From 3156111322dd2e7b10d5e0ac5eb5b94b88a20c70 Mon Sep 17 00:00:00 2001 From: Steve Springett Date: Thu, 1 Feb 2024 17:33:43 -0600 Subject: [PATCH] Content update --- CBOM/en/0x20-Use-Cases.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/CBOM/en/0x20-Use-Cases.md b/CBOM/en/0x20-Use-Cases.md index b4a33be..464dd6c 100644 --- a/CBOM/en/0x20-Use-Cases.md +++ b/CBOM/en/0x20-Use-Cases.md @@ -25,8 +25,7 @@ approach to inventorying cryptographic assets and evaluating their resilience ag cryptographic algorithms and their respective parameters, CBOM enables organizations to identify vulnerable or weak components that require mitigation or replacement with quantum-resistant alternatives recommended by NSA and NIST. Through comprehensive analysis and strategic planning facilitated by CBOM, organizations can proactively transition to -post-quantum cryptographic primitives, ensuring the long-term security and integrity of their systems and applications -in the face of evolving technological landscapes. +post-quantum cryptographic primitives, ensuring the long-term security and integrity of their systems and applications. ## Cryptographic Requirements and Certifications CBOM facilitates the assessment of whether cryptographic implementations meet the stringent criteria outlined by