Cryptography
145. Protect system cryptographic keys223. Uniform distribution in random numbers146. Remove cryptographic keys from RAM224. Use secure cryptographic mechanisms147. Use pre-existent mechanisms336. Disable insecure TLS versions148. Set minimum size of asymmetric encryption338. Implement perfect forward secrecy149. Set minimum size of symmetric encryption346. Use initialization vectors once150. Set minimum size for hash functions371. Use GCM Padding with AES151. Separate keys for encryption and signatures