4. Cryptographic Settings1 min read Data Protection & Compliance4. Cryptographic Settings Strong ciphers only Strong MACs only Strong key exchange algorithms Weak algorithms disabled Appropriate host key algorithms← Previous: 3. Access Controls Next: 5. Connection Security →