Privacy and confidentiality requirements
Integrity requirements
Non-repudiation
Compliance and policy requirements
Common cryptography use cases
Data at rest
Data in transit
Data in process/data in use
Protection of web services
Embedded systems
Key escrow/management
Mobile security
Secure authentication
Smart card
Common PKI use cases
Web services
Email
Code signing
Federation
Trust models
VPN
Enterprise and security automation/orchestration