Focusing on storage and use within an organization and adding standard information security practices, the certification was created specifically for the crypto industry. For example, it analyzes how a provider generates keys, the hardware it uses, and how the policy and workflow engine works, as well as the cybersecurity controls used.