This objective ensures that once passwords are required and in use, your systems are also configured to protect them—during storage and use. This includes enforcing secure handling, encryption, and preventing unauthorized access or exposure of password data.