https://tsecurity.de/de/1385119/IT+Reverse+Engineering/Sicherheitsl%C3%BCcken/IBM+Security+Identity+Governance+and+Intelligence+5.2.6+inadequate+encryption/
IBM Security Identity Governance and Intelligence 5.2.6 inadequate encryption