IAM-39—Hardware Tokens
>Control Description
Where applicable, hardware token-based authentication is facilitated only by approved organizations.
Theme
Process
Type
Preventive
Policy/Standard
Access Management Procedure>Implementation Guidance
1. Design the process for hardware token-based authentication. 2. Ensure that the hardware tokens are assigned to the corresponding users.
>Testing Procedure
1. Inspect the process by which hardware token-based authentication is distributed, used, and collected. 2. For a sample of users, inspect the inventory of the hardware tokens and ensure that they are assigned to the corresponding users.
>Audit Artifacts
E-IAM-54
E-IAM-55
>Framework Mappings
Cross-framework mappings provided by Adobe CCF Open Source under Creative Commons License.
Ask AI
Configure your API key to use AI features.