Under active development Content is continuously updated and improved

1.3.31.3.3

>Control Description

Alternative Multi-Factor Authentication (MFA) methods utilize user activity patterns from cross pillar activities such as "User Activity Monitoring (UAM) and User & Entity Behavior Analytics (UEBA)" to assist with access decision making (e.g., not grant access when pattern deviation occurs).

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.