Under active development Content is continuously updated and improved

4.44.4

>Control Description

In Risk-adaptive Application Access, access privileges are granted based on a combination of a user’s identity, mission need, and the level of security risk that exists between the system being accessed and a user. RAdAC will use security metrics, such as the strength of the authentication method, the level of assurance of the session connection between the system and a user, and the physical location of a user, to make its risk determination.

Ask AI

Configure your API key to use AI features.