4.4—4.4
>Control Description
In Risk-adaptive Application Access, access privileges are granted based on a combination of a user’s identity, mission need, and the level of security risk that exists between the system being accessed and a user. RAdAC will use security metrics, such as the strength of the authentication method, the level of assurance of the session connection between the system and a user, and the physical location of a user, to make its risk determination.
Ask AI
Configure your API key to use AI features.