Under active development Content is continuously updated and improved

IA-3Device Identification And Authentication

>Control Description

Enterprises should implement capabilities to distinctly and positively identify devices and software within their supply chain and, once identified, verify that the identity is authentic. Devices that require unique device-to-device identification and authentication should be defined by type, device, or a combination of type and device. Software that requires authentication should be identified through a software identification tag (SWID) that enables verification of the software package and authentication of the enterprise releasing the software package.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.