3.1.1—Limit System Access Assessment
>Control Description
Determine if: authorized users are identified.; processes acting on behalf of authorized users are identified.; devices (including other systems) authorized to connect to the system are identified.
Ask AI
Configure your API key to use AI features.