3.5.2[c]—Authenticate Users, Processes, and Devices Assessment [c]
>Control Description
the identity of each device accessing or connecting to the system is authenticated or verified as a prerequisite to system access.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.