IAC-26—Permitted Actions Without Identification or Authorization
Weight: 8
>Control Description
Mechanisms exist to identify and document the supporting rationale for specific user actions that can be performed on a system without identification or authentication.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.