1.3.3—1.3.3
>Control Description
Alternative Multi-Factor Authentication (MFA) methods utilize user activity patterns from cross pillar activities such as "User Activity Monitoring (UAM) and User & Entity Behavior Analytics (UEBA)" to assist with access decision making (e.g., not grant access when pattern deviation occurs).
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.