4.D(2)(g)—Multi-Factor Authentication
>Control Description
Utilize effective controls, which may include Multi-Factor Authentication procedures for any individual accessing Nonpublic Information;
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.