2-2-2—2-2-2
>Control Description
Implement strong authentication standard to access IoT devices and services, and follow best practices, including but not limited to:
▪ Prevent the users from using default and hard-coded passwords.
▪ Enforce the users to change their passwords periodically.
▪ Improve the complexity of passwords, such as by defining a minimum key length and usage of a combination ofletters (upper/lower cases), numbers and symbols;
▪ Implement controls to prevent the display of user's credentials on login interfaces in applications.
▪ Establish threshold limits for unsuccessful attempts.
▪ Enable secure authentication capabilities, if applicable.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.