Under active development Content is continuously updated and improved

2-2-22-2-2

>Control Description

Implement strong authentication standard to access IoT devices and services, and follow best practices, including but not limited to: ▪ Prevent the users from using default and hard-coded passwords. ▪ Enforce the users to change their passwords periodically. ▪ Improve the complexity of passwords, such as by defining a minimum key length and usage of a combination ofletters (upper/lower cases), numbers and symbols; ▪ Implement controls to prevent the display of user's credentials on login interfaces in applications. ▪ Establish threshold limits for unsuccessful attempts. ▪ Enable secure authentication capabilities, if applicable.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.