4.1.2—4.1.2
>Control Description
+ The procedures for user authentication have been selected based on a risk assessment. Possible attack scenarios have been considered (e.g. direct accessibility via the internet).
+ State of the art procedures for user authentication are applied.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.