Under active development Content is continuously updated and improved

4.1.24.1.2

>Control Description

+ The procedures for user authentication have been selected based on a risk assessment. Possible attack scenarios have been considered (e.g. direct accessibility via the internet). + State of the art procedures for user authentication are applied.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.