This objective requires your organization to identify which types of device identifiers (e.g., IP addresses, MAC addresses, hardware tokens, certificates) are used to support system authentication. This applies to both user devices and system-to-system authentication in environments handling Controlled Unclassified Information (CUI).