This objective requires your organization to identify which types of device identifiers (e.g., IP addresses, MAC addresses, hardware tokens, certificates) are used to support system authentication. This applies to both user devices and system-to-system authentication in environments handling Controlled Unclassified Information (CUI).

🍪 We Use Cookies

To enhance your experience and analyze site usage, we use cookies. By continuing to use our site, you agree to our use of cookies in accordance with our Privacy Policy.