This objective requires your organization to identify how you protect the authenticity of communications sessions involving Controlled Unclassified Information (CUI). You must ensure that when users or systems communicate, you can verify who is on the other end and that the session hasn’t been hijacked, altered, or spoofed.

🍪 We Use Cookies

To enhance your experience and analyze site usage, we use cookies. By continuing to use our site, you agree to our use of cookies in accordance with our Privacy Policy.