View source for Category:PR.AC-7: Users, devices, and other assets are authenticated (e.g., single-factor, multi-factor) commensurate with the risk of the transaction (e.g., individuals’ security and privacy risks and other organizational risks)
From GCA ACT
Jump to navigationJump to search
You do not have permission to edit this page, for the following reason:
You can view and copy the source of this page.