A system with critical information must require the identification of the equipment from which a user or system is authenticated.
The requirement includes capturing information about the device used for access that can be used to identify it uniquely. This can include information such as device ID, hardware characteristics, IP address, or other identifying data. It helps to ensure that the authentication request is being originated from a recognized and authorized device, reducing the risk of unauthorized access to critical data.
This requirement is verified in following services
Plan | Supported |
---|---|
Essential | 🔴 |
Advanced | 🟢 |