Use equipment identification as a method for connection authentication.
Where applicable, use location-aware technologies to validate connection authentication integrity based on known equipment locations.
- Examine the policy relating to equipment classification and identification.
- Determine if appropriate methods are implemented.
- Confirm the existence of a process or procedure to track and maintain a list of appropriate equipment permitted for authorised connections.
[csf.tools Note: For more information on the Cloud Controls Matrix, visit the CSA Cloud Controls Matrix Homepage.]
Cloud Control Matrix is Copyright 2023 Cloud Security Alliance.