DCS-08: Equipment Identification

Control Family:

Datacenter Security

CSF v1.1 References:

PF v1.0 References:

Previous Version:

Control Statement

Use equipment identification as a method for connection authentication.

Implementation Guidance

Where applicable, use location-aware technologies to validate connection authentication integrity based on known equipment locations.

Auditing Guidance

  1. Examine the policy relating to equipment classification and identification.
  2. Determine if appropriate methods are implemented.
  3. Confirm the existence of a process or procedure to track and maintain a list of appropriate equipment permitted for authorised connections.

[csf.tools Note: For more information on the Cloud Controls Matrix, visit the CSA Cloud Controls Matrix Homepage.]

Cloud Control Matrix is Copyright 2023 Cloud Security Alliance.