1.8: Utilize Client Certificates to Authenticate Hardware Assets
CSF v1.1 References:
PF v1.0 References:
Threats Addressed:
Group:
The next version of the control set incorporates all or part of this control into: 13.9: Deploy Port-Level Access Control.
Control Statement
Use client certificates to authenticate hardware assets connecting to the organization’s trusted network.
[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]