PR.AC-7: Users, devices, and other assets are authenticated (e.g., single-factor, multi-factor) commensurate with the risk of the transaction (e.g., individuals’ security and privacy risks and other organizational risks)

Threats Addressed:

Description

[csf.tools Note: Subcategories do not have detailed descriptions.]