PR.AC-P6: Individuals and devices are proofed and bound to credentials, and authenticated commensurate with the risk of the transaction (e.g., individuals’ security and privacy risks and other organizational risks).

CSF v1.1 References:

Description

[csf.tools Note: Subcategories do not have detailed descriptions.]