Description |
---|
Require the authentication of devices and software processes where appropriate. Devices that connect remotely to other systems should require strong authentication to prevent spoofing of communications. Furthermore, software processes should also require authentication when accessing APIs. |
Field | Old value | New value |
---|---|---|
modified | 2023-09-20 13:12:24.527000+00:00 | 2024-10-14 20:31:04.927000+00:00 |
x_mitre_attack_spec_version | 3.1.0 | 3.2.0 |
x_mitre_version | 1.0 | 1.1 |
labels[2] | NIST SP 800-53 Rev. 5 - IA-9 | NIST SP 800-53 Rev. 5 - IA-3 |