logo

Database

Summary

Systems that manages business-critical information must require digital certificates from the client. This must be done especially during the authentication process.

Description

This control suggests the implementation of a security measure in which client systems interacting with or accessing business-critical information must present valid digital certificates. This practice enhances authentication, secure communication, and control access to sensitive business data.