Require equipment identity
Summary
A system with critical information must require the identification of the equipment from which a user or system is authenticated.
Description
The requirement includes capturing information about the device used for access that can be used to identify it uniquely. This can include information such as device ID, hardware characteristics, IP address, or other identifying data. It helps to ensure that the authentication request is being originated from a recognized and authorized device, reducing the risk of unauthorized access to critical data.
References
- CAPEC-114. Authentication abuse
- OWASP10-A7. Identification and authentication failures
- MITRE-M1025. Privileged process integrity
- SANS25-13. Improper authentication
- PDPO-S1_4. Security of personal data
- CMMC-MP_L2-3_8_1. Media protection
- CMMC-MP_L2-3_8_8. Shared media
- HITRUST-01_k. Equipment identification in networks
- HITRUST-08_b. Physical entry controls
- ISO27002-5_37. Documented operating procedures
- OSSTMM3-8_7_4. Physical security (controls verification) - Integrity
- PTES-7_4_4_1. Post Exploitation - Pillaging (user information on system)
- SWIFTCSC-3_1. Physical security
- SIG-D_1_1_2. Asset and information management
- ASVS-2_8_2. One time verifier
- ISO27001-5_37. Documented operating procedures
- CASA-2_8_2. One Time Verifier
- CWE25-287. Improper authentication
Search for vulnerabilities in your apps for free with Fluid Attacks' automated security testing! Start your 21-day free trial and discover the benefits of the Continuous Hacking Essential plan.If you prefer the Advanced plan, which includes the expertise of Fluid Attacks' hacking team, fill out this contact form.
Supported In
This requirement is verified in following services
Essential Plan
Advanced Plan