logo

264 Request authentication


Summary

The system must require authentication for all resources, except for the consultation or visualization of those specifically classified as public.


Description

Sometimes systems have information and other resources that are not considered public. These resources should be protected by a secure authentication mechanism that prevents unauthorized actors from accessing them.


Supported In

Essential: True

Advanced: True


References


Weaknesses


Last updated

2024/03/05