logo

Database

Summary

The system must require authentication for all resources, except for the consultation or visualization of those specifically classified as public.

Description

Sometimes systems have information and other resources that are not considered public. These resources should be protected by a secure authentication mechanism that prevents unauthorized actors from accessing them.

References

Weaknesses

Supported In

This requirement is verified in following services

Essential Plan

Yes

Advanced Plan

Yes