logo

351 Assign unique keys to each device


Summary

Each individual device must have unique cryptographic keys and certificates.


Description

A system that is using unique cryptographic keys applied to devices can prevent unauthorized devices from gaining access to a network or system. Without the proper keys and certificates, a device should not be able to establish a secure connection or participate in transactions.


Supported In

Advanced: True


References


Last updated

2024/02/05