💼 6 The following are examples where increased authentication strength is typically required, given the impact should an identity be falsified:
a. administration or other privileged access to sensitive or critical information assets;
b. remote access (i.e. via public networks) to sensitive or critical information assets;
c. high-risk activities (e.g. third-party fund transfers, creation of new payees)
- Contextual name: 💼 6 The following are examples where increased authentication strength is typically required, given the impact should an identity be falsified:
a. administration or other privileged access to sensitive or critical information assets;
b. remote access (i.e. via public networks) to sensitive or critical information assets;
c. high-risk activities (e.g. third-party fund transfers, creation of new payees)
- ID:
/frameworks/apra-cpg-234/c/6
- Located in: 💼 Attachment C - Identity and access
Description
Empty...
Similar
Sub Sections
Section | Sub Sections | Internal Rules | Policies | Flags |
---|
Policies (2)
Internal Rules
Rule | Policies | Flags |
---|
✉️ dec-x-b92b08f4 | 1 | |
✉️ dec-z-bb731292 | 1 | |