💼 6 The following are examples where increased authentication strength is typically required, given the impact should an identity be falsified:
a. administration or other privileged access to sensitive or critical information assets;
b. remote access (i.e. via public networks) to sensitive or critical information assets;
c. high-risk activities (e.g. third-party fund transfers, creation of new payees)
- ID:
/frameworks/apra-cpg-234/c/6
Description
Empty...
Similar
Sub Sections
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|
Policies (2)
Internal Rules
| Rule | Policies | Flags |
|---|
| ✉️ dec-x-b92b08f4 | 1 | |
| ✉️ dec-z-bb731292 | 1 | |