Identities and credentials for authorized devices and users shall be managed.
Identities and credentials for authorized devices and users shall be managed, where feasible through automated mechanisms.
System credentials shall be deactivated after a specified period of inactivity unless it would compromise the safe operation of (critical) processes.
For transactions within the organization's critical systems, the organization shall implement: • multi-factor end-user authentication (MFA or "strong authentication"). • certificate-based authentication for system-to-system communications
The organization’s critical systems shall be monitored for atypical use of system credentials. Credentials associated with significant risk shall be disabled.