The organization shall implement documented procedures for verifying the identity of individuals before issuing credentials that provide access to organization's systems.
The organization shall ensure the use of unique credentials bound to each verified user, device, and process interacting with the organization's critical systems; make sure that they are authenticated, and that the unique identifiers are captured when performing system interactions.