IAC-28: Does the organization verify the identity of a user before issuing authenticators or modifying access permissions?

Mechanisms exist to verify the identity of a user before issuing authenticators or modifying access permissions.

Description

Mechanisms exist to verify the identity of a user before issuing authenticators or modifying access permissions.