Employ controls to ensure that only individuals or systems receive the following information, system components, or devices: information, system components, or devices.
Techniques employed by organizations to ensure that only designated systems or individuals receive certain information, system components, or devices include sending authenticators via an approved courier service but requiring recipients to show some form of government-issued photographic identification as a condition of receipt.
controls are employed to ensure that only individuals or systems receive information, system components, or devices.
No cross-framework mappings available