Allocation and management of authentication information shall be controlled by a management process, including advising personnel on appropriate handling of authentication information.
Last updated 2 years ago