2.12 All authentication decisions are loggedΒΆ
Verify that all suspicious authentication decisions are logged. This should include requests with relevant metadata needed for security investigations.
Levels: 2, 3
Verify that all suspicious authentication decisions are logged. This should include requests with relevant metadata needed for security investigations.
Levels: 2, 3