2.26 Sensitive operations are sufficiently protectedΒΆ

Verify re-authentication, step up or adaptive authentication, two factor authentication, or transaction signing is required before any application-specific sensitive operations are permitted as per the risk profile of the application.

Levels: 2, 3