2.30 Use a proven secure authentication mechanismΒΆ
Verify that if an application allows users to authenticate, they use a proven secure authentication mechanism.
Levels: 1, 2, 3
Verify that if an application allows users to authenticate, they use a proven secure authentication mechanism.
Levels: 1, 2, 3