ISO 27001 8.5 Secure Authentication Requirement:
"Secure authentication technologies and procedures shall be implemented based on information access restrictions and the topic-specific policy on access control."[1]
ISO 27001 8.5 Secure Authentication Requirement Explanation:
Authentication technology used by the organization should be modern and replay resistant. Where possible multi-factor authentication should be used.
References:
Quick & Simple
Discover Our Cybersecurity Compliance Solutions:
Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you