SECURE-15. SECURITY AUDITS

SECURE-14. SECURITY LOGS

SECURE-13. REVOCATION

SECURE-12. RECOVERY AND REISSUANCE

SECURE-11. KEY MANAGEMENT

SECURE-10. UPTIME

SECURE-9. AUTHENTICATION RISK ASSESSMENT

SECURE-8. MULTIFACTOR AUTHENTICATION

SECURE-7. TOKEN CONTROL

SECURE-6. CREDENTIAL UNIQUENESS