Archive content originally produced by CESG that has not yet been absorbed into the new NCSC web pages.
This guidance is for those responsible for the selection, implementation and administration of user authentication systems. It will also enable informed decisions to be made on the security related requirements by the system designer.
This file may not be suitable for users of assistive technology.
We need your feedback to improve this content.