Monterey - Map identity for PKI based authentication
Information
Without mapping the certificate used to authenticate to the user account, the ability to determine the identity of the individual user or group will not be available for forensic analysis.
Solution
For directory bound systems, the technology inherently meets this requirement. No fix is required.