Protocol source authentication (for example EAP-TLS vs password vs no auth)
Internal vs External source/control
admin configuration (did the admin configure the source)
history of configuration change (length of time since last change)
source certification (biometrics, for example)
history of use
Known exploits
internal source verification/detection (i.e. PAD, self-tests, KAT)
Protocol source authentication (for example EAP-TLS vs password vs no auth) Internal vs External source/control admin configuration (did the admin configure the source) history of configuration change (length of time since last change) source certification (biometrics, for example) history of use Known exploits internal source verification/detection (i.e. PAD, self-tests, KAT)