Employ [controls to be employed to ensure that only designated individuals or systems receive specific information, system components, or devices are defined;] to ensure that only [individuals or systems designated to receive specific information, system components, or devices are defined;] receive the following information, system components, or devices: [information, system components, or devices that only individuals or systems are designated to receive are defined;].
Supplemental
Techniques employed by organizations to ensure that only designated systems or individuals receive certain information, system components, or devices include sending authenticators via an approved courier service but requiring recipients to show some form of government-issued photographic identification as a condition of receipt.