Fedramp system Security Plan (ssp) High Baseline Template


IA-5 Authenticator Management (H)



Download 1.2 Mb.
Page238/478
Date16.12.2020
Size1.2 Mb.
#54609
1   ...   234   235   236   237   238   239   240   241   ...   478
FedRAMP-SSP-High-Baseline-Template
FedRAMP-SSP-High-Baseline-Template, North Carolina Summary Table of Ecoregion Characteristics

IA-5 Authenticator Management (H)


The organization manages information system authenticators by:

  1. Verifying, as part of the initial authenticator distribution, the identity of the individual, group, role, or device receiving the authenticator;

  2. Establishing initial authenticator content for authenticators defined by the organization;

  3. Ensuring that authenticators have sufficient strength of mechanism for their intended use;

  4. Establishing and implementing administrative procedures for initial authenticator distribution, for lost/compromised or damaged authenticators, and for revoking authenticators;

  5. Changing default content of authenticators prior to information system installation;

  6. Establishing minimum and maximum lifetime restrictions and reuse conditions for authenticators;

  7. Changing/refreshing authenticators [Assignment: organization-defined time period by authenticator type].

  8. Protecting authenticator content from unauthorized disclosure and modification;

  9. Requiring individuals to take, and having devices implement, specific security safeguards to protect authenticators; and

  10. Changing authenticators for group/role accounts when membership to those accounts changes.


Download 1.2 Mb.

Share with your friends:
1   ...   234   235   236   237   238   239   240   241   ...   478




The database is protected by copyright ©ininet.org 2024
send message

    Main page