|
IA-5 (8) What is the solution and how is it implemented?
|
Page | 246/478 | Date | 16.12.2020 | Size | 1.2 Mb. | | #54609 |
| FedRAMP-SSP-High-Baseline-Template FedRAMP-SSP-High-Baseline-Template, North Carolina Summary Table of Ecoregion CharacteristicsIA-5 (8) What is the solution and how is it implemented?
|
IA-5 (11) Control Enhancement (L) (M) (H)
The information system, for hardware token-based authentication, employs mechanisms that satisfy [Assignment: organization-defined token quality requirements].
IA-5 (11)
|
Control Summary Information
|
Responsible Role:
|
Parameter IA-5 (11)
|
Implementation Status (check all that apply):
☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable
|
Control Origination (check all that apply):
☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for Click here to enter text. ,
|
IA-5 (11) What is the solution and how is it implemented?
|
|
Share with your friends: |
The database is protected by copyright ©ininet.org 2024
send message
|
|