IA-7 Cryptographic Module Authentication (L) (M) (H)
Page 249/478 Date 16.12.2020 Size 1.2 Mb. #54609
FedRAMP-SSP-High-Baseline-Template FedRAMP-SSP-High-Baseline-Template ,
North Carolina Summary Table of Ecoregion Characteristics IA-7 Cryptographic Module Authentication (L) (M) (H)
The information system implements mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws , Executive Orders, directives , policies, regulations , standards, and guidance for such authentication.
IA-7
Control Summary Information
Responsible Role:
Implementation Status (check all that apply):
☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable
Control Origination (check all that apply):
☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for Click here to enter text. ,
IA-7 What is the solution and how is it implemented?
Share with your friends:
The database is protected by copyright ©ininet.org 2024
send message