The organization manages information system authenticators by implementing administrative procedures for damaged authenticators.
No STIG checks reference this CCI.