STIGhub
STIGs
RMF Controls
Compare
← All Controls
IA-5
Identification and Authentication
Rev 3
Authenticator Management
CCI Identifiers (30)
CCI-000175
The organization manages information system authenticators for users and devices by verifying, as part of the initial authenticator distribution, the identity of the individual and/or device receiving the authenticator.
CCI-000176
Manage system authenticators by establishing initial authenticator content for authenticators issued by the organization.
CCI-000177
The organization manages information system authenticators for users and devices by establishing and implementing administrative procedures for initial authenticator distribution, for lost/compromised, or damaged authenticators, and for revoking authenticators.
CCI-000178
The organization manages information system authenticators for users and devices by changing default content of authenticators upon information system installation.
CCI-000179
The organization manages information system authenticators by establishing minimum lifetime restrictions for authenticators.
CCI-000180
The organization manages information system authenticators by establishing maximum lifetime restrictions for authenticators.
CCI-000181
The organization manages information system authenticators by establishing reuse conditions for authenticators.
CCI-000182
Manage system authenticators by changing or refreshing authenticators in accordance with the organization-defined time period by authenticator type or when organization-defined events occur.
CCI-000183
Manage system authenticators by protecting authenticator content from unauthorized disclosure.
CCI-000184
Manage system authenticators by requiring individuals to take, and having devices implement, specific security controls to protect authenticators.
CCI-001544
Manage system authenticators by ensuring that authenticators have sufficient strength of mechanism for their intended use.
CCI-001610
Defines the time-period (by authenticator type) for changing/refreshing authenticators.
CCI-001987
The organization manages information system authenticators by implementing administrative procedures for damaged authenticators.
CCI-001988
Manage system authenticators by implementing administrative procedures for revoking authenticators.
CCI-001980
Manage system authenticators by verifying, as part of the initial authenticator distribution, the identity of the individual, group, role, service, or device receiving the authenticator.
CCI-001981
Manage system authenticators by establishing administrative procedures for initial authenticator distribution.
CCI-001982
The organization manages information system authenticators by establishing administrative procedures for lost/compromised authenticators.
CCI-001983
The organization manages information system authenticators by establishing administrative procedures for damaged authenticators.
CCI-001984
Manage system authenticators by establishing administrative procedures for revoking authenticators.
CCI-001985
Manage system authenticators by implementing administrative procedures for initial authenticator distribution.
CCI-001986
The organization manages information system authenticators by implementing administrative procedures for lost/compromised authenticators.
CCI-001989
The organization manages information system authenticators by changing default content of authenticators prior to information system installation.
CCI-001990
Manage system authenticators by changing authenticators for group or role accounts when membership to those accounts changes.
CCI-002042
Manage system authenticators by protecting authenticator content from unauthorized modification.
CCI-002365
The organization manages information system authenticators by requiring individuals to take specific security safeguards to protect authenticators.
CCI-002366
The organization manages information system authenticators by having devices implement specific security safeguards to protect authenticators.
CCI-004053
Manage system authenticators by establishing administrative procedures for lost/compromised or damaged authenticators.
CCI-004054
Manage system authenticators by implementing administrative procedures for lost/compromised or damaged authenticators.
CCI-004055
Manage system authenticators by changing default authenticators prior to first use.
CCI-004056
Defines the events for when to change or refresh authenticators.
Linked STIG Checks (5)
Across 3 STIGs. Click to expand.
▶
Application Security and Development Security Technical Implementation Guide
1 check
▶
IBM Hardware Management Console (HMC) STIG
1 check
▶
SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide
3 checks