STIGhub
STIGs
RMF Controls
Compare
← All Controls
IA-5 (2)
Identification and Authentication
Rev 5
Authenticator Management
CCI Identifiers (5)
CCI-000185
For public key-based authentication, validate certificates by constructing and verifying a certification path to an accepted trust anchor including checking certificate status information.
CCI-000186
For public key-based authentication, enforce authorized access to the corresponding private key.
CCI-000187
For public key-based authentication, map the authenticated identity to the account of the individual or group.
CCI-001991
The information system, for PKI-based authentication, implements a local cache of revocation data to support path discovery and validation in case of inability to access revocation information via the network.
CCI-004068
For public key-based authentication, implement a local cache of revocation data to support path discovery and validation.
Linked STIG Checks (200)
Across 74 STIGs. Click to expand.
▶
A10 Networks ADC ALG Security Technical Implementation Guide
1 check
▶
AAA Services Security Requirements Guide
5 checks
▶
Adobe ColdFusion Security Technical Implementation Guide
2 checks
▶
Amazon Linux 2023 Security Technical Implementation Guide
3 checks
▶
Anduril NixOS Security Technical Implementation Guide
4 checks
▶
Apache Server 2.4 UNIX Server Security Technical Implementation Guide
1 check
▶
Apache Server 2.4 UNIX Site Security Technical Implementation Guide
2 checks
▶
Apache Server 2.4 Windows Server Security Technical Implementation Guide
1 check
▶
Apache Server 2.4 Windows Site Security Technical Implementation Guide
1 check
▶
Apache Tomcat Application Server 9 Security Technical Implementation Guide
3 checks
▶
Apple macOS 12 (Monterey) Security Technical Implementation Guide
3 checks
▶
Apple macOS 13 (Ventura) Security Technical Implementation Guide
3 checks
▶
Apple macOS 14 (Sonoma) Security Technical Implementation Guide
4 checks
▶
Apple macOS 15 (Sequoia) Security Technical Implementation Guide
4 checks
▶
Apple macOS 26 (Tahoe) Security Technical Implementation Guide
4 checks
▶
Application Layer Gateway Security Requirements Guide
3 checks
▶
Application Security and Development Security Technical Implementation Guide
4 checks
▶
Application Server Security Requirements Guide
4 checks
▶
ArcGIS for Server 10.3 Security Technical Implementation Guide
2 checks
▶
Arctic Wolf CylanceON-PREM Security Technical Implementation Guide
3 checks
▶
AvePoint Compliance Guardian Security Technical Implementation Guide
2 checks
▶
Axonius Federal Systems Ax-OS Security Technical Implementation Guide
1 check
▶
BIND 9.x Security Technical Implementation Guide
6 checks
▶
CA API Gateway ALG Security Technical Implementation Guide
2 checks
▶
Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide
2 checks
▶
Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide
5 checks
▶
Canonical Ubuntu 22.04 LTS Security Technical Implementation Guide
5 checks
▶
Canonical Ubuntu 24.04 LTS Security Technical Implementation Guide
4 checks
▶
Central Log Server Security Requirements Guide
4 checks
▶
Cisco ACI NDM Security Technical Implementation Guide
1 check
▶
Cisco ASA VPN Security Technical Implementation Guide
5 checks
▶
Cisco ISE NDM Security Technical Implementation Guide
1 check
▶
Cloud Computing Mission Owner Network Security Requirements Guide
2 checks
▶
Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide
3 checks
▶
Container Platform Security Requirements Guide
3 checks
▶
Crunchy Data Postgres 16 Security Technical Implementation Guide
3 checks
▶
Crunchy Data PostgreSQL Security Technical Implementation Guide
3 checks
▶
Database Security Requirements Guide
4 checks
▶
Dell OS10 Switch NDM Security Technical Implementation Guide
2 checks
▶
Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide
5 checks
▶
Domain Name System (DNS) Security Requirements Guide
7 checks
▶
Dragos Platform 2.x Security Technical Implementation Guide
2 checks
▶
EDB Postgres Advanced Server v11 on Windows Security Technical Implementation Guide
2 checks
▶
EDB Postgres Advanced Server v9.6 Security Technical Implementation Guide
2 checks
▶
Enterprise Voice, Video, and Messaging Session Management Security Requirements Guide
1 check
▶
EnterpriseDB Postgres Advanced Server (EPAS) Security Technical Implementation Guide
3 checks
▶
F5 BIG-IP Access Policy Manager Security Technical Implementation Guide
4 checks
▶
F5 BIG-IP Local Traffic Manager Security Technical Implementation Guide
4 checks
▶
F5 BIG-IP TMOS ALG Security Technical Implementation Guide
4 checks
▶
F5 BIG-IP TMOS NDM Security Technical Implementation Guide
2 checks
▶
F5 NGINX Security Technical Implementation Guide
4 checks
▶
Forescout Network Access Control Security Technical Implementation Guide
1 check
▶
Forescout Network Device Management Security Technical Implementation Guide
1 check
▶
General Purpose Operating System Security Requirements Guide
4 checks
▶
Google Chrome Current Windows Security Technical Implementation Guide
1 check
▶
HP FlexFabric Switch NDM Security Technical Implementation Guide
2 checks
▶
HPE 3PAR SSMC Operating System Security Technical Implementation Guide
1 check
▶
HPE 3PAR SSMC Web Server Security Technical Implementation Guide
2 checks
▶
HPE 3PAR StoreServ 3.3.x Security Technical Implementation Guide
1 check
▶
HPE Alletra Storage ArcusOS Network Device Management Security Technical Implementation Guide
1 check
▶
HPE Aruba Networking AOS NDM Security Technical Implementation Guide
2 checks
▶
HPE Aruba Networking AOS VPN Security Technical Implementation Guide
4 checks
▶
HPE Nimble Storage Array NDM Security Technical Implementation Guide
1 check
▶
HYCU Protege Security Technical Implementation Guide
1 check
▶
IBM AIX 7.x Security Technical Implementation Guide
3 checks
▶
IBM DataPower ALG Security Technical Implementation Guide
3 checks
▶
IBM DataPower Network Device Management Security Technical Implementation Guide
1 check
▶
IBM MQ Appliance V9.0 AS Security Technical Implementation Guide
1 check
▶
IBM MQ Appliance v9.0 NDM Security Technical Implementation Guide
2 checks
▶
IBM WebSphere Liberty Server Security Technical Implementation Guide
2 checks
▶
IBM WebSphere Traditional V9.x Security Technical Implementation Guide
4 checks
▶
IBM z/OS ACF2 Security Technical Implementation Guide
3 checks
▶
IBM z/OS RACF Security Technical Implementation Guide
3 checks
▶
IBM z/OS TSS Security Technical Implementation Guide
1 check