💼 IA-5 Authenticator Management (L)(M)(H)
- Contextual name: 💼 IA-5 Authenticator Management (L)(M)(H)
- ID:
/frameworks/fedramp-high-security-controls/ia/05
- Located in: 💼 Identification and Authentication
Description
Manage system authenticators by:
a. Verifying, as part of the initial authenticator distribution, the identity of the individual, group, role, service, or device receiving the authenticator;
b. Establishing initial authenticator content for any authenticators issued by the organization;
c. Ensuring that authenticators have sufficient strength of mechanism for their intended use;
d. Establishing and implementing administrative procedures for initial authenticator distribution, for lost or compromised or damaged authenticators, and for revoking authenticators;
e. Changing default authenticators prior to first use;
f. Changing or refreshing authenticators [Assignment: organization-defined time period by authenticator type] or when [Assignment: organization-defined events] occur;
g. Protecting authenticator content from unauthorized disclosure and modification;
h. Requiring individuals to take, and having devices implement, specific controls to protect authenticators; and
i. Changing authenticators for group or role accounts when membership to those accounts changes.
IA-5 Additional FedRAMP Requirements and Guidance:
Guidance: SP 800-63C Section 6.2.3 Encrypted Assertion requires that authentication assertions be encrypted when passed through third parties, such as a browser. For example, a SAML assertion can be encrypted using XML-Encryption, or an OpenID Connect ID Token can be encrypted using JSON Web Encryption (JWE).
Requirement: Authenticators must be compliant with NIST SP 800-63-3 Digital Identity Guidelines IAL, AAL, FAL level 2. Link https://pages.nist.gov/800-63-3.
Similar
- Sections
/frameworks/nist-sp-800-53-r5/ia/05
- Internal
- ID:
dec-c-eecfdaef
- ID:
Similar Sections (Take Policies From)
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
💼 NIST SP 800-53 Revision 5 → 💼 IA-5 Authenticator Management | 18 | 16 |
Similar Sections (Give Policies To)
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
💼 FedRAMP Low Security Controls → 💼 IA-5 Authenticator Management (L)(M)(H) | 1 | 32 | ||
💼 FedRAMP Moderate Security Controls → 💼 IA-5 Authenticator Management (L)(M)(H) | 4 | 32 |
Sub Sections
Policies (25)
Internal Rules
Rule | Policies | Flags |
---|---|---|
✉️ dec-x-0be4dfe5 | 1 | |
✉️ dec-x-0feec790 | 2 | |
✉️ dec-x-4d6fee7a | 1 | |
✉️ dec-x-6c93750d | 1 | |
✉️ dec-x-12a85339 | 1 | |
✉️ dec-x-82ca4127 | 2 | |
✉️ dec-x-4157c58a | 1 | |
✉️ dec-x-30795016 | 1 | |
✉️ dec-x-b10e98af | 1 | |
✉️ dec-x-bcb0c78f | 1 | |
✉️ dec-x-ca52f63a | 2 | |
✉️ dec-x-e58fd8e0 | 1 | |
✉️ dec-x-f7c2faac | 1 | |
✉️ dec-z-79f4ab88 | 1 |