Skip to main content

πŸ’Ό IA-5(2) Public Key-based Authentication (M)(H)

Description​

(a) For public key-based authentication:

  1. Enforce authorized access to the corresponding private key; and

  2. Map the authenticated identity to the account of the individual or group; and

(b) When public key infrastructure (PKI) is used:

  1. Validate certificates by constructing and verifying a certification path to an accepted trust anchor, including checking certificate status information; and

  2. Implement a local cache of revocation data to support path discovery and validation.

Similar​

  • Sections
    • /frameworks/nist-sp-800-53-r5/ia/05/02
  • Internal
    • ID: dec-c-f184dc63

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό NIST SP 800-53 Revision 5 β†’ πŸ’Ό IA-5(2) Authenticator Management _ Public Key-based Authentication

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό FedRAMP Moderate Security Controls β†’ πŸ’Ό IA-5(2) Public Key-based Authentication (M)(H)1

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags

Policies (1)​

PolicyLogic CountFlags
πŸ“ AWS IAM User with console and programmatic access set during the initial creation 🟒🟒 x3

Internal Rules​

RulePoliciesFlags
βœ‰οΈ dec-x-b10e98af1