Skip to main content

💼 IA-5(2) Public Key-based Authentication (M)(H)

Description

(a) For public key-based authentication:

  1. Enforce authorized access to the corresponding private key; and

  2. Map the authenticated identity to the account of the individual or group; and

(b) When public key infrastructure (PKI) is used:

  1. Validate certificates by constructing and verifying a certification path to an accepted trust anchor, including checking certificate status information; and

  2. Implement a local cache of revocation data to support path discovery and validation.

Similar

  • Sections
    • /frameworks/nist-sp-800-53-r5/ia/05/02
  • Internal
    • ID: dec-c-f184dc63

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlags
💼 NIST SP 800-53 Revision 5 → 💼 IA-5(2) Authenticator Management _ Public Key-based Authentication

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlags
💼 FedRAMP Moderate Security Controls → 💼 IA-5(2) Public Key-based Authentication (M)(H)1

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlags

Policies (1)

PolicyLogic CountFlags
📝 AWS IAM User with console and programmatic access set during the initial creation 🟢🟢 x3

Internal Rules

RulePoliciesFlags
✉️ dec-x-b10e98af1