Skip to main content

💼 IA-5(2) Public Key-based Authentication (M)(H)

  • ID: /frameworks/fedramp-moderate-security-controls/ia/05/02

Description

(a) For public key-based authentication:

  1. Enforce authorized access to the corresponding private key; and

  2. Map the authenticated identity to the account of the individual or group; and

(b) When public key infrastructure (PKI) is used:

  1. Validate certificates by constructing and verifying a certification path to an accepted trust anchor, including checking certificate status information; and

  2. Implement a local cache of revocation data to support path discovery and validation.

Similar

  • Sections
    • /frameworks/fedramp-high-security-controls/ia/05/02
  • Internal
    • ID: dec-c-f184dc63

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 FedRAMP High Security Controls → 💼 IA-5(2) Public Key-based Authentication (M)(H)11no data

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance

Policies (1)

PolicyLogic CountFlagsCompliance
🛡️ AWS IAM User with console and programmatic access set during the initial creation🟢⚪🟢 x2, ⚪ x1no data