Skip to main content

πŸ’Ό IA-5(2) Public Key-based Authentication (M)(H)

  • Contextual name: πŸ’Ό IA-5(2) Public Key-based Authentication (M)(H)
  • ID: /frameworks/fedramp-moderate-security-controls/ia/05/02
  • Located in: πŸ’Ό IA-5 Authenticator Management (L)(M)(H)

Description​

(a) For public key-based authentication:

  1. Enforce authorized access to the corresponding private key; and

  2. Map the authenticated identity to the account of the individual or group; and

(b) When public key infrastructure (PKI) is used:

  1. Validate certificates by constructing and verifying a certification path to an accepted trust anchor, including checking certificate status information; and

  2. Implement a local cache of revocation data to support path discovery and validation.

Similar​

  • Sections
    • /frameworks/fedramp-high-security-controls/ia/05/02
  • Internal
    • ID: dec-c-f184dc63

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό IA-5(2) Public Key-based Authentication (M)(H)11

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags

Policies (1)​

PolicyLogic CountFlags
πŸ“ AWS IAM User with console and programmatic access set during the initial creation 🟒🟒 x3