πΌ IA-5 Authenticator Management
- Contextual name: πΌ IA-5 Authenticator Management
- ID:
/frameworks/nist-sp-800-53-r5/ia/05
- Located in: πΌ IA Identification And Authentication
Descriptionβ
Manage system authenticators by: a. Verifying, as part of the initial authenticator distribution, the identity of the individual, group, role, service, or device receiving the authenticator; b. Establishing initial authenticator content for any authenticators issued by the organization; c. Ensuring that authenticators have sufficient strength of mechanism for their intended use; d. Establishing and implementing administrative procedures for initial authenticator distribution, for lost or compromised or damaged authenticators, and for revoking authenticators; e. Changing default authenticators prior to first use; f. Changing or refreshing authenticators [Assignment: organization-defined time period by authenticator type] or when [Assignment: organization-defined events] occur; g. Protecting authenticator content from unauthorized disclosure and modification; h. Requiring individuals to take, and having devices implement, specific controls to protect authenticators; and i. Changing authenticators for group or role accounts when membership to those accounts changes.
Similarβ
- Sections
/frameworks/aws-fsbp-v1.0.0/dms/10
/frameworks/aws-fsbp-v1.0.0/dms/11
/frameworks/aws-fsbp-v1.0.0/transfer-family/02
- Internal
- ID:
dec-c-42a21b57
- ID:
Similar Sections (Take Policies From)β
Similar Sections (Give Policies To)β
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
πΌ FedRAMP High Security Controls β πΌ IA-5 Authenticator Management (L)(M)(H) | 6 | 14 | 32 | |
πΌ FedRAMP Low Security Controls β πΌ IA-5 Authenticator Management (L)(M)(H) | 1 | 32 | ||
πΌ NIST CSF v2.0 β πΌ PR.AA-01: Identities and credentials for authorized users, services, and hardware are managed by the organization | 38 | |||
πΌ NIST CSF v2.0 β πΌ PR.AA-03: Users, services, and hardware are authenticated | 32 |
Sub Sectionsβ
Policies (8)β
Policy | Logic Count | Flags |
---|---|---|
π Google BigQuery Dataset is not encrypted with Customer-Managed Encryption Key (CMEK) π’ | 1 | π’ x6 |
π Google BigQuery Table is not encrypted with Customer-Managed Encryption Key (CMEK) π’ | 1 | π’ x6 |
π Google Dataproc Cluster is not encrypted using Customer-Managed Encryption Key π’ | 1 | π’ x6 |
π Google GCE Disk for critical VMs is not encrypted with Customer-Supplied Encryption Key (CSEK) π’ | 1 | π’ x6 |
π Google GCE Instance Block Project-Wide SSH Keys is not enabled π’ | 1 | π’ x6 |
π Google GCE Instance Confidential Compute is not enabled π’ | 1 | π’ x6 |
π Google GCE Instance is configured to use the Default Service Account π’ | 1 | π’ x6 |
π Google GCE Instance is configured to use the Default Service Account with full access to all Cloud APIs π’ | 1 | π’ x6 |