Skip to main content

πŸ’Ό IA-5(2) Authenticator Management | Public Key-based Authentication

  • Contextual name: πŸ’Ό IA-5(2) Authenticator Management | Public Key-based Authentication
  • ID: /frameworks/nist-sp-800-53-r5/ia/05/02
  • Located in: πŸ’Ό IA-5 Authenticator Management

Description​

(a) For public key-based authentication: (1) Enforce authorized access to the corresponding private key; and (2) Map the authenticated identity to the account of the individual or group; and (b) When public key infrastructure (PKI) is used: (1) Validate certificates by constructing and verifying a certification path to an accepted trust anchor, including checking certificate status information; and (2) Implement a local cache of revocation data to support path discovery and validation.

Similar​

  • Internal
    • ID: dec-c-677149db

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό IA-5(2) Public Key-based Authentication (M)(H)11

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags