manage.get.gov/docs/compliance/dist/system-security-plans/ato/ia-5.6.md
Logan McDonald 1d3dfdb8d5
Add compliance documentation to source control (#116)
* add initial setup of compliance-trestle
2022-09-14 08:46:43 -04:00

1.2 KiB

implementation-status control-origination
c-not-implemented
c-inherited-cloud-gov
c-inherited-cisa
c-common-control
c-system-specific-control

ia-5.6 - [catalog] Protection of Authenticators

Control Statement

Protect authenticators commensurate with the security category of the information to which use of the authenticator permits access.

Control guidance

For systems that contain multiple security categories of information without reliable physical or logical separation between categories, authenticators used to grant access to the systems are protected commensurate with the highest security category of information on the systems. Security categories of information are determined as part of the security categorization process.

Control assessment-objective

authenticators are protected commensurate with the security category of the information to which use of the authenticator permits access.


What is the solution and how is it implemented?

Add control implementation description here for control ia-5.6