IA-5(13)

  • Requirement

    Prohibit the use of cached authenticators after [Assignment: organization-defined time period].

  • Discussion

    Cached authenticators are used to authenticate to the local machine when the network is not available. If cached authentication information is out of date, the validity of the authentication information may be questionable.

More Info

  • Title

    Authenticator Management | Expiration of Cached Authenticators
  • Family

    Identification and Authentication
  • NIST 800-53B Baseline(s)

    • Related NIST 800-53 ID

    NIST 800-53A Assessment Guidance

    CMMC Training

    Our CMMC Overview Course simplifies CMMC. Enroll so you can make informed decisions!