IA-5(6)

  • Requirement

    Protect authenticators commensurate with the security category of the information to which use of the authenticator permits access.

  • Discussion

    For systems that contain multiple security categories of information without reliable physical or logical separation between categories, authenticators used to grant access to the systems are protected commensurate with the highest security category of information on the systems. Security categories of information are determined as part of the security categorization process.

More Info

  • Title

    Authenticator Management | Protection of Authenticators
  • Family

    Identification and Authentication
  • NIST 800-53B Baseline(s)

    • Moderate
    • High
  • Related NIST 800-53 ID

    RA-2

NIST 800-53A Assessment Guidance

CMMC Training

Our CMMC Overview Course simplifies CMMC. Enroll so you can make informed decisions!