IA-13.3 ยท Token Management

Control Description

In accordance with {{ insert: param, ia-13_odp.01 }}, assertions and access tokens are:

Impact Baselines
Security baselines where this control applies
Not in any baseline
Control Properties
SP800-53-enhancement
organization
Enhancement
Control Statement
The control requirements

In accordance with {{ insert: param, ia-13_odp.01 }}, assertions and access tokens are:

(a) generated;

(b) issued;

(c) refreshed;

(d) revoked;

(e) time-restricted; and

(f) audience-restricted.

Supplemental Guidance

An access token is a piece of data that represents the authorization granted to a user or NPE to access specific systems or information resources. Access tokens enable controlled access to services and resources. Properly managing the lifecycle of access tokens, including their issuance, validation, and revocation, is crucial to maintaining confidentiality of data and systems. Restricting token validity to a specific audience, e.g., an application or security domain, and restricting token validity lifetimes are important practices. Access tokens are revoked or invalidated if they are compromised, lost, or are no longer needed to mitigate the risks associated with stolen or misused tokens.