Automated mechanisms exist to enable systems to authenticate to a cryptographic module.
Control Question
Assessment question for control validation
Does the organization use automated mechanisms to enable systems to authenticate to a cryptographic module?
Supply Chain Risk Management (SCRM) Tiers
Applicable SCRM tier levels for this control
Core Control Designations
Special designations and baseline inclusions