IAC-10.5 ยท Protection of Authenticators

Control Description

Mechanisms exist to protect authenticators commensurate with the sensitivity of the information to which use of the authenticator permits access.

Control Question
Assessment question for control validation

Does the organization protect authenticators commensurate with the sensitivity of the information to which use of the authenticator permits access?

Control Weighting
10
Validation Cadence
Annual
NIST CSF Function
Protect
Supply Chain Risk Management (SCRM) Tiers
Applicable SCRM tier levels for this control
Tier 2 - Operational
Tier 3 - Tactical
Core Control Designations
Special designations and baseline inclusions
ESP Level 2: IAC-10.5
ESP Level 3: IAC-10.5