IAC-12.1 ยท Hardware Security Modules (HSM)

Control Description

Automated mechanisms exist to utilize Hardware Security Modules (HSM) to protect authenticators on which the component relies.

Control Question
Assessment question for control validation

Does the organization use automated mechanisms to utilize Hardware Security Modules (HSM) to protect authenticators on which the component relies?

Control Weighting
3
Validation Cadence
Quarterly
NIST CSF Function
Protect
Supply Chain Risk Management (SCRM) Tiers
Applicable SCRM tier levels for this control
Tier 3 - Tactical