IA-5(13): Expiration of Cached Authenticators

CSF v1.1 References:

Threats Addressed:

Baselines:

(Not part of any baseline)

Previous Version:

Control Statement

Prohibit the use of cached authenticators after [Assignment: organization-defined time period].

Supplemental Guidance

Cached authenticators are used to authenticate to the local machine when the network is not available. If cached authentication information is out of date, the validity of the authentication information may be questionable.