IA-5(6): Protection of Authenticators

CSF v1.1 References:


  • Moderate
  • High

Previous Version:

Control Statement

Protect authenticators commensurate with the security category of the information to which use of the authenticator permits access.

Supplemental Guidance

For systems that contain multiple security categories of information without reliable physical or logical separation between categories, authenticators used to grant access to the systems are protected commensurate with the highest security category of information on the systems. Security categories of information are determined as part of the security categorization process.