IA-5(7): No Embedded Unencrypted Static Authenticators

CSF v1.1 References:


(Not part of any baseline)

Previous Version:

Control Statement

Ensure that unencrypted static authenticators are not embedded in applications or other forms of static storage.

Supplemental Guidance

In addition to applications, other forms of static storage include access scripts and function keys. Organizations exercise caution when determining whether embedded or stored authenticators are in encrypted or unencrypted form. If authenticators are used in the manner stored, then those representations are considered unencrypted authenticators.