Number | Title | Impact | Priority | Subject Area |
---|---|---|---|---|
IA-7 | Cryptographic Module Authentication | LOW | P1 | Identification And Authentication |
Instructions |
---|
The information system implements mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication. |
Guidance |
---|
Authentication mechanisms may be required within a cryptographic module to authenticate an operator accessing the module and to verify that the operator is authorized to assume the requested role and perform services within that role. |
Enhancements |
---|