IA-5(14)—Authenticator Management
PBMM (P2)
Secret (P2)
Technical
>Control Description
AUTHENTICATOR MANAGEMENT | MANAGING CONTENT OF PKI TRUST STORES The organization, for PKI-based authentication, employs a deliberate organization-wide methodology for managing the content of PKI trust stores installed across all platforms including networks, operating systems, browsers, and applications.
>Tailoring Guidance
This security control/enhancement is considered to be best practice. Consequently, inclusion in a departmental profile is strongly encouraged in most cases.
Ask AI
Configure your API key to use AI features.