IA-7—Cryptographic Module Authentication
PBMM (P2)
Secret (P2)
Technical
>Control Description
(A) The information system implements mechanisms for authentication to a cryptographic module that meet the requirements of applicable GC legislation and TBS policies, directives, and standards for such authentication.
>Supplemental Guidance
Authentication mechanisms may be required within a cryptographic module to authenticate an operator accessing the module and to verify that the operator is authorized to assume the requested role and perform services within that role. Related controls: SC-12, SC-13
>Tailoring Guidance
This security control/enhancement is considered to be best practice. Consequently, inclusion in a departmental profile is strongly encouraged in most cases. For additional guidance please refer to ITSG-31 User Authentication Guidance for IT Systems.
Ask AI
Configure your API key to use AI features.