Under active development Content is continuously updated and improved

IA-5(6)Authenticator Management | Protection of Authenticators

IL4 Mod
IL4 High
IL5
IL6

>Control Description

Protect authenticators commensurate with the security category of the information to which use of the authenticator permits access.

>DoD Impact Level Requirements

No specific parameter values or requirements for this impact level.

>Discussion

For systems that contain multiple security categories of information without reliable physical or logical separation between categories, authenticators used to grant access to the systems are protected commensurate with the highest security category of information on the systems. Security categories of information are determined as part of the security categorization process.

>Programmatic Queries

Beta

Related Services

Secrets Manager
KMS
Hardware Security Module

CLI Commands

Store secret in Secrets Manager
aws secretsmanager create-secret --name SECRET_NAME --description 'Protected secret' --secret-string '{"username":"user","password":"pass"}'
Enable secret rotation
aws secretsmanager rotate-secret --secret-id SECRET_NAME --rotation-lambda-arn LAMBDA_ARN --rotation-rules AutomaticallyAfterDays=30
Get secret with encryption status
aws secretsmanager describe-secret --secret-id SECRET_NAME --query 'Secret.{Name:Name,KmsKeyId:KmsKeyId,LastRotatedDate:LastRotatedDate}'

>Related Controls

>Assessment Interview Topics

Questions assessors commonly ask

Process & Governance:

  • What formal policies and procedures govern the implementation of IA-5(6) (Protection Of Authenticators)?
  • Who are the designated roles responsible for implementing, maintaining, and monitoring IA-5(6)?
  • How frequently is the IA-5(6) policy reviewed and updated, and what triggers policy changes?
  • What governance structure ensures IA-5(6) requirements are consistently applied across all systems?

Technical Implementation:

  • Describe the specific technical mechanisms or controls used to enforce IA-5(6) requirements.
  • What automated tools, systems, or technologies are deployed to implement IA-5(6)?
  • How is IA-5(6) integrated into your system architecture and overall security posture?
  • What configuration settings, parameters, or technical specifications enforce IA-5(6) requirements?

Evidence & Documentation:

  • What documentation demonstrates the complete implementation of IA-5(6)?
  • What audit logs, records, reports, or monitoring data validate IA-5(6) compliance?
  • Can you provide evidence of periodic reviews, assessments, or testing of IA-5(6) effectiveness?
  • What artifacts would you present during a FedRAMP assessment to demonstrate IA-5(6) compliance?

Ask AI

Configure your API key to use AI features.