Under active development Content is continuously updated and improved

IA-05(07)Authenticator Management | No Embedded Unencrypted Static Authenticators

Moderate

>Control Description

Ensure that unencrypted static authenticators are not embedded in applications or other forms of static storage.

>Discussion

In addition to applications, other forms of static storage include access scripts and function keys. Organizations exercise caution when determining whether embedded or stored authenticators are in encrypted or unencrypted form. If authenticators are used in the manner stored, then those representations are considered unencrypted authenticators.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.