IA-5(13)—Authenticator Management
PBMM (P2)
Secret (P2)
Technical
>Control Description
AUTHENTICATOR MANAGEMENT | EXPIRATION OF CACHED AUTHENTICATORS The information system prohibits the use of cached authenticators after ⚙organization-defined time period.
>Tailoring Guidance
This security control/enhancement is considered to be best practice. Consequently, inclusion in a departmental profile is strongly encouraged in most cases. The organization must determine the maximum life of cached authenticators as part of tailoring this control.
Ask AI
Configure your API key to use AI features.