Under active development Content is continuously updated and improved

IA-5(13)Authenticator Management

PBMM (P2)
Secret (P2)
Technical

>Control Description

AUTHENTICATOR MANAGEMENT | EXPIRATION OF CACHED AUTHENTICATORS The information system prohibits the use of cached authenticators after organization-defined time period.

>Tailoring Guidance

This security control/enhancement is considered to be best practice. Consequently, inclusion in a departmental profile is strongly encouraged in most cases. The organization must determine the maximum life of cached authenticators as part of tailoring this control.

Ask AI

Configure your API key to use AI features.