Under active development Content is continuously updated and improved

IA-7Cryptographic Module Authentication

PBMM (P2)
Secret (P2)
Technical

>Control Description

(A) The information system implements mechanisms for authentication to a cryptographic module that meet the requirements of applicable GC legislation and TBS policies, directives, and standards for such authentication.

>Supplemental Guidance

Authentication mechanisms may be required within a cryptographic module to authenticate an operator accessing the module and to verify that the operator is authorized to assume the requested role and perform services within that role. Related controls: SC-12, SC-13

>Tailoring Guidance

This security control/enhancement is considered to be best practice. Consequently, inclusion in a departmental profile is strongly encouraged in most cases. For additional guidance please refer to ITSG-31 User Authentication Guidance for IT Systems.

Ask AI

Configure your API key to use AI features.