The organization manages information system authenticators by establishing reuse conditions for authenticators.
No STIG checks reference this CCI.