Manage system authenticators by requiring individuals to take, and having devices implement, specific security controls to protect authenticators.