STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← IA-5 (6) — Authenticator Management

CCI-000201

Definition

Protect authenticators commensurate with the security category of the information to which use of the authenticator permits access.

Parent Control

IA-5 (6)Authenticator ManagementIdentification and Authentication

Linked STIG Checks (2)

V-222641CAT IIThe application must use encryption to implement key exchange and authenticate endpoints prior to establishing a communication channel for key exchange.Application Security and Development Security Technical Implementation GuideV-22347CAT IIThe /etc/passwd file must not contain password hashes.SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide