The organization manages information system authenticators by establishing administrative procedures for damaged authenticators.
No STIG checks reference this CCI.