The organization manages information system authenticators by implementing administrative procedures for lost/compromised authenticators.
No STIG checks reference this CCI.