The organization manages information system authenticators by having devices implement specific security safeguards to protect authenticators.
No STIG checks reference this CCI.