STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← All Controls

IA-5

Identification and AuthenticationRev 5organization

Authenticator Management

Baselines:LowModerateHigh

Control Statement

Manage system authenticators by:

Supplemental Guidance

Authenticators include passwords, cryptographic devices, biometrics, certificates, one-time password devices, and ID badges. Device authenticators include certificates and passwords. Initial authenticator content is the actual content of the authenticator (e.g., the initial password). In contrast, the requirements for authenticator content contain specific criteria or characteristics (e.g., minimum password length). Developers may deliver system components with factory default authentication credentials (i.e., passwords) to allow for initial installation and configuration. Default authentication credentials are often well known, easily discoverable, and present a significant risk. The requirement to protect individual authenticators may be implemented via control [PL-4](#pl-4) or [PS-6](#ps-6) for authenticators in the possession of individuals and by controls [AC-3](#ac-3), [AC-6](#ac-6) , and [SC-28](#sc-28) for authenticators stored in organizational systems, including passwords stored in hashed or encrypted formats or files containing encrypted or hashed passwords accessible with administrator privileges. Systems support authenticator management by organization-defined settings and restrictions for various authenticator characteristics (e.g., minimum password length, validation time window for time synchronous one-time tokens, and number of allowed rejections during the verification stage of biometric authentication). Actions can be taken to safeguard individual authenticators, including maintaining possession of authenticators, not sharing authenticators with others, and immediately reporting lost, stolen, or compromised authenticators. Authenticator management includes issuing and revoking authenticators for temporary access when no longer needed.

Related Controls (13)

AC-3AC-6CM-6IA-2IA-4IA-7IA-8IA-9MA-4PE-2PL-4SC-12SC-13

CCI Identifiers (30)

CCI-000177The organization manages information system authenticators for users and devices by establishing and implementing administrative procedures for initial authenticator distribution, for lost/compromised, or damaged authenticators, and for revoking authenticators.CCI-000178The organization manages information system authenticators for users and devices by changing default content of authenticators upon information system installation.CCI-000179The organization manages information system authenticators by establishing minimum lifetime restrictions for authenticators.CCI-000175The organization manages information system authenticators for users and devices by verifying, as part of the initial authenticator distribution, the identity of the individual and/or device receiving the authenticator.CCI-000176Manage system authenticators by establishing initial authenticator content for authenticators issued by the organization.CCI-002042Manage system authenticators by protecting authenticator content from unauthorized modification.CCI-001988Manage system authenticators by implementing administrative procedures for revoking authenticators.

Linked STIG Checks (5)

Across 3 STIGs. Click to expand.

CCI-000180
The organization manages information system authenticators by establishing maximum lifetime restrictions for authenticators.
CCI-000181The organization manages information system authenticators by establishing reuse conditions for authenticators.
CCI-000182Manage system authenticators by changing or refreshing authenticators in accordance with the organization-defined time period by authenticator type or when organization-defined events occur.
CCI-000183Manage system authenticators by protecting authenticator content from unauthorized disclosure.
CCI-000184Manage system authenticators by requiring individuals to take, and having devices implement, specific security controls to protect authenticators.
CCI-001980Manage system authenticators by verifying, as part of the initial authenticator distribution, the identity of the individual, group, role, service, or device receiving the authenticator.
CCI-004053Manage system authenticators by establishing administrative procedures for lost/compromised or damaged authenticators.
CCI-004054Manage system authenticators by implementing administrative procedures for lost/compromised or damaged authenticators.
CCI-004055Manage system authenticators by changing default authenticators prior to first use.
CCI-004056Defines the events for when to change or refresh authenticators.
CCI-001544Manage system authenticators by ensuring that authenticators have sufficient strength of mechanism for their intended use.
CCI-001610Defines the time-period (by authenticator type) for changing/refreshing authenticators.
CCI-001981Manage system authenticators by establishing administrative procedures for initial authenticator distribution.
CCI-001982The organization manages information system authenticators by establishing administrative procedures for lost/compromised authenticators.
CCI-001983The organization manages information system authenticators by establishing administrative procedures for damaged authenticators.
CCI-001984Manage system authenticators by establishing administrative procedures for revoking authenticators.
CCI-001985Manage system authenticators by implementing administrative procedures for initial authenticator distribution.
CCI-001986The organization manages information system authenticators by implementing administrative procedures for lost/compromised authenticators.
CCI-001987The organization manages information system authenticators by implementing administrative procedures for damaged authenticators.
CCI-001989The organization manages information system authenticators by changing default content of authenticators prior to information system installation.
CCI-001990Manage system authenticators by changing authenticators for group or role accounts when membership to those accounts changes.
CCI-002365The organization manages information system authenticators by requiring individuals to take specific security safeguards to protect authenticators.
CCI-002366The organization manages information system authenticators by having devices implement specific security safeguards to protect authenticators.