STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← All Controls

IA-5 (13)

Identification and AuthenticationRev 5system

Authenticator Management

Control Statement

Prohibit the use of cached authenticators after [Assignment: time period].

Supplemental Guidance

Cached authenticators are used to authenticate to the local machine when the network is not available. If cached authentication information is out of date, the validity of the authentication information may be questionable.

CCI Identifiers (2)

CCI-002007Prohibit the use of cached authenticators after an organization-defined time period.CCI-002006Defines the time period after which the use of cached authenticators is prohibited.

Linked STIG Checks (83)

Across 72 STIGs. Click to expand.