Show/Hide Toolbars

ABCI Consultants

Guidance for NIST 800-171 Assessment & Compliance

Navigation: IA-FAMILY: IDENTIFICATION AND AUTHENTICATION

IA-5(1) AUTHENTICATOR MANAGEMENT  |  PASSWORD-BASED AUTHENTICATION

Scroll Prev Top Next More

Applicable

(Y)es / (N)o

(C)onfidentiality

(I)ntegrity

(A)vailability

RPN

(C+I+A)

(S)atisfactory

L1

M2

H3

L1

M2

H3

L1

M2

H3

(O)ther than satisfactory +##

 

 

 

 

 

 

 

 

 

 

 

 

###

ia-5(1)

authenticator management  | password-based authentication

 

assessment objective:

Determine if, for password-based authentication:

ia-5(1)(a)

ia-5(1)(a)[1]

the organization defines requirements for case sensitivity;

ia-5(1)(a)[2]

the organization defines requirements for number of characters;

ia-5(1)(a)[3]

the organization defines requirements for the mix of upper-case letters, lower-case letters, numbers and special characters;

ia-5(1)(a)[4]

the organization defines minimum requirements for each type of character;

ia-5(1)(a)[5]

the information system enforces minimum password complexity of organization-defined requirements for case sensitivity, number of characters, mix of upper-case letters, lower-case letters, numbers, and special characters, including minimum requirements for each type;

ia-5(1)(b)

ia-5(1)(b)[1]

the organization defines a minimum number of changed characters to be enforced when new passwords are created;

ia-5(1)(b)[2]

the information system enforces at least the organization-defined minimum number of characters that must be changed when new passwords are created;

ia-5(1)(c)

the information system stores and transmits only encrypted representations of passwords;

ia-5(1)(d)

ia-5(1)(d)[1]

the organization defines numbers for password minimum lifetime restrictions to be enforced for passwords;

ia-5(1)(d)[2]

the organization defines numbers for password maximum lifetime restrictions to be enforced for passwords;

ia-5(1)(d)[3]

the information system enforces password minimum lifetime restrictions of organization-defined numbers for lifetime minimum;

ia-5(1)(d)[4]

the information system enforces password maximum lifetime restrictions of organization-defined numbers for lifetime maximum;

ia-5(1)(e)

ia-5(1)(e)[1]

the organization defines the number of password generations to be prohibited from password reuse;

ia-5(1)(e)[2]

the information system prohibits password reuse for the organization-defined number of generations; and

ia-5(1)(f)

the information system allows the use of a temporary password for system logons with an immediate change to a permanent password.

potential assessment methods and objects:

Examine: [select from: Identification and authentication policy; password policy; procedures addressing authenticator management; security plan; information system design documentation; information system configuration settings and associated documentation; password configurations and associated documentation; other relevant documents or records].

Interview: [select from: Organizational personnel with authenticator management responsibilities; organizational personnel with information security responsibilities; system/network administrators; system developers].

Test: [select from: Automated mechanisms supporting and/or implementing password-based authenticator management capability].

Hosted by ABCI Consultants for Information Security Management Systems | Implementations, Training and Assessments for Compliance | (800) 644-2056