Show/Hide Toolbars

ABCI Consultants

Guidance for NIST 800-171 Assessment & Compliance

Navigation: IA-FAMILY: IDENTIFICATION AND AUTHENTICATION

IA-5(2) AUTHENTICATOR MANAGEMENT  |  PKI-BASED AUTHENTICATION (FED)

Scroll Prev Top Next More

Applicable

(Y)es / (N)o

(C)onfidentiality

(I)ntegrity

(A)vailability

RPN

(C+I+A)

(S)atisfactory

L1

M2

H3

L1

M2

H3

L1

M2

H3

(O)ther than satisfactory +##

 

 

 

 

 

 

 

 

 

 

 

 

###

ia-5(2)

authenticator management  | pki-based authentication

 

assessment objective:

Determine if the information system, for PKI-based authentication:

ia-5(2)(a)

ia-5(2)(a)[1]

validates certifications by constructing a certification path to an accepted trust anchor;

ia-5(2)(a)[2]

validates certifications by verifying a certification path to an accepted trust anchor;

ia-5(2)(a)[3]

includes checking certificate status information when constructing and verifying the certification path;

ia-5(2)(b)

enforces authorized access to the corresponding private key;

ia-5(2)(c)

maps the authenticated identity to the account of the individual or group; and

ia-5(2)(d)

implements a local cache of revocation data to support path discovery and validation in case of inability to access revocation information via the network.

potential assessment methods and objects:

Examine: [select from: Identification and authentication policy; procedures addressing authenticator management; security plan; information system design documentation; information system configuration settings and associated documentation; PKI certification validation records; PKI certification revocation lists; other relevant documents or records].

Interview: [select from: Organizational personnel with PKI-based, authenticator management responsibilities; organizational personnel with information security responsibilities; system/network administrators; system developers].

Test: [select from: Automated mechanisms supporting and/or implementing PKI-based, authenticator management capability].

Hosted by ABCI Consultants for Information Security Management Systems | Implementations, Training and Assessments for Compliance | (800) 644-2056