Implement mechanisms for authentication to a cryptographic module that meet the requirements of applicable laws, executive orders, directives, policies, regulations, standards, and guidelines for such authentication.
|
|
| Control Identifier | IA-7 |
| Latest Sync Date | 19/12/24 09:18:14 |
| Discussion | Authentication mechanisms may be required within a cryptographic module to authenticate an operator accessing the module and to verify that the operator is authorized to assume the requested role and perform services within that role. |
| Related Controls | AC-3, IA-5, SA-4, SC-12, SC-13. |