CCI-001987
CCI-001987 Definition
The organization manages information system authenticators by implementing administrative procedures for damaged authenticators.
Status | |
Type | CheckType.policy |
Master Assessment Datasheet
Implementation Guidance
The organization being inspected/assessed implements administrative procedures for the response to damaged authenticators as documented in IA-5, CCI 1983.
Validation Procedures
The organization conducting the inspection/assessment obtains and examines documented procedures for the response to damaged authenticators to ensure that the organization being inspected/assessed implements the process as defined in IA-5, CCI 1983.
Compelling Evidence
1.) Signed and dated Key Management Policy implementing administrative procedures for the response to damaged authenticators and the procedures involving secure disposal of authenticators as document in IA-5, CCI 1983.