An error occurred:
Close sidebar
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: bugfix-XSS-85-d5bffe - rmfrev4
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: bugfix-XSS-85-d5bffe - rmfrev4
Open sidebar
Navigate
Top
Search
CCIs (
5137
)
Pages (
66/172
)
CCIs
Number
Definition
Status
Related
CCI-001981
Manage system authenticators by establishing administrative procedures for initial authenticator distribution.
Draft
IA-5
CCI-001982
The organization manages information system authenticators by establishing administrative procedures for lost/compromised authenticators.
Draft
IA-5
CCI-001983
The organization manages information system authenticators by establishing administrative procedures for damaged authenticators.
Draft
IA-5
CCI-001984
Manage system authenticators by establishing administrative procedures for revoking authenticators.
Draft
IA-5
CCI-001985
Manage system authenticators by implementing administrative procedures for initial authenticator distribution.
Draft
IA-5
CCI-001986
The organization manages information system authenticators by implementing administrative procedures for lost/compromised authenticators.
Draft
IA-5
CCI-001987
The organization manages information system authenticators by implementing administrative procedures for damaged authenticators.
Draft
IA-5
CCI-001988
Manage system authenticators by implementing administrative procedures for revoking authenticators.
Draft
IA-5
CCI-001989
The organization manages information system authenticators by changing default content of authenticators prior to information system installation.
Draft
IA-5
CCI-001990
Manage system authenticators by changing authenticators for group or role accounts when membership to those accounts changes.
Draft
IA-5
CCI-001991
The information system, for PKI-based authentication, implements a local cache of revocation data to support path discovery and validation in case of inability to access revocation information via the network.
Draft
IA-5(2)
CCI-001992
The organization defines the personnel or roles responsible for authorizing the organization's registration authority accountable for the authenticator registration process.
Draft
IA-5(3)
CCI-001993
The organization defines the registration authority accountable for the authenticator registration process.
Draft
IA-5(3)
CCI-001994
The organization defines the types of and/or specific authenticators that are subject to the authenticator registration process.
Draft
IA-5(3)
CCI-001995
The organization requires that the registration process, to receive organization-defined types of and/or specific authenticators, be conducted in person, or by a trusted third-party, before an organization-defined registration authority with authorization by organization-defined personnel or roles.
Draft
IA-5(3)
CCI-001996
The organization defines the requirements required by the automated tools to determine if password authenticators are sufficiently strong.
Draft
IA-5(4)
CCI-001997
The organization employs automated tools to determine if password authenticators are sufficiently strong to satisfy organization-defined requirements.
Draft
IA-5(4)
CCI-001998
Require developers and installers of system components to provide unique authenticators or change default authenticators prior to delivery and installation.
Draft
IA-5(5)
CCI-001999
The organization defines the external organizations to be coordinated with for cross-organization management of credentials.
Draft
IA-5(9)
CCI-002000
The organization coordinates with organization-defined external organizations for cross-organization management of credentials.
Draft
IA-5(9)
CCI-002001
Bind identities and authenticators dynamically using organization-defined binding rules.
Draft
IA-5(10)
CCI-002002
The organization defines the token quality requirements to be employed by the information system mechanisms for token-based authentication.
Draft
IA-5(11)
CCI-002003
The information system, for token-based authentication, employs mechanisms that satisfy organization-defined token quality requirements.
Draft
IA-5(11)
CCI-002004
Defines the biometric quality requirements to be employed by the mechanisms for biometric-based authentication.
Draft
IA-5(12)
CCI-002005
For biometric-based authentication, employ mechanisms that satisfy organization-defined biometric quality requirements.
Draft
IA-5(12)
CCI-002006
Defines the time period after which the use of cached authenticators is prohibited.
Draft
IA-5(13)
CCI-002007
Prohibit the use of cached authenticators after an organization-defined time period.
Draft
IA-5(13)
CCI-002008
For PKI-based authentication, employs an organization-wide methodology for managing the content of PKI trust stores installed across all platforms including networks, operating systems, browsers, and applications.
Draft
IA-5(14)
CCI-002009
Accept Personal Identity Verification-compliant credentials from other federal agencies.
Draft
IA-8(1)
CCI-002010
Electronically verify Personal Identity Verification-compliant credentials from other federal agencies.
Draft
IA-8(1)
Prev
1...
62
63
64
65
66
67
68
69
70
...172
Next