IA-2 (5)
IA-2 (5): Group Authentication
The organization requires individuals to be authenticated with an individual authenticator when a group authenticator is employed.
Supplemental
Requiring individuals to use individual authenticators as a second level of authentication helps organizations to mitigate the risk of using group authenticators.
CIA Levels | |
---|---|
Confidentiality | low |
Integrity | low |
Availability | unknown |
Overlays |
---|
None |