IA-2(5)
IA-2(5): Group Authentication
The organization requires individuals to be authenticated with an individual authenticator when a group authenticator is employed.
Supplemental
Requiring individuals to use individual authenticators as a second level of authentication helps organizations to mitigate the risk of using group authenticators.
CIA Levels | |
---|---|
Confidentiality | high |
Integrity | high |
Availability | unknown |
Overlays |
---|
None |
CSF Categories |
---|
None |