IA-5 (14)
IA-5 (14): Managing Content Of Pki Trust Stores
The organization, for PKI-based authentication, employs a deliberate organization-wide methodology for managing the content of PKI trust stores installed across all platforms including networks, operating systems, browsers, and applications.
Supplemental
None
CIA Levels | |
---|---|
Confidentiality | low |
Integrity | low |
Availability | unknown |
Overlays |
---|
None |