IA-5 (14)
IA-5 (14) Description
The organization, for PKI-based authentication, employs a deliberate organization-wide methodology for managing the content of PKI trust stores installed across all platforms including networks, operating systems, browsers, and applications.
Supplemental
None
CIA Levels | |
---|---|
Confidentiality | low |
Integrity | low |
Availability | unknown |
Overlays |
---|