IA-5(11)
IA-5(11): Hardware Token-based Authentication
The information system, for hardware token-based authentication, employs mechanisms that satisfy [organization-defined token quality requirements].
Supplemental
Hardware token-based authentication typically refers to the use of PKI-based tokens, such as the U.S. Government Personal Identity Verification (PIV) card. Organizations define specific requirements for tokens, such as working with a particular PKI.
CIA Levels | |
---|---|
Confidentiality | unknown |
Integrity | unknown |
Availability | unknown |
Overlays |
---|
None |
CSF Categories |
---|
None |