IA-5(13)
IA-5(13): Expiration of Cached Authenticators
Prohibit the use of cached authenticators after [the time period after which the use of cached authenticators is prohibited is defined;].
Supplemental
Cached authenticators are used to authenticate to the local machine when the network is not available. If cached authentication information is out of date, the validity of the authentication information may be questionable.
| CIA Levels | |
|---|---|
| Confidentiality | low |
| Integrity | low |
| Availability | unknown |
| Overlays |
|---|
| None |
| CSF Categories |
|---|
| None |