IA-7
IA-7: Cryptographic Module Authentication
The information system implements mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.
Supplemental
Authentication mechanisms may be required within a cryptographic module to authenticate an operator accessing the module and to verify that the operator is authorized to assume the requested role and perform services within that role.
CIA Levels | |
---|---|
Confidentiality | high |
Integrity | high |
Availability | unknown |
Overlays |
---|
Privacy (High), Privacy (Low), Privacy (Mod), Privacy (PHI) |
CSF Categories |
---|
PR.AC-1 |