National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

NIST Special Publication 800-53 (Rev. 4)

Security and Privacy Controls for Federal Information Systems and Organizations

IA-7 CRYPTOGRAPHIC MODULE AUTHENTICATION

Family:
IA - IDENTIFICATION AND AUTHENTICATION
Class:
Priority:
P1 - Implement P1 security controls first.
Baseline Allocation:
Low Moderate High
IA-7 IA-7 IA-7

Control Description

The information system implements mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.

Supplemental Guidance

Authentication mechanisms may be required within a cryptographic module to authenticate an operator accessing the module and to verify that the operator is authorized to assume the requested role and perform services within that role.

Related to: SC-12SC-13

Control Enhancements

None.

References

FIPS Publication 140 http://csrc.nist.gov/publications/PubsFIPS.html
http://csrc.nist.gov/groups/STM/cmvp/index.html http://csrc.nist.gov/groups/STM/cmvp/index.html