IA-7 CRYPTOGRAPHIC MODULE AUTHENTICATION

TAILORED FOR INDUSTRIAL CONTROL SYSTEMS

  • ICS Control Baselines:
  • Low
  • Moderate
  • High

The information system implements mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.

SUPPLEMENTAL GUIDANCE

Authentication mechanisms may be required within a cryptographic module to authenticate an operator accessing the module and to verify that the operator is authorized to assume the requested role and perform services within that role.

ICS SUPPLEMENTAL GUIDANCE

No ICS Supplemental Guidance.

CONTROL ENHANCEMENTS

REFERENCES:

  • NIST Special Publication 800-82
  • FIPS Publication 140
  • http://csrc.nist.gov/groups/STM/cmvp/index.html