IA-7 CRYPTOGRAPHIC MODULE AUTHENTICATION
TAILORED FOR INDUSTRIAL CONTROL SYSTEMS
ICS Control Baselines:
- Low
- Moderate
- High
The information system implements mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.
SUPPLEMENTAL GUIDANCE
Authentication mechanisms may be required within a cryptographic module to authenticate an operator accessing the module and to verify that the operator is authorized to assume the requested role and perform services within that role.
ICS SUPPLEMENTAL GUIDANCE
No ICS Supplemental Guidance.
RELATED CONTROLS: IA-7
CONTROL ENHANCEMENTS
REFERENCES:
- NIST Special Publication 800-82
- FIPS Publication 140
- http://csrc.nist.gov/groups/STM/cmvp/index.html