graphgrc

SCF - IAC-10.5 - Protection of Authenticators

Mechanisms exist to protect authenticators commensurate with the sensitivity of the information to which use of the authenticator permits access.

Mapped framework controls

ISO 27002

NIST 800-53

Control questions

Does the organization protect authenticators commensurate with the sensitivity of the information to which use of the authenticator permits access?