The Policy is available in AzureUSGovernment cloud. Version: '1.*.*'
Additional metadata
Name/Id: CMA_C1339 / CMA_C1339 Category: Operational Title: Ensure authorized users protect provided authenticators Ownership: Customer Description: The customer agency is responsible for ensuring their authorized users protect all provided authenticators, including passwords. Customer agency users should protect authenticators with the classification or sensitivity of the information accessed. Requirements: The customer is responsible for implementing this recommendation.
The following 7 compliance controls are associated with this Policy definition 'Ensure authorized users protect provided authenticators' (37dbe3dc-0e9c-24fa-36f2-11197cbfa207)
Use the filters above each column to filter and limit table data. Advanced searches can be performed by using the following operators: <, <=, >, >=, =, *, !, {, }, ||,&&, [empty], [nonempty], rgx: Learn more
The organization protects authenticators commensurate with the security category of the information to which use of the authenticator permits access.
Supplemental Guidance: For information systems containing multiple security categories of information without reliable physical or logical separation between categories, authenticators used to grant access to the systems are protected commensurate with the highest security category of information on the systems.
The organization protects authenticators commensurate with the security category of the information to which use of the authenticator permits access.
Supplemental Guidance: For information systems containing multiple security categories of information without reliable physical or logical separation between categories, authenticators used to grant access to the systems are protected commensurate with the highest security category of information on the systems.
The organization protects authenticators commensurate with the security category of the information to which use of the authenticator permits access.
Supplemental Guidance: For information systems containing multiple security categories of information without reliable physical or logical separation between categories, authenticators used to grant access to the systems are protected commensurate with the highest security category of information on the systems.
Use the filters above each column to filter and limit table data. Advanced searches can be performed by using the following operators: <, <=, >, >=, =, *, !, {, }, ||,&&, [empty], [nonempty], rgx: Learn more