Title
HARDWARE TOKEN-BASED AUTHENTICATION
Description
The information system, for hardware token-based authentication, employs mechanisms that satisfy [Assignment: organization-defined token quality requirements].
Supplemental
Hardware token-based authentication typically refers to the use of PKI-based tokens, such as the U.S. Government Personal Identity Verification (PIV) card. Organizations define specific requirements for tokens, such as working with a particular PKI.
Reference Item Details
Category: IDENTIFICATION AND AUTHENTICATION
Parent Title: AUTHENTICATOR MANAGEMENT
Family: IDENTIFICATION AND AUTHENTICATION
Baseline Impact: LOW,MODERATE,HIGH