[Withdrawn: Incorporated into IA-2(1) and IA-2(2).]
[Withdrawn: Incorporated into IA-2(1) and IA-2(2).]
[Withdrawn: Incorporated into IA-12(4).]
Require developers and installers of system components to provide unique authenticators or change default authenticators prior to delivery and installation.
Protect authenticators commensurate with the security category of the information to which use of the authenticator permits access.
Ensure that unencrypted static authenticators are not embedded in applications or other forms of static storage.
Implement [Assignment: organization-defined security controls] to manage the risk of compromise due to individuals having accounts on multiple systems.
Use the following external organizations to federate credentials: [Assignment: organization-defined external organizations].
Bind identities and authenticators dynamically using the following rules: [Assignment: organization-defined binding rules].
[Withdrawn: Incorporated into IA-5(1).]
For biometric-based authentication, employ mechanisms that satisfy the following biometric quality requirements [Assignment: organization-defined biometric quality requirements].