HOME

IA-5 (11)

IA-5 (11) H M L
Description

The information system, for hardware token-based authentication, employs mechanisms that satisfy [Assignment: organization-defined token quality requirements].

DISA Cloud Computing SRG

DoDI 8520.03

Source:
DoD RMF TAG

Supplemental Guidance

Hardware token-based authentication typically refers to the use of PKI-based tokens, such as the U.S. Government Personal Identity Verification (PIV) card. Organizations define specific requirements for tokens, such as working with a particular PKI.