IA-5 - Authenticator Management

Manage system authenticators by: a. Verifying, as part of the initial authenticator distribution, the identity of the individual, group, role, service, or device receiving the authenticator; b. Establishing initial authenticator content for any authenticators issued by the organization; c. Ensuring that authenticators have sufficient strength of mechanism for their intended use; d. Establishing and implementing administrative procedures for initial authenticator distribution, for lost or compromised or damaged authenticators, and for revoking authenticators; e. Changing default authenticators prior to first use; f. Changing or refreshing authenticators [Assignment: organization-defined time period by authenticator type] or when [Assignment: organization-defined events] occur; g. Protecting authenticator content from unauthorized disclosure and modification; h. Requiring individuals to take, and having devices implement, specific controls to protect authenticators; and i. Changing authenticators for group or role accounts when membership to those accounts changes.


ID: IA-5

Space Segment Guidance

Authenticator management often includes custody and loading of command-auth keys, ground operator credentials for mission tools, and on-board authenticators for services/partitions. Consider distribution, activation, rotation, and revocation that function with intermittent links; procedures for lost/compromised credentials mid-mission; and survivability across resets, SEUs, or autonomous mode changes. Hardware-backed storage may protect ground credentials; on-board, integrity checks, escrow/golden keys, and tested recovery paths help avoid lockouts while maintaining assurance.