{
  "$TMF_VERSION": "1.4",
  "PublicationDateTime": "2021-04-26T00:00:00.000Z",
  "Description": "Profile of requirements corresponding to NIST Special Publication 800-53, r4, Security Control IA-5 (2): PKI-Based Authentication. Applicable to MODERATE impact and HIGH impact systems.",
  "Keywords": [
    "800-53",
    "Authentication",
    "High",
    "Identification",
    "Moderate",
    "NIST",
    "PKI-Based Authentication",
    "Security"
  ],
  "Issuer": {
    "Identifier": "https://trustmarkinitiative.org/",
    "PrimaryContact": {
      "Email": "help@trustmarkinitiative.org",
      "Telephone": "555-555-5555",
      "Kind": "PRIMARY",
      "WebsiteURL": "https://trustmarkinitiative.org/",
      "Responder": ""
    },
    "Name": "TMI"
  },
  "Sources": [{
    "Identifier": "SP800-53R4",
    "Reference": "NIST Special Publication 800-53 Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations, National Institute of Standards and Technology, April 2013 (Includes updates as of 01-15-2014). Available at <a href=\"http://dx.doi.org/10.6028/NIST.SP.800-53r4\">http://dx.doi.org/10.6028/NIST.SP.800-53r4<\/a>.",
    "$id": "source-2112165102"
  }],
  "Name": "NIST SP 800-53 r4 Security Control IA-5 (2): PKI-Based Authentication",
  "TrustExpression": "TD_ref1 and TD_ref2 and TD_ref3 and TD_ref4",
  "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tips/nist-sp-800-53-r4-security-control-ia-5-_2__-pki-based-authentication/4/",
  "Version": "4",
  "References": {"TrustmarkDefinitionRequirements": [
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tds/authenticator-management-_-pki-based-authentication-maps-identity-to-account/1.0/",
      "Description": "Defines conformance and assessment criteria for verifying that an information system, for PKI-based authentication maps the authenticated identity to the account of the individual or group.",
      "Number": 1,
      "Version": "1.0",
      "TrustmarkDefinitionReference": {
        "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tds/authenticator-management-_-pki-based-authentication-maps-identity-to-account/1.0/",
        "Description": "Defines conformance and assessment criteria for verifying that an information system, for PKI-based authentication maps the authenticated identity to the account of the individual or group.",
        "Number": 1,
        "Version": "1.0",
        "Name": "Authenticator Management | Pki-Based Authentication Maps Identity to Account"
      },
      "$Type": "TrustmarkDefinitionRequirement",
      "Name": "Authenticator Management | Pki-Based Authentication Maps Identity to Account",
      "$id": "TD_ref1"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tds/authenticator-management-_-pki-based-authentication-certification-validation/1.0/",
      "Description": "Defines conformance and assessment criteria for verifying that an information system, for PKI-based authentication validates certifications by constructing and verifying a certification path to an accepted trust anchor including checking certificate status information.",
      "Number": 2,
      "Version": "1.0",
      "TrustmarkDefinitionReference": {
        "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tds/authenticator-management-_-pki-based-authentication-certification-validation/1.0/",
        "Description": "Defines conformance and assessment criteria for verifying that an information system, for PKI-based authentication validates certifications by constructing and verifying a certification path to an accepted trust anchor including checking certificate status information.",
        "Number": 2,
        "Version": "1.0",
        "Name": "Authenticator Management | Pki-Based Authentication Certification Validation"
      },
      "$Type": "TrustmarkDefinitionRequirement",
      "Name": "Authenticator Management | Pki-Based Authentication Certification Validation",
      "$id": "TD_ref2"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tds/authenticator-management-_-pki-based-authentication-enforces-authorized-access/1.0/",
      "Description": "Defines conformance and assessment criteria for verifying that an information system, for PKI-based authentication enforces authorized access to the corresponding private key.",
      "Number": 3,
      "Version": "1.0",
      "TrustmarkDefinitionReference": {
        "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tds/authenticator-management-_-pki-based-authentication-enforces-authorized-access/1.0/",
        "Description": "Defines conformance and assessment criteria for verifying that an information system, for PKI-based authentication enforces authorized access to the corresponding private key.",
        "Number": 3,
        "Version": "1.0",
        "Name": "Authenticator Management | Pki-Based Authentication Enforces Authorized Access"
      },
      "$Type": "TrustmarkDefinitionRequirement",
      "Name": "Authenticator Management | Pki-Based Authentication Enforces Authorized Access",
      "$id": "TD_ref3"
    },
    {
      "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tds/authenticator-management-_-pki-based-authentication-caches-revocation-data/1.0/",
      "Description": "Defines conformance and assessment criteria for verifying that an information system, for PKI-based authentication implements a local cache of revocation data.",
      "Number": 4,
      "Version": "1.0",
      "TrustmarkDefinitionReference": {
        "Identifier": "https://artifacts.trustmarkinitiative.org/lib/tds/authenticator-management-_-pki-based-authentication-caches-revocation-data/1.0/",
        "Description": "Defines conformance and assessment criteria for verifying that an information system, for PKI-based authentication implements a local cache of revocation data.",
        "Number": 4,
        "Version": "1.0",
        "Name": "Authenticator Management | Pki-Based Authentication Caches Revocation Data"
      },
      "$Type": "TrustmarkDefinitionRequirement",
      "Name": "Authenticator Management | Pki-Based Authentication Caches Revocation Data",
      "$id": "TD_ref4"
    }
  ]},
  "Primary": "false",
  "LegalNotice": "This document and the information contained herein is provided on an \"AS IS\" basis, and the Georgia Tech Research Institute disclaims all warranties, express or implied, including but not limited to any warranty that the use of the information herein will not infringe any rights or any implied warranties or merchantability or fitness for a particular purpose. In addition, the Georgia Tech Research Institute disclaims legal liability for any loss incurred as a result of the use or reliance on the document or the information contained herein.",
  "$Type": "TrustInteroperabilityProfile"
}