Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family IA

IA-5Authenticator Management

Manage system authenticators by: Verifying, as part of the initial authenticator distribution, the identity of the individual, group, role, service, or device receiving the authenticator; Establishing initial authenticator content for any authenticators issued by the organization; Ensuring that authenticators have sufficient strength of mechanism for their intended use; Establishing and implementing administrative procedures for initial authenticator distribution, for lost or compromised or damaged authenticators, and for revoking authenticators; Changing default authenticators prior to first use; Changing or refreshing authenticators {{ insert: param, ia-05_odp.01 }} or when {{ insert: param, ia-05_odp.02 }} occur; Protecting authenticator content from unauthorized disclosure and modification; Requiring individuals to take, and having devices implement, specific controls to protect authenticators; and Changing authenticators for group or role accounts when membership to those accounts changes.

Last updated: 19 May 2026 14:18 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (72)

Weaknesses this control addresses (8)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-798Use of Hard-coded Credentials1,961Changing default authenticators prior to first use and protecting content prevents use of hard-coded credentials.
CWE-522Insufficiently Protected Credentials1,529Protecting authenticator content from unauthorized disclosure and modification while requiring protective controls addresses insufficiently protected credentials.
CWE-521Weak Password Requirements303Ensuring authenticators have sufficient strength of mechanism for intended use addresses weak password requirements.
CWE-640Weak Password Recovery Mechanism for Forgotten Password301Establishing procedures for lost or compromised authenticators addresses weak password recovery mechanisms.
CWE-259Use of Hard-coded Password188Changing default authenticators prior to first use directly prevents use of hard-coded passwords.
CWE-1392Use of Default Credentials91Changing default authenticators prior to first use prevents use of default credentials.
CWE-1391Use of Weak Credentials47Ensuring sufficient strength of mechanism for authenticators prevents use of weak credentials.
CWE-1393Use of Default Password37Changing default authenticators prior to first use prevents use of default passwords.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2025-133904.810.00.4744good
CVE-2025-228964.08.60.3743good
CVE-2025-584343.99.80.3255good
CVE-2025-87303.89.80.3021good
CVE-2026-20128 KEV UPD3.57.50.0008good
CVE-2025-08903.39.80.2167good
CVE-2025-255703.29.80.2057good
CVE-2024-96433.19.80.1951good
CVE-2024-569023.17.50.2649good
CVE-2025-06742.99.80.1575good
CVE-2026-263412.89.80.1402good
CVE-2025-689262.69.80.1061good
CVE-2025-699712.29.80.0453good
CVE-2024-573952.29.80.0332good
CVE-2025-11002.19.80.0185good
CVE-2025-671142.09.80.0034good
CVE-2026-287782.09.80.0058good
CVE-2026-291192.09.80.0043good
CVE-2026-228862.09.80.0027good
CVE-2026-287772.09.80.0043good
CVE-2026-287762.09.80.0043good
CVE-2026-276372.09.80.0029good
CVE-2026-262182.09.80.0020good
CVE-2025-709982.09.80.0026good
CVE-2026-236472.09.80.0036good

Other controls in family IA

IA-1 IA-10 IA-11 IA-12 IA-13 IA-2 IA-3 IA-4 IA-6 IA-7 IA-8 IA-9