Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family IA

IA-5Authenticator Management

Manage system authenticators by: Verifying, as part of the initial authenticator distribution, the identity of the individual, group, role, service, or device receiving the authenticator; Establishing initial authenticator content for any authenticators issued by the organization; Ensuring that authenticators have sufficient strength of mechanism for their intended use; Establishing and implementing administrative procedures for initial authenticator distribution, for lost or compromised or damaged authenticators, and for revoking authenticators; Changing default authenticators prior to first use; Changing or refreshing authenticators {{ insert: param, ia-05_odp.01 }} or when {{ insert: param, ia-05_odp.02 }} occur; Protecting authenticator content from unauthorized disclosure and modification; Requiring individuals to take, and having devices implement, specific controls to protect authenticators; and Changing authenticators for group or role accounts when membership to those accounts changes.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (1)

ATT&CK techniques this control mitigates (72)

Weaknesses this control addresses (8)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-798Use of Hard-coded Credentials1,955Changing default authenticators prior to first use and protecting content prevents use of hard-coded credentials.
CWE-522Insufficiently Protected Credentials1,518Protecting authenticator content from unauthorized disclosure and modification while requiring protective controls addresses insufficiently protected credentials.
CWE-521Weak Password Requirements303Ensuring authenticators have sufficient strength of mechanism for intended use addresses weak password requirements.
CWE-640Weak Password Recovery Mechanism for Forgotten Password298Establishing procedures for lost or compromised authenticators addresses weak password recovery mechanisms.
CWE-259Use of Hard-coded Password187Changing default authenticators prior to first use directly prevents use of hard-coded passwords.
CWE-1392Use of Default Credentials89Changing default authenticators prior to first use prevents use of default credentials.
CWE-1391Use of Weak Credentials47Ensuring sufficient strength of mechanism for authenticators prevents use of weak credentials.
CWE-1393Use of Default Password37Changing default authenticators prior to first use prevents use of default passwords.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2025-133904.110.00.3499good
CVE-2025-87303.89.80.3021good
CVE-2025-228963.78.60.3324good
CVE-2024-96433.59.80.2625good
CVE-2026-20128 KEV3.57.50.0004good
CVE-2025-08903.39.80.2167good
CVE-2025-255703.29.80.2057good
CVE-2025-584343.29.80.2098good
CVE-2024-569023.17.50.2649good
CVE-2025-06742.99.80.1575good
CVE-2025-689262.69.80.1061good
CVE-2025-699712.29.80.0453good
CVE-2024-573952.29.80.0332good
CVE-2025-11002.19.80.0185good
CVE-2025-671142.09.80.0046good
CVE-2026-287782.09.80.0055good
CVE-2026-291192.09.80.0042good
CVE-2026-228862.09.80.0020good
CVE-2026-287772.09.80.0042good
CVE-2026-287762.09.80.0042good
CVE-2026-276372.09.80.0029good
CVE-2026-263412.09.80.0020good
CVE-2026-262182.09.80.0020good
CVE-2025-709982.09.80.0026good
CVE-2026-236472.09.80.0036good

Other controls in family IA

IA-1 IA-10 IA-11 IA-12 IA-13 IA-2 IA-3 IA-4 IA-6 IA-7 IA-8 IA-9