Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family IA

IA-7Cryptographic Module Authentication

Implement mechanisms for authentication to a cryptographic module that meet the requirements of applicable laws, executive orders, directives, policies, regulations, standards, and guidelines for such authentication.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (12)

Weaknesses this control addresses (6)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-287Improper Authentication4,730Directly requires implementation of compliant authentication mechanisms to cryptographic modules, preventing improper authentication.
CWE-306Missing Authentication for Critical Function2,567Mandates authentication for the critical function of accessing or using a cryptographic module.
CWE-1392Use of Default Credentials89Standards-compliant authentication mechanisms typically prohibit default credentials for cryptographic modules.
CWE-1390Weak Authentication75Requires authentication mechanisms to meet applicable standards and guidelines, preventing weak authentication.
CWE-1391Use of Weak Credentials47Enforces use of credentials that comply with standards rather than weak credentials for module access.
CWE-1393Use of Default Password37Requires authentication that meets guidelines, avoiding default passwords for cryptographic module access.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2025-646471.25.90.0001good

Other controls in family IA

IA-1 IA-10 IA-11 IA-12 IA-13 IA-2 IA-3 IA-4 IA-5 IA-6 IA-8 IA-9