SKIP TO PAGE CONTENT

IA-7 Cryptographic Module Authentication

Last Review: 10/1/22

Statement

The West Texas A&M University information system implements mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.

Applicability

This Control applies to all West Texas A&M network information resources. The intended audience for this Control includes all information resource owners, custodians, and users of information resources.

Implementation

Encryption used by the state organization meets the requirements of applicable laws, Executive Orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module. Encryption mechanisms used on information systems that must comply with federal standards use FIPS 140-2 approved algorithms, at a minimum.

Phone
Twitter
Facebook
Instagram
Mail