NIST 800-53 REV 5 • IDENTIFICATION AND AUTHENTICATION
IA-5(14) — Managing Content of PKI Trust Stores
For PKI-based authentication, employ an organization-wide methodology for managing the content of PKI trust stores installed across all platforms, including networks, operating systems, browsers, and applications.
CMMC Practice Mapping
No direct CMMC mapping
NIST 800-171 Mapping
No direct NIST 800-171 mapping
Related Controls
No related controls listed
Supplemental Guidance
An organization-wide methodology for managing the content of PKI trust stores helps improve the accuracy and currency of PKI-based authentication credentials across the organization.
Practitioner Notes
This enhancement requires managing the content of PKI trust stores — controlling which certificate authorities your systems trust.
Example 1: Use Group Policy to manage the Trusted Root Certificate Authorities store on all domain-joined machines, removing untrusted CAs and adding only your organization's approved CAs.
Example 2: Regularly audit the certificate trust list on your servers and devices, removing any root CAs that are not needed for your business operations to reduce attack surface.