This objective ensures that your systems are technically configured to enforce the password characteristics defined in IA.L2-3.5.5[a]—such as minimum length, complexity, and blocking of weak passwords. It confirms that enforcement is happening at the system level, not just documented in policy.

🍪 We Use Cookies

To enhance your experience and analyze site usage, we use cookies. By continuing to use our site, you agree to our use of cookies in accordance with our Privacy Policy.