This objective ensures that the authentication mechanisms identified in IA.L2-3.5.8[a] are actually deployed and functioning across systems, particularly those that handle Controlled Unclassified Information (CUI). It confirms that each authentication method is technically configured and enforced where required.