IA-5(13): Authenticator Management | Expiration of Cached Authenticators
Control Text:
Prohibit the use of cached authenticators after [Assignment: organization-defined time period].
Cached authenticators are used to authenticate to the local machine when the network is not available. If cached authentication information is out of date, the validity of the authentication information may be questionable.