Identification and Authentication (IA)

(a) Accept only external authenticators that are NIST-compliant; and (b) Document and maintain a list of accepted external authenticators.


Login

Identification and Authentication (IA)

[Withdrawn: Incorporated into IA-8(2).]


Login

Identification and Authentication (IA)

Conform to the following profiles for identity management [Assignment: organization-defined identity management profiles].


Login

Identification and Authentication (IA)

Accept and verify federated or PKI credentials that meet [Assignment: organization-defined policy].


Login

Identification and Authentication (IA)

Implement the following measures to disassociate user attributes or identifier assertion relationships among individuals, credential service providers, and relying parties: [Assignment: organization-defined measures].


Login

Identification and Authentication (IA)

Uniquely identify and authenticate [Assignment: organization-defined system services and applications] before establishing communications with devices, users, or other services or applications.


Login

Identification and Authentication (IA)

[Withdrawn: Incorporated into IA-9.]


Login

Identification and Authentication (IA)

[Withdrawn: Incorporated into IA-9.]


Login

Identification and Authentication (IA)

Require individuals accessing the system to employ [Assignment: organization-defined supplemental authentication techniques or mechanisms] under specific [Assignment: organization-defined circumstances or situations].


Login

Identification and Authentication (IA)

Level N/A

Require users to re-authenticate when [Assignment: organization-defined circumstances or situations requiring re-authentication].


Login