Identification and Authentication (IA)

[Withdrawn: Incorporated into IA-2(1) and IA-2(2).]


Login

Identification and Authentication (IA)

[Withdrawn: Incorporated into IA-12(4).]


Login

Identification and Authentication (IA)

Require developers and installers of system components to provide unique authenticators or change default authenticators prior to delivery and installation.


Login

Identification and Authentication (IA)

Protect authenticators commensurate with the security category of the information to which use of the authenticator permits access.


Login

Identification and Authentication (IA)

Ensure that unencrypted static authenticators are not embedded in applications or other forms of static storage.


Login

Identification and Authentication (IA)

Implement [Assignment: organization-defined security controls] to manage the risk of compromise due to individuals having accounts on multiple systems.


Login

Identification and Authentication (IA)

Use the following external organizations to federate credentials: [Assignment: organization-defined external organizations].


Login

Identification and Authentication (IA)

Bind identities and authenticators dynamically using the following rules: [Assignment: organization-defined binding rules].


Login

Identification and Authentication (IA)

[Withdrawn: Incorporated into IA-5(1).]


Login

Identification and Authentication (IA)

For biometric-based authentication, employ mechanisms that satisfy the following biometric quality requirements [Assignment: organization-defined biometric quality requirements].


Login