IA - Identification and Authentication

  • Controls Count: 2
  • Controls IDs: IA-2 (5), IA-12 (4)

Controls

IA-2 (5): Individual Authentication with Group Authentication

When shared accounts or authenticators are employed, require users to be individually authenticated before granting access to the shared accounts or resources.

Individual authentication prior to shared group authentication mitigates the risk of using group accounts or authenticators.

users are required to be individually authenticated before granting access to the shared accounts or resources when shared accounts or authenticators are employed.

Identification and authentication policy

system security plan

procedures addressing user identification and authentication

system design documentation

system configuration settings and associated documentation

system audit records

list of system accounts

other relevant documents or records

Organizational personnel with system operations responsibilities

organizational personnel with account management responsibilities

organizational personnel with information security responsibilities

system/network administrators

system developers

Mechanisms supporting and/or implementing an authentication capability for group accounts

IA-12 (4): In-person Validation and Verification

Require that the validation and verification of identity evidence be conducted in person before a designated registration authority.

In-person proofing reduces the likelihood of fraudulent credentials being issued because it requires the physical presence of individuals, the presentation of physical identity documents, and actual face-to-face interactions with designated registration authorities.

the validation and verification of identity evidence is conducted in person before a designated registration authority.

Identification and authentication policy

procedures addressing identity proofing

system security plan

other relevant documents or records

Organizational personnel with system operations responsibilities

organizational personnel with information security responsibilities

system/network administrators

system developers

organizational personnel with identification and authentication responsibilities

Mechanisms supporting and/or implementing identification and authentication capabilities