Skip to main content

๐Ÿ’ผ IA-2 Identification and Authentication (Organizational Users) (L)(M)(H)

  • Contextual name: ๐Ÿ’ผ IA-2 Identification and Authentication (Organizational Users) (L)(M)(H)
  • ID: /frameworks/fedramp-moderate-security-controls/ia/02
  • Located in: ๐Ÿ’ผ Identification and Authentication

Descriptionโ€‹

Uniquely identify and authenticate organizational users and associate that unique identification with processes acting on behalf of those users.

IA-2 Additional FedRAMP Requirements and Guidance:

Guidance: "Phishing-resistant" authentication refers to authentication processes designed to detect and prevent disclosure of authentication secrets and outputs to a website or application masquerading as a legitimate system.

Requirement: For all control enhancements that specify multifactor authentication, the implementation must adhere to the Digital Identity Guidelines specified in NIST Special Publication 800-63B.

Requirement: Multi-factor authentication must be phishing-resistant.

Requirement: All uses of encrypted virtual private networks must meet all applicable Federal requirements and architecture, dataflow, and security and privacy controls must be documented, assessed, and authorized to operate.

Similarโ€‹

  • Sections
    • /frameworks/fedramp-high-security-controls/ia/02
  • Internal
    • ID: dec-c-eb896af4

Similar Sections (Take Policies From)โ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ FedRAMP High Security Controls โ†’ ๐Ÿ’ผ IA-2 Identification and Authentication (Organizational Users) (L)(M)(H)613

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ IA-2(1) Multi-factor Authentication to Privileged Accounts (L)(M)(H)2
๐Ÿ’ผ IA-2(2) Multi-factor Authentication to Non-privileged Accounts (L)(M)(H)2
๐Ÿ’ผ IA-2(5) Individual Authentication with Group Authentication (M)(H)
๐Ÿ’ผ IA-2(6) Access to Accounts โ€”separate Device (M)(H)2
๐Ÿ’ผ IA-2(8) Access to Accounts โ€” Replay Resistant (L)(M)(H)2
๐Ÿ’ผ IA-2(12) Acceptance of PIV Credentials (L)(M)(H)

Policies (1)โ€‹

PolicyLogic CountFlags
๐Ÿ“ Consumer Google Accounts are used ๐ŸŸข๐ŸŸข x3