Skip to main content

💼 IA IDENTIFICATION AND AUTHENTICATION

  • Contextual name: 💼 IA IDENTIFICATION AND AUTHENTICATION
  • ID: /frameworks/nist-sp-800-53-r4/ia
  • Located in: 💼 NIST SP 800-53 Revision 4

Description​

Empty...

Similar​

  • Internal
    • ID: dec-b-29507603

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags
💼 IA-1 IDENTIFICATION AND AUTHENTICATION POLICY AND PROCEDURES
💼 IA-2 IDENTIFICATION AND AUTHENTICATION (ORGANIZATIONAL USERS)1312
    💼 IA-2 (1) NETWORK ACCESS TO PRIVILEGED ACCOUNTS
    💼 IA-2 (2) NETWORK ACCESS TO NON-PRIVILEGED ACCOUNTS
    💼 IA-2 (3) LOCAL ACCESS TO PRIVILEGED ACCOUNTS
    💼 IA-2 (4) LOCAL ACCESS TO NON-PRIVILEGED ACCOUNTS
    💼 IA-2 (5) GROUP AUTHENTICATION
    💼 IA-2 (6) NETWORK ACCESS TO PRIVILEGED ACCOUNTS - SEPARATE DEVICE
    💼 IA-2 (7) NETWORK ACCESS TO NON-PRIVILEGED ACCOUNTS - SEPARATE DEVICE
    💼 IA-2 (8) NETWORK ACCESS TO PRIVILEGED ACCOUNTS - REPLAY RESISTANT
    💼 IA-2 (9) NETWORK ACCESS TO NON-PRIVILEGED ACCOUNTS - REPLAY RESISTANT
    💼 IA-2 (10) SINGLE SIGN-ON
    💼 IA-2 (11) REMOTE ACCESS - SEPARATE DEVICE
    💼 IA-2 (12) ACCEPTANCE OF PIV CREDENTIALS
    💼 IA-2 (13) OUT-OF-BAND AUTHENTICATION
💼 IA-3 DEVICE IDENTIFICATION AND AUTHENTICATION411
    💼 IA-3 (1) CRYPTOGRAPHIC BIDIRECTIONAL AUTHENTICATION
    💼 IA-3 (2) CRYPTOGRAPHIC BIDIRECTIONAL NETWORK AUTHENTICATION
    💼 IA-3 (3) DYNAMIC ADDRESS ALLOCATION
    💼 IA-3 (4) DEVICE ATTESTATION
💼 IA-4 IDENTIFIER MANAGEMENT7
    💼 IA-4 (1) PROHIBIT ACCOUNT IDENTIFIERS AS PUBLIC IDENTIFIERS
    💼 IA-4 (2) SUPERVISOR AUTHORIZATION
    💼 IA-4 (3) MULTIPLE FORMS OF CERTIFICATION
    💼 IA-4 (4) IDENTIFY USER STATUS
    💼 IA-4 (5) DYNAMIC MANAGEMENT
    💼 IA-4 (6) CROSS-ORGANIZATION MANAGEMENT
    💼 IA-4 (7) IN-PERSON REGISTRATION
💼 IA-5 AUTHENTICATOR MANAGEMENT1522
    💼 IA-5 (1) PASSWORD-BASED AUTHENTICATION
    💼 IA-5 (2) PKI-BASED AUTHENTICATION
    💼 IA-5 (3) IN-PERSON OR TRUSTED THIRD-PARTY REGISTRATION
    💼 IA-5 (4) AUTOMATED SUPPORT FOR PASSWORD STRENGTH DETERMINATION
    💼 IA-5 (5) CHANGE AUTHENTICATORS PRIOR TO DELIVERY
    💼 IA-5 (6) PROTECTION OF AUTHENTICATORS
    💼 IA-5 (7) NO EMBEDDED UNENCRYPTED STATIC AUTHENTICATORS
    💼 IA-5 (8) MULTIPLE INFORMATION SYSTEM ACCOUNTS
    💼 IA-5 (9) CROSS-ORGANIZATION CREDENTIAL MANAGEMENT
    💼 IA-5 (10) DYNAMIC CREDENTIAL ASSOCIATION
    💼 IA-5 (11) HARDWARE TOKEN-BASED AUTHENTICATION
    💼 IA-5 (12) BIOMETRIC-BASED AUTHENTICATION
    💼 IA-5 (13) EXPIRATION OF CACHED AUTHENTICATORS11
    💼 IA-5 (14) MANAGING CONTENT OF PKI TRUST STORES
    💼 IA-5 (15) FICAM-APPROVED PRODUCTS AND SERVICES
💼 IA-6 AUTHENTICATOR FEEDBACK
💼 IA-7 CRYPTOGRAPHIC MODULE AUTHENTICATION
💼 IA-8 IDENTIFICATION AND AUTHENTICATION (NON-ORGANIZATIONAL USERS)5
    💼 IA-8 (1) ACCEPTANCE OF PIV CREDENTIALS FROM OTHER AGENCIES
    💼 IA-8 (2) ACCEPTANCE OF THIRD-PARTY CREDENTIALS
    💼 IA-8 (3) USE OF FICAM-APPROVED PRODUCTS
    💼 IA-8 (4) USE OF FICAM-ISSUED PROFILES
    💼 IA-8 (5) ACCEPTANCE OF PIV-I CREDENTIALS
💼 IA-9 SERVICE IDENTIFICATION AND AUTHENTICATION2
    💼 IA-9 (1) INFORMATION EXCHANGE
    💼 IA-9 (2) TRANSMISSION OF DECISIONS
💼 IA-10 ADAPTIVE IDENTIFICATION AND AUTHENTICATION
💼 IA-11 RE-AUTHENTICATION