Skip to main content

💼 IA IDENTIFICATION AND AUTHENTICATION

  • ID: /frameworks/nist-sp-800-53-r4/ia

Description​

Empty...

Similar​

  • Internal
    • ID: dec-b-29507603

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 IA-1 IDENTIFICATION AND AUTHENTICATION POLICY AND PROCEDURESno data
💼 IA-2 IDENTIFICATION AND AUTHENTICATION (ORGANIZATIONAL USERS)1312no data
 💼 IA-2 (1) NETWORK ACCESS TO PRIVILEGED ACCOUNTSno data
 💼 IA-2 (2) NETWORK ACCESS TO NON-PRIVILEGED ACCOUNTSno data
 💼 IA-2 (3) LOCAL ACCESS TO PRIVILEGED ACCOUNTSno data
 💼 IA-2 (4) LOCAL ACCESS TO NON-PRIVILEGED ACCOUNTSno data
 💼 IA-2 (5) GROUP AUTHENTICATIONno data
 💼 IA-2 (6) NETWORK ACCESS TO PRIVILEGED ACCOUNTS - SEPARATE DEVICEno data
 💼 IA-2 (7) NETWORK ACCESS TO NON-PRIVILEGED ACCOUNTS - SEPARATE DEVICEno data
 💼 IA-2 (8) NETWORK ACCESS TO PRIVILEGED ACCOUNTS - REPLAY RESISTANTno data
 💼 IA-2 (9) NETWORK ACCESS TO NON-PRIVILEGED ACCOUNTS - REPLAY RESISTANTno data
 💼 IA-2 (10) SINGLE SIGN-ONno data
 💼 IA-2 (11) REMOTE ACCESS - SEPARATE DEVICEno data
 💼 IA-2 (12) ACCEPTANCE OF PIV CREDENTIALSno data
 💼 IA-2 (13) OUT-OF-BAND AUTHENTICATIONno data
💼 IA-3 DEVICE IDENTIFICATION AND AUTHENTICATION411no data
 💼 IA-3 (1) CRYPTOGRAPHIC BIDIRECTIONAL AUTHENTICATIONno data
 💼 IA-3 (2) CRYPTOGRAPHIC BIDIRECTIONAL NETWORK AUTHENTICATIONno data
 💼 IA-3 (3) DYNAMIC ADDRESS ALLOCATIONno data
 💼 IA-3 (4) DEVICE ATTESTATIONno data
💼 IA-4 IDENTIFIER MANAGEMENT7no data
 💼 IA-4 (1) PROHIBIT ACCOUNT IDENTIFIERS AS PUBLIC IDENTIFIERSno data
 💼 IA-4 (2) SUPERVISOR AUTHORIZATIONno data
 💼 IA-4 (3) MULTIPLE FORMS OF CERTIFICATIONno data
 💼 IA-4 (4) IDENTIFY USER STATUSno data
 💼 IA-4 (5) DYNAMIC MANAGEMENTno data
 💼 IA-4 (6) CROSS-ORGANIZATION MANAGEMENTno data
 💼 IA-4 (7) IN-PERSON REGISTRATIONno data
💼 IA-5 AUTHENTICATOR MANAGEMENT1522no data
 💼 IA-5 (1) PASSWORD-BASED AUTHENTICATIONno data
 💼 IA-5 (2) PKI-BASED AUTHENTICATIONno data
 💼 IA-5 (3) IN-PERSON OR TRUSTED THIRD-PARTY REGISTRATIONno data
 💼 IA-5 (4) AUTOMATED SUPPORT FOR PASSWORD STRENGTH DETERMINATIONno data
 💼 IA-5 (5) CHANGE AUTHENTICATORS PRIOR TO DELIVERYno data
 💼 IA-5 (6) PROTECTION OF AUTHENTICATORSno data
 💼 IA-5 (7) NO EMBEDDED UNENCRYPTED STATIC AUTHENTICATORSno data
 💼 IA-5 (8) MULTIPLE INFORMATION SYSTEM ACCOUNTSno data
 💼 IA-5 (9) CROSS-ORGANIZATION CREDENTIAL MANAGEMENTno data
 💼 IA-5 (10) DYNAMIC CREDENTIAL ASSOCIATIONno data
 💼 IA-5 (11) HARDWARE TOKEN-BASED AUTHENTICATIONno data
 💼 IA-5 (12) BIOMETRIC-BASED AUTHENTICATIONno data
 💼 IA-5 (13) EXPIRATION OF CACHED AUTHENTICATORS11no data
 💼 IA-5 (14) MANAGING CONTENT OF PKI TRUST STORESno data
 💼 IA-5 (15) FICAM-APPROVED PRODUCTS AND SERVICESno data
💼 IA-6 AUTHENTICATOR FEEDBACKno data
💼 IA-7 CRYPTOGRAPHIC MODULE AUTHENTICATIONno data
💼 IA-8 IDENTIFICATION AND AUTHENTICATION (NON-ORGANIZATIONAL USERS)5no data
 💼 IA-8 (1) ACCEPTANCE OF PIV CREDENTIALS FROM OTHER AGENCIESno data
 💼 IA-8 (2) ACCEPTANCE OF THIRD-PARTY CREDENTIALSno data
 💼 IA-8 (3) USE OF FICAM-APPROVED PRODUCTSno data
 💼 IA-8 (4) USE OF FICAM-ISSUED PROFILESno data
 💼 IA-8 (5) ACCEPTANCE OF PIV-I CREDENTIALSno data
💼 IA-9 SERVICE IDENTIFICATION AND AUTHENTICATION2no data
 💼 IA-9 (1) INFORMATION EXCHANGEno data
 💼 IA-9 (2) TRANSMISSION OF DECISIONSno data
💼 IA-10 ADAPTIVE IDENTIFICATION AND AUTHENTICATIONno data
💼 IA-11 RE-AUTHENTICATIONno data