Skip to main content

๐Ÿ’ผ IA IDENTIFICATION AND AUTHENTICATION

  • Contextual name: ๐Ÿ’ผ IA IDENTIFICATION AND AUTHENTICATION
  • ID: /frameworks/nist-sp-800-53-r4/ia
  • Located in: ๐Ÿ’ผ NIST SP 800-53 Revision 4

Descriptionโ€‹

Empty...

Similarโ€‹

  • Internal
    • ID: dec-b-29507603

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ IA-1 IDENTIFICATION AND AUTHENTICATION POLICY AND PROCEDURES
๐Ÿ’ผ IA-2 IDENTIFICATION AND AUTHENTICATION (ORGANIZATIONAL USERS)1311
ย ย ย ย ๐Ÿ’ผ IA-2 (1) NETWORK ACCESS TO PRIVILEGED ACCOUNTS
ย ย ย ย ๐Ÿ’ผ IA-2 (2) NETWORK ACCESS TO NON-PRIVILEGED ACCOUNTS
ย ย ย ย ๐Ÿ’ผ IA-2 (3) LOCAL ACCESS TO PRIVILEGED ACCOUNTS
ย ย ย ย ๐Ÿ’ผ IA-2 (4) LOCAL ACCESS TO NON-PRIVILEGED ACCOUNTS
ย ย ย ย ๐Ÿ’ผ IA-2 (5) GROUP AUTHENTICATION
ย ย ย ย ๐Ÿ’ผ IA-2 (6) NETWORK ACCESS TO PRIVILEGED ACCOUNTS - SEPARATE DEVICE
ย ย ย ย ๐Ÿ’ผ IA-2 (7) NETWORK ACCESS TO NON-PRIVILEGED ACCOUNTS - SEPARATE DEVICE
ย ย ย ย ๐Ÿ’ผ IA-2 (8) NETWORK ACCESS TO PRIVILEGED ACCOUNTS - REPLAY RESISTANT
ย ย ย ย ๐Ÿ’ผ IA-2 (9) NETWORK ACCESS TO NON-PRIVILEGED ACCOUNTS - REPLAY RESISTANT
ย ย ย ย ๐Ÿ’ผ IA-2 (10) SINGLE SIGN-ON
ย ย ย ย ๐Ÿ’ผ IA-2 (11) REMOTE ACCESS - SEPARATE DEVICE
ย ย ย ย ๐Ÿ’ผ IA-2 (12) ACCEPTANCE OF PIV CREDENTIALS
ย ย ย ย ๐Ÿ’ผ IA-2 (13) OUT-OF-BAND AUTHENTICATION
๐Ÿ’ผ IA-3 DEVICE IDENTIFICATION AND AUTHENTICATION411
ย ย ย ย ๐Ÿ’ผ IA-3 (1) CRYPTOGRAPHIC BIDIRECTIONAL AUTHENTICATION
ย ย ย ย ๐Ÿ’ผ IA-3 (2) CRYPTOGRAPHIC BIDIRECTIONAL NETWORK AUTHENTICATION
ย ย ย ย ๐Ÿ’ผ IA-3 (3) DYNAMIC ADDRESS ALLOCATION
ย ย ย ย ๐Ÿ’ผ IA-3 (4) DEVICE ATTESTATION
๐Ÿ’ผ IA-4 IDENTIFIER MANAGEMENT7
ย ย ย ย ๐Ÿ’ผ IA-4 (1) PROHIBIT ACCOUNT IDENTIFIERS AS PUBLIC IDENTIFIERS
ย ย ย ย ๐Ÿ’ผ IA-4 (2) SUPERVISOR AUTHORIZATION
ย ย ย ย ๐Ÿ’ผ IA-4 (3) MULTIPLE FORMS OF CERTIFICATION
ย ย ย ย ๐Ÿ’ผ IA-4 (4) IDENTIFY USER STATUS
ย ย ย ย ๐Ÿ’ผ IA-4 (5) DYNAMIC MANAGEMENT
ย ย ย ย ๐Ÿ’ผ IA-4 (6) CROSS-ORGANIZATION MANAGEMENT
ย ย ย ย ๐Ÿ’ผ IA-4 (7) IN-PERSON REGISTRATION
๐Ÿ’ผ IA-5 AUTHENTICATOR MANAGEMENT1522
ย ย ย ย ๐Ÿ’ผ IA-5 (1) PASSWORD-BASED AUTHENTICATION
ย ย ย ย ๐Ÿ’ผ IA-5 (2) PKI-BASED AUTHENTICATION
ย ย ย ย ๐Ÿ’ผ IA-5 (3) IN-PERSON OR TRUSTED THIRD-PARTY REGISTRATION
ย ย ย ย ๐Ÿ’ผ IA-5 (4) AUTOMATED SUPPORT FOR PASSWORD STRENGTH DETERMINATION
ย ย ย ย ๐Ÿ’ผ IA-5 (5) CHANGE AUTHENTICATORS PRIOR TO DELIVERY
ย ย ย ย ๐Ÿ’ผ IA-5 (6) PROTECTION OF AUTHENTICATORS
ย ย ย ย ๐Ÿ’ผ IA-5 (7) NO EMBEDDED UNENCRYPTED STATIC AUTHENTICATORS
ย ย ย ย ๐Ÿ’ผ IA-5 (8) MULTIPLE INFORMATION SYSTEM ACCOUNTS
ย ย ย ย ๐Ÿ’ผ IA-5 (9) CROSS-ORGANIZATION CREDENTIAL MANAGEMENT
ย ย ย ย ๐Ÿ’ผ IA-5 (10) DYNAMIC CREDENTIAL ASSOCIATION
ย ย ย ย ๐Ÿ’ผ IA-5 (11) HARDWARE TOKEN-BASED AUTHENTICATION
ย ย ย ย ๐Ÿ’ผ IA-5 (12) BIOMETRIC-BASED AUTHENTICATION
ย ย ย ย ๐Ÿ’ผ IA-5 (13) EXPIRATION OF CACHED AUTHENTICATORS11
ย ย ย ย ๐Ÿ’ผ IA-5 (14) MANAGING CONTENT OF PKI TRUST STORES
ย ย ย ย ๐Ÿ’ผ IA-5 (15) FICAM-APPROVED PRODUCTS AND SERVICES
๐Ÿ’ผ IA-6 AUTHENTICATOR FEEDBACK
๐Ÿ’ผ IA-7 CRYPTOGRAPHIC MODULE AUTHENTICATION
๐Ÿ’ผ IA-8 IDENTIFICATION AND AUTHENTICATION (NON-ORGANIZATIONAL USERS)5
ย ย ย ย ๐Ÿ’ผ IA-8 (1) ACCEPTANCE OF PIV CREDENTIALS FROM OTHER AGENCIES
ย ย ย ย ๐Ÿ’ผ IA-8 (2) ACCEPTANCE OF THIRD-PARTY CREDENTIALS
ย ย ย ย ๐Ÿ’ผ IA-8 (3) USE OF FICAM-APPROVED PRODUCTS
ย ย ย ย ๐Ÿ’ผ IA-8 (4) USE OF FICAM-ISSUED PROFILES
ย ย ย ย ๐Ÿ’ผ IA-8 (5) ACCEPTANCE OF PIV-I CREDENTIALS
๐Ÿ’ผ IA-9 SERVICE IDENTIFICATION AND AUTHENTICATION2
ย ย ย ย ๐Ÿ’ผ IA-9 (1) INFORMATION EXCHANGE
ย ย ย ย ๐Ÿ’ผ IA-9 (2) TRANSMISSION OF DECISIONS
๐Ÿ’ผ IA-10 ADAPTIVE IDENTIFICATION AND AUTHENTICATION
๐Ÿ’ผ IA-11 RE-AUTHENTICATION