Skip to main content

πŸ’Ό IA Identification And Authentication

  • ID: /frameworks/nist-sp-800-53-r5/ia

Description​

Empty...

Similar​

  • Internal
    • ID: dec-b-b2769d26

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
πŸ’Ό IA-1 Policy and Proceduresno data
πŸ’Ό IA-2 Identification and Authentication (organizational Users)133no data
γ€€πŸ’Ό IA-2(1) Identification and Authentication (organizational Users) _ Multi-factor Authentication to Privileged Accounts3no data
γ€€πŸ’Ό IA-2(2) Identification and Authentication (organizational Users) _ Multi-factor Authentication to Non-privileged Accounts3no data
γ€€πŸ’Ό IA-2(3) Identification and Authentication (organizational Users) _ Local Access to Privileged Accountsno data
γ€€πŸ’Ό IA-2(4) Identification and Authentication (organizational Users) _ Local Access to Non-privileged Accountsno data
γ€€πŸ’Ό IA-2(5) Identification and Authentication (organizational Users) _ Individual Authentication with Group Authenticationno data
γ€€πŸ’Ό IA-2(6) Identification and Authentication (organizational Users) _ Access to Accounts β€”separate Device3no data
γ€€πŸ’Ό IA-2(7) Identification and Authentication (organizational Users) _ Network Access to Non-privileged Accounts β€” Separate Deviceno data
γ€€πŸ’Ό IA-2(8) Identification and Authentication (organizational Users) _ Access to Accounts β€” Replay Resistant3no data
γ€€πŸ’Ό IA-2(9) Identification and Authentication (organizational Users) _ Network Access to Non-privileged Accounts β€” Replay Resistantno data
γ€€πŸ’Ό IA-2(10) Identification and Authentication (organizational Users) _ Single Sign-onno data
γ€€πŸ’Ό IA-2(11) Identification and Authentication (organizational Users) _ Remote Access β€” Separate Deviceno data
γ€€πŸ’Ό IA-2(12) Identification and Authentication (organizational Users) _ Acceptance of PIV Credentialsno data
γ€€πŸ’Ό IA-2(13) Identification and Authentication (organizational Users) _ Out-of-band Authenticationno data
πŸ’Ό IA-3 Device Identification and Authentication4no data
γ€€πŸ’Ό IA-3(1) Device Identification and Authentication _ Cryptographic Bidirectional Authenticationno data
γ€€πŸ’Ό IA-3(2) Device Identification and Authentication _ Cryptographic Bidirectional Network Authenticationno data
γ€€πŸ’Ό IA-3(3) Device Identification and Authentication _ Dynamic Address Allocationno data
γ€€πŸ’Ό IA-3(4) Device Identification and Authentication _ Device Attestationno data
πŸ’Ό IA-4 Identifier Management9no data
γ€€πŸ’Ό IA-4(1) Identifier Management _ Prohibit Account Identifiers as Public Identifiersno data
γ€€πŸ’Ό IA-4(2) Identifier Management _ Supervisor Authorizationno data
γ€€πŸ’Ό IA-4(3) Identifier Management _ Multiple Forms of Certificationno data
γ€€πŸ’Ό IA-4(4) Identifier Management _ Identify User Statusno data
γ€€πŸ’Ό IA-4(5) Identifier Management _ Dynamic Managementno data
γ€€πŸ’Ό IA-4(6) Identifier Management _ Cross-organization Managementno data
γ€€πŸ’Ό IA-4(7) Identifier Management _ In-person Registrationno data
γ€€πŸ’Ό IA-4(8) Identifier Management _ Pairwise Pseudonymous Identifiersno data
γ€€πŸ’Ό IA-4(9) Identifier Management _ Attribute Maintenance and Protectionno data
πŸ’Ό IA-5 Authenticator Management1816no data
γ€€πŸ’Ό IA-5(1) Authenticator Management _ Password-based Authentication8no data
γ€€πŸ’Ό IA-5(2) Authenticator Management _ Public Key-based Authenticationno data
γ€€πŸ’Ό IA-5(3) Authenticator Management _ In-person or Trusted External Party Registrationno data
γ€€πŸ’Ό IA-5(4) Authenticator Management _ Automated Support for Password Strength Determinationno data
γ€€πŸ’Ό IA-5(5) Authenticator Management _ Change Authenticators Prior to Deliveryno data
γ€€πŸ’Ό IA-5(6) Authenticator Management _ Protection of Authenticatorsno data
γ€€πŸ’Ό IA-5(7) Authenticator Management _ No Embedded Unencrypted Static Authenticatorsno data
γ€€πŸ’Ό IA-5(8) Authenticator Management _ Multiple System Accountsno data
γ€€πŸ’Ό IA-5(9) Authenticator Management _ Federated Credential Managementno data
γ€€πŸ’Ό IA-5(10) Authenticator Management _ Dynamic Credential Bindingno data
γ€€πŸ’Ό IA-5(11) Authenticator Management _ Hardware Token-based Authenticationno data
γ€€πŸ’Ό IA-5(12) Authenticator Management _ Biometric Authentication Performanceno data
γ€€πŸ’Ό IA-5(13) Authenticator Management _ Expiration of Cached Authenticatorsno data
γ€€πŸ’Ό IA-5(14) Authenticator Management _ Managing Content of PKI Trust Storesno data
γ€€πŸ’Ό IA-5(15) Authenticator Management _ GSA-approved Products and Servicesno data
γ€€πŸ’Ό IA-5(16) Authenticator Management _ In-person or Trusted External Party Authenticator Issuanceno data
γ€€πŸ’Ό IA-5(17) Authenticator Management _ Presentation Attack Detection for Biometric Authenticatorsno data
γ€€πŸ’Ό IA-5(18) Authenticator Management _ Password Managersno data
πŸ’Ό IA-6 Authentication Feedbackno data
πŸ’Ό IA-7 Cryptographic Module Authenticationno data
πŸ’Ό IA-8 Identification and Authentication (non-organizational Users)6no data
γ€€πŸ’Ό IA-8(1) Identification and Authentication (non-organizational Users) _ Acceptance of PIV Credentials from Other Agenciesno data
γ€€πŸ’Ό IA-8(2) Identification and Authentication (non-organizational Users) _ Acceptance of External Authenticatorsno data
γ€€πŸ’Ό IA-8(3) Identification and Authentication (non-organizational Users) _ Use of FICAM-approved Productsno data
γ€€πŸ’Ό IA-8(4) Identification and Authentication (non-organizational Users) _ Use of Defined Profilesno data
γ€€πŸ’Ό IA-8(5) Identification and Authentication (non-organizational Users) _ Acceptance of PVI-I Credentialsno data
γ€€πŸ’Ό IA-8(6) Identification and Authentication (non-organizational Users) _ Disassociabilityno data
πŸ’Ό IA-9 Service Identification and Authentication2no data
γ€€πŸ’Ό IA-9(1) Service Identification and Authentication _ Information Exchangeno data
γ€€πŸ’Ό IA-9(2) Service Identification and Authentication _ Transmission of Decisionsno data
πŸ’Ό IA-10 Adaptive Authenticationno data
πŸ’Ό IA-11 Re-authenticationno data
πŸ’Ό IA-12 Identity Proofing6no data
γ€€πŸ’Ό IA-12(1) Identity Proofing _ Supervisor Authorizationno data
γ€€πŸ’Ό IA-12(2) Identity Proofing _ Identity Evidenceno data
γ€€πŸ’Ό IA-12(3) Identity Proofing _ Identity Evidence Validation and Verificationno data
γ€€πŸ’Ό IA-12(4) Identity Proofing _ In-person Validation and Verificationno data
γ€€πŸ’Ό IA-12(5) Identity Proofing _ Address Confirmationno data
γ€€πŸ’Ό IA-12(6) Identity Proofing _ Accept Externally-proofed Identitiesno data