manage.get.gov/docs/compliance/dist/system-security-plans/ato/ia-8.md
Logan McDonald 1d3dfdb8d5
Add compliance documentation to source control (#116)
* add initial setup of compliance-trestle
2022-09-14 08:46:43 -04:00

1.5 KiB

implementation-status control-origination
c-not-implemented
c-inherited-cloud-gov
c-inherited-cisa
c-common-control
c-system-specific-control

ia-8 - [catalog] Identification and Authentication (Non-organizational Users)

Control Statement

Uniquely identify and authenticate non-organizational users or processes acting on behalf of non-organizational users.

Control guidance

Non-organizational users include system users other than organizational users explicitly covered by IA-2 . Non-organizational users are uniquely identified and authenticated for accesses other than those explicitly identified and documented in AC-14 . Identification and authentication of non-organizational users accessing federal systems may be required to protect federal, proprietary, or privacy-related information (with exceptions noted for national security systems). Organizations consider many factors—including security, privacy, scalability, and practicality—when balancing the need to ensure ease of use for access to federal information and systems with the need to protect and adequately mitigate risk.

Control assessment-objective

non-organizational users or processes acting on behalf of non-organizational users are uniquely identified and authenticated.


What is the solution and how is it implemented?

Add control implementation description here for control ia-8