2.4 KiB
implementation-status | control-origination | |||||
---|---|---|---|---|---|---|
|
|
ia-12 - [catalog] Identity Proofing
Control Statement
-
[a] Identity proof users that require accounts for logical access to systems based on appropriate identity assurance level requirements as specified in applicable standards and guidelines;
-
[b] Resolve user identities to a unique individual; and
-
[c] Collect, validate, and verify identity evidence.
Control guidance
Identity proofing is the process of collecting, validating, and verifying a user’s identity information for the purposes of establishing credentials for accessing a system. Identity proofing is intended to mitigate threats to the registration of users and the establishment of their accounts. Standards and guidelines specifying identity assurance levels for identity proofing include SP 800-63-3 and SP 800-63A . Organizations may be subject to laws, executive orders, directives, regulations, or policies that address the collection of identity evidence. Organizational personnel consult with the senior agency official for privacy and legal counsel regarding such requirements.
Control assessment-objective
users who require accounts for logical access to systems based on appropriate identity assurance level requirements as specified in applicable standards and guidelines are identity proofed; user identities are resolved to a unique individual; identity evidence is collected; identity evidence is validated; identity evidence is verified.
What is the solution and how is it implemented?
Implementation a.
Add control implementation description here for item ia-12_smt.a
Implementation b.
Add control implementation description here for item ia-12_smt.b
Implementation c.
Add control implementation description here for item ia-12_smt.c