manage.get.gov/docs/compliance/dist/system-security-plans/ato/ia-4.md
Logan McDonald 1d3dfdb8d5
Add compliance documentation to source control (#116)
* add initial setup of compliance-trestle
2022-09-14 08:46:43 -04:00

2.8 KiB

implementation-status control-origination
c-not-implemented
c-inherited-cloud-gov
c-inherited-cisa
c-common-control
c-system-specific-control

ia-4 - [catalog] Identifier Management

Control Statement

Manage system identifiers by:

  • [a] Receiving authorization from personnel or roles to assign an individual, group, role, service, or device identifier;

  • [b] Selecting an identifier that identifies an individual, group, role, service, or device;

  • [c] Assigning the identifier to the intended individual, group, role, service, or device; and

  • [d] Preventing reuse of identifiers for time period.

Control guidance

Common device identifiers include Media Access Control (MAC) addresses, Internet Protocol (IP) addresses, or device-unique token identifiers. The management of individual identifiers is not applicable to shared system accounts. Typically, individual identifiers are the usernames of the system accounts assigned to those individuals. In such instances, the account management activities of AC-2 use account names provided by IA-4 . Identifier management also addresses individual identifiers not necessarily associated with system accounts. Preventing the reuse of identifiers implies preventing the assignment of previously used individual, group, role, service, or device identifiers to different individuals, groups, roles, services, or devices.

Control assessment-objective

system identifiers are managed by receiving authorization from personnel or roles to assign to an individual, group, role, or device identifier; system identifiers are managed by selecting an identifier that identifies an individual, group, role, service, or device; system identifiers are managed by assigning the identifier to the intended individual, group, role, service, or device; system identifiers are managed by preventing reuse of identifiers for time period.


What is the solution and how is it implemented?


Implementation a.

Add control implementation description here for item ia-4_smt.a


Implementation b.

Add control implementation description here for item ia-4_smt.b


Implementation c.

Add control implementation description here for item ia-4_smt.c


Implementation d.

Add control implementation description here for item ia-4_smt.d