National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

NIST Special Publication 800-53 (Rev. 4)

Security Controls and Assessment Procedures for Federal Information Systems and Organizations

Identification And Authentication Control Family

Showing 11 controls:
No. Control Priority Low Moderate High
IA-1 IDENTIFICATION AND AUTHENTICATION POLICY AND PROCEDURES P1 IA-1 IA-1 IA-1
IA-2 IDENTIFICATION AND AUTHENTICATION (ORGANIZATIONAL USERS) P1 IA-2 (1) (12) IA-2 (1) (2) (3) (8) (11) (12) IA-2 (1) (2) (3) (4) (8) (9) (11) (12)
IA-3 DEVICE IDENTIFICATION AND AUTHENTICATION P1 IA-3 IA-3
IA-4 IDENTIFIER MANAGEMENT P1 IA-4 IA-4 IA-4
IA-5 AUTHENTICATOR MANAGEMENT P1 IA-5 (1) (11) IA-5 (1) (2) (3) (11) IA-5 (1) (2) (3) (11)
IA-6 AUTHENTICATOR FEEDBACK P2 IA-6 IA-6 IA-6
IA-7 CRYPTOGRAPHIC MODULE AUTHENTICATION P1 IA-7 IA-7 IA-7
IA-8 IDENTIFICATION AND AUTHENTICATION (NON-ORGANIZATIONAL USERS) P1 IA-8 (1) (2) (3) (4) IA-8 (1) (2) (3) (4) IA-8 (1) (2) (3) (4)
IA-9 SERVICE IDENTIFICATION AND AUTHENTICATION P0
IA-10 ADAPTIVE IDENTIFICATION AND AUTHENTICATION P0
IA-11 RE-AUTHENTICATION P0