Security and Privacy Controls for Federal Information Systems and Organizations
No. | Control | Priority | Low | Moderate | High |
---|---|---|---|---|---|
IA-1 | IDENTIFICATION AND AUTHENTICATION POLICY AND PROCEDURES | P1 |
IA-1
|
IA-1
|
IA-1
|
IA-2 | IDENTIFICATION AND AUTHENTICATION (ORGANIZATIONAL USERS) | P1 | |||
IA-3 | DEVICE IDENTIFICATION AND AUTHENTICATION | P1 |
|
IA-3
|
IA-3
|
IA-4 | IDENTIFIER MANAGEMENT | P1 |
IA-4
|
IA-4
|
IA-4
|
IA-5 | AUTHENTICATOR MANAGEMENT | P1 | |||
IA-6 | AUTHENTICATOR FEEDBACK | P2 |
IA-6
|
IA-6
|
IA-6
|
IA-7 | CRYPTOGRAPHIC MODULE AUTHENTICATION | P1 |
IA-7
|
IA-7
|
IA-7
|
IA-8 | IDENTIFICATION AND AUTHENTICATION (NON-ORGANIZATIONAL USERS) | P1 | |||
IA-9 | SERVICE IDENTIFICATION AND AUTHENTICATION | P0 |
|
|
|
IA-10 | ADAPTIVE IDENTIFICATION AND AUTHENTICATION | P0 |
|
|
|
IA-11 | RE-AUTHENTICATION | P0 |
|
|
|