AC-14 Permitted Actions Without Identification Or Authentication
Access Control
Low Moderate High
Description
The organization identifies and documents specific user actions that can be performed on the information system without identification or authentication.\n
Supplemental Guidance
The organization allows limited user activity without identification and authentication for public websites or other publicly available information systems (e.g., individuals accessing a federal information system at http://www.firstgov.gov). Related security control: IA-2.\n
Enhancements
(1) The organization permits actions to be performed without identification and authentication only to the extent necessary to accomplish mission objectives.\n
Compliance Mappings
ISO 17799 (legacy)
None.
COBIT 4.1 (legacy)
None.