AC-14 Permitted Actions Without Identification Or Authentication
Access Control
Low Moderate High
Description
The organization identifies and documents specific user actions that can be performed on the information system without identification or authentication.
Supplemental Guidance
The organization allows limited user activity without identification and authentication for public websites or other publicly available information systems (e.g., individuals accessing a federal information system at http://www.firstgov.gov). Related security control: IA-02.
Enhancements
(1) The organization permits actions to be performed without identification and authentication only to the extent necessary to accomplish mission objectives.
MITRE ATT&CK Techniques (1)
ATT&CK v16.1Techniques mitigated by this control, mapped via CTID.
Persistence 1
Persistence
Compliance Mappings
ISO 27002:2022
5.15
COBIT 2019
DSS05
NIS2 Directive
Art. 21(2)(i)
MAS TRM
9
BSI IT-Grundschutz
ORP.4
ANSSI
Hygiene.11SecNumCloud.10.1
FINMA Circular 2023/1
IV.B.d(59)
OSFI B-13
B-13.3.2
EU GDPR
Art.25(2)
EU DORA
Art.9(4)(c)
BIO2
5.15
RBI CSF
Annex1.8
SAMA CSF
3.1
NCA ECC
2-2
UAE IA
T9
CBB TM
TM-6
Qatar NIA
AC
CBUAE
CR-4
CBE CSF
CTO-1
BoG CISD
CISD-VIII
HIPAA Security Rule
ยง164.312(a)(2)(ii)
BOT Cyber Resilience
Ch2.2
CMMC 2.0
AC
Lloyd's Minimum Standards
MS8.3
FDA Cybersecurity Guidance
SA-1
ISO 27799
9.2
ISO 17799 (legacy)
None.
COBIT 4.1 (legacy)
None.