IA-01 Identification And Authentication Policy And Procedures

Identification and Authentication

Low Moderate High

Description

The organization develops, disseminates, and periodically reviews/updates: (i) a formal, documented, identification and authentication policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls.\n

Supplemental Guidance

The identification and authentication policy and procedures are consistent with: (i) FIPS 201 and Special Publications 800-73, 800-76, and 800-78; and (ii) other applicable laws, Executive Orders, directives, policies, regulations, standards, and guidance. The identification and authentication policy can be included as part of the general information security policy for the organization. Identification and authentication procedures can be developed for the security program in general, and for a particular information system, when required. NIST Special Publication 800-12 provides guidance on security policies and procedures. NIST Special Publication 800-63 provides guidance on remote electronic authentication.\n

Changes from Rev 4

Title changed from 'Identification and Authentication Policy and Procedures' Requires the selection (one or more) of organization-level; mission/business process-level; system-level identification and authentication policies New parameters require update to policy and procedures as a result of specified events in addition to specified frequency Adds text requiring consistency with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines Requires the designation of a specific official to manage the development, documentation, and dissemination of the identification and authentication policy and procedures Discussion amplifies the need for policy and procedures for risk management, and to help provide security and privacy assurance

Enhancements

(0) None.\n

Compliance Mappings

ISO 27001:2022

5.1(a)5.25.2(a)5.2(b)5.2(c)5.2(d)5.2(e)5.2(f)5.2(g)7.57.5.17.5.1(a)7.5.1(b)7.5.27.5.2(a)7.5.2(b)7.5.2(c)7.5.37.5.3(a)7.5.3(b)7.5.3(c)7.5.3(d)7.5.3(e)7.5.3(f)

ISO 27002:2022

5.15.155.185.37

COBIT 2019

APO01.09APO02.02APO13.03DSS05.04DSS06.03EDM01.01EDM01.03EDM05.01

CIS Controls v8

4.755.666.6

NIST CSF 2.0

GV.OVGV.OV-01GV.OV-02GV.POGV.PO-01GV.PO-02GV.SC-01GV.SC-03ID.RAPR.AAPR.AA-05

SOC 2 TSC

CC1.2-POF1CC1.4-POF1CC2.2-POF1CC2.2-POF7CC5.3CC5.3-POF1CC5.3-POF6CC6.1CC6.1-POF3CC6.1-POF7CC6.1-POF8CC6.1-POF9CC6.6CC6.6-POF2CC6.6-POF3CC7.2-POF1P1.1-POF5

ISO 17799 (legacy)

15.1.1

COBIT 4.1 (legacy)

DS5.3PC5