UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

IA-1 IDENTIFICATION AND AUTHENTICATION POLICY AND PROCEDURES


Overview

Number Title Impact Priority Subject Area
IA-1 Identification And Authentication Policy And Procedures LOW P1 Identification And Authentication

Instructions
The organization:
IA-1a.
Develops, documents, and disseminates to Assignment: organization-defined personnel or roles:
       IA-1a.1.
An identification and authentication policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
       IA-1a.2.
Procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls; and
IA-1b.
Reviews and updates the current:
       IA-1b.1.
Identification and authentication policy Assignment: organization-defined frequency; and
       IA-1b.2.
Identification and authentication procedures Assignment: organization-defined frequency.
Guidance
This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the IA family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.

Enhancements