ARTIFACTS

IA: IDENTIFICATION & AUTHENTICATION

What's On This Page

Each control family has a page dedicated to presenting all of the artifacts associated with the controls and control enhancements in that family. This is a consolidated view of the artifacts organized in a way to make the information usable. From here you can navigate to the individual control pages where the artifacts associated with each control or control enhancement are displayed with the control. You can use the Links Panels to select the individual controls or control enhancements you want to work with.

Supplement the artifacts here with other relevent documents and records dictated by your risk-based cybersecurity program and your information supply chain requirements.

The Source of the Artifacts

The control information comes from NIST Special Publication 800-53R4, Security and Privacy Controls for Information Systems and Organizationsand Special Publication and NIST Special Publication 800-53AR4, Assessing Security and Privacy Controls in Federal Information Systems and Organizations Building Effective Assessment Plans. We've normalized the artifact names and annotated them with information useful in understanding these artifacts in the context of your digital enterprise, information supply chain, and security architecture.

Essential Artifacts for Risk-Based Cybersecurity Programs

This section includes core documents for risk-based cybersecurity; the POLICY & PROCEDURES document for (IA); and documents that are widely used in the assessment of controls and control enhancements in the (IA) family. Policy and Procedure documents from control families are in CAPS and identified with their two letter code.

CORE ARTIFACTS
WIDELY USED ARTIFACTS FOR IDENTIFICATION & AUTHENTICATION
IDENTIFICATION & AUTHENTICATION policy (IA)
Identification & Authentication policy
Information system design documentation
Information system configuration settings and associated documentation
Information system audit records
Security Authorization Package Documents:
  • Security Plan
  • Security Assessment
  • Plan of Action and Milestones (POA&M)
ESSENTIALS
ACCESS CONTROL POLICY & PROCEDURES (AC)
Asset Inventory
AUDIT & ACCOUNTABILITY POLICY & PROCEDURES (AU)
Configuration Management Plan
CONFIGURATION MANAGEMENT POLICY & PROCEDURES (CM)
Contingency Plan

  • Plans related to a comprehensive Contingency Plan:
    • Business Continuity Plans
    • Disaster Recovery Plans
    • Continuity of Operations Plans
    • Crisis Communications Plans
    • Critical Infrastructure Plans
    • Cyber Incident Response Plans
    • Insider Threat Implementation Plan
    • Occupant Emergency Plans
CONTINGENCY PLANNING POLICY & PROCEDURES (CP)
Continuous Monitoring Strategy
Continuous Monitoring Plan
Enterprise Architecture (EA)
IDENTIFICATION & AUTHENTICATION POLICY & PROCEDURES (IA)
INCIDENT RESPONSE POLICY & PROCEDURES (IR)
INFORMATION SECURITY PROGRAM PLAN (PM)
MEDIA PROTECTION POLICY & PROCEDURES (MP)
PERSONNEL SECURITY POLICY & PROCEDURES (PS)
PHYSICAL AND ENVIRONMENTAL PROTECTION POLICY & PROCEDURES (PE)
Privacy Impact Assessment
Privacy Program Plan
Risk Assessment
RISK ASSESSMENT POLICY & PROCEDURES (RA)
SECURITY ASSESSMENT & AUTHORIZATION POLICY & PROCEDURES (CA)
SECURITY AWARENESS AND TRAINING POLICY & PROCEDURES (AT)
Security Configurations
SECURITY PLANNING POLICY & PROCEDURES (PL)
SYSTEM AND COMMUNICATIONS PROTECTION POLICY & PROCEDURES (SC)
SYSTEM AND INFORMATION INTEGRITY POLICY & PROCEDURES (SI)
SYSTEM AND SERVICES ACQUISITION POLICY & PROCEDURES (SA)
System Interconnection Agreements
SYSTEM MAINTENANCE POLICY & PROCEDURES (MA)

Policy & Procedures

Here you'll find a catalog of Identification & Authentication (IA) related policies and procedures for managing access to your digital enterprise and information supply chain. Select those that enable your risk-based cybersecurity program.

POLICES & PROCEDURES APPLICABLE
CONTROL(S)
IDENTIFICATION & AUTHENTICATION POLICY & PROCEDURES IA-1
Password policy IA-5 (1)
Procedures addressing account management IA-4
IA-4 (1)
IA-4 (2)
IA-4 (3)
IA-4 (4)
IA-4 (5)
IA-4 (6)
IA-4 (7)
IA-5 (9)
Procedures addressing account management IA-4 (1)
Procedures addressing adaptive/ supplemental Identification & Authentication techniques or mechanisms IA-10
Procedures addressing authenticator feedback IA-6
Procedures addressing authenticator management IA-5
IA-5 (1)
IA-5 (2)
IA-5 (3)
IA-5 (4)
IA-5 (5)
IA-5 (6)
IA-5 (7)
IA-5 (8)
IA-5 (9)
IA-5 (11)
IA-5 (12)
IA-5 (13)
IA-5 (14)
Procedures addressing cryptographic module authentication IA-7
Procedures addressing device configuration management IA-3 (4)
Procedures addressing device IDENTIFICATION & AUTHENTICATION IA-3
IA-3 (1)
IA-3 (3)
IA-3 (4)
Procedures addressing IDENTIFICATION & AUTHENTICATION IA-2 (10)
Procedures addressing identifier management IA-4
IA-4 (1)
IA-4 (2)
IA-4 (3)
IA-4 (4)
IA-4 (5)
IA-4 (6)
IA-4 (7)
IA-5 (10)
IA-5 (15)
Procedures addressing service Identification & Authentication IA-9
IA-9 (1)
IA=9 (2)
Procedures addressing single sign-on capability for information system accounts and services IA-2 (10)
Procedures addressing the integration of security requirements into the acquisition process IA-5 (5)
Procedures addressing the integration of security requirements into the acquisition process IA-8 (3)
Procedures addressing the integration of security requirements into the acquisition process IA-8 (4)
Procedures addressing user and device re-authentication IA-11
Procedures addressing user Identification & Authentication IA-2
IA-2 (1)
IA-2 (2)
IA-2 (3)
IA-2 (4)
IA-2 (5)
IA-2 (6)
IA-2 (7)
IA-2 (8)
IA-2 (9)
IA-2 (11)
IA-2 (12)
IA-2 (13)
IA-8
IA-8 (1)
IA-8 (2)
IA-8 (3)
IA-8 (4)
IA-8 (5)
System and services acquisition policy IA-5 (5)
IA-8 (3)
IA-8 (4)

Evidence, Records & Artifacts

Here you'll find a catalog of Identification & Authentication (IA) related policies and procedures for managing access to your digital enterprise and information supply chain. Select those that enable your risk-based cybersecurity program.

ARTIFACT APPLICABLE
CONTROL(S)
Acquisition contracts for information system procurements or services IA-5 (5)
Acquisition contracts for information system procurements or services IA-8 (3)
IA-8 (4)
Acquisition documentation IA-5 (5)
IA-8 (3)
IA-8 (4)
Application code reviews for detecting unencrypted static authenticators IA-5 (7)
Authenticator registration documentation IA-5 (3)
Automated mechanisms employing biometric-based authentication for the information system IA-5 (12)
Automated mechanisms employing hardware token-based authentication for the information system IA-5 (11)
Automated mechanisms providing dynamic binding of identifiers and authenticators IA-5 (10)
IA-5 (15)
Automated tools for evaluating password authenticators IA-5 (4)
Change control records IA-3 (4)
Change control records associated with managing information system authenticators IA-5
Configuration management records IA-3 (4)
Device connection reports IA-3
IA-3 (1)
IA-3 (3)
Enterprise architecture documentation IA-5 (14)
Enterprise security architecture documentation IA-5 (14)
Evidence of FICAM-approved third-party credentials IA-8 (2)
Evidence of lease information and lease duration assigned to devices IA-3 (3)
Evidence of PIV credentials IA-2 (12)
IA-8 (1)
Evidence of PIV-I credentials IA-8 (5)
Information security agreements IA-5 (9)
Logical access scripts IA-5 (7)
Organizational methodology for managing content of PKI trust stores across installed all platforms IA-5 (14)
Password configurations and associated documentation IA-5 (1)
Password strength assessment results IA-5 (4)
Piv credential authorizations IA-2 (12)
IA-8 (1)
Piv verification records IA-2 (12)
IA-8 (1)
Piv-I credential authorizations IA-8 (5)
Piv-I verification records IA-8 (5)
PKI certification validation records IA-5 (2)
Registration process for receiving information system authenticators IA-5 (3)
Risk assessment results IA-5 (6)
Rules for IDENTIFICATION & AUTHENTICATION transmission decisions between organizational services IA-9 (2)
Security assessments of authenticator protections IA-5 (6)
Security categorization documentation for the information system IA-5 (6)
Security safeguards used to identify and authenticate information system services IA-9
Supplemental IDENTIFICATION & AUTHENTICATION techniques or mechanisms IA-10
System-generated list of out-of-band authentication paths IA-2 (13)
Third-party credential authorizations IA-8 (2)
IA-8 (3)
Third-party credential records IA-8 (3)
Third-party credential validations IA-8 (3)
Third-party credential verification records IA-8 (2)
Transmission records IA-9 (2)
Transmission verification records IA-9 (2)

Identification & Authentication (IA) Related Lists

These are the Identification & Authentication (IA) related lists you may need to support your security program. For the lists applicable to your systems and informations supply chain you should know the source of the list and the data it contains; how the lists are generated, where they are stored, and how they are maintained, and how to get the when you have an incident, an incident investigation or an audit.

LIST APPLICABLE
CONTROL(S)
List of authenticators requiring in-person registration IA-5 (3)
List of authenticators requiring trusted third party registration IA-5 (3)
List of biometric quality requirements IA-5 (12)
List of characteristics identifying individual status IA-4 (4)
List of circumstances or situations requiring re-authentication IA-11
List of devices requiring unique Identification & Authentication IA-3
List of devices requiring unique Identification & Authentication IA-3 (1)
List of FICAM-approved information system components procured and implemented by organization IA-8 (3)
List of FICAM-approved, third-party credentialing products, components, or services procured and implemented by organization IA-8 (2)
List of FICAM-issued profiles and associated, approved protocols IA-8 (4)
List of identifiers generated from physical access control devices IA-4
List of individuals having accounts on multiple information systems IA-5 (8)
List of information system accounts IA-2
IA-2 (1)
IA-2 (2)
IA-2 (3)
IA-2 (4)
IA-2 (5)
IA-2 (6)
IA-2 (7)
IA-4
IA-8
List of information system accounts and services requiring single sign-on capability IA-2 (10)
List of information system authenticator types IA-5
List of non-privileged information system accounts IA-2 (9)
List of privileged and non-privileged information system accounts IA-2 (11)
List of privileged information system accounts IA-2 (8)
List of security safeguards intended to manage risk of compromise due to individuals having accounts on multiple information systems IA-5 (8)
List of token quality requirements IA-5 (11)
PKI certification revocation lists IA-5 (2)
Go to The List of Lists