NIST SP 800-53Ar1 Assessment Procedure Catalog, with SP 800-53r3 Security Controls
IDENTIFICATION AND AUTHENTICATION
IA-1 IDENTIFICATION AND AUTHENTICATION POLICY AND PROCEDURES
FAMILY: IDENTIFICATION AND AUTHENTICATION
|
CLASS: TECHNICAL
|
- Security Control Baseline:
IA-1
|
Identification and Authentication Policy and Procedures
|
P1
|
LOW IA-1
|
MOD IA-1
|
HIGH IA-1
|
ASSESSMENT PROCEDURE
|
IA-1 |
IDENTIFICATION AND AUTHENTICATION POLICY AND PROCEDURES
|
IA-1.1 |
ASSESSMENT OBJECTIVE:
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: Identification and authentication policy and procedures; other relevant documents or records].
- Interview: [SELECT FROM: Organizational personnel with identification and authentication responsibilities].
|
IA-1.2 |
ASSESSMENT OBJECTIVE:
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: Identification and authentication policy and procedures; other relevant documents or records].
- Interview: [SELECT FROM: Organizational personnel with identification and authentication responsibilities].
|
IA-2 IDENTIFICATION AND AUTHENTICATION (ORGANIZATIONAL USERS)
FAMILY: IDENTIFICATION AND AUTHENTICATION
|
CLASS: TECHNICAL
|
- Security Control Baseline:
IA-2
|
Identification and Authentication (Organizational Users)
|
P1
|
LOW IA-2 (1)
|
MOD IA-2 (1) (2) (3) (8)
|
HIGH IA-2 (1) (2) (3) (4) (8) (9)
|
ASSESSMENT PROCEDURE
|
IA-2 |
IDENTIFICATION AND AUTHENTICATION (ORGANIZATIONAL USERS)
|
IA-2.1 |
ASSESSMENT OBJECTIVE:
Determine if the information system uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users).
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: Identification and authentication policy; procedures addressing user identification and authentication; information system design documentation; information system configuration settings and associated documentation; information system audit records; list of information system accounts; other relevant documents or records].
- Test: [SELECT FROM: Automated mechanisms implementing identification and authentication capability for the information system].
|
IA-2(1) |
IDENTIFICATION AND AUTHENTICATION (ORGANIZATIONAL USERS)
|
IA-2(1).1 |
ASSESSMENT OBJECTIVE:
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: Identification and authentication policy; procedures addressing user identification and authentication; information system design documentation; information system configuration settings and associated documentation; list of privileged information system accounts; other relevant documents or records].
- Test: [SELECT FROM: Automated mechanisms implementing identification and authentication capability for the information system].
|
IA-4 IDENTIFIER MANAGEMENT
FAMILY: IDENTIFICATION AND AUTHENTICATION
|
CLASS: TECHNICAL
|
- Security Control Baseline:
IA-4
|
Identifier Management
|
P1
|
LOW IA-4
|
MOD IA-4
|
HIGH IA-4
|
ASSESSMENT PROCEDURE
|
IA-4 |
IDENTIFIER MANAGEMENT
|
IA-4.1 |
ASSESSMENT OBJECTIVE:
Determine if:
- (i) the organization defines the time period for preventing reuse of user or device identifiers;
- (ii) the organization defines the time period of inactivity after which a user identifier is to be disabled; and
- (iii) the organization manages information system identifiers for users and devices by:
- receiving authorization from a designated organizational official to assign a user or device identifier;
- selecting an identifier that uniquely identifies an individual or device;
- assigning the user identifier to the intended party or the device identifier to the intended device;
- preventing reuse of user or device identifiers for the organization-defined time period; and
- disabling the user identifier after the organization-defined time period of inactivity.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: Identification and authentication policy; procedures addressing identifier management; procedures addressing account management; security plan; information system design documentation; information system configuration settings and associated documentation; list of information system accounts; list of identifiers generated from physical access control devices; other relevant documents or records].
- Interview: [SELECT FROM: Organizational personnel with identifier management responsibilities].
|
IA-5 AUTHENTICATOR MANAGEMENT
FAMILY: IDENTIFICATION AND AUTHENTICATION
|
CLASS: TECHNICAL
|
- Security Control Baseline:
IA-5
|
Authenticator Management
|
P1
|
LOW IA-5 (1)
|
MOD IA-5 (1) (2) (3)
|
HIGH IA-5 (1) (2) (3)
|
ASSESSMENT PROCEDURE
|
IA-5 |
AUTHENTICATOR MANAGEMENT
|
IA-5.1 |
ASSESSMENT OBJECTIVE:
Determine if:
- (i) the organization defines the time period (by authenticator type) for changing/refreshing authenticators; and
- (ii) the organization manages information system authenticators for users and devices by:
- verifying, as part of the initial authenticator distribution, the identity of the individual and/or device receiving the authenticator;
- establishing initial authenticator content for authenticators defined by the organization;
- ensuring that authenticators have sufficient strength of mechanism for their intended use;
- establishing and implementing administrative procedures for initial authenticator distribution;
- establishing and implementing administrative procedures for lost/compromised or damaged authenticators;
- establishing and implementing administrative procedures for revoking authenticators;
- changing default content of authenticators upon information system installation;
- establishing minimum and maximum lifetime restrictions and reuse conditions for authenticators (if deemed to be appropriate by the organization);
- changing/refreshing authenticators in accordance with the organization-defined time period by authenticator type;
- protecting authenticator content from unauthorized disclosure and modification; and
- requiring users to take, and having devices implement, specific measures to safeguard authenticators.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: Identification and authentication policy; procedures addressing authenticator management; information system design documentation; information system configuration settings and associated documentation; list of information system accounts; other relevant documents or records].
- Interview: [SELECT FROM: Organizational personnel with responsibilities for determining initial authenticator content].
- Test: [SELECT FROM: Automated mechanisms implementing authenticator management functions].
|
IA-5(1) |
AUTHENTICATOR MANAGEMENT
|
IA-5(1).1 |
ASSESSMENT OBJECTIVE:
Determine if:
- (i) the organization defines the minimum password complexity requirements to be enforced for case sensitivity, the number of characters, and the mix of upper-case letters, lower-case letters, numbers, and special characters including minimum requirements for each type;
- (ii) the organization defines the minimum number of characters that must be changed when new passwords are created;
- (iii) the organization defines the restrictions to be enforced for password minimum lifetime and password maximum lifetime parameters;
- (iv) the organization defines the number of generations for which password reuse is prohibited; and
- (v) the information system, for password-based authentication:
- enforces the minimum password complexity standards that meet the organization-defined requirements;
- enforces the organization-defined minimum number of characters that must be changed when new passwords are created;
- encrypts passwords in storage and in transmission;
- enforces the organization-defined restrictions for password minimum lifetime and password maximum lifetime parameters; and
- prohibits password reuse for the organization-defined number of generations.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: Identification and authentication policy; password policy; procedures addressing authenticator management; security plan; information system design documentation; information system configuration settings and associated documentation; other relevant documents or records].
- Test: [SELECT FROM: Automated mechanisms implementing authenticator management functions].
|
IA-6 AUTHENTICATOR FEEDBACK
FAMILY: IDENTIFICATION AND AUTHENTICATION
|
CLASS: TECHNICAL
|
- Security Control Baseline:
IA-6
|
Authenticator Feedback
|
P1
|
LOW IA-6
|
MOD IA-6
|
HIGH IA-6
|
ASSESSMENT PROCEDURE
|
IA-6 |
AUTHENTICATOR FEEDBACK
|
IA-6.1 |
ASSESSMENT OBJECTIVE:
Determine if the information system obscures feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: Identification and authentication policy; procedures addressing authenticator feedback; information system design documentation; information system configuration settings and associated documentation; other relevant documents or records].
- Test: [SELECT FROM: Automated mechanisms implementing authenticator feedback].
|
IA-7 CRYPTOGRAPHIC MODULE AUTHENTICATION
FAMILY: IDENTIFICATION AND AUTHENTICATION
|
CLASS: TECHNICAL
|
- Security Control Baseline:
IA-7
|
Cryptographic Module Authentication
|
P1
|
LOW IA-7
|
MOD IA-7
|
HIGH IA-7
|
ASSESSMENT PROCEDURE
|
IA-7 |
CRYPTOGRAPHIC MODULE AUTHENTICATION
|
IA-7.1 |
ASSESSMENT OBJECTIVE:
Determine if the information system uses mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: Identification and authentication policy; procedures addressing cryptographic module authentication; information system design documentation; information system configuration settings and associated documentation; other relevant documents or records].
- Test: [SELECT FROM: Automated mechanisms implementing cryptographic module authentication].
|
IA-8 IDENTIFICATION AND AUTHENTICATION (NON-ORGANIZATIONAL USERS)
FAMILY: IDENTIFICATION AND AUTHENTICATION
|
CLASS: TECHNICAL
|
- Security Control Baseline:
IA-8
|
Identification and Authentication (Non-Organizational Users)
|
P1
|
LOW IA-8
|
MOD IA-8
|
HIGH IA-8
|
ASSESSMENT PROCEDURE
|
IA-8 |
IDENTIFICATION AND AUTHENTICATION (NON-ORGANIZATIONAL USERS)
|
IA-8.1 |
ASSESSMENT OBJECTIVE:
Determine if the information system uniquely identifies and authenticates non-organizational users (or processes acting on behalf of non-organizational users).
|
- POTENTIAL ASSESSMENT METHODS AND OBJECTS:
- Examine: [SELECT FROM: Identification and authentication policy; procedures addressing user identification and authentication; information system design documentation; information system configuration settings and associated documentation; information system audit records; list of information system accounts; other relevant documents or records].
- Test: [SELECT FROM: Automated mechanisms implementing identification and authentication capability for the information system].
|
Source