IA - Identification and Authentication Control Family
Page last updated:
Number | Control | Pivotal Application Service (PAS) Compliance |
---|---|---|
IA-1 | IDENTIFICATION AND AUTHENTICATION POLICY AND PROCEDURES | Deployer responsibility |
IA-2 | IDENTIFICATION AND AUTHENTICATION (ORGANIZATIONAL USERS) | compliant and inherited |
IA-3 | DEVICE IDENTIFICATION AND AUTHENTICATION | compliant and inherited |
IA-4 | IDENTIFIER MANAGEMENT | compliant |
IA-5 | AUTHENTICATOR MANAGEMENT | Deployer responsibility |
IA-6 | AUTHENTICATOR FEEDBACK | compliant |
IA-7 | CRYPTOGRAPHIC MODULE AUTHENTICATION | partially compliant |
IA-8 | IDENTIFICATION AND AUTHENTICATION (NON-ORGANIZATIONAL USERS) | compliant |
IA-9 | SERVICE IDENTIFICATION AND AUTHENTICATION | P0, so not required for FISMA moderate |
IA-10 | ADAPTIVE IDENTIFICATION AND AUTHENTICATION | P0, so not required for FISMA moderate |
IA-11 | RE-AUTHENTICATION | P0, so not required for FISMA moderate |