IA-2: Identification And Authentication (Organizational Users)
Control Family:
Threats Addressed:
Next Version:
- NIST Special Publication 800-53 Revision 5:
- IA-2: Identification and Authentication (organizational Users)
Control Statement
The information system uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users).
Supplemental Guidance
Organizational users include employees or individuals that organizations deem to have equivalent status of employees (e.g., contractors, guest researchers). This control applies to all accesses other than: (i) accesses that are explicitly identified and documented in AC-14; and (ii) accesses that occur through authorized use of group authenticators without individual authentication. Organizations may require unique identification of individuals in group accounts (e.g., shared privilege accounts) or for detailed accountability of individual activity. Organizations employ passwords, tokens, or biometrics to authenticate user identities, or in the case multifactor authentication, or some combination thereof. Access to organizational information systems is defined as either local access or network access. Local access is any access to organizational information systems by users (or processes acting on behalf of users) where such access is obtained by direct connections without the use of networks. Network access is access to organizational information systems by users (or processes acting on behalf of users) where such access is obtained through network connections (i.e., nonlocal accesses). Remote access is a type of network access that involves communication through external networks (e.g., the Internet). Internal networks include local area networks and wide area networks. In addition, the use of encrypted virtual private networks (VPNs) for network connections between organization-controlled endpoints and non-organization controlled endpoints may be treated as internal networks from the perspective of protecting the confidentiality and integrity of information traversing the network.
Organizations can satisfy the identification and authentication requirements in this control by complying with the requirements in Homeland Security Presidential Directive 12 consistent with the specific organizational implementation plans. Multifactor authentication requires the use of two or more different factors to achieve authentication. The factors are defined as: (i) something you know (e.g., password, personal identification number [PIN]); (ii) something you have (e.g., cryptographic identification device, token); or (iii) something you are (e.g., biometric). Multifactor solutions that require devices separate from information systems gaining access include, for example, hardware tokens providing time-based or challenge-response authenticators and smart cards such as the U.S. Government Personal Identity Verification card and the DoD common access card. In addition to identifying and authenticating users at the information system level (i.e., at logon), organizations also employ identification and authentication mechanisms at the application level, when necessary, to provide increased information security. Identification and authentication requirements for other than organizational users are described in IA-8.
Control Enhancements
IA-2(1): Network Access To Privileged Accounts
Baseline(s):
- Low
- Moderate
- High
The information system implements multifactor authentication for network access to privileged accounts.
IA-2(2): Network Access To Non-Privileged Accounts
Baseline(s):
- Moderate
- High
The information system implements multifactor authentication for network access to non-privileged accounts.
IA-2(3): Local Access To Privileged Accounts
Baseline(s):
- Moderate
- High
The information system implements multifactor authentication for local access to privileged accounts.
IA-2(4): Local Access To Non-Privileged Accounts
Baseline(s):
- High
The information system implements multifactor authentication for local access to non-privileged accounts.
IA-2(5): Group Authentication
Baseline(s):
The organization requires individuals to be authenticated with an individual authenticator when a group authenticator is employed.
IA-2(6): Network Access To Privileged Accounts – Separate Device
Baseline(s):
The information system implements multifactor authentication for network access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access and the device meets [Assignment: organization-defined strength of mechanism requirements].
IA-2(7): Network Access To Non-Privileged Accounts – Separate Device
Baseline(s):
The information system implements multifactor authentication for network access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access and the device meets [Assignment: organization-defined strength of mechanism requirements].
IA-2(8): Network Access To Privileged Accounts – Replay Resistant
Baseline(s):
- Moderate
- High
The information system implements replay-resistant authentication mechanisms for network access to privileged accounts.
IA-2(9): Network Access To Non-Privileged Accounts – Replay Resistant
Baseline(s):
- High
The information system implements replay-resistant authentication mechanisms for network access to non-privileged accounts.
IA-2(10): Single Sign-On
Baseline(s):
The information system provides a single sign-on capability for [Assignment: organization-defined information system accounts and services].
IA-2(11): Remote Access – Separate Device
Baseline(s):
- Moderate
- High
The information system implements multifactor authentication for remote access to privileged and non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access and the device meets [Assignment: organization-defined strength of mechanism requirements].
IA-2(12): Acceptance Of Piv Credentials
Baseline(s):
- Low
- Moderate
- High
The information system accepts and electronically verifies Personal Identity Verification (PIV) credentials.
IA-2(13): Out-Of-Band Authentication
Baseline(s):
The information system implements [Assignment: organization-defined out-of-band authentication] under [Assignment: organization-defined conditions].