STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← IA-8 (4) — Use of Defined Profiles

CCI-004085

Definition

Conform to organization-defined identity management profiles for identity management.

Parent Control

IA-8 (4)Use of Defined ProfilesIdentification and Authentication

Linked STIG Checks (7)

V-205002CAT IIThe ALG providing user authentication intermediary services must conform to Federal Identity, Credential, and Access Management (FICAM)-issued profiles.Application Layer Gateway Security Requirements GuideV-222560CAT IIThe application must conform to Federal Identity, Credential, and Access Management (FICAM)-issued profiles.Application Security and Development Security Technical Implementation GuideV-204809CAT IIThe application server must conform to Federal Identity, Credential, and Access Management (FICAM)-issued profiles.Application Server Security Requirements GuideV-276012CAT IAx-OS must have no local accounts for the user interface.Axonius Federal Systems Ax-OS Security Technical Implementation GuideV-205577CAT IIThe Mainframe Product must conform to Federal Identity, Credential, and Access Management (FICAM)-issued profiles.Mainframe Product Security Requirements GuideV-279444CAT IINutanix AOS must conform to Federal Identity, Credential, and Access Management (FICAM)-issued profiles.Nutanix Acropolis Application Server Security Technical Implementation GuideV-269574CAT IXylok Security Suite must use a centralized user management solution.Xylok Security Suite 20.x Security Technical Implementation Guide