STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to General Purpose Operating System Security Requirements Guide

V-203650

CAT II (Medium)

The operating system must uniquely identify and must authenticate non-organizational users (or processes acting on behalf of non-organizational users).

Rule ID

SV-203650r958504_rule

STIG

General Purpose Operating System Security Requirements Guide

Version

V3R3

CCIs

CCI-000804

Discussion

Lack of authentication and identification enables non-organizational users to gain access to the application or possibly other information systems and provides an opportunity for intruders to compromise resources within the application or information system. Non-organizational users include all information system users other than organizational users, which include organizational employees or individuals the organization deems to have equivalent status of an employee (e.g., contractors and guest researchers). Non-organizational users shall be uniquely identified and authenticated for all accesses other than those accesses explicitly identified and documented by the organization when related to the use of anonymous access.

Check Content

Verify the operating system uniquely identifies and authenticates non-organizational users (or processes acting on behalf of non-organizational users). If it does not, this is a finding.

Fix Text

Configure the operating system to uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).