STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← All Controls

AC-14

Access ControlRev 5organization

Permitted Actions Without Identification or Authentication

Baselines:LowModerateHigh

Control Statement

a. Identify [Assignment: user actions] that can be performed on the system without identification or authentication consistent with organizational mission and business functions; and b. Document and provide supporting rationale in the security plan for the system, user actions not requiring identification or authentication.

Supplemental Guidance

Specific user actions may be permitted without identification or authentication if organizations determine that identification and authentication are not required for the specified user actions. Organizations may allow a limited number of user actions without identification or authentication, including when individuals access public websites or other publicly accessible federal systems, when individuals use mobile phones to receive calls, or when facsimiles are received. Organizations identify actions that normally require identification or authentication but may, under certain circumstances, allow identification or authentication mechanisms to be bypassed. Such bypasses may occur, for example, via a software-readable physical switch that commands bypass of the logon functionality and is protected from accidental or unmonitored use. Permitting actions without identification or authentication does not apply to situations where identification and authentication have already occurred and are not repeated but rather to situations where identification and authentication have not yet occurred. Organizations may decide that there are no user actions that can be performed on organizational systems without identification and authentication, and therefore, the value for the assignment operation can be "none."

Related Controls (3)

AC-8IA-2PL-2

CCI Identifiers (4)

CCI-000061Identify organization-defined user actions that can be performed on the system without identification or authentication consistent with organizational missions/business functions.CCI-000232Document and provide supporting rationale in the security plan for the system, user actions not requiring identification and authentication.CCI-003695Defines the user actions that can be performed on the system without identification or authentication consistent with organizational missions/business functions.CCI-002255The organization defines the user actions that can be performed on the information system without identification and authentication.deprecated

Linked STIG Checks (0)

No STIG checks reference this control.