STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← All Controls

IA-1

Identification and AuthenticationRev 5organization

Policy and Procedures

Baselines:LowModerateHigh

Control Statement

a. Develop, document, and disseminate to [Assignment: organization-defined personnel or roles]: 1. [Selection: organization-defined value] identification and authentication policy that: (a) Addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (b) Is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines; and 2. Procedures to facilitate the implementation of the identification and authentication policy and the associated identification and authentication controls; b. Designate an [Assignment: official] to manage the development, documentation, and dissemination of the identification and authentication policy and procedures; and c. Review and update the current identification and authentication: 1. Policy [Assignment: frequency] and following [Assignment: events] ; and 2. Procedures [Assignment: frequency] and following [Assignment: events].

Supplemental Guidance

Identification and authentication policy and procedures address the controls in the IA family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance. Therefore, it is important that security and privacy programs collaborate on the development of identification and authentication policy and procedures. Security and privacy program policies and procedures at the organization level are preferable, in general, and may obviate the need for mission- or system-specific policies and procedures. The policy can be included as part of the general security and privacy policy or be represented by multiple policies that reflect the complex nature of organizations. Procedures can be established for security and privacy programs, for mission or business processes, and for systems, if needed. Procedures describe how the policies or controls are implemented and can be directed at the individual or role that is the object of the procedure. Procedures can be documented in system security and privacy plans or in one or more separate documents. Events that may precipitate an update to identification and authentication policy and procedures include assessment or audit findings, security incidents or breaches, or changes in applicable laws, executive orders, directives, regulations, policies, standards, and guidelines. Simply restating controls does not constitute an organizational policy or procedure.

Related Controls (4)

AC-1PM-9PS-8SI-12

CCI Identifiers (25)

CCI-000758Review and update the current identification and authentication policy in accordance with the organization-defined frequency.CCI-000759Defines a frequency for reviewing and updating the identification and authentication policy.CCI-000760The organization develops procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls.CCI-000761The organization disseminates to organization-defined personnel or roles procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls.CCI-000762Review and update the current identification and authentication procedures in accordance with the organization-defined frequency.CCI-000763Defines a frequency for reviewing and updating the identification and authentication procedures.CCI-004033Develop and document an organization-level; mission/business process-level; and/or system-level identification and authorization policy that is consistent with applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines.

Linked STIG Checks (2)

Across 2 STIGs. Click to expand.

CCI-004035
Designate an organization-defined official to manage development and documentation of the identification and authentication policy.
CCI-004036Designate an organization-defined official to manage dissemination of the identification and authentication policy.
CCI-004037Designate an organization-defined official to manage development and documentation of the identification and authentication procedures.
CCI-004038Designate an organization-defined official to manage dissemination of the identification and authentication procedures.
CCI-004039Defines the official designated to managing the development, documentation, and dissemination of the identification and authentication policy.
CCI-004040Defines the official designated to managing the development, documentation, and dissemination of the identification and authentication procedures.
CCI-004041Review and update the current identification and authentication policy following organization-defined events.
CCI-004042Defines the events following reviewing and updating the current identification and authentication policy.
CCI-000756The organization develops an identification and authentication policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
CCI-000757Disseminate an organization-level; mission/business process-level; and/or system-level identification and authentication policy to organization-defined personnel.
CCI-004034Develop and document the procedures to facilitate the implementation of the identification and authorization policy and the associated identification and authentication controls.
CCI-001932The organization documents an identification and authentication policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
CCI-001933The organization defines the personnel or roles to be recipients of the identification and authentication policy and the procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls.
CCI-001934The organization documents procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls.
CCI-004031Defines the personnel or roles the organization-level; mission/business process-level; and/or system-level identification and authorization policy is disseminated to.
CCI-004032Develop and document an organization-level; mission/business process-level; and/or system-level identification and authorization policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination, among organizational entities, and compliance.
CCI-004043Review and update the current identification and authentication procedures following organization-defined events.
CCI-004044Defines the events following reviewing and updating the current identification and authentication procedures.