STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← All Controls

IA-9

Identification and AuthenticationRev 5organization

Service Identification and Authentication

Control Statement

Uniquely identify and authenticate [Assignment: system services and applications] before establishing communications with devices, users, or other services or applications.

Supplemental Guidance

Services that may require identification and authentication include web applications using digital certificates or services or applications that query a database. Identification and authentication methods for system services and applications include information or code signing, provenance graphs, and electronic signatures that indicate the sources of services. Decisions regarding the validity of identification and authentication claims can be made by services separate from the services acting on those decisions. This can occur in distributed system architectures. In such situations, the identification and authentication decisions (instead of actual identifiers and authentication data) are provided to the services that need to act on those decisions.

Related Controls (5)

IA-3IA-4IA-5IA-13SC-8

CCI Identifiers (6)

CCI-002017The organization defines the information system services requiring identification.CCI-002018Defines the system services and applications requiring authentication.CCI-002019The organization defines the security safeguards to be used when identifying information system services.CCI-002020The organization defines the security safeguards to be used when authenticating information system services.CCI-002021Uniquely identify organization-defined system services and applications before establishing communications with devices, users, or other services or applications.CCI-002022Uniquely authenticate organization-defined system services and applications before establishing communications with devices, users, or other services or applications.

Linked STIG Checks (0)

No STIG checks reference this control.