Identification and Authentication Policy
Identification and Authentication Domain (IA)
📖 What This Policy Covers
Identification and Authentication is about proving 'you are who you say you are' before granting access. This policy covers unique user identifiers, identity verification processes, password requirements, multi-factor authentication (MFA), cryptographic authentication (certificates, SSH keys), device authentication (802.1X, NAC), federated identity and SSO, service account management, and privileged access authentication. It works hand-in-hand with the Access Control policy -- IA proves identity, AC determines what that identity can access.
Purpose
This policy ensures that users and devices are uniquely identified before accessing systems, authentication mechanisms are strong enough to prevent unauthorized access, credentials are properly managed and protected throughout their lifecycle, and the organization meets CMMC Level 2 requirements for identity management.
Scope
Applies to all employees, contractors, vendors, service accounts, and automated processes. Covers all information systems, applications, databases, and network devices processing CUI. Includes all authentication methods: passwords, MFA, certificates, biometrics, API keys, and SSH keys across cloud, on-premise, hybrid, and SaaS environments.
🎯 Why It Matters
Stolen or weak credentials are the #1 attack vector -- 80% of breaches involve compromised credentials (Verizon DBIR). Without strong identification and authentication, access controls are meaningless because anyone can impersonate a legitimate user. MFA alone blocks 99.9% of automated attacks (Microsoft). This domain has 11 practices, making it the second-largest family after Access Control, reflecting how critical identity is to security.
🔐 Key Requirements
1. User Identification
Every user, process, and device must have a unique identifier with proper identity verification before access is granted.
- ✓ Every user has a unique identifier ([email protected] or first initial + last name)
- ✓ Service accounts use svc-[purpose] naming (e.g., svc-backup, svc-api)
- ✓ Shared accounts prohibited (no 'admin', 'support', 'developer' accounts)
- ✓ Emergency break-glass accounts: documented, monitored, reviewed monthly
- ✓ Identity verified before provisioning: employees via HR onboarding + photo ID, contractors via NDA + sponsor verification
- ✓ Audit trail associates all actions to specific user ID
2. Password Requirements
Strong password standards, secure storage, and proper lifecycle management.
- ✓ Minimum 14 characters with 3 of 4 complexity types (upper, lower, number, special)
- ✓ Prohibited: dictionary words, company name, username, sequential/repeated characters
- ✓ Password history: last 12 cannot be reused; no reuse within 1 year
- ✓ Expiration: standard 90 days, privileged 60 days, service accounts 180 days, cloud with MFA 120 days
- ✓ Lockout: 5 consecutive failures triggers 30-minute lockout with notification to user + IT Security
- ✓ Temporary passwords: system-generated, valid 24 hours max, forced change on first login
- ✓ Storage: NEVER plaintext, hashed with FIPS 140-2 approved algorithms (bcrypt, Argon2, PBKDF2), salted, encrypted at rest
3. Multi-Factor Authentication (MFA)
MFA requirements, acceptable methods, enrollment, and replay resistance.
- ✓ MFA required for: all privileged accounts, remote access (VPN/cloud), CUI systems, email, cloud consoles, access from non-company IPs
- ✓ Acceptable methods (preference order): hardware tokens (YubiKey), authenticator apps, push notifications, biometrics; SMS only temporary
- ✓ Prohibited: voice call OTP, email OTP
- ✓ Enrollment within 48 hours of account creation; each user registers 2+ MFA methods
- ✓ Replay resistance: TOTP codes valid 30 seconds and non-reusable, nonce-based challenges, session tokens bound to IP and device
- ✓ 100% enrollment tracked via monthly reports
4. Cryptographic Authentication
Certificate-based authentication, PKI management, SSH key management, and FIPS-validated cryptographic modules.
- ✓ Certificate-based auth required for: service-to-service APIs, privileged infrastructure access (SSH, RDP), device auth (802.1X), code signing
- ✓ Certificate standards: RSA 2048-bit minimum (4096-bit or ECC P-256+ preferred), max 397 days validity
- ✓ PKI: company-operated internal CA, auto-enrollment via GPO/Intune, revocation within 24 hours of compromise
- ✓ SSH keys: ED25519 preferred, RSA 4096-bit minimum, passphrase required, 180-day rotation for privileged access
- ✓ FIPS 140-2 validated modules required; SHA-256+ hash functions; AES-256 encryption; SHA-1 prohibited
5. Device Authentication
Device identity verification and network access control.
- ✓ All devices enrolled in MDM with unique device ID (serial, asset tag, device certificate)
- ✓ 802.1X authentication for wired and wireless networks using device certificates
- ✓ Posture assessment before network access: AV enabled, firewall enabled, patches current, encryption enabled
- ✓ Non-compliant devices quarantined to remediation VLAN
- ✓ IoT/headless devices: certificate-based auth only, device attestation via TPM, mutual TLS
6. Service Account & Non-Human Identities
Management of service accounts, API keys, and automated process identities.
- ✓ Unique identifier per service/application (svc-db-backup)
- ✓ Documentation required: purpose, owner, systems accessed, permissions, credential storage, last review date
- ✓ Preferred auth: certificate-based or managed identities (Azure MI, AWS IAM roles)
- ✓ If password required: 32+ character random, stored in vault (Azure Key Vault, HashiCorp Vault), rotated every 180 days automatically
- ✓ API keys rotated every 90 days, stored in secrets management
- ✓ Quarterly review; disabled immediately when service retired
7. Privileged Access Authentication
Enhanced authentication requirements for administrative and privileged accounts.
- ✓ Separate accounts: standard (jsmith) + privileged (jsmith-admin)
- ✓ MFA mandatory with no exceptions; session recording via PAM
- ✓ Just-In-Time (JIT) temporary elevation preferred over standing access
- ✓ Every privileged access requires ticket/justification
- ✓ Break-glass accounts: 32+ char password in sealed envelope in physical safe, monitored 24/7, password changed within 1 hour of use
👥 Roles & Responsibilities
CISO / IT Director
- • Overall accountability for identity and authentication program
- • Approve authentication standards and exceptions
- • Review authentication logs quarterly
- • Ensure compliance with this policy
IT Department / Identity Administrators
- • Implement and maintain IAM systems (Active Directory, Azure AD)
- • Provision unique identifiers, enforce password policies and MFA
- • Monitor authentication failures and anomalies
- • Maintain identity lifecycle (creation, modification, deletion)
Human Resources (HR)
- • Provide new hire information for identity provisioning
- • Notify IT of terminations/role changes within 24 hours
- • Coordinate identity verification for new users
Application Owners / System Administrators
- • Configure authentication requirements per this policy
- • Implement MFA for all CUI-handling systems
- • Document service account usage
- • Report authentication issues to IT Security
All Users
- • Protect personal credentials (no sharing)
- • Report lost/stolen authentication devices within 1 hour
- • Complete MFA enrollment within 48 hours of account creation
- • Report suspicious authentication requests immediately
🛠️ Implementation Roadmap (8 Weeks)
Identity Foundation
Weeks 1-2- → Week 1: Audit existing identities, identify shared accounts, standardize naming to firstname.lastname, create separate admin accounts, document service accounts
- → Week 2: Configure password policy via GPO (14 char min, 12 history, 90-day expiry, 5-attempt lockout), enable Azure AD Password Protection with banned word list, deploy password manager company-wide
Multi-Factor Authentication
Weeks 3-4- → Week 3: Select MFA provider, configure Conditional Access / IAM MFA policies, procure hardware tokens (YubiKey) for privileged users
- → Week 4: Roll out MFA -- Phase 1: admins, Phase 2: remote users, Phase 3: all users. Create training materials, track enrollment daily, escalate non-compliance after 48 hours
Certificate-Based Authentication
Weeks 5-6- → Week 5: Deploy Certificate Authority (Windows Server CA or Azure AD CA), define certificate templates, configure auto-enrollment via GPO/Intune
- → Week 6: Inventory service accounts, migrate to certificate auth where possible, deploy secrets vault (Azure Key Vault / HashiCorp Vault), configure automated credential rotation
Device Authentication & Monitoring
Weeks 7-8- → Week 7: Configure 802.1X on network switches (RADIUS + device certificates), pilot with IT department, roll out by floor/department
- → Week 8: Configure SIEM to ingest auth logs (Azure AD sign-ins, AD events 4625/4740/4771, VPN, SSH), create dashboards and alerts, assign 24/7 on-call rotation
Recommended Tools
📊 CMMC Practice Mapping
| Practice ID | Requirement | Policy Section |
|---|---|---|
| IA.L1-3.5.1 | Identify users, processes, devices | 1, 5, 6 |
| IA.L1-3.5.2 | Authenticate users, processes, devices | 1, 4, 5 |
| IA.L2-3.5.3 | Use multi-factor authentication | 3 |
| IA.L2-3.5.4 | Employ replay-resistant authentication | 3 |
| IA.L2-3.5.5 | Prevent reuse of identifiers | 1, 2 |
| IA.L2-3.5.6 | Disable inactive accounts | See AC Policy |
| IA.L2-3.5.7 | Enforce minimum password complexity | 2 |
| IA.L2-3.5.8 | Prohibit password reuse | 2 |
| IA.L2-3.5.9 | Allow temp password use only once | 2 |
| IA.L2-3.5.10 | Store/transmit passwords cryptographically | 2, 6 |
| IA.L2-3.5.11 | Obscure feedback during authentication | Built into OS |
📋 Evidence Requirements
These are the artifacts a C3PAO assessor will ask for. Start collecting early.
Password Policy GPO / Azure AD Config Screenshots
MFA Configuration Screenshot
MFA Enrollment Report
Failed Authentication Log
Service Account Registry
Certificate Inventory
Password Policy Test Results
Training Records
⚠️ Common Gaps (What Assessors Flag)
1. Shared or generic accounts still in use
2. MFA not covering all required access paths
3. Service accounts with stale credentials
4. No password manager deployed
📝 Template Customization Guide
When filling in the downloadable template for this policy, replace these placeholders with your organization's specifics:
[COMPANY NAME] Your organization's legal name
Example: Acme Defense Systems, LLC
[CISO Name] Name of your CISO or IT Director
Example: Jane Smith
[MM/DD/YYYY] Policy dates
Example: 03/01/2026
[certificate management system] Your PKI/certificate management tool
Example: DigiCert CertCentral
[Service Account Registry] Where service accounts are documented
Example: SharePoint list at /sites/IT/ServiceAccounts
Customization Tips
- 💡 If your organization doesn't operate a PKI, use a third-party CA and document the arrangement
- 💡 Adjust MFA method preferences based on your user population (remote workers may prefer mobile app over hardware token)
- 💡 For service accounts, prioritize managed identities (Azure MI, AWS IAM roles) over password-based auth
- 💡 If 14-character passwords cause significant pushback, implement passphrase guidance (e.g., 'correct-horse-battery-staple')
- 💡 Document any systems that cannot support MFA and describe compensating controls (IP restrictions, VPN-only access, enhanced logging)