Identify users, processes, and devices
π What This Means
This control requires organizations to identify and maintain a clear list of all users, processes, and devices that interact with their systems. It means knowing who is accessing your network, what automated processes are running, and which devices are connected. This is essential for ensuring that only authorized entities can access sensitive information. For example, in a small defense contractor, this could involve tracking employees, contractors, and their laptops or smartphones. Another example is identifying automated backup processes that run nightly. By doing this, organizations can detect unauthorized access or anomalies, such as a device that shouldnβt be on the network or a process accessing data it shouldnβt.
π― Why It Matters
Failing to identify users, processes, and devices leaves your network vulnerable to unauthorized access and cyberattacks. For instance, in the 2020 SolarWinds breach, attackers exploited unidentified processes to infiltrate networks. Without proper identification, malicious actors can impersonate legitimate users or devices, leading to data breaches, financial loss, and reputational damage. From a DoD perspective, this control is critical because it ensures that only authorized entities can access Controlled Unclassified Information (CUI). It also helps in incident response by providing a clear map of whatβs on the network, making it easier to detect and mitigate threats.
β How to Implement
- 1. Use AWS Identity and Access Management (IAM) or Azure Active Directory to create and manage user accounts.
- 2. Enable CloudTrail (AWS) or Azure Monitor to log user and process activities.
- 3. Use AWS Config or Azure Security Center to identify and track devices accessing cloud resources.
- 4. Implement tagging for cloud resources to categorize users, processes, and devices.
- 5. Regularly review and update access policies to ensure only authorized entities have access.
π Evidence Examples
User Account List
Device Inventory Report
Process Logs
Access Policy Document
Training Records
π SSP Guidance
Use this guidance when writing the System Security Plan (SSP) narrative for this control.
How to Write the SSP Narrative
For IA.L1-3.5.1 ("Identify users, processes, and devices"), your SSP narrative should specifically describe: (1) the tools and technologies you use to implement this control, (2) the configuration or process that enforces it, (3) who is responsible for maintaining it, and (4) what evidence proves it's working. Describe how users, devices, and processes are identified and authenticated, including your IAM platform, password policies, MFA implementation, certificate management, and service account controls. Be specific -- name your actual products, settings, and responsible personnel.
Example SSP Narratives
"IA.L1-3.5.1 is implemented using cloud-native controls. [Organization] uses [specific cloud service/feature] to identify users, processes, and devices. The configuration is managed through [Azure Policy/AWS Config/Terraform] and monitored via [SIEM tool]. Responsible party: [IT Security Manager]. Evidence: [specific artifact, e.g., 'Azure AD Conditional Access policy screenshot, CloudTrail logs']."
"IA.L1-3.5.1 is implemented through on-premise infrastructure controls. [Organization] uses [Active Directory/Group Policy/specific tool] to identify users, processes, and devices. Configuration is documented in [location] and audited [frequency]. Responsible party: [System Administrator]. Evidence: [specific artifact, e.g., 'Group Policy export, Windows Event logs']."
"IA.L1-3.5.1 is implemented across both cloud and on-premise environments. [Organization] uses [Azure AD Connect/hybrid tool] to ensure consistent enforcement. Cloud resources are managed via [cloud tool] and on-premise systems via [on-prem tool]. Both environments report to [centralized SIEM]. Responsible party: [IT Director]. Evidence: [artifacts from both environments]."
System Boundary Considerations
- β’ Identify all authentication entry points (local login, VPN, cloud, API)
- β’ Document the identity provider(s) and authentication flow
- β’ Specify MFA methods and coverage
- β’ Ensure this control covers all systems within your defined CUI boundary where identify users, processes, and devices applies
- β’ Document any systems where this control is not applicable and explain why
Key Documentation to Reference in SSP
- π Identification and Authentication Policy
- π Password policy configuration
- π MFA enrollment records
- π Service account registry
- π Evidence artifacts specific to IA.L1-3.5.1
- π POA&M entry if control is not fully implemented
What the Assessor Looks For
The assessor will test authentication mechanisms, verify MFA is enforced for required access paths, check password policy configuration, and review service account documentation.
π¬ Self-Assessment Questions
Use these questions to assess your compliance. Each "NO" answer provides specific remediation guidance.
Question 1: Do you maintain an up-to-date list of all user accounts?
Question 2: Do you have a process to identify all devices on your network?
Question 3: Do you log and monitor automated processes?
Question 4: Do you review and update access policies annually?
Question 5: Do you train employees on identification policies?
β οΈ Common Mistakes (What Auditors Flag)
1. Missing devices on the network
2. Outdated user accounts
3. Incomplete process logs
4. Lack of access policy documentation
5. No employee training
π Parent Policy
This practice is governed by the Identification and Authentication Policy