Authenticate (or verify) the identities of users, processes, or devices
π What This Means
This control ensures that only authorized users, processes, or devices can access your systems. It requires verifying identities before granting access, like checking a username and password. This prevents unauthorized access and protects sensitive information. For example, when an employee logs into their work computer, the system checks their credentials. Similarly, a server might verify a deviceβs identity before allowing it to connect. This practice is crucial for maintaining security and preventing breaches.
π― Why It Matters
Without proper authentication, unauthorized users or devices can access sensitive data, leading to breaches, data theft, or system compromises. For instance, the 2017 Equifax breach exposed millions of records due to weak authentication controls. The DoD emphasizes this control to protect classified information and ensure only authorized access. The impact of failure includes financial losses, reputational damage, and potential loss of contracts. Proper authentication mitigates these risks by ensuring only verified entities can access critical systems.
β How to Implement
- Enable Identity and Access Management (IAM) in your cloud provider (e.g., AWS IAM, Azure AD).
- Set up multi-factor authentication (MFA) for all user accounts.
- Configure role-based access control (RBAC) to limit permissions.
- Use cloud-native authentication tools (e.g., AWS Cognito, Azure AD B2C).
- Regularly audit and review access logs for anomalies.
π Evidence Examples
IAM Policy Document
MFA Enrollment Report
Access Logs
Password Policy
Training Records
π SSP Guidance
Use this guidance when writing the System Security Plan (SSP) narrative for this control.
How to Write the SSP Narrative
For IA.L1-3.5.2 ("Authenticate (or verify) the identities of users, processes, or devices"), your SSP narrative should specifically describe: (1) the tools and technologies you use to implement this control, (2) the configuration or process that enforces it, (3) who is responsible for maintaining it, and (4) what evidence proves it's working. Describe how users, devices, and processes are identified and authenticated, including your IAM platform, password policies, MFA implementation, certificate management, and service account controls. Be specific -- name your actual products, settings, and responsible personnel.
Example SSP Narratives
"IA.L1-3.5.2 is implemented using cloud-native controls. [Organization] uses [specific cloud service/feature] to authenticate (or verify) the identities of users, processes, or devices. The configuration is managed through [Azure Policy/AWS Config/Terraform] and monitored via [SIEM tool]. Responsible party: [IT Security Manager]. Evidence: [specific artifact, e.g., 'Azure AD Conditional Access policy screenshot, CloudTrail logs']."
"IA.L1-3.5.2 is implemented through on-premise infrastructure controls. [Organization] uses [Active Directory/Group Policy/specific tool] to authenticate (or verify) the identities of users, processes, or devices. Configuration is documented in [location] and audited [frequency]. Responsible party: [System Administrator]. Evidence: [specific artifact, e.g., 'Group Policy export, Windows Event logs']."
"IA.L1-3.5.2 is implemented across both cloud and on-premise environments. [Organization] uses [Azure AD Connect/hybrid tool] to ensure consistent enforcement. Cloud resources are managed via [cloud tool] and on-premise systems via [on-prem tool]. Both environments report to [centralized SIEM]. Responsible party: [IT Director]. Evidence: [artifacts from both environments]."
System Boundary Considerations
- β’ Identify all authentication entry points (local login, VPN, cloud, API)
- β’ Document the identity provider(s) and authentication flow
- β’ Specify MFA methods and coverage
- β’ Ensure this control covers all systems within your defined CUI boundary where authenticate (or verify) the identities of users, processes, or devices applies
- β’ Document any systems where this control is not applicable and explain why
Key Documentation to Reference in SSP
- π Identification and Authentication Policy
- π Password policy configuration
- π MFA enrollment records
- π Service account registry
- π Evidence artifacts specific to IA.L1-3.5.2
- π POA&M entry if control is not fully implemented
What the Assessor Looks For
The assessor will test authentication mechanisms, verify MFA is enforced for required access paths, check password policy configuration, and review service account documentation.
π¬ Self-Assessment Questions
Use these questions to assess your compliance. Each "NO" answer provides specific remediation guidance.
Question 1: Do all users have unique login credentials?
Question 2: Is MFA enabled for all user accounts?
Question 3: Are password policies enforced (e.g., complexity, expiration)?
Question 4: Are authentication logs reviewed regularly?
Question 5: Are devices authenticated before accessing the network?
β οΈ Common Mistakes (What Auditors Flag)
1. Shared accounts
2. Weak password policies
3. MFA not enabled
4. Inconsistent authentication across environments
5. Lack of regular log reviews
π Parent Policy
This practice is governed by the Identification and Authentication Policy