IA-2(5)
IA-2(5): Individual Authentication with Group Authentication
When shared accounts or authenticators are employed, require users to be individually authenticated before granting access to the shared accounts or resources.
Supplemental
Individual authentication prior to shared group authentication mitigates the risk of using group accounts or authenticators.
| CIA Levels | |
|---|---|
| Confidentiality | low |
| Integrity | low |
| Availability | unknown |
| Overlays |
|---|
| DAF Baseline, Privacy (accountability), Privacy (high), Privacy (low), Privacy (moderate) |
| CSF Categories |
|---|
| None |