Navigate
IA-8
IA-8: Identification and Authentication (Non-organizational Users)
Uniquely identify and authenticate non-organizational users or processes acting on behalf of non-organizational users.
Supplemental
Non-organizational users include system users other than organizational users explicitly covered by [IA-2](#ia-2) . Non-organizational users are uniquely identified and authenticated for accesses other than those explicitly identified and documented in [AC-14](#ac-14) . Identification and authentication of non-organizational users accessing federal systems may be required to protect federal, proprietary, or privacy-related information (with exceptions noted for national security systems). Organizations consider many factors—including security, privacy, scalability, and practicality—when balancing the need to ensure ease of use for access to federal information and systems with the need to protect and adequately mitigate risk.
| CIA Levels | |
|---|---|
| Confidentiality | low |
| Integrity | low |
| Availability | unknown |
| Overlays |
|---|
| DAF Baseline, Privacy (high), Privacy (low), Privacy (moderate) |
| CSF Categories |
|---|
| PR.AC-1, PR.AC-6, PR.AC-7 |
Related Controls
The controls below (if any) were marked by NIST as being related to IA-8.
Enhancements
The controls below (if any) add on to the requirements of IA-8.
Related CCIs
The CCIs below are tied to IA-8.