AC-14 - Permitted Actions Without Identification or Authentication

a. Identify [Assignment: organization-defined user actions] that can be performed on the system without identification or authentication consistent with organizational mission and business functions; and b. Document and provide supporting rationale in the security plan for the system, user actions not requiring identification or authentication.


ID: AC-14
Enhancements: 

Space Segment Guidance

Some missions expose limited unauthenticated capabilities (e.g., beacons, coarse housekeeping) to aid discovery and recovery. Consider which signals truly need to be open, how their content avoids enabling command timing or key inference, and how behavior narrows in safe mode. Define guardrails for any discovery aids, and validate in simulators/flatsats that no unauthenticated pathway can alter state or leak sensitive configuration.