IA-8(2) - Identification and Authentication (non-organizational Users) | Acceptance of External Authenticators

(a) Accept only external authenticators that are NIST-compliant; and (b) Document and maintain a list of accepted external authenticators.

Informational References

ISO 27001

ID: IA-8(2)
Enhancement of : IA-8

Countermeasures Covered by Control

ID Name Description D3FEND

Space Threats Tagged by Control

ID Description

Sample Requirements

Requirement Rationale/Additional Guidance/Notes

Related SPARTA Techniques and Sub-Techniques

ID Name Description