Back to Control Explorer

IA.1.077

Content

Control Acronym

IA

Family

Identification And Authentication

CMMC Level

1

800-171 Control #

3.5.2

CMMC Description

Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems.

CMMC Clarification

Before you let a person or a device have access to your system, you need to verify that the user or device is who or what it claims to be. This verification is called authentication. The most common way to verify identity is using a username and a hard-to-guess password. Some devices ship with default usernames and passwords. For example, some devices ship so that when you first logon to the device, the username is “admin” and the password is “admin”. When you have devices with this type of default username and password, you need to change the default password to a unique password you create. Default passwords are well known to the public, and easily found in a search. So, these default passwords would be easy for an unauthorized person to guess and use to gain access to your system. Example You are in charge of purchasing for your company. You know that some devices, such as laptops, come with a default username and a default password. Last week, your coworker in the Engineering Department received a laptop with the default username “admin” and default password “admin.” You remind the coworker to be sure to delete the default account details, or change the default password to a unique password. You also explain that default passwords are easily found in an internet search engine making it easy for an unauthorized person to gain access to the system.

800-171 Description

Authenticate (or verify) the identities of users, processes, or devices, as a prerequisite to allowing access to organizational systems.

800-171 Discussion

Individual authenticators include the following: passwords, key cards, cryptographic devices, and one-time password devices. Initial authenticator content is the actual content of the authenticator, for example, the initial password. In contrast, the requirements about authenticator content include the minimum password length. Developers ship system components with factory default authentication credentials to allow for initial installation and configuration. Default authentication credentials are often well known, easily discoverable, and present a significant security risk. Systems support authenticator management by organization-defined settings and restrictions for various authenticator characteristics including minimum password length, validation time window for time synchronous one-time tokens, and number of allowed rejections during the verification stage of biometric authentication. Authenticator management includes issuing and revoking, when no longer needed, authenticators for temporary access such as that required for remote maintenance. Device authenticators include certificates and passwords. [SP 800-63-3] provides guidance on digital identities.

Other Source Discussion

N/A

CIS Control References

CIS Controls v7.1 4.2, 4.3, 16.8, 16.9

NIST 800-53 Control Ref.

NIST SP 800-53 Rev 4 IA-2, IA-3, IA-5

CMMC Derived

NIST CSF Control References

NIST CSF v1.1 PR.AC-1, PR.AC-6, PR.AC-7

NIST 800-171 References

NIST SP 800-171 Rev 1 3.5.2

Applicable FAR Clause

FAR Clause 52.204-21 b.1.vi

NIST CSF Control Reference

CERT RMM Reference

CERT RMM v1.2 TM:SG4.SP1

Modification of NIST 800-171B Reference

NIST 800-171B Reference

UK NCSCCyber Reference

UK NCSC Cyber Essentials

AS ACSC Reference

Sub-Criterias

Assessment Sub-Criteria 1

IA.1.077.[a] the identity of each user is authenticated or verified as a prerequisite to system access;

Assessment Sub-Criteria 2

IA.1.077.[b] the identity of each process acting on behalf of a user is authenticated or verified as a prerequisite to system access; and

Assessment Sub-Criteria 3

IA.1.077.[c] the identity of each device accessing or connecting to the system is authenticated or verified as a prerequisite to system access.

Assessment Sub-Criteria 4

Assessment Sub-Criteria 5

Assessment Sub-Criteria 6

Assessment Sub-Criteria 7

Assessment Sub-Criteria 8

Assessment Sub-Criteria 9

Assessment Sub-Criteria 10

Assessment Sub-Criteria 11

Assessment Sub-Criteria 12

Assessment Sub-Criteria 13

Assessment Sub-Criteria 14

Assessment Sub-Criteria 15