IA.L1-B.1.VI
Authentication
FCI Data
Security Requirement
Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems.
USU Policy, Procedures, and Standards
University Policy 5200: Information Security and Appropriate Use
- Section 2.2 - Appropriate Use and Terms of Use
- Section 2.3 - Device and Endpoint Management and Security
Authentication is a condition of access. Section 2.3 notes that all university devices must implement access controls. Shared credentials are explicitly prohibited.
NIST Cybersecurity Framework v2
- Protect (PR): PR.AA-03 - Users, processes, and devices are authenticated before access is granted.
- Protect (PR): PR.AA-06 - Authentication mechanisms are managed and periodically reviewed.
Implementation Details
Documentation should include details to meet the Security Requirement for this control. Complete this list for each system or systems that process or access FCI data:
- List how user identity is verified before access is granted to the system (e.g., password, MFA).
- List how service accounts or automated processes are authenticated before performing system functions.
- List how devices are authenticated before accessing systems that process FCI.
- List any additional procedures or technologies in place to ensure access is only granted to verified identities.
Document How
- the identity of each user is authenticated or verified as a prerequisite to system access
- the identity of each process acting on behalf of a user is authenticated or verified as a prerequisite to system access
- the identity of each device accessing or connecting to the system is authenticated or verified as a prerequisite to system access
Example
All users must authenticate using their USU-issued A# via Entra ID (Azure AD), which enforces password complexity. MFA is required for all SSO-enabled services. Devices must be USU-managed and compliant with institutional endpoint protection policies. Service accounts use secure, randomly generated credentials and are not shared between individuals. Default passwords are changed prior to system deployment.
How might an auditor assess this control?
Method
- Examine:
- Review authentication policies, MFA configurations, login workflows, and password policy settings.
- Interview:
- Ask administrators how authentication is enforced for users, service accounts, and devices.
- Test:
- Attempt to log in with a test account lacking MFA or attempt access from an unmanaged device.
Objects (examples of items you could present to the auditor)
- Authentication Policy: Describes required methods and enforcement mechanisms.
- MFA Enrollment Records: Showing users are enrolled in an MFA solution.
- Service Account Logs: Showing when and how automated processes authenticate.
- Device Trust Configurations: Screenshots of settings ensuring only compliant devices are allowed.
- Password Policy Settings: Exported or documented policy requiring strong passwords and changes.
- Default Credential Controls: Evidence of procedures for changing factory/default passwords.