AC-14—Permitted Actions Without Identification or Authentication
>Control Description
a
Identify any specific user actions that can be performed on the system without identification or authentication consistent with organizational mission and business functions; and
b
Document and provide supporting rationale in the security plan for the system, user actions not requiring identification or authentication.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.