IA-8(1)—Identification and Authentication (non-organizational Users) | Acceptance of PIV Credentials from Other Agencies
IL4 Mod
IL4 High
IL5
IL6
>Control Description
Accept and electronically verify Personal Identity Verification-compliant credentials from other federal agencies.
>DoD Impact Level Requirements
No specific parameter values or requirements for this impact level.
>Discussion
Acceptance of Personal Identity Verification (PIV) credentials from other federal agencies applies to both logical and physical access control systems. PIV credentials are those credentials issued by federal agencies that conform to FIPS Publication 201 and supporting guidelines. The adequacy and reliability of PIV card issuers are addressed and authorized using SP 800-79-2.
>Programmatic Queries
Beta
Related Services
IAM
Directory Service
Certificate Manager
CLI Commands
Create external identity provider
aws iam create-saml-provider --saml-metadata-document file://metadata.xml --name PIV_SAML_ProviderConfigure PIV certificate trust
aws iam upload-signing-certificate --user-name EXTERNAL_USER --certificate-body file://piv-agency-cert.pemList external identity providers
aws iam list-saml-providers --output table>Related Controls
>Assessment Interview Topics
Questions assessors commonly ask
Process & Governance:
- •What formal policies and procedures govern the implementation of IA-8(1) (Acceptance Of Piv Credentials From Other Agencies)?
- •Who are the designated roles responsible for implementing, maintaining, and monitoring IA-8(1)?
- •How frequently is the IA-8(1) policy reviewed and updated, and what triggers policy changes?
- •What governance structure ensures IA-8(1) requirements are consistently applied across all systems?
Technical Implementation:
- •Describe the specific technical mechanisms or controls used to enforce IA-8(1) requirements.
- •What automated tools, systems, or technologies are deployed to implement IA-8(1)?
- •How is IA-8(1) integrated into your system architecture and overall security posture?
- •What configuration settings, parameters, or technical specifications enforce IA-8(1) requirements?
Evidence & Documentation:
- •What documentation demonstrates the complete implementation of IA-8(1)?
- •What audit logs, records, reports, or monitoring data validate IA-8(1) compliance?
- •Can you provide evidence of periodic reviews, assessments, or testing of IA-8(1) effectiveness?
- •What artifacts would you present during a FedRAMP assessment to demonstrate IA-8(1) compliance?
Ask AI
Configure your API key to use AI features.