Under active development Content is continuously updated and improved

IA-8(4)Identification and Authentication (non-organizational Users) | Use of Defined Profiles

IL4 Mod
IL4 High
IL5
IL6

>Control Description

Conform to the following profiles for identity management organization-defined identity management profiles.

>DoD Impact Level Requirements

No specific parameter values or requirements for this impact level.

>Discussion

Organizations define profiles for identity management based on open identity management standards. To ensure that open identity management standards are viable, robust, reliable, sustainable, and interoperable as documented, the Federal Government assesses and scopes the standards and technology implementations against applicable laws, executive orders, directives, policies, regulations, standards, and guidelines.

>Programmatic Queries

Beta

Related Services

IAM
Cognito
STS

CLI Commands

Create IAM role for external users
aws iam create-role --role-name ExternalUserRole --assume-role-policy-document file://trust-policy.json --description 'Role for federated external users'
Attach permissions policy to role
aws iam attach-role-policy --role-name ExternalUserRole --policy-arn arn:aws:iam::ACCOUNT:policy/ExternalUserPolicy
List roles with external user conditions
aws iam list-roles --query 'Roles[?contains(AssumeRolePolicyDocument, "external")].[RoleName,Arn]'

>Assessment Interview Topics

Questions assessors commonly ask

Process & Governance:

  • What formal policies and procedures govern the implementation of IA-8(4) (Use Of Defined Profiles)?
  • Who are the designated roles responsible for implementing, maintaining, and monitoring IA-8(4)?
  • How frequently is the IA-8(4) policy reviewed and updated, and what triggers policy changes?
  • What governance structure ensures IA-8(4) requirements are consistently applied across all systems?

Technical Implementation:

  • Describe the specific technical mechanisms or controls used to enforce IA-8(4) requirements.
  • What automated tools, systems, or technologies are deployed to implement IA-8(4)?
  • How is IA-8(4) integrated into your system architecture and overall security posture?
  • What configuration settings, parameters, or technical specifications enforce IA-8(4) requirements?

Evidence & Documentation:

  • What documentation demonstrates the complete implementation of IA-8(4)?
  • What audit logs, records, reports, or monitoring data validate IA-8(4) compliance?
  • Can you provide evidence of periodic reviews, assessments, or testing of IA-8(4) effectiveness?
  • What artifacts would you present during a FedRAMP assessment to demonstrate IA-8(4) compliance?

Ask AI

Configure your API key to use AI features.