IA — Identification and Authentication
59 controls in the Identification and Authentication family
IA-1Identification And Authentication Policy And Procedures
IA-2Identification And Authentication (Organizational Users)
IA-2(1)Identification And Authentication (Organizational Users)
IA-2(2)Identification And Authentication (Organizational Users)
IA-2(3)Identification And Authentication (Organizational Users)
IA-2(4)Identification And Authentication (Organizational Users)
IA-2(5)Identification And Authentication (Organizational Users)
IA-2(6)Identification And Authentication (Organizational Users)
IA-2(7)Identification And Authentication (Organizational Users)
IA-2(8)Identification And Authentication (Organizational Users)
IA-2(9)Identification And Authentication (Organizational Users)
IA-2(10)Identification And Authentication (Organizational Users)
IA-2(11)Identification And Authentication (Organizational Users)
IA-2(12)Identification And Authentication (Organizational Users)
IA-2(13)Identification And Authentication (Organizational Users)
IA-2(100)Identification And Authentication (Organizational Users)
IA-3Device Identification And Authentication
IA-3(1)Device Identification And Authentication
IA-3(2)Device Identification And Authentication
IA-3(3)Device Identification And Authentication
IA-3(4)Device Identification And Authentication
IA-4Identifier Management
IA-4(1)Identifier Management
IA-4(2)Identifier Management
IA-4(3)Identifier Management
IA-4(4)Identifier Management
IA-4(5)Identifier Management
IA-4(6)Identifier Management
IA-4(7)Identifier Management
IA-5Authenticator Management
IA-5(1)Authenticator Management
IA-5(2)Authenticator Management
IA-5(3)Authenticator Management
IA-5(4)Authenticator Management
IA-5(5)Authenticator Management
IA-5(6)Authenticator Management
IA-5(7)Authenticator Management
IA-5(8)Authenticator Management
IA-5(9)Authenticator Management
IA-5(10)Authenticator Management
IA-5(11)Authenticator Management
IA-5(12)Authenticator Management
IA-5(13)Authenticator Management
IA-5(14)Authenticator Management
IA-5(15)Authenticator Management
IA-6Authenticator Feedback
IA-7Cryptographic Module Authentication
IA-8Identification And Authentication (Non-Organizational Users)
IA-8(1)Identification And Authentication (Non-Organizational Users)
IA-8(2)Identification And Authentication (Non-Organizational Users)
IA-8(3)Identification And Authentication (Non-Organizational Users)
IA-8(4)Identification And Authentication (Non-Organizational Users)
IA-8(5)Identification And Authentication (Non-Organizational Users)
IA-8(100)Identification And Authentication (Non-Organizational Users)
IA-9Service Identification And Authentication
IA-9(1)Service Identification And Authentication
IA-9(2)Service Identification And Authentication
IA-10Adaptive Identification And Authentication
IA-11Re-Authentication