Under active development Content is continuously updated and improved

IAC-26Permitted Actions Without Identification or Authorization

Weight: 8

>Control Description

Mechanisms exist to identify and document the supporting rationale for specific user actions that can be performed on a system without identification or authentication.

>Cross-Framework Mappings

NIST SP 800-53 r5

FedRAMP Rev 5

FBI CJIS

Ask AI

Configure your API key to use AI features.