Applicable (Y)es / (N)o |
(C)onfidentiality |
(I)ntegrity |
(A)vailability |
RPN (C+I+A) |
(S)atisfactory |
||||||
L1 |
M2 |
H3 |
L1 |
M2 |
H3 |
L1 |
M2 |
H3 |
(O)ther than satisfactory +## |
||
|
|
|
|
|
|
|
|
|
|
|
|
###
ia-1 |
identification and authentication policy and procedures |
|||
|
assessment objective: Determine if the organization: |
|||
ia-1(a)(1) |
ia-1(a)(1)[1] |
develops and documents an identification and authentication policy that addresses: |
||
ia-1(a)(1)[1][a] |
purpose; |
|||
ia-1(a)(1)[1][b] |
scope; |
|||
ia-1(a)(1)[1][c] |
roles; |
|||
ia-1(a)(1)[1][d] |
responsibilities; |
|||
ia-1(a)(1)[1][e] |
management commitment; |
|||
ia-1(a)(1)[1][f] |
coordination among organizational entities; |
|||
ia-1(a)(1)[1][g] |
compliance; |
|||
ia-1(a)(1)[2] |
defines personnel or roles to whom the identification and authentication policy is to be disseminated; and |
|||
ia-1(a)(1)[3] |
disseminates the identification and authentication policy to organization-defined personnel or roles; |
|||
ia-1(a)(2) |
ia-1(a)(2)[1] |
develops and documents procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls; |
||
ia-1(a)(2)[2] |
defines personnel or roles to whom the procedures are to be disseminated; |
|||
ia-1(a)(2)[3] |
disseminates the procedures to organization-defined personnel or roles; |
|||
ia-1(b)(1) |
ia-1(b)(1)[1] |
defines the frequency to review and update the current identification and authentication policy; |
||
ia-1(b)(1)[2] |
reviews and updates the current identification and authentication policy with the organization-defined frequency; and |
|||
ia-1(b)(2) |
ia-1(b)(2)[1] |
defines the frequency to review and update the current identification and authentication procedures; and |
||
ia-1(b)(2)[2] |
reviews and updates the current identification and authentication procedures with the organization-defined frequency. |
|||
potential assessment methods and objects: Examine: [select from: Identification and authentication policy and procedures; other relevant documents or records]. Interview: [select from: Organizational personnel with identification and authentication responsibilities; organizational personnel with information security responsibilities]. |