IA-1 |
IDENTIFICATION AND AUTHENTICATION POLICY AND PROCEDURES |
Deployer responsibility |
IA-2 |
IDENTIFICATION AND AUTHENTICATION (ORGANIZATIONAL USERS) |
compliant and inherited |
IA-3 |
DEVICE IDENTIFICATION AND AUTHENTICATION |
compliant and inherited |
IA-4 |
IDENTIFIER MANAGEMENT |
compliant |
IA-5 |
AUTHENTICATOR MANAGEMENT |
Deployer responsibility |
IA-6 |
AUTHENTICATOR FEEDBACK |
compliant |
IA-7 |
CRYPTOGRAPHIC MODULE AUTHENTICATION |
partially compliant |
IA-8 |
IDENTIFICATION AND AUTHENTICATION (NON-ORGANIZATIONAL USERS) |
compliant |
IA-9 |
SERVICE IDENTIFICATION AND AUTHENTICATION |
P0, so not required for FISMA moderate |
IA-10 |
ADAPTIVE IDENTIFICATION AND AUTHENTICATION |
P0, so not required for FISMA moderate |
IA-11 |
RE-AUTHENTICATION |
P0, so not required for FISMA moderate |