IAC-26 ยท Permitted Actions Without Identification or Authorization

Control Description

Mechanisms exist to identify and document the supporting rationale for specific user actions that can be performed on a system without identification or authentication.

Control Question
Assessment question for control validation

Does the organization identify and document the supporting rationale for specific user actions that can be performed on a system without identification or authentication?

Control Weighting
8
Validation Cadence
Annual
NIST CSF Function
Protect
Supply Chain Risk Management (SCRM) Tiers
Applicable SCRM tier levels for this control
Tier 3 - Tactical