Mechanisms exist to verify the identity of a user before issuing authenticators or modifying access permissions.
Control Question
Assessment question for control validation
Does the organization verify the identity of a user before issuing authenticators or modifying access permissions?
Supply Chain Risk Management (SCRM) Tiers
Applicable SCRM tier levels for this control
Core Control Designations
Special designations and baseline inclusions
MAD: IAC-28
ESP Level 1: IAC-28
ESP Level 2: IAC-28
ESP Level 3: IAC-28