After somewhat of a hiatus due to the response efforts for the 1st wave of the COVID-19 outbreak, we are picking up where we left off in late February with the 5th of the practices required to achieve Level 1 CMMC, Basic Cyber Hygiene. We move to a second domain with the 5th practice for Level 1 compliance, Identification and Authentication. Within this Domain, there is one Capability, Grant access to authenticated entities, and 2 practices. The first of these practices is IA.1.076, Identify Information System Users, Processes Acting on Behalf of Users and Devices. Now, what exactly does that mean to you and your business?
The source document, from NIST SP 800-171, R2, provides clarification for IA.1.076 as follows:
Common device identifiers include media access control (MAC), internet protocol (IP), addresses, or device-unique token identifiers. Management of individual identifiers is not applicable to shared system accounts. Typically, individual identifiers are the usernames associated with the system accounts assigned to those individuals. Organizations may require unique identification of individuals in group accounts or for detailed accountability of individual activity. In addition, this requirement addresses individual identifiers that are not necessarily associated with system accounts. Organizational devices requiring identification may be defined by type, by device, or by a combination of type/device. NIST SP 800-63-3 provides guidance on digital identities.
Authentication helps you to know who is using or viewing your system. Make sure to assign individual, unique identifiers, like usernames, to all employees/users who access company systems. Confirm the identities of users, processes, or devices before allowing them access to the company’s information system – usually done through passwords.
You lead a project with the Department of Defense (DoD) for your small company and want to make sure that all employees working on the project can log onto the company system to see important information about the project. You also want to prevent employees who are not working on the DOD project from being able to access the information. You set up the system so that when an employee logs on, the system uniquely identifies each person, then determines the appropriate level of access.
Until next time…
Mark Lupo, MBCP, SMP