800-53|AC-14

Title

PERMITTED ACTIONS WITHOUT IDENTIFICATION OR AUTHENTICATION

Description

The organization:

Supplemental

This control addresses situations in which organizations determine that no identification or authentication is required in organizational information systems. Organizations may allow a limited number of user actions without identification or authentication including, for example, when individuals access public websites or other publicly accessible federal information systems, when individuals use mobile phones to receive calls, or when facsimiles are received. Organizations also identify actions that normally require identification or authentication but may under certain circumstances (e.g., emergencies), allow identification or authentication mechanisms to be bypassed. Such bypasses may occur, for example, via a software-readable physical switch that commands bypass of the logon functionality and is protected from accidental or unmonitored use. This control does not apply to situations where identification and authentication have already occurred and are not repeated, but rather to situations where identification and authentication have not yet occurred. Organizations may decide that there are no user actions that can be performed on organizational information systems without identification and authentication and thus, the values for assignment statements can be none.

Reference Item Details

Related: CP-2,IA-2

Category: ACCESS CONTROL

Family: ACCESS CONTROL

Priority: P3

Baseline Impact: LOW,MODERATE,HIGH

Audit Items

View all Reference Audit Items

NamePluginAudit Name
AIOS-02-080009 - Apple iOS must not display notifications when the device is locked.MDMAirWatch - DISA Apple iOS 10 v1r3
AIOS-02-080009 - Apple iOS must not display notifications when the device is locked.MDMMobileIron - DISA Apple iOS 10 v1r3
AIOS-02-080010 - Apple iOS must not display notifications (calendar information) when the device is locked.MDMAirWatch - DISA Apple iOS 10 v1r3
AIOS-02-080010 - Apple iOS must not display notifications (calendar information) when the device is locked.MDMMobileIron - DISA Apple iOS 10 v1r3
ESXI-06-000012 - The SSH daemon must ignore .rhosts files.UnixDISA VMware vSphere ESXi 6.0 STIG v1r5 Unix
ESXI-06-000013 - The SSH daemon must not allow host-based authentication.UnixDISA VMware vSphere ESXi 6.0 STIG v1r5 Unix
ESXI5-VM-000014 - The unexposed feature keyword isolation.tools.ghi.autologon.disable must be initialized to decrease the VMs potential attack vectors.VMwareDISA VMware ESXi Version 5 Virtual Machine STIG v2r1
GEN005538 - The SSH daemon must not allow rhosts RSA authentication.UnixDISA AIX 5.3 STIG v1r2
GEN005820 - The Network File System (NFS) anonymous UID and GID must be configured to values without permissions - 'anongid'UnixDISA STIG for Oracle Linux 5 v2r1
GEN005820 - The Network File System (NFS) anonymous UID and GID must be configured to values without permissions - 'anonuid'UnixDISA STIG for Oracle Linux 5 v2r1
GEN005820 - The NFS anonymous UID and GID must be configured to values that have no permissions - 'anongid'UnixDISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit
GEN005820 - The NFS anonymous UID and GID must be configured to values that have no permissions - 'anonuid'UnixDISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit
GEN005820 - The NFS anonymous UID and GID must be configured to values without permissions.UnixDISA STIG AIX 6.1 v1r14
VMCH-06-000009 - The unexposed feature keyword isolation.tools.ghi.autologon.disable must be set.VMwareDISA VMware vSphere Virtual Machine Version 6 STIG v1r1