IA-4

  • Requirement

    Manage system identifiers by:

    1. Receiving authorization from [Assignment: organization-defined personnel or roles] to assign an individual, group, role, service, or device identifier;
    2. Selecting an identifier that identifies an individual, group, role, service, or device;
    3. Assigning the identifier to the intended individual, group, role, service, or device; and
    4. Preventing reuse of identifiers for [Assignment: organization-defined time period].
  • Discussion

    Common device identifiers include Media Access Control (MAC) addresses, Internet Protocol (IP) addresses, or device-unique token identifiers. The management of individual identifiers is not applicable to shared system accounts. Typically, individual identifiers are the usernames of the system accounts assigned to those individuals. In such instances, the account management activities of AC-2 use account names provided by IA-4. Identifier management also addresses individual identifiers not necessarily associated with system accounts. Preventing the reuse of identifiers implies preventing the assignment of previously used individual, group, role, service, or device identifiers to different individuals, groups, roles, services, or devices.

More Info

  • Title

    Identifier Management
  • Family

    Identification and Authentication
  • NIST 800-53B Baseline(s)

    • Low
    • Moderate
    • High
  • Related NIST 800-53 ID

    AC-5;IA-2;IA-3;IA-5;IA-8;IA-9;IA-12;MA-4;PE-2;PE-3;PE-4;PL-4;PM-12;PS-3;PS-4;PS-5;SC-37

NIST 800-53A Assessment Guidance

CMMC Training

Our CMMC Overview Course simplifies CMMC. Enroll so you can make informed decisions!