CMMC v2.13 Practices

IA.L1-b.1.v  

Reference: CMMC v2.13

Family: IA

Level Introduced: 1

Title: Identification [FCI Data]

Practice:
Identify information system users, processes acting on behalf of users, or devices.

Further Discussion:
Individual, unique identifiers (e.g., user names) should be assigned to all users and processes that access company systems. Authorized devices also should have unique identifiers. Unique identifiers can be as simple as a short set of alphanumeric characters (e.g., SW001 could refer to a network switch, SW002 could refer to a different network switch).

This requirement, IA.L1-b.1.v, provides a vetted and trusted identity that supports the access control mechanism required by AC.L1-b.1.i.

Example
You want to make sure that all employees working on a project can access important information about it. Because this is work for the DoD and contains FCI, you also need to prevent employees who are not working on that project from being able to access the information. You assign each employee a unique user ID, which they use to log on to the system [a].

Potential Assessment Considerations
• Are unique identifiers issued to individual users (e.g., usernames) [a]?
• Are the processes and service accounts that an authorized user initiates identified (e.g., scripts, automatic updates, configuration updates, vulnerability scans) [b]?
• Are unique device identifiers used for devices that access the system identified [c]?

This is for registered users only. Please sign up for a free account, or Login, to see complete cross references to other standards and frameworks.

This is for registered users only. Please sign up for a free account, or Login, to see complete cross references to other standards and frameworks.

Source: CMMC v2.13