Title
IDENTIFIER MANAGEMENT
Description
The organization manages information system identifiers by:
Supplemental
Common device identifiers include, for example, media access control (MAC), Internet protocol (IP) addresses, or device-unique token identifiers. Management of individual identifiers is not applicable to shared information system accounts (e.g., guest and anonymous accounts). Typically, individual identifiers are the user names of the information system accounts assigned to those individuals. In such instances, the account management activities of AC-2 use account names provided by IA-4. This control also addresses individual identifiers not necessarily associated with information system accounts (e.g., identifiers used in physical security control databases accessed by badge reader systems for access to information systems). Preventing reuse of identifiers implies preventing the assignment of previously used individual, group, role, or device identifiers to different individuals, groups, roles, or devices.
Reference Item Details
Related: AC-2,IA-2,IA-3,IA-5,IA-8,SC-37
Category: IDENTIFICATION AND AUTHENTICATION
Family: IDENTIFICATION AND AUTHENTICATION
Baseline Impact: LOW,MODERATE,HIGH