Under active development Content is continuously updated and improved

AC-14Permitted Actions Without Identification or Authentication

>Control Description

a

Identify any specific user actions that can be performed on the system without identification or authentication consistent with organizational mission and business functions; and

b

Document and provide supporting rationale in the security plan for the system, user actions not requiring identification or authentication.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.