Under active development Content is continuously updated and improved

IA-2(13)Identification And Authentication (Organizational Users)

Technical

>Control Description

IDENTIFICATION AND AUTHENTICATION | OUT-OF-BAND AUTHENTICATION The information system implements organization-defined out-of-band authentication under organization-defined conditions.

>Supplemental Guidance

Out-of-band authentication (OOBA) refers to the use of two separate communication paths to identify and authenticate users or devices to an information system. The first path (i.e., the in-band path), is used to identify and authenticate users or devices, and generally is the path through which information flows. The second path (i.e., the out-of-band path) is used to independently verify the authentication and/or requested action.

For example, a user authenticates via a notebook computer to a remote server to which the user desires access, and requests some action of the server via that communication path. Subsequently, the server contacts the user via the user’s cell phone to verify that the requested action originated from the user. The user may either confirm the intended action to an individual on the telephone or provide an authentication code via the telephone.

This type of authentication can be employed by organizations to mitigate actual or suspected man-in the-middle attacks. The conditions for activation can include, for example, suspicious activities, new threat indicators or elevated threat levels, or the impact level or classification level of information in requested transactions. Related controls: IA-10, IA-11, SC-37.

Ask AI

Configure your API key to use AI features.