IA — Identification and Authentication
16 controls in the Identification and Authentication family
IA-1Policy and Procedures
IA-2Identification and Authentication (organizational Users)
IA-2(1)Identification and Authentication (organizational Users) | Multi-factor Authentication to Privileged Accounts
IA-2(8)Identification and Authentication (organizational Users) | Access to Accounts — Replay Resistant
IA-3Device Identification and Authentication
IA-4Identifier Management
IA-4(4)Identifier Management | Identify User Status
IA-5Authenticator Management
IA-5(1)Authenticator Management | Password-based Authentication
IA-5(2)Authenticator Management | Public Key-based Authentication
IA-5(6)Authenticator Management | Protection of Authenticators
IA-5(7)Authenticator Management | No Embedded Unencrypted Static Authenticators
IA-6Authentication Feedback
IA-7Cryptographic Module Authentication
IA-8Identification and Authentication (non-organizational Users)
IA-11Re-authentication