Identification and Authentication
11 controls in this family. Select a control for detailed guidance, implementation examples, and assessment questions.
3.5.2
Authenticate (or verify) the identities of users, processes, or devices, as a prerequisite to allowing access to organizational systems.
3.5.3
Use multifactor authentication for local and network access to privileged accounts and for network access to non-privileged accounts.[24] [25].
3.5.4
Employ replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts.
Need Complete CMMC Guidance?
Get full access to all controls, detailed implementation guidance, and expert support.
Request Full Access