This page is classified as INTERNAL.
NIST 800-53 (r4) Control:
The organization:
(a) Identifies [Assignment: organization-defined user actions] that can be performed on the information system without identification or authentication consistent with organizational missions/business functions; and
(b) Documents and provides supporting rationale in the security plan for the information system, user actions not requiring identification or authentication.
NIST 800-53 (r4) Supplemental Guidance:
This control addresses situations in which organizations determine that no identification or authentication is required in organizational information systems. Organizations may allow a limited number of user actions without identification or authentication including, for example, when individuals access public websites or other publicly accessible federal information systems, when individuals use mobile phones to receive calls, or when facsimiles are received. Organizations also identify actions that normally require identification or authentication but may under certain circumstances (e.g., emergencies), allow identification or authentication mechanisms to be bypassed. Such bypasses may occur, for example, via a software-readable physical switch that commands bypass of the logon functionality and is protected from accidental or unmonitored use. This control does not apply to situations where identification and authentication have already occurred and are not repeated, but rather to situations where identification and authentication have not yet occurred. Organizations may decide that there are no user actions that can be performed on organizational information systems without identification and authentication and thus, the values for assignment statements can be none. Related controls: CP-2, IA-2.
(1) PERMITTED ACTIONS WITHOUT IDENTIFICATION OR AUTHENTICATION | NECESSARY USES
[Withdrawn: Incorporated into AC-14].
References: None.
NIST 800-53 (r5) Discussion:
Specific user actions may be permitted without identification or authentication if organizations determine that identification and authentication are not required for the specified user actions. Organizations may allow a limited number of user actions without identification or authentication, including when individuals access public websites or other publicly accessible federal systems, when individuals use mobile phones to receive calls, or when facsimiles are received. Organizations identify actions that normally require identification or authentication but may, under certain circumstances, allow identification or authentication mechanisms to be bypassed. Such bypasses may occur, for example, via a software-readable physical switch that commands bypass of the logon functionality and is protected from accidental or unmonitored use. Permitting actions without identification or authentication does not apply to situations where identification and authentication have already occurred and are not repeated but rather to situations where identification and authentication have not yet occurred. Organizations may decide that there are no user actions that can be performed on organizational systems without identification and authentication, and therefore, the value for the assignment operation can be “none.”
38North Guidance:
Meets Minimum Requirement:
A user account/role matrix documenting and providing justification for any user action on the information system that does not require the user to be logged into the system.
Best Practice:
Document any user functions, if any, within the information system that can be performed without the user having to log into the system. this should be documented within the SSP along with any rationale and justification as to why this is allowed.
Unofficial FedRAMP Guidance: None.
Assessment Evidence:
SSP Roles and Responsibilities Matrix showing user roles who are not required to log into the system to perform functions along with the permitted actions where identification and authentication is not required.
Ensure by observing during testing that system administrators are not able to conduct any actions without identification or authorization when access system components or applications within the boundary.
CSP Implementation Tips:
Amazon Web Services (AWS): TBD
Microsoft Azure: TBD
Google Cloud Platform: TBD