NIST CSF: PR.AC-7 Subcategory

From NIST's Cyber Security Framework (version 1):

Users, devices, and other assets are authenticated (e.g., single-factor, multi-factor) commensurate with the risk of the transaction (e.g., individuals’ security and privacy risks and other organizational risks)

Cyber Threat Graph Context

Explore how this control relates to the wider threat graph

CSF Mapped to SP800-53 Controls

Generated from NIST's SP800-53/CSF Crosswalk mappings.

Related ISO 27001 Controls

Annex A controls from ISO 27001 (2013) which are related to this CSF subcategory, taken from mappings by NIST and additional data from Ofgem.

  • Secure log-on procedures (9.4.2)
    ISO 27001:2013
  • Management of secret authentication information of users (9.2.4)
    ISO 27001:2013
  • Use of secret authentication information (9.3.1)
    ISO 27001:2013
  • Privacy and protection of personally identifiable information (18.1.4)
    ISO 27001:2013
  • Password management system (9.4.3)
    ISO 27001:2013
  • User registration and de-registration (9.2.1)
    ISO 27001:2013

Related ISA/IEC 62443 Controls

Clauses and controls from IEC 62443 (62443-2-1 and 62443-3-3) which are related to this CSF subcategory, taken from mappings by NIST and additional data from Ofgem.

  • Authenticate all users before system use (4.3.3.6.2)
    ISA/IEC 62443-2-1:2009
  • Require strong authentication methods for system administration and application configuration (4.3.3.6.3)
    ISA/IEC 62443-2-1:2009
  • Authenticate all remote users at the appropriate level (4.3.3.6.5)
    ISA/IEC 62443-2-1:2009
  • Develop a policy for remote login and connections (4.3.3.6.6)
    ISA/IEC 62443-2-1:2009
  • Public key infrastructure (PKI) certificates (SR 1.8)
    ISA/IEC 62443-3-3:2013
  • Log and review all access attempts to critical systems (4.3.3.6.4)
    ISA/IEC 62443-2-1:2009
  • Strength of password-based authentication (SR 1.7)
    ISA/IEC 62443-3-3:2013
  • Disable access account after failed remote login attempts (4.3.3.6.7)
    ISA/IEC 62443-2-1:2009
  • Authenticator feedback (SR 1.10)
    ISA/IEC 62443-3-3:2013
  • Develop an authentication strategy (4.3.3.6.1)
    ISA/IEC 62443-2-1:2009
  • Human User Identification and Authentication (SR 1.1)
    ISA/IEC 62443-3-3:2013
  • Require re-authentication after remote system inactivity (4.3.3.6.8)
    ISA/IEC 62443-2-1:2009
  • Authenticator management (SR 1.5)
    ISA/IEC 62443-3-3:2013
  • Software process and device identification and authentication (SR 1.2)
    ISA/IEC 62443-3-3:2013
  • Employ authentication for task-to task communication (4.3.3.6.9)
    ISA/IEC 62443-2-1:2009
  • Strength of public key authentication (SR 1.9)
    ISA/IEC 62443-3-3:2013

MITRE ATT&CK Techniques

See which MITRE ATT&CK techniques this control helps to protect against. This is based on mappings to associated SP800-53 controls.

CSF Mapped to the NCSC CAF

Cyber Assessment Framework mappings generated from UK Cabinet Office data.