IA-3: Device Identification and Authentication

From NIST's SP800-53:

Uniquely identify and authenticate [Assignment: organization-defined devices and/or types of devices] before establishing a [Selection (one or more): local; remote; network] connection.

Cyber Threat Graph Context

Explore how this control relates to the wider threat graph

SP800-53 Control Mapped to NIST Cyber Security Framework

Generated from NISTs SP800-53/CSF Crosswalk mappings.

Control ID Description
PR.AC-7 Users, devices, and other assets are authenticated (e.g., single-factor, multi-factor) commensurate with the risk of the transaction (e.g., individuals’ security and privacy risks and other organizational risks)
PR.AC-1 Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users and processes

MITRE ATT&CK Techniques

See which MITRE ATT&CK techniques this control helps to protect against.

ATT&CK ID Title Associated Tactics
T1552.005 Cloud Instance Metadata API Credential Access
T1602.001 SNMP (MIB Dump) Collection
T1552 Unsecured Credentials Credential Access
T1602.002 Network Device Configuration Dump Collection
T1621 Multi-Factor Authentication Request Generation Credential Access
T1537 Transfer Data to Cloud Account Exfiltration
T1602 Data from Configuration Repository Collection
T1530 Data from Cloud Storage Collection