Documents how the system identifies users, devices, and services and verifies their authenticators. Covers the controls of the IA family in NIST SP 800-53 r5 and aligns with NIST SP 800-63 (Digital Identity Guidelines) and FIPS 140 (cryptographic modules).
Public site — unclassified data only.
Do not enter classified, CUI, or other sensitive non-public information into this plan. Use placeholders for sensitive content and complete those fields on an authorized system within the appropriate enclave.