IA · Plan wizard

Identification and Authentication Plan

Documents how the system identifies users, devices, and services and verifies their authenticators. Covers the controls of the IA family in NIST SP 800-53 r5 and aligns with NIST SP 800-63 (Digital Identity Guidelines) and FIPS 140 (cryptographic modules).

1
Full official name of the information system.
Short identifier used in headings and references.
Role or named individual accountable for the system.
Describe what falls inside the authorization boundary - components, services, networks, data flows.
2
Determines which controls in this family appear in your plan.
3
Approach basics → §4.x

Identity provider, supported authenticators, and target assurance levels.

The platform that authenticates users and issues identity assertions (e.g., Azure AD / Entra ID, Okta, Ping, Keycloak, AWS IAM Identity Center, ADFS).
Population required to use MFA. Federal systems handling CUI require AAL2+; privileged often AAL3.
Authenticator types supported by this system. NIST SP 800-63B classifies each. Avoid SMS / voice OTP as primary factors at AAL2+.
Per NIST SP 800-63A. Federal systems handling CUI typically require IAL2; classified often IAL3.
Per NIST SP 800-63B. Federal CUI typically AAL2; privileged or classified AAL3.
Brief phrase summarizing how identifiers are issued and reused. Detail goes in the dedicated sub-section.
Identifier Management → §4.x

How identifiers are assigned, formatted, reused, and disabled (IA-4).

Format / convention for usernames (e.g., 'firstname.lastname@org', 'EDIPI for DoD', 'email address from authoritative source').
How identifier collisions are prevented across the user lifecycle, and what disambiguates two people with the same name.
Best practice: never reuse. Federal systems often require minimum 1-2 years of dormancy before reuse, if any.
How quickly an identifier is disabled after the user leaves (e.g., '24 hours after HR notification'; 'immediate for involuntary terminations').
How devices are assigned identifiers (e.g., 'Hostname format <env>-<role>-<n>; X.509 cert with hostname in CN; AD computer object with FQDN matching cert').
How service accounts are named (svc- prefix, app-svc-<name>, managed identity, etc.) and how they're distinguished from human users in logs.
Authenticator Management → §4.x

Issuance, distribution, rotation, revocation of authenticators (IA-5).

How a new user receives their first authenticator. In-person handoff for hardware tokens, signed package for PIV cards, etc.
Secure channel used to deliver authenticators (encrypted email with separate password, in-person, registered mail).
By authenticator type (e.g., 'PIV cards every 6 years per FIPS 201; service-account passwords every 60 days; FIDO2 keys lifetime').
How a compromised or surrendered authenticator is revoked across all systems. Time bound (e.g., 'within 4 hours of report').
Length, allowed character classes, breach-list checking, anti-pattern rules. Per NIST SP 800-63B, length matters more than complexity rules.
Per NIST SP 800-63B, memorized secrets must be salted and hashed using a memory-hard function.
Multi-Factor Authentication Strategy → §4.x

When MFA is required, methods preferred, and exception handling.

Specific scenarios / actions / populations requiring MFA beyond the high-level scope in §4.1.
Method recommended to users by default. Federal systems should default to hardware-key when feasible (per OMB M-22-09 zero-trust guidance).
Per OMB M-22-09, federal systems should adopt phishing-resistant MFA. Document where you stand on the journey.
What happens when a user loses their primary authenticator. Help-desk verification process, backup codes, or in-person re-issuance.
Rare scenarios where MFA cannot be enforced (legacy system, embedded service). Time-bound exception register; cross-reference §4.5 of CM Plan if relevant.
Device Identification and Authentication → §4.x

How devices authenticate to the system (IA-3).

How devices identify themselves: X.509 client certificates, MDM-issued certs, EAP-TLS, MAC binding (last resort), MFA-bound device identity.
PKI / CA that issues device certificates (e.g., 'Internal CA on enterprise PKI', 'Microsoft Intune-issued device cert').
How a lost / decommissioned device is removed from authentication. CRL / OCSP / cert-bound short-lifetime tokens.
Service / Machine Authentication → §4.x

How services and automated processes authenticate (IA-9).

Mechanism: managed identity (cloud-native), workload identity federation, mTLS, signed JWT, API key (last resort), service principal.
Where service credentials live (HashiCorp Vault, AWS Secrets Manager, Azure Key Vault, CyberArk).
Cadence + automation for rotating service credentials. Short-lived ephemeral credentials (workload identity) are best practice.
How each service account is assigned to a human owner / role for accountability. Quarterly review against ownership register.
Non-Organizational Users → §4.x

Federation, external partner identities, and public users (IA-8).

    Suggested:
    External identity providers federated with the system.
    Assurance levels enforced for non-organizational users — often differ from internal scope.
    Which attributes the external IdP must assert for the user to be authenticated (subject, email, group memberships, MFA satisfied claim).
    Adaptive and Re-authentication → §4.x

    Risk-based authentication and re-authentication triggers (IA-10, IA-11).

    Signals that elevate authentication strength (step-up MFA) when a risk threshold is crossed.
    Tool / service evaluating risk signals (e.g., 'Okta Adaptive MFA', 'Azure AD Conditional Access', 'custom risk engine').
    Hard cap on session length before user must re-authenticate (per AAL2: 12h interactive / 30 days non-interactive; per AAL3: 12h / 18h).
    Identity Populations Supported → §2.x

    Numerical scope of who authenticates to this system.

    Authentication Metrics & KPIs → §6.x

    Metrics tracked to demonstrate IA control effectiveness over time.

      Suggested:
      Cross-references to other RMF artifacts → §7

      Where this plan plugs into the broader RMF package.

      Where in the SSP the IA control implementations are summarized (e.g., 'SSP §13.4').
      Convention for IA-related POA&M items (e.g., 'POAM-IA-').
      Where the AC plan consumes IA outputs. AC delegates the underlying authenticator strength and identity proofing to IA.
      How authentication events (success / failure / step-up) flow into the AU pipeline. SIEM index, log source, retention.
      Pointer to the CA-7 monitoring strategy document tying IA continuous-monitoring metrics to the broader ConMon plan.
      4

      Pick a baseline in section 2 and the applicable controls will appear here. Each control gets a card with the official text, related controls, linked CCIs, and fields for your implementation status, narrative, responsible role, and evidence.

      5