CMMC IA.1.077 – Verify Users, Processes and Devices

CMMC IA.1.077 – Verify Users, Processes and Devices

Requirement text: 
IA.1.077: Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems.

DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2
Individual authenticators include the following: passwords, key cards, cryptographic devices, and one-time password devices. Initial authenticator content is the actual content of the authenticator, for example, the initial password. In contrast, the requirements about authenticator content include the minimum password length. Developers ship system components with factory default authentication credentials to allow for initial installation and configuration. Default authentication credentials are often well known, easily discoverable, and present a significant security risk.

Systems support authenticator management by organization-defined settings and restrictions for various authenticator characteristics including minimum password length, validation time window for time synchronous one-time tokens, and number of allowed rejections during the verification stage of biometric authentication. Authenticator management includes issuing and revoking, when no longer needed, authenticators for temporary access such as that required for remote maintenance. Device authenticators include certificates and passwords. NIST SP 800-63-3 provides guidance on digital identities.

CMMC CLARIFICATION
Before you let a person or a device have access to your system, you need to verify that the user or device is who or what it claims to be. This verification is called authentication. The most common way to verify identity is using a username and a hard-to-guess password.

Some devices ship with default usernames and passwords. For example, some devices ship so that when you first logon to the device, the username is “admin” and the password is “admin”. When you have devices with this type of default username and password, you need to change the default password to a unique password you create. Default passwords are well known to the public, and easily found in a search. So, these default passwords would be easy for an unauthorized person to guess and use to gain access to your system.

Example
You are in charge of purchasing for your company. You know that some devices, such as laptops, come with a default username and a default password. Last week, your coworker in the Engineering Department received a laptop with the default username “admin” and default password “admin.” You remind the coworker to be sure to delete the default account details, or change the default password to a unique password. You also explain that default passwords are easily found in an internet search engine making it easy for an unauthorized person to gain access to the system.

Get Audit Ready

How to pass? Ensure that all your company computers and devices require a username and password or other log-on method before they can be accessed. Your company mobile phone should have a pattern or PIN required to unlock it. The computers and devices should lock themselves after 10 or 20 minutes if not used. The password should not be guessable – default passwords should be changed.

How to fail? Letting your very old manufacturing computer have no password because it controls factory machines and production would be slower if you have to log on to it each day. Never changing the default password on your security system.


References

• FAR Clause 52.204-21 b.1.vi
• NIST SP 800-171 Rev 1 3.5.2
• CIS Controls v7.1 4.2, 4.3, 16.8, 16.9
• NIST CSF v1.1 PR.AC-1, PR.AC-6, PR.AC-7
• CERT RMM v1.2 TM:SG4.SP1
• NIST SP 800-53 Rev 4 IA-2, IA-3, IA-5
• UK NCSC Cyber Essentials

    • Related Articles

    • CMMC IA.1.076 – Identify Authorized Users, Processes and Devices

      Requirement text:  IA.1.076: Identify information system users, processes acting on behalf of users, or devices. DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2 Common device identifiers include media access control (MAC), Internet protocol (IP) ...
    • Identification and Authentication: SP 800-171 Security Family 3.5

       For most systems, identification and authentication is often the first line of defense. Identification is the means of verifying the identity of a user, process, or device, typically as a prerequisite for granting access to resources in a system. ...
    • CMMC IA.3.083 - Use Multifactor Authentication

      Requirement text: IA.3.083: Use multifactor authentication for local and network access to privileged accounts and for network access to non-privileged accounts. DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2 Multifactor authentication requires the ...
    • CMMC IA.3.085 - Prevent Reuse of System Identifiers

      Requirement text: IA.3.085: Prevent the reuse of identifiers for a defined period. DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2 Identifiers are provided for users, processes acting on behalf of users, or devices (IA.1.076). Preventing reuse of ...
    • CMMC IA.2.082 - Obscure Authentication Feedback

      Requirement text: IA.2.082: Obscure feedback of authentication information. DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2 The feedback from systems does not provide any information that would allow unauthorized individuals to compromise ...