IA-8 Identification and Authentication (Non-Organizational Users)
Description
Information resources shall be configured to uniquely identify and authenticate users not affiliated with the university who are permitted to utilize university information resources (See Control AC-2 , Account Management).
Applicability
- This Control applies to all Texas A&M information resources. The intended audience for this Control includes all owners and custodians of information resources.
Implementation
-
1 - It is the responsibility of the information resource owner, or designee, to ensure:
- 1.1 - Users not affiliated with the University, such as guests or vendor personnel, are authorized to access information resources; and
- 1.2 - Access to university information resources meet requirements in Security Control IA-1, Identification and Authentication Policy and Procedures.