Access Authorizations, v1.0

Defines conformance and assessment criteria for compliance with minimum security requirements for access authorizations as related to overall access control requirements.
If an assessment step references organization-defined elements (E.g. <organization-defined personnel or roles>, <organization-defined frequency>, etc.), corresponding citations/excerpts must be provided to confirm that the organization has established and documented these values and that they apply as referenced in the conformance criteria.

Similarly, if a "Selection" among multiple options (e.g. [Selection (one or more): as needed; ]) is specified, evidence must be provided to establish that the option(s) implemented by the organization have been defined and documented.

The assessment step shall not be marked as satisfied without this evidence.

Assessment Steps (5)

1
Access Authorizations - Valid (AccessAuthorizations-Valid)
Does the organization authorize access to the information system based on a valid access authorization?
Artifact
A1
Provide evidence (e.g. organizational policies, procedures, compliance/assessment reports, etc.) that support the assessor's response to this assessment step.
Parameter
Valid Access Authorizationrequired
BOOLEAN : Specify if access to the system is based on a valid access authorization (TRUE=yes)
2
Access Authorizations - Intended Use (AccessAuthorizations-IntendedUse)
Does the organization authorize access to the information system based on intended system usage?
Artifact
A1
Provide evidence (e.g. organizational policies, procedures, compliance/assessment reports, etc.) that support the assessor's response to this assessment step.
Parameter
Intended System Usagerequired
BOOLEAN : Specify if access to the system is based on intended usage (TRUE=yes)
3
Access Authorizations - Need To Know (AccessAuthorizations-NeedToKnow)
Does the organization authorize access to the information system based on a valid need-to-know/need-to-share that is determined by assigned official duties?
Artifacts
A1
Provide evidence (e.g. organizational policies, procedures, compliance/assessment reports, etc.) that support the assessor's response to this assessment step.
A2
Record whether or not the organization authorizes access based on need to know or need to share (True or False).
Parameter
Need To Knowrequired
BOOLEAN : Specify if access to the system is based on need to know / need to share determined by official duties (TRUE=yes)
4
Access Authorizations - Personnel Security (AccessAuthorizations-PersonnelSecurity)
Does the organization authorize access to the information system based on satisfaction of all personnel security criteria?
Artifacts
A1
Provide evidence (e.g. organizational policies, procedures, compliance/assessment reports, etc.) that support the assessor's response to this assessment step.
A2
Record whether or not the organization authorizes access based on satisfaction of personnel criteria (True or False).
Parameter
Satisfaction Of Personnel Criteriarequired
BOOLEAN : Specify if access to the system is based on satisfaction of all personnel security criteria (TRUE=yes)
5
Access Authorizations - Other Criteria (AccessAuthorizations-OtherCriteria)
Does the organization authorize access to the information system based on attributes as required by the organization or associated missions/business functions?
Artifacts
A1
Provide evidence (e.g. organizational policies, procedures, compliance/assessment reports, etc.) that support the assessor's response to this assessment step.
A2
If the organization requires other criteria, note that information here.
Parameter
Other Criteriarequired
BOOLEAN : Specify if access to the system is based on organization-defined criteria (TRUE=yes)
If conformance criteria reference organization-defined elements (e.g. <organization-defined personnel or roles>, <organization-defined frequency>, etc.), these values must be defined and documented by the organization.

Similarly, if the criteria specify a "Selection" among multiple options (e.g. [Selection (one or more): as needed; ]), the option(s) implemented by the organization must also be defined and documented.

Conformance Criteria (1)

C1
The organization must authorize access to the information system based on: a valid access authorization; intended system usage; and other attributes as required by the organization or associated missions/business functions.
Citations
SP800-53R4
Appendix F, AC-2
CJIS-SP-V5-4
Section 5.5.1.