Document and provide supporting rationale in the security plan for the system, user actions not requiring identification and authentication.
No STIG checks reference this CCI.