STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← IA-8 (4) — Identification and Authentication (Non-Organizational Users)

CCI-002014

Definition

The information system conforms to FICAM-issued profiles.

Parent Control

IA-8 (4)Identification and Authentication (Non-Organizational Users)Identification and Authentication

Linked STIG Checks (16)

V-279055CAT IColdFusion must be using an enterprise solution for authentication.Adobe ColdFusion Security Technical Implementation GuideV-222560CAT IIThe application must conform to Federal Identity, Credential, and Access Management (FICAM)-issued profiles.Application Security and Development Security Technical Implementation GuideV-272627CAT IIICylanceON-PREM must be configured to use a third-party identity provider.Arctic Wolf CylanceON-PREM Security Technical Implementation GuideV-256847CAT IICompliance Guardian must conform to FICAM-issued profiles.AvePoint Compliance Guardian Security Technical Implementation GuideV-237397CAT IIThe CA API Gateway providing user authentication intermediary services must conform to Federal Identity, Credential, and Access Management (FICAM) issued profiles.CA API Gateway ALG Security Technical Implementation GuideV-235780CAT IILDAP integration in Docker Enterprise must be configured.Docker Enterprise 2.x Linux/UNIX Security Technical Implementation GuideV-235821CAT IISAML integration must be enabled in Docker Enterprise.Docker Enterprise 2.x Linux/UNIX Security Technical Implementation GuideV-215735CAT IIThe BIG-IP APM module must conform to FICAM-issued profiles.F5 BIG-IP Access Policy Manager Security Technical Implementation GuideV-215788CAT IIThe BIG-IP Core implementation must be able to conform to FICAM-issued profiles when providing authentication to virtual servers.F5 BIG-IP Local Traffic Manager Security Technical Implementation GuideV-252558CAT IIIBM Aspera Console must implement multifactor authentication for remote access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access.IBM Aspera Platform 4.2 Security Technical Implementation GuideV-252580CAT IIIBM Aspera Faspex must implement multifactor authentication for remote access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access.IBM Aspera Platform 4.2 Security Technical Implementation GuideV-252599CAT IIIBM Aspera Shares must implement multifactor authentication for remote access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access.IBM Aspera Platform 4.2 Security Technical Implementation GuideV-65267CAT IIThe DataPower Gateway providing user authentication intermediary services must conform to FICAM-issued profiles.IBM DataPower ALG Security Technical Implementation GuideV-255794CAT IIIThe MQ Appliance messaging server must accept FICAM-approved third-party credentials.IBM MQ Appliance V9.0 AS Security Technical Implementation GuideV-254093CAT IInnoslate must use multifactor authentication for network access to privileged and non-privileged accounts.SPEC Innovations Innoslate 4.x Security Technical Implementation GuideV-94299CAT IISymantec ProxySG providing user authentication intermediary services must conform to Federal Identity, Credential, and Access Management (FICAM)-issued profiles.Symantec ProxySG ALG Security Technical Implementation Guide