STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← IA-8 (4) — Identification and Authentication (Non-Organizational Users)

CCI-004085

Definition

Conform to organization-defined identity management profiles for identity management.

Parent Control

IA-8 (4)Identification and Authentication (Non-Organizational Users)Identification and Authentication

Linked STIG Checks (7)

V-205002CAT IIThe ALG providing user authentication intermediary services must conform to Federal Identity, Credential, and Access Management (FICAM)-issued profiles.Application Layer Gateway Security Requirements GuideV-222560CAT IIThe application must conform to Federal Identity, Credential, and Access Management (FICAM)-issued profiles.Application Security and Development Security Technical Implementation GuideV-204809CAT IIThe application server must conform to Federal Identity, Credential, and Access Management (FICAM)-issued profiles.Application Server Security Requirements GuideV-276012CAT IAx-OS must have no local accounts for the user interface.Axonius Federal Systems Ax-OS Security Technical Implementation GuideV-205577CAT IIThe Mainframe Product must conform to Federal Identity, Credential, and Access Management (FICAM)-issued profiles.Mainframe Product Security Requirements GuideV-279444CAT IINutanix AOS must conform to Federal Identity, Credential, and Access Management (FICAM)-issued profiles.Nutanix Acropolis Application Server Security Technical Implementation GuideV-269574CAT IXylok Security Suite must use a centralized user management solution.Xylok Security Suite 20.x Security Technical Implementation Guide