STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated just now
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to General Purpose Operating System Security Requirements Guide

V-203650

CAT II (Medium)

The operating system must uniquely identify and must authenticate non-organizational users (or processes acting on behalf of non-organizational users).

Rule ID

SV-203650r958504_rule

STIG

General Purpose Operating System Security Requirements Guide

Version

V3R3

CCIs

CCI-000804

Discussion

Lack of authentication and identification enables non-organizational users to gain access to the application or possibly other information systems and provides an opportunity for intruders to compromise resources within the application or information system. Non-organizational users include all information system users other than organizational users, which include organizational employees or individuals the organization deems to have equivalent status of an employee (e.g., contractors and guest researchers). Non-organizational users shall be uniquely identified and authenticated for all accesses other than those accesses explicitly identified and documented by the organization when related to the use of anonymous access.

Check Content

Verify the operating system uniquely identifies and authenticates non-organizational users (or processes acting on behalf of non-organizational users). If it does not, this is a finding.

Fix Text

Configure the operating system to uniquely identify and authenticate non-organizational users (or processes acting on behalf of non-organizational users).