STIGhub
STIGs
RMF Controls
Compare
← All Controls
IA-8 (1)
Identification and Authentication
Rev 5
Identification and Authentication (Non-Organizational Users)
CCI Identifiers (2)
CCI-002009
Accept Personal Identity Verification-compliant credentials from other federal agencies.
CCI-002010
Electronically verify Personal Identity Verification-compliant credentials from other federal agencies.
Linked STIG Checks (36)
Across 28 STIGs. Click to expand.
▶
Adobe ColdFusion Security Technical Implementation Guide
1 check
▶
Apache Tomcat Application Server 9 Security Technical Implementation Guide
1 check
▶
Application Security and Development Security Technical Implementation Guide
2 checks
▶
Application Server Security Requirements Guide
2 checks
▶
Arctic Wolf CylanceON-PREM Security Technical Implementation Guide
1 check
▶
AvePoint Compliance Guardian Security Technical Implementation Guide
1 check
▶
Axonius Federal Systems Ax-OS Security Technical Implementation Guide
1 check
▶
Container Platform Security Requirements Guide
1 check
▶
Docker Enterprise 2.x Linux/UNIX Security Technical Implementation Guide
2 checks
▶
Dragos Platform 2.x Security Technical Implementation Guide
1 check
▶
F5 NGINX Security Technical Implementation Guide
1 check
▶
IBM WebSphere Liberty Server Security Technical Implementation Guide
1 check
▶
IBM WebSphere Traditional V9.x Security Technical Implementation Guide
2 checks
▶
Mainframe Product Security Requirements Guide
2 checks
▶
Mirantis Kubernetes Engine Security Technical Implementation Guide
1 check
▶
Nutanix Acropolis Application Server Security Technical Implementation Guide
1 check
▶
Nutanix AOS 5.20.x Application Security Technical Implementation Guide
1 check
▶
Okta Identity as a Service (IDaaS) Security Technical Implementation Guide
1 check
▶
Palo Alto Networks Prisma Cloud Compute Security Technical Implementation Guide
1 check
▶
Red Hat OpenShift Container Platform 4.x Security Technical Implementation Guide
1 check
▶
SPEC Innovations Innoslate 4.x Security Technical Implementation Guide
1 check
▶
Tanium 7.0 Security Technical Implementation Guide
1 check
▶
Tanium 7.3 Security Technical Implementation Guide
1 check
▶
Tanium 7.x Application on TanOS Security Technical Implementation Guide
1 check
▶
Tanium 7.x Security Technical Implementation Guide
2 checks
▶
VMware vSphere 7.0 vCenter Security Technical Implementation Guide
2 checks
▶
VMware vSphere 8.0 vCenter Security Technical Implementation Guide
2 checks
▶
Xylok Security Suite 20.x Security Technical Implementation Guide
1 check