graphgrc

SCF - IAC-26 - Permitted Actions Without Identification or Authorization

Mechanisms exist to identify and document the supporting rationale for specific user actions that can be performed on a system without identification or authentication.

Mapped framework controls

NIST 800-53

Control questions

Does the organization identify and document the supporting rationale for specific user actions that can be performed on a system without identification or authentication?