Authorization, Identification & Authentication Policy Template

Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.

The use of authorization, identification and authentication controls ensures that only known users make use of information systems. Without authorization, identification and authentication controls, the potential exists that information systems could be accessed illicitly and that the security of those information systems be compromised.

This Authorization, Identification and Authentication Policy Template includes the following sections:

  • Default policy statements that define what the enterprise must do.
  • Default procedures that define how the enterprise must do it.
  • Baseline recommendations to customize the template to individual enterprise requirements.

Use this and the related templates to build an efficient and effective enterprise Security Policy.


  • Missing comment
    Lynn Kopp | 07-26-2011

    Could use an administrative/super user password policy separate from general user password policy. Thanks.

    • 9eb6a2810126f534ebf65557616f34d1 comment
      Info-Tech Research Group | 07-26-2011

      Thanks for your suggestion. We’ll consider it in our next user policy refresh cycle.

Related Content

GET HELP Contact Us
VL Methodology