User Authorization, Identification, & Authentication Policy


Please note that the content on this page is retired. This content is not maintained and may contain information or links that are out of date.

Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.

This policy ensures that users are authorized before being given access to information systems, where feasible federated identity mechanisms should be used to integrate access controls of cloud services and mobile devices with internal systems.

Risks Addressed by Policy:

  • Information systems could be accessed illicitly.
  • Security of information systems can be compromised.

Related Content

GET HELP Contact Us
VL Methodology