Please note that the content on this page is retired. This content is not maintained and may contain information or links that are out of date.

The use of authorization, identification and authentication controls ensures that only known users make use of information systems. Without authorization, identification and authentication controls, the potential exists that information systems could be accessed illicitly and that the security of those information systems be compromised.

This Authorization, Identification and Authentication Policy Template includes the following sections:

  • Default policy statements that define what the enterprise must do.
  • Default procedures that define how the enterprise must do it.
  • Baseline recommendations to customize the template to individual enterprise requirements.

Use this and the related templates to build an efficient and effective enterprise Security Policy.

Also In

Develop a Five Year Data Architecture Plan

Secure your footings in data to lay a foundation that will withstand the winds and rain of today's IT disruptors.

Related Content


  • Missing comment
    Lynn Kopp | 07-26-2011

    Could use an administrative/super user password policy separate from general user password policy. Thanks.

    • 9eb6a2810126f534ebf65557616f34d1 comment
      Info-Tech Research Group | 07-26-2011

      Thanks for your suggestion. We’ll consider it in our next user policy refresh cycle.


Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.