Identification and Authentication (IA)
GPTKB entity
Statements (50)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:Information_security_concept
|
| gptkbp:abbreviation |
IA
|
| gptkbp:appliesTo |
Processes
Users Devices |
| gptkbp:category |
Security control family
|
| gptkbp:component |
Identification
Authentication |
| gptkbp:definedIn |
gptkb:NIST_SP_800-53
|
| gptkbp:enables |
Session management
Audit logging Access revocation User accountability |
| gptkbp:example |
Two-factor authentication
Fingerprint scan Smart card login Username and password |
| gptkbp:governedBy |
Security policies
Compliance standards |
| gptkbp:partOf |
Access control
|
| gptkbp:protectedBy |
Impersonation
Unauthorized access Credential theft |
| gptkbp:purpose |
Control access to resources
Verify user identity |
| gptkbp:relatedConcept |
Access management
Identity management Single sign-on |
| gptkbp:relatedStandard |
gptkb:PCI_DSS
gptkb:GDPR gptkb:HIPAA_Security_Rule gptkb:ISO/IEC_27002 gptkb:NIST_SP_800-63 |
| gptkbp:relatedTo |
Authorization
Biometric authentication Multi-factor authentication Password User credentials |
| gptkbp:requires |
gptkb:Federal_Information_Security_Management_Act_(FISMA)
gptkb:ISO/IEC_27001 gptkb:NIST_guidelines |
| gptkbp:step |
Remote access
Network access System access User login process |
| gptkbp:usedIn |
Cybersecurity
Information systems |
| gptkbp:bfsParent |
gptkb:NIST_Special_Publication_800-53
|
| gptkbp:bfsLayer |
6
|
| https://www.w3.org/2000/01/rdf-schema#label |
Identification and Authentication (IA)
|