16.1: Maintain an Inventory of Authentication Systems

Maintain an inventory of each of the organization’s authentication systems, including those located on-site or at a remote service provider.

Asset Type

Security Function

Implementation Groups

Users

Identify

2, 3

Dependencies

  • Sub-control 1.4: Maintain Detailed Asset Inventory

  • Sub-control 1.5: Maintain Asset Inventory Information

  • Sub-control 2.1: Maintain Inventory of Authorized Software

Inputs

  1. Inventory of the organization’s authentication systems (including onsite and remote)

Operations

  1. Verify that the inventory of authentication systems (Input 1) was provided. The presence or absence of this list will be indicated with M1.

  2. (Optional) Manually review Input 1 to ensure that it includes all of the authentication systems utilized by the organization, including those located onsite and by remote service providers (for instance, be sure authentication systems for any cloud services used by the organization are included). An optional manual score can be generated from this review and provided as M2.

Measures

  • M1 = 1 if the inventory was provided, 0 if it was not provided

  • M2 = (Optional) Indicates manual review of the authentication systems inventory was performed; 0 otherwise

Metrics

Existence

Metric

Does the organization’s authentication systems inventory exist?

Calculation

M1

Manual Review

Metric

Was a manual review of the organization’s systems inventory performed?

Calculation

M2