16.1: Maintain an Inventory of Authentication Systems
Maintain an inventory of each of the organization’s authentication systems, including those located on-site or at a remote service provider.
Asset Type |
Security Function |
Implementation Groups |
---|---|---|
Users |
Identify |
2, 3 |
Dependencies
Sub-control 1.4: Maintain Detailed Asset Inventory
Sub-control 1.5: Maintain Asset Inventory Information
Sub-control 2.1: Maintain Inventory of Authorized Software
Inputs
Inventory of the organization’s authentication systems (including onsite and remote)
Operations
Verify that the inventory of authentication systems (Input 1) was provided. The presence or absence of this list will be indicated with M1.
(Optional) Manually review Input 1 to ensure that it includes all of the authentication systems utilized by the organization, including those located onsite and by remote service providers (for instance, be sure authentication systems for any cloud services used by the organization are included). An optional manual score can be generated from this review and provided as M2.
Measures
M1 = 1 if the inventory was provided, 0 if it was not provided
M2 = (Optional) Indicates manual review of the authentication systems inventory was performed; 0 otherwise
Metrics
Existence
Metric |
Does the organization’s authentication systems inventory exist?
|
Calculation |
|
Manual Review
Metric |
Was a manual review of the organization’s systems inventory performed?
|
Calculation |
|