16.2: Configure Centralized Point of Authentication

Configure access for all accounts through as few centralized points of authentication as possible, including network, security, and cloud systems.

Asset Type

Security Function

Implementation Groups

Users

Protect

2, 3

Dependencies

  • Sub-control 1.4: Maintain Detailed Asset Inventory

  • Sub-control 1.5: Maintain Asset Inventory Information

Inputs

  1. The list of endpoints

Operations

  1. Enumerate centralized authentication points in inventory

  2. For each identified centralized authentication point to determine necessity (i.e. can a given authentication system be consolidated with another?)

  3. Enumerate the list of unnecessary centralized authentication points

Measures

  • M1 = List of centralized authentication points in inventory

  • M2 = List of unnecessary centralized authentication points

  • M3 = Count of centralized authentication points in the inventory (The count of M1)

  • M4 = Count of unnecessary centralized authentication points (The count of M2)

  • M5 = M3 - M4 (the target number of centralized authentication points)

Metrics

Coverage

Metric

The ratio of desired centralized authentication points to actual authentication
points, where the goal is for M5 / M3 = 1.

Calculation

M5 / M3