Vigyata.AI
Is this your channel?

Episode 13_Permitted Actions Without Identification and Authentications_ (AC-14)

1.0K views· 49 likes· 7:48· Dec 13, 2022

🛍️ Products Mentioned (4)

In this episode of the NIST SP 800-53 Rev 5 Security Control explanatory series, We reviewed the AC-14 Permitted Actions Without Identification and Authentication Control and then tried to simplify what the control requirements are all about, and how best to assess/test this control during the Security Control Assessment (SCA) process and self control assessment process in the Continuous Monitoring phase of the RMF. Computer Security Resource Center https://csrc.nist.gov/publications The free way to help the channel grow is by subscribing using the link below: https://www.youtube.com/c/KamilSec?su... *************Patreon & Channel Support******************* https://www.patreon.com/kamilSec?fan_landing=true​ ********Order your KamilSec (KS) Designs Merch:********** https://kamilsec.creator-spring.com/ ************************************************************** CashApp: $Kamilzak Zelle: kaamilzak@gmail.com paypal: https://paypal.me/MZakari Venmo: @kamilsec Thank You!!! ************************************************************* **I ALSO CONDUCT INDIVIDUALIZED RESUME AND INTERVIEW PREP SESSION AS WELL AS ON THE JOB CONSULTATION** *************************************************************** ****Connect with me on Social Media***: Twitter: https://twitter.com/Kamilzak_1​ Instagram: @Kamilzak1 Facebook: https://www.facebook.com/kamil.kamilsec E-Mail: Kaamilzak@gmail.com

About This Video

In Episode 13 of my NIST SP 800-53 Rev 5 Access Control explanatory series, I break down AC-14: Permitted Actions Without Identification and Authentication. I walk you through what the control actually says, why it shows up in every baseline (Low, Moderate, and High), and what NIST is really asking for: if you’re going to allow any actions on a system without unique user ID or authentication, you must identify those actions, document them, and provide a solid rationale in the SSP. I also simplify the intent in plain language: don’t “accidentally” leave unauthenticated functionality on a system just because it’s convenient. If there’s a legitimate mission or business need—like public access to a public-facing website—fine, but it needs to be explicitly approved and written down. From an assessor’s perspective (SCA or continuous monitoring self-assessments), I explain exactly what I look at: the access control policy/procedures and the SSP section for AC-14, including the rationale. And I emphasize a common issue I’ve seen: the rationale may have been valid years ago, but if it’s no longer needed, you need to call it out, remove the bypass, and update the documentation.

Frequently Asked Questions

🎬 More from KamilSec