SKIP TO PAGE CONTENT

IA-1 Identification and Authentication Policy and Procedures

Last Review: 10/1/22

Overview

The West Texas A&M Information Security Controls Catalog establishes the minimum standards and controls for University information security in accordance with the state's Information Security Standards for Institutions of Higher Education found in Title 1, Chapter 202, Texas Administrative Code (TAC 202).

Purpose

To develop, document, and disseminate an identification and authentication policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls.  WTAMU will review and update the current identification and authentication policy and procedures.

Scope

The scope of these regulations and procedures are applicable to all information resources owned or operated by WTAMU. All users are responsible for adhering to this policy. If needed or appropriate, information regarding roles, responsibilities, management commitment, and coordination among organizational entities are embedded within these procedures.

Regulations and Procedures

The State of Texas Department of Information Resources (DIR) has chosen to adopt a select number of Identification and Authentication Controls as established within the NIST SP 800-53 control family guidelines identified by the DIR Security Control Standards Catalog.

WTAMU establishes the policies for verifying the identity of a user, process, or device, as a prerequisite for granting access to resources in an information system.

Phone
Twitter
Facebook
Instagram
Mail