6.6
IG2 IG3

Establish and Maintain an Inventory of Authentication and Authorization Systems

Asset Type: Users
Security Function: Identify

Description

Establish and maintain an inventory of the enterprise’s authentication and authorization systems, including those hosted on-site or at a remote service provider. Review and update the inventory, at a minimum, annually, or more frequently.

Implementation Checklist

1
Document current state and create baseline inventory
2
Define data fields and attributes to track
3
Assign ownership and responsibilities
4
Establish review cadence and update procedures
5
Select and deploy inventory management tool
6
Populate initial inventory with all known assets
7
Establish process for adding/removing inventory entries
8
Identify systems requiring multi-factor authentication
9
Select and deploy MFA solution
10
Enroll users and distribute authentication factors
11
Test MFA across all identified systems
12
Inventory all third-party service providers
13
Classify third parties by risk level
14
Conduct security assessments of critical vendors
15
Include security requirements in contracts

Threats & Vulnerabilities (CIS RAM)

Threat Scenarios

Undiscovered Authentication System Compromise

Confidentiality

An authentication system not included in the inventory is compromised, but the breach goes undetected because the system is not monitored, patched, or included in security reviews.

Inconsistent Security Policies Across Unknown Auth Systems

Integrity

Authentication systems not tracked in the inventory operate with different security policies, creating weak links that attackers target for initial access.

Vulnerabilities (When Safeguard Absent)

No Inventory of Authentication and Authorization Systems

Without a maintained inventory, the organization does not know all the systems that authenticate or authorize users, leaving some unmanaged and potentially misconfigured.

Unmanaged Identity Providers

Authentication systems not captured in the inventory are excluded from security hardening, monitoring, and incident response processes, creating blind spots in identity security.

Evidence Requirements

Type Evidence Item Collection Frequency
Document Current inventory or catalog documentation Maintained continuously, reviewed quarterly
Document Process/procedure documentation for identification activities Reviewed annually
Technical Asset/software inventory export with required fields populated Exported quarterly for review
Record Inventory review meeting minutes or sign-off Per review cycle
Record Third-party risk assessment reports and scorecards Annually per vendor
Document Vendor contracts with security requirements Per contract cycle
Document Governing policy document (current, approved, communicated) Reviewed annually