Identification and Authentication Policy
Abstract:
The overall audit objective was to evaluate the adherence of system users to DoD information systems security policy, during and after year 2000 conversion efforts. Specifically, we were to determine the security procedures used for contractor support of year 2000 efforts, using as criteria the requirements of Administrative Instruction 26, Chapter 11, and Section 5.1.1. We will accomplish the audit objective in two phases. In this phase, we reviewed current DoD Component policies on the use of identification and authentication controls to access information systems. In the second phase, we will review procedures for identification and authentication for year 2000 renovated systems at selected locations.