NIH | National Cancer Institute | NCI Wiki  

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The e-Authentication policy is found in the Office of Management and Budget Memo 04-04, E-Authentication Guidance for Federal Agencies. Technology recommendations and guidance are discussed in the National Institute of Standards and Technology (NIST) SP 800-63, Electronic Authentication Guideline.

Step 1: Complete the

...

E-Auth Threshold Analysis

  1. On Step 1 (Tab 2) of the workbook, fill in the System Name, ISSO Name, System Owner Name (Federal business owner), Date of Assessment, and Date of Approval in the provided blanks. If you know your system's FISMA UUID you can provide it; otherwise leave blank and this can be assigned later if needed.

  2. The Minimum Assurance Level box will be automatically filled in based on Step 2

  3. Answer the three screening questions posed, which are:

...

If you answer YES to all 3 of these questions, then you must proceed to Step 2 of the workbook and complete all required answers in Step 2. If you answered NO to any one of these 3 questions, then an eAuth rating is not required and you can skip to Step 3.

Step 2: Answer the

...

E-Auth RA questions

  1. On Step 2 (Tab 3) provide a response to each question by selecting the appropriate impact levels for each of the 6 Impact areas using the built-in dropdown menus (e.g, choosing between N/A, Low, Moderate, or High)

  2. Once you have answered all 6 questions, proceed to Step 3 (Tab 4) of the Workbook to see your final eAuth rating and obtain owner approval.

...