Information resources shall be configured to uniquely identify and authenticate users not affiliated with the university who are permitted to utilize university information resources (See Control AC-2 , Account Management).


  • This Control applies to all Texas A&M information resources. The intended audience for this Control includes all owners and custodians of information resources.


  • 1

    It is the responsibility of the information resource owner, or designee, to ensure:

    • 1.1

      Users not affiliated with the University, such as guests or vendor personnel, are authorized to access information resources; and

    • 1.2

      Access to university information resources meet requirements in Security Control IA-1, Identification and Authentication Policy and Procedures.