NIST 800-53 REV 5 • ACCESS CONTROL
AC-14(1) — Necessary Uses
CMMC Practice Mapping
No direct CMMC mapping
NIST 800-171 Mapping
No direct NIST 800-171 mapping
Related Controls
No related controls listed
Practitioner Notes
For any action you allow without authentication, document exactly why it is necessary. There should be a clear business or mission justification for every exception.
Example 1: In your SSP, create a table listing each unauthenticated action, the system it applies to, the justification (e.g., "Public website must be accessible to potential customers"), and the approving authority. Review this table during every annual SSP update.
Example 2: For network services, document why DNS, DHCP, and NTP are available without authentication (they must be for the network to function). Ensure these services are hardened — for example, restrict DNS zone transfers to authorized secondary servers only using allow-transfer in your BIND or Windows DNS config.