https://www.epa.gov/system/files/documents/2023-01/information_security_identification_and_authentication_procedure.pdf
This example procedure from the EPA describes how the agency is to implement security control requirements for the NIST SP 800-53 Identification and Authentication (IA) control family.
https://www.isaca.org/resources/isaca-journal/issues/2018/volume-1/data-loss-preventionnext-steps
This article provides a comprehensive description of Data Loss Prevention (DLP). The article includes best Practices for DLP planning and preparation, and tools for automating DLP.
https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/manage/understand-security-identifiers
This document describes security identifiers and how they work in regards to accounts and groups in the Windows operating system.
Texas A&M Policy: Identification and Authentication (Non-Organizational Users) (IA-8)
3.5 3.5.1 Identification and Authentication
https://it.tamu.edu/policy/it-policy/controls-catalog/controls/IA/IA-8
This example policy describes the configuration of resources to uniquely identify and authenticate users not affiliated with the university who are permitted to utilize university information resources.
Texas A&M Policy: Identification and Authentication (Organizational Users) (IA-2)
3.5 3.5.1 Identification and Authentication
https://it.tamu.edu/policy/it-policy/controls-catalog/controls/IA/IA-2
This example policy describes the capability for information resources to uniquely identify and authenticate university faculty, staff, students, and other approved users.
https://it.tamu.edu/policy/it-policy/controls-catalog/controls/IA/IA-4/
This example policy describes how user or device identifiers are managed by receiving appropriate authorization to initially assign a user, selecting a unique identifier, preventing the reuse of identifiers, and disabling the user identifier after a period of inactivity or change in job status.
https://www.youtube.com/watch?v=pZIlaWhfhpQ
This YouTube video discusses identification and authentication issues in the context of computer security.