https://www.epa.gov/system/files/documents/2025-06/information_security_identification_and_authentication.pdf
This example procedure from the EPA describes how the agency is to implement security control requirements for the NIST SP 800-53 Identification and Authentication (IA) control family.
https://www.isaca.org/resources/isaca-journal/issues/2018/volume-1/data-loss-preventionnext-steps
This article provides a comprehensive description of Data Loss Prevention (DLP). The article includes best Practices for DLP planning and preparation, and tools for automating DLP.
https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/manage/understand-security-identifiers
This document describes security identifiers and how they work in regards to accounts and groups in the Windows operating system.
https://learn.microsoft.com/en-us/entra/standards/configure-cmmc-level-1-controls
Microsoft Entra ID meets identity-related practice requirements in each Cybersecurity Maturity Model Certification (CMMC) level. To be compliant with requirements in CMMC, it's the responsibility of companies performing work with, and on behalf of, the US Dept. of Defense (DoD) to complete other configurations or processes. In CMMC Level 1, there are three domains that have one or more practices related to identity: Access Control (AC), Identification and Authentication (IA), and System and Information integrity (SI)
https://www.youtube.com/watch?v=pZIlaWhfhpQ
This YouTube video discusses identification and authentication issues in the context of computer security.