https://www.idmanagement.gov/
The Approved Products List (APL) provides federal agencies with products and services that have been approved for FICAM implementation based on rigorous security vulnerability and interoperability testing performed by the FIPS 201 Evaluation Program.
https://info.identityautomation.com/hubfs/PDFs/Enterprise_Resources/Definitive-guide-to-username-conventions.pdf
This document from Identity Automation provides organizations with a step by step process to follow for creating and maintaining usernames.
Infosecurity Magazine – Inactive Accounts: The Key to Your Company’s Sensitive Data
3.5 3.5.6 Identification and Authentication
https://www.infosecurity-magazine.com/opinions/inactive-accounts-key-sensitive/
This article from infosecurity magazine, describes the importance of securing inactive user accounts.
https://www.isaca.org/resources/isaca-journal/issues/2018/volume-1/data-loss-preventionnext-steps
This article provides a comprehensive description of Data Loss Prevention (DLP). The article includes best Practices for DLP planning and preparation, and tools for automating DLP.
https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/deploy/ad-ds-deployment
This guide covers how to install and remove Active Directory Domain Services (AD DS) in Windows Server 2012 and important issues to be aware of when you add new domain controllers to an existing Active Directory environment.
https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/manage/understand-security-identifiers
This document describes security identifiers and how they work in regards to accounts and groups in the Windows operating system.
Microsoft – Configure CMMC Level 2 Identification and Authentication (IA) controls
3.5 3.5.5 Identification and Authentication
https://learn.microsoft.com/en-us/entra/standards/configure-cmmc-level-2-identification-and-authentication
This article provides guidance for the Identification and Authorization (IA) domain. There's a table with links to content that provides step-by-step guidance to accomplish the practice.
Microsoft – Regularly check for and remove inactive user accounts in the Active Directory
3.5 3.5.6 Identification and Authentication
https://learn.microsoft.com/en-us/services-hub/unified/health/remediation-steps-ad/regularly-check-for-and-remove-inactive-user-accounts-in-active-directory
This webpage discusses how to regularly check for and remove inactive user accounts in Microsoft Active Directory.
https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-111.pdf
This NIST Special Publication provides recommendations to facilitate more efficient and effective storage encryption solution design, implementation, and management for Federal departments and agencies.
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-175Br1.pdf
This NIST Special Publication is one part in a series of documents intended to provide guidance to the Federal Government for using cryptography to protect its sensitive, but unclassified digitized information during transmission and while in storage.