Identification and Authentication Policy and Procedures | IA-1
Identification and Authentication Policy
MCC recognizes that identification and authentication policies and procedures are vital to reducing information security risks.
Purpose
The Identification and Authentication Policy and associated controls describe the requirements for identifying users and protecting access to information resources.
Scope and Roles
This policy applies to information resources owned or managed by MCC. The intended audience includes the Cybersecurity Manager and all users of MCC Information Resources
Compliance
Identification and Authentication controls are implemented to ensure compliance with the Texas Department of Information Resources (DIR) Security Control Standards Catalog as required by Title 1 Texas Administrative Code §202.76.
Implementation
The Cybersecurity Manager or their designee is responsible for:
- ensuring that this policy and supporting procedures are periodically reviewed and updated.
Last updated: 5/13/2026