8.8 Ensure that security policies and operational procedures for identification and authentication are documented, in use, and known to all affected parties

8.8 Ensure that security policies and operational procedures for identification and authentication are documented, in use, and known to all affected parties.

8.8 Examine documentation and interview personnel to verify that security policies and operational procedures for identification and authentication are:
• Documented,
• In use, and
• Known to all affected parties.
Personnel need to be aware of and following security policies and operational procedures for managing identification and authorization on a continuous basis.