AC-3(14): Individual Access
AC-3(14) requires you to give each individual a reliable way to access specific elements of their own personally identifiable information (PII) that your system holds, using defined access mechanisms and scope. To operationalize it, define which PII elements are in scope, implement an authenticated self-service or assisted access workflow, and retain evidence that requests are fulfilled consistently and securely. (NIST SP 800-53 Rev. 5 OSCAL JSON)
Key takeaways:
- Define the exact PII elements an individual can access, and where those elements live in your systems of record. (NIST SP 800-53 Rev. 5 OSCAL JSON)
- Implement a repeatable, identity-verified request and delivery process with clear authorization boundaries. (NIST SP 800-53 Rev. 5)
- Keep audit-ready artifacts: procedures, request logs, identity verification records, and proof of delivery for fulfilled access events. (NIST SP 800-53 Rev. 5)
The ac-3(14): individual access requirement is a privacy-centered enhancement to NIST SP 800-53’s access enforcement control (AC-3). It focuses on a specific outcome: individuals must be able to access elements of their own PII held by the organization’s system, through mechanisms you define and control. The control text is parameterized, which means you must make two explicit decisions and document them: (1) what “access mechanisms” you will provide, and (2) which “elements” of PII are accessible. (NIST SP 800-53 Rev. 5 OSCAL JSON)
For a Compliance Officer, CCO, or GRC lead, the operational challenge is rarely the concept. It’s execution: scoping the data precisely, choosing a workflow that won’t create new security exposure, aligning the process to system boundaries and third parties, and producing evidence that an assessor will accept. If you treat this as a generic “DSAR” process without mapping it to system-level access enforcement and logs, you end up with gaps that are hard to defend in an audit.
This page translates AC-3(14) into an implementable requirement: who owns it, what you build, what you document, and what evidence you keep so you can pass assessment without slowing down operations. (NIST SP 800-53 Rev. 5)
Regulatory text
Control requirement (excerpt): “Provide {{ insert: param, ac-03.14_odp.01 }} to enable individuals to have access to the following elements of their personally identifiable information: {{ insert: param, ac-03.14_odp.02 }}.” (NIST SP 800-53 Rev. 5 OSCAL JSON)
What the operator must do
You must define and implement:
- The access mechanism(s) you will provide to individuals (for example, a portal, a documented request intake process with authenticated delivery, or another controlled method). This is the first parameter. (NIST SP 800-53 Rev. 5 OSCAL JSON)
- The specific PII elements individuals can access (for example, profile fields, transaction history, identity attributes, communications metadata, or other enumerated data elements you store). This is the second parameter. (NIST SP 800-53 Rev. 5 OSCAL JSON)
Then you must operate the process consistently and securely, with access enforcement that prevents anyone from accessing another person’s PII and prevents over-disclosure beyond the defined elements. (NIST SP 800-53 Rev. 5)
Plain-English interpretation (what AC-3(14) is really asking)
AC-3(14) expects you to answer: “If an individual asks, can they see the PII about themselves that we hold in this system, through a defined channel, without exposing other people’s data or extra fields we did not approve for release?” (NIST SP 800-53 Rev. 5 OSCAL JSON)
This is not a vague policy statement. Assessors will look for:
- A documented scope of PII elements.
- A working access path (self-service or assisted).
- Identity proofing/verification appropriate to the risk of the PII being disclosed.
- Evidence the process operates: tickets, logs, approvals, and delivery records. (NIST SP 800-53 Rev. 5)
Who it applies to (entity and operational context)
AC-3(14) commonly applies where you are implementing NIST SP 800-53 Rev. 5 controls for:
- Federal information systems, or
- Contractor systems handling federal data (including environments that must align to 800-53 control baselines by contract or program requirements). (NIST SP 800-53 Rev. 5)
Operationally, it applies to any system that stores or processes PII tied to individuals (customers, end users, employees, applicants, beneficiaries, or other data subjects) and where you have an obligation to provide individual access via defined mechanisms. If third parties host, process, or sub-process that PII, your mechanism still needs a dependable way to retrieve the correct elements from those systems of record. (NIST SP 800-53 Rev. 5)
What you actually need to do (step-by-step)
Step 1: Name the control owner and system scope
- Assign a control owner (often Privacy, Security GRC, or IAM, with execution split across IT and Privacy Operations).
- Define the system boundary: which applications, databases, logs, and third-party services are in scope for “PII elements.” (NIST SP 800-53 Rev. 5)
Practical tip: write the scope as “systems of record” plus “systems that replicate PII,” because replicas (analytics, CRM sync, data lake extracts) are where teams miss fields.
Step 2: Define the two parameters in operational language
Document both parameters explicitly:
- Access mechanism(s) provided: self-service portal, authenticated email workflow, secure file pickup, customer support workflow with identity verification, etc.
- PII elements accessible: list them. Avoid “all PII” unless you can actually deliver it safely and consistently. (NIST SP 800-53 Rev. 5 OSCAL JSON)
A clean way to do this is a table:
| PII element category | System(s) of record | Access method | Delivery format | Owner |
|---|---|---|---|---|
| Identity profile fields | IAM/HRIS/CRM | Portal or ticket | On-screen view / export | Privacy Ops |
| Account activity | App DB | Ticket + export | CSV/PDF | App Owner |
| Support history | Ticketing tool | Ticket | PDF export | Support Ops |
Step 3: Build or formalize the request intake workflow
You need a repeatable workflow with clear entry points:
- Intake channels (portal form, email, support queue).
- Required identifiers to locate the correct record.
- Triage rules (who works it, what is “in scope,” escalation). (NIST SP 800-53 Rev. 5)
If you already run a data subject access request process, map it to the system control level: AC-3(14) wants defined mechanisms and defined PII elements, not just a privacy policy promise.
Step 4: Implement identity verification and authorization checks
Operationalize safeguards so the right person gets the right data:
- Authenticate the requester or perform identity verification steps aligned to your risk tolerance for the data types involved.
- Prevent “acting on behalf of” abuse: require documented authority (for example, a verified delegated admin relationship or legal authorization) before release.
- Enforce least-privilege in internal tooling so staff can only retrieve what’s required for the request. (NIST SP 800-53 Rev. 5)
Step 5: Implement data retrieval, minimization, and redaction rules
- Build a standard query/export per system of record for the approved PII elements.
- Add redaction logic for mixed records (e.g., notes that mention other individuals).
- Create a consistent packaging format (human-readable plus machine-readable where feasible) so fulfillment is repeatable. (NIST SP 800-53 Rev. 5)
Step 6: Deliver securely and capture proof of delivery
- Use a controlled delivery channel (portal download with authentication, encrypted file transfer, or other approved method).
- Record delivery completion and any exceptions (could not verify identity, data not found, partial fulfillment due to system constraints).
- Retain correspondence and artifacts in a system of record for audit. (NIST SP 800-53 Rev. 5)
Step 7: Test the mechanism and operationalize recurring evidence
- Run a tabletop test and at least one end-to-end functional test per major system boundary change (new data store, new third party, major schema change).
- Establish ongoing evidence capture: request logs, samples of fulfilled packages, and exception handling records. (NIST SP 800-53 Rev. 5)
Where Daydream fits: If you’re trying to keep this audit-ready across multiple systems and third parties, Daydream can serve as the control system of record: map AC-3(14) to an owner, document the procedure, and schedule recurring evidence pulls (tickets, exports, and delivery proofs) so you are not rebuilding the story at assessment time. (NIST SP 800-53 Rev. 5 OSCAL JSON)
Required evidence and artifacts to retain
Assessors typically want artifacts that prove both design and operation. Keep:
- Control statement for AC-3(14) with the two parameter decisions (mechanisms and PII elements). (NIST SP 800-53 Rev. 5 OSCAL JSON)
- Procedure/runbook: intake, verification, retrieval, redaction, delivery, exception handling. (NIST SP 800-53 Rev. 5)
- PII elements inventory (system-level listing aligned to your defined scope).
- Request/fulfillment logs (ticket IDs, timestamps, request type, disposition).
- Identity verification records (what checks were performed; avoid retaining sensitive verification artifacts unless required).
- Proof of delivery (portal download logs, encrypted transfer logs, customer confirmation, or support system closure notes).
- Access controls evidence for staff tooling used to compile exports (role assignments, approvals). (NIST SP 800-53 Rev. 5)
Common exam/audit questions and hangups
- “What are the ‘elements’ of PII you committed to provide?” If your answer is “everything,” auditors will ask how you prevent over-disclosure and mixed-data leaks. (NIST SP 800-53 Rev. 5 OSCAL JSON)
- “Show me the mechanism.” Screenshots of the portal, the form, or the workflow configuration, plus a walkthrough. (NIST SP 800-53 Rev. 5)
- “How do you verify the requester is the individual?” Expect scrutiny here; weak identity verification is a common gap. (NIST SP 800-53 Rev. 5)
- “Prove it operated.” Provide a sample set of completed requests with evidence of verification, retrieval, redaction decisions, and delivery completion. (NIST SP 800-53 Rev. 5)
Frequent implementation mistakes and how to avoid them
-
Mistake: Defining the PII element scope too broadly.
Fix: enumerate data elements by system of record and add a rule for mixed records that require redaction. (NIST SP 800-53 Rev. 5 OSCAL JSON) -
Mistake: Treating this as a policy-only privacy obligation.
Fix: connect the workflow to AC-3 enforcement and internal role-based access, and keep operational logs. (NIST SP 800-53 Rev. 5) -
Mistake: No exception path.
Fix: document what happens if identity cannot be verified, data is unavailable, or a third party cannot return records promptly; keep those records as evidence of controlled handling. (NIST SP 800-53 Rev. 5) -
Mistake: Fulfillment packages contain other people’s data.
Fix: implement reviewer checks for exports from unstructured sources (support notes, free-text fields) and require redaction prior to delivery. (NIST SP 800-53 Rev. 5)
Enforcement context and risk implications
No public enforcement cases were provided in the source catalog for this requirement, so you should treat AC-3(14) primarily as an assessment and contract performance risk within NIST-aligned programs rather than as a standalone enforcement hook in this document. (NIST SP 800-53 Rev. 5 OSCAL JSON)
Practically, the risk is straightforward:
- Unauthorized disclosure risk if identity verification and redaction are weak.
- Audit finding risk if you cannot show defined mechanisms, defined PII element scope, and operating evidence.
- Third-party dependency risk if PII is hosted or processed externally and you cannot reliably retrieve the defined elements. (NIST SP 800-53 Rev. 5)
A practical 30/60/90-day execution plan
First 30 days (design and scoping)
- Assign the control owner and identify in-scope systems and third parties that store PII.
- Define the AC-3(14) parameters: access mechanisms and the list of PII elements.
- Draft the runbook and the evidence plan (what you will retain per request). (NIST SP 800-53 Rev. 5 OSCAL JSON)
By 60 days (build and pilot)
- Configure the request intake workflow (portal or ticketing), with identity verification steps.
- Implement data retrieval templates/exports for each system of record.
- Pilot the process with test individuals and document results, including exceptions. (NIST SP 800-53 Rev. 5)
By 90 days (operate and harden)
- Go live with the mechanism and run the process as business-as-usual.
- Implement QA checks (especially for redaction and mixed records).
- Start a recurring evidence cycle and readiness review using your GRC system (Daydream or equivalent) so artifacts are collected continuously. (NIST SP 800-53 Rev. 5)
Frequently Asked Questions
Does AC-3(14) require a self-service portal?
No. The control requires that you “provide” defined mechanisms for individuals to access specified PII elements, but it does not mandate a portal. A controlled, identity-verified assisted workflow can meet the requirement if it is documented and consistently operated. (NIST SP 800-53 Rev. 5 OSCAL JSON)
How detailed should the “elements of PII” list be?
Make it field-level or report-level per system of record, so a responder can fulfill requests without interpretation. If you keep it vague, you will either under-deliver (audit gap) or over-disclose (privacy incident risk). (NIST SP 800-53 Rev. 5 OSCAL JSON)
What if our PII is spread across multiple third parties?
Treat third-party systems as part of your fulfillment supply chain: document the systems, define how you retrieve the in-scope elements, and keep evidence of retrieval and delivery. If retrieval is unreliable, adjust scope or contract terms so your defined mechanism is actually operable. (NIST SP 800-53 Rev. 5)
Do we have to retain copies of the data package we send?
Keep enough evidence to prove what was delivered and that the correct identity verification and approvals occurred. If retaining full copies increases risk, retain hashes, metadata, and delivery logs instead, plus a reproducible query definition. (NIST SP 800-53 Rev. 5)
How do we handle free-text notes that mention other people?
Put those sources behind a redaction-and-review step before any disclosure. Most teams treat unstructured fields as high risk and either exclude them from the defined “elements” scope or require manual review prior to release. (NIST SP 800-53 Rev. 5)
What’s the fastest way to get audit-ready for AC-3(14)?
Write down the two parameters (mechanism and PII elements), map them to systems of record, then run a small set of test requests and keep the full evidence trail. In Daydream, track the owner, procedure, and recurring evidence so readiness does not depend on one person’s memory. (NIST SP 800-53 Rev. 5 OSCAL JSON)
Frequently Asked Questions
Does AC-3(14) require a self-service portal?
No. The control requires that you “provide” defined mechanisms for individuals to access specified PII elements, but it does not mandate a portal. A controlled, identity-verified assisted workflow can meet the requirement if it is documented and consistently operated. (NIST SP 800-53 Rev. 5 OSCAL JSON)
How detailed should the “elements of PII” list be?
Make it field-level or report-level per system of record, so a responder can fulfill requests without interpretation. If you keep it vague, you will either under-deliver (audit gap) or over-disclose (privacy incident risk). (NIST SP 800-53 Rev. 5 OSCAL JSON)
What if our PII is spread across multiple third parties?
Treat third-party systems as part of your fulfillment supply chain: document the systems, define how you retrieve the in-scope elements, and keep evidence of retrieval and delivery. If retrieval is unreliable, adjust scope or contract terms so your defined mechanism is actually operable. (NIST SP 800-53 Rev. 5)
Do we have to retain copies of the data package we send?
Keep enough evidence to prove what was delivered and that the correct identity verification and approvals occurred. If retaining full copies increases risk, retain hashes, metadata, and delivery logs instead, plus a reproducible query definition. (NIST SP 800-53 Rev. 5)
How do we handle free-text notes that mention other people?
Put those sources behind a redaction-and-review step before any disclosure. Most teams treat unstructured fields as high risk and either exclude them from the defined “elements” scope or require manual review prior to release. (NIST SP 800-53 Rev. 5)
What’s the fastest way to get audit-ready for AC-3(14)?
Write down the two parameters (mechanism and PII elements), map them to systems of record, then run a small set of test requests and keep the full evidence trail. In Daydream, track the owner, procedure, and recurring evidence so readiness does not depend on one person’s memory. (NIST SP 800-53 Rev. 5 OSCAL JSON)
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream