PS-3(1): Classified Information
PS-3(1) requires you to verify that every person who can access a system that processes, stores, or transmits classified information has (1) an active clearance and (2) has been indoctrinated to the highest classification level of information they can access on that system. Operationalize it by binding clearance/indoctrination status to identity lifecycle controls, and by blocking access until verification is complete. 1
Key takeaways:
- Gate system access on verified clearance level and documented indoctrination, not manager approval. 1
- Match the “highest classification level accessible” to actual system authorization boundaries and role entitlements. 1
- Keep audit-ready evidence: verification checks, decision records, and recurring revalidation outputs. 2
The ps-3(1): classified information requirement is a personnel screening enhancement focused on one failure mode: people gaining access to classified systems before the organization has confirmed they are cleared and properly indoctrinated for the level of information they can reach. The control is simple in wording and often messy in execution because clearance status, indoctrination, HR onboarding, contractor onboarding, and IAM provisioning live in different places and are owned by different teams.
For a CCO, Compliance Officer, or GRC lead, the fastest path to operationalizing PS-3(1) is to treat it as an access control gate with two mandatory attributes: verified clearance level and verified indoctrination level. Your job is to make sure those attributes are (a) authoritative, (b) current, (c) mapped to system classification boundaries, and (d) enforced automatically or with tightly controlled manual steps. PS-3(1) is also evidence-heavy: auditors will want to see how you verified status, what you did when verification failed, and whether the system technically prevented access before completion. 2
Regulatory text
Requirement (verbatim): “Verify that individuals accessing a system processing, storing, or transmitting classified information are cleared and indoctrinated to the highest classification level of the information to which they have access on the system.” 1
What the operator must do (plain reading):
- Identify every individual who can access the system (employees, contractors, admins, developers, operators, and privileged users).
- For each individual, verify two conditions before access is granted:
- The individual is cleared.
- The individual is indoctrinated.
- The clearance and indoctrination must cover the highest classification level of information that the person can access on that system (not just what they “usually” access). 1
Plain-English interpretation
PS-3(1) is a “no verification, no access” rule for classified systems. If a person can log in, they must have documented eligibility (clearance) and documented briefing/acknowledgement status (indoctrination) for the top classification level their account could reach through roles, group membership, data access paths, admin tools, backups, logs, or indirect access (for example, database admin access).
Two operational implications matter in audits:
- The scope is system access, not just “handling classified data in daily work.” If the account can reach it, PS-3(1) applies. 1
- “Highest classification level” is determined by effective access, so entitlements and technical architecture drive the compliance outcome. 2
Who it applies to
Entity scope
- Federal information systems operating with classified information requirements. 1
- Contractor systems handling federal data where the system processes, stores, or transmits classified information. 1
Operational contexts that trigger PS-3(1)
- Any environment (on-prem, cloud, hybrid) authorized for classified processing.
- Systems with classified data in:
- primary storage,
- backups,
- logs/telemetry,
- admin consoles,
- CI/CD artifacts, container registries, or ticketing attachments that contain classified content.
- Any access path:
- interactive login,
- API/service accounts,
- privileged admin access,
- remote support or break-glass access.
What you actually need to do (step-by-step)
Step 1: Define the “highest classification level accessible” per system
- Document the system’s classification handling boundary and the maximum classification level present or reachable from that system boundary.
- Translate that into a simple rule: “To access System X, person must have clearance level ≥ X and indoctrination level ≥ X.” 1
Decision point: If the system has mixed zones (for example, separate enclaves by classification), treat each enclave as a separate access control target with distinct gates. Otherwise you will overprovision access or under-control a high side path.
Step 2: Establish authoritative verification sources and ownership
Assign owners for:
- Clearance verification (often Security, FSO, or a cleared program security function).
- Indoctrination verification (briefing records, program indoctrination, read-ins).
- Access provisioning enforcement (IAM team / system owners).
Then write down the verification method used for each attribute (system-of-record name, how checks are performed, and what “pass/fail” means). The requirement is “verify,” so you need a repeatable verification step, not an informal email chain. 2
Step 3: Build an access gate in the onboarding and change workflow
Implement an explicit gate in your joiner/mover/leaver (JML) process:
- Request submitted (ticket or access request tool).
- Clearance verified against the authoritative source.
- Indoctrination verified for the required classification level.
- Provision access only after both verifications pass.
- Record decision evidence (who checked, when, what was checked, result).
Minimum operational rule: the approver who wants the person onboarded cannot be the only verifier of clearance/indoctrination status. Separate “need” approval from “eligibility” verification.
Step 4: Enforce at the technical control point (not only in process)
Auditors will test whether the system can technically prevent access when verification is missing. Common enforcement patterns include:
- Role-based access groups that are only assignable after verification fields are complete.
- A provisioning workflow that blocks group membership until clearance/indoctrination attributes are set.
- Conditional access rules that deny login unless the identity is tagged as verified for the relevant classification level.
Your goal is to make “bypass” difficult and detectable.
Step 5: Cover non-human and privileged access paths
PS-3(1) speaks about “individuals accessing,” which creates a recurring hangup: service accounts and shared admin accounts. The practical approach is:
- Prohibit shared accounts where feasible.
- For admin actions performed through automation, tie actions to a human operator identity through strong authentication, approvals, and logging, and ensure only cleared/indoctrinated individuals can trigger or approve those actions.
- For break-glass accounts, restrict who can activate them to pre-verified cleared/indoctrinated personnel, and require documented activation records.
Step 6: Revalidate and reconcile access
Build a recurring reconciliation between:
- people with system accounts (including privileged roles), and
- people with verified clearance/indoctrination at the right level.
Treat mismatches as incidents: disable access quickly, investigate, and document remediation. This is where teams often find legacy accounts, contractor accounts, or temporary access that never got cleaned up.
Step 7: Map PS-3(1) to an owner and recurring evidence set
Operationalize PS-3(1) by assigning a control owner, documenting the procedure, and defining recurring evidence artifacts that prove ongoing operation. This is the fastest way to become assessment-ready and avoid “we do this but can’t prove it.” 1
A practical way to manage the mapping and evidence calendar is to track PS-3(1) like any other recurring control test in Daydream, with named owners, evidence requests, and an audit-ready trail.
Required evidence and artifacts to retain
Keep artifacts that prove verification happened before access and prove the verification matched the highest classification level accessible:
- System classification/access baseline
- System boundary description and maximum classification level handled or reachable.
- Role-to-data classification mapping (which roles can reach what level).
- Personnel verification evidence
- Clearance verification record (date/time, verifier, result).
- Indoctrination verification record (date/time, verifier, level).
- Access control evidence
- Access request tickets with approvals and verification steps.
- Provisioning logs showing account creation/group assignment timestamps aligned to verification completion.
- Current access roster for the system and privileged roles.
- Reconciliation outputs
- Periodic access review results with exceptions and remediation actions.
- Termination/offboarding evidence showing timely removal of access.
Common exam/audit questions and hangups
Expect these questions:
-
“Show me how you determine the highest classification level a user can access.”
Hangup: teams cite the data owner’s intent, not the actual entitlements and admin paths. -
“Prove verification occurred before access was granted.”
Hangup: timestamps don’t line up, or the verification is an email without a durable record. -
“How do you handle contractors and third parties?”
Hangup: contractor onboarding is outside HR, so verification steps get skipped. -
“How do you prevent a privileged admin from viewing higher-classified data than required?”
Hangup: admins are granted broad access “for support,” which changes the “highest classification level accessible.” -
“What happens when someone’s status changes?”
Hangup: no trigger for immediate access removal when a person rotates off a program.
Frequent implementation mistakes (and how to avoid them)
-
Mistake: Treating indoctrination as training-only.
Fix: define indoctrination evidence (read-in/briefing acknowledgement) and make it a required attribute for access gating. 1 -
Mistake: Overlooking logs, backups, and admin consoles.
Fix: include operational data stores in the “highest classification level accessible” analysis and restrict who can access those tools. -
Mistake: Manual exceptions that become permanent.
Fix: route exceptions through a time-bound workflow, with documented compensating controls and required re-approval before extension. -
Mistake: Privileged access granted before verification “because the start date is today.”
Fix: pre-stage accounts without access, or issue conditional access that remains blocked until verification completes. -
Mistake: No evidence package.
Fix: define a standing PS-3(1) evidence checklist and collect on a schedule; store artifacts in a system that preserves timestamps and change history. 2
Enforcement context and risk implications
No public enforcement cases were provided in the source catalog for PS-3(1), so you should plan around assessment and authorization risk rather than case law. The practical exposure is straightforward: if a person without the right clearance or indoctrination can access classified systems, you have a high-severity access control failure that can trigger incident response, loss of authorization, contractual findings, and program impact. 2
Practical 30/60/90-day execution plan
First 30 days (stabilize and stop the obvious failures)
- Name a PS-3(1) control owner and publish a one-page procedure for verification and access gating. 1
- Inventory systems that process/store/transmit classified information and identify the highest classification level accessible for each.
- Pull a complete user and privileged-role roster for each in-scope system.
- Run a one-time reconciliation: roster vs. clearance/indoctrination verification status; disable or quarantine mismatches.
Days 31–60 (build repeatable gates and evidence)
- Implement the access request workflow steps for clearance and indoctrination verification.
- Add IAM enforcement: block provisioning until both attributes are verified for the required level.
- Standardize artifacts: create templates for verification logs, access decisions, and exception handling.
- Define a recurring revalidation cadence and assign owners for evidence collection in your GRC system.
Days 61–90 (harden edge cases and prepare for assessment)
- Extend controls to privileged access tooling, break-glass processes, and remote support paths.
- Validate technical enforcement with negative testing (attempt to provision or log in without verified status).
- Conduct an internal “audit pack” review: confirm you can show the story from system classification level → user entitlements → clearance/indoctrination verification → access granted.
- If you manage controls in Daydream, configure recurring evidence requests and automated reminders so PS-3(1) stays current without rebuilding the pack each assessment cycle.
Frequently Asked Questions
Does PS-3(1) apply if the system is only used by administrators and not end users?
Yes. If administrators can access a system that processes, stores, or transmits classified information, they are “individuals accessing” the system and must be cleared and indoctrinated to the highest level they can reach. 1
What does “highest classification level … to which they have access” mean in practice?
Use effective access, not intended access. If a role, admin permission, database query privilege, or log access path can expose higher-classified information, that higher level sets the clearance/indoctrination requirement. 1
Can I satisfy PS-3(1) with manager attestation that the person is cleared?
Manager approval can cover need-to-know, but PS-3(1) requires verification of clearance and indoctrination. Keep the verification tied to an authoritative source and record who verified it and when. 2
How should we handle service accounts and automation?
Avoid shared accounts and ensure automated actions are controlled by workflows that only cleared/indoctrinated individuals can initiate or approve. Also restrict access to credentials and admin tooling to verified personnel. 2
What evidence will an assessor ask for first?
Expect requests for your access roster, proof of clearance/indoctrination verification for sampled users, and system-side enforcement evidence that access cannot be granted before verification. Keep timestamps and decision records consistent across systems. 2
What is the fastest way to become audit-ready for PS-3(1)?
Assign a control owner, document the procedure, and define recurring evidence artifacts that you can produce on demand. Track evidence requests and exceptions in a single workflow so you can show consistent operation over time. 1
Footnotes
Frequently Asked Questions
Does PS-3(1) apply if the system is only used by administrators and not end users?
Yes. If administrators can access a system that processes, stores, or transmits classified information, they are “individuals accessing” the system and must be cleared and indoctrinated to the highest level they can reach. (Source: NIST SP 800-53 Rev. 5 OSCAL JSON)
What does “highest classification level … to which they have access” mean in practice?
Use effective access, not intended access. If a role, admin permission, database query privilege, or log access path can expose higher-classified information, that higher level sets the clearance/indoctrination requirement. (Source: NIST SP 800-53 Rev. 5 OSCAL JSON)
Can I satisfy PS-3(1) with manager attestation that the person is cleared?
Manager approval can cover need-to-know, but PS-3(1) requires verification of clearance and indoctrination. Keep the verification tied to an authoritative source and record who verified it and when. (Source: NIST SP 800-53 Rev. 5)
How should we handle service accounts and automation?
Avoid shared accounts and ensure automated actions are controlled by workflows that only cleared/indoctrinated individuals can initiate or approve. Also restrict access to credentials and admin tooling to verified personnel. (Source: NIST SP 800-53 Rev. 5)
What evidence will an assessor ask for first?
Expect requests for your access roster, proof of clearance/indoctrination verification for sampled users, and system-side enforcement evidence that access cannot be granted before verification. Keep timestamps and decision records consistent across systems. (Source: NIST SP 800-53 Rev. 5)
What is the fastest way to become audit-ready for PS-3(1)?
Assign a control owner, document the procedure, and define recurring evidence artifacts that you can produce on demand. Track evidence requests and exceptions in a single workflow so you can show consistent operation over time. (Source: NIST SP 800-53 Rev. 5 OSCAL JSON)
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream