1. The Institute of Internal Auditors (IIA)
Global Technology Audit Guide (GTAG) 8: Auditing Application Controls
2nd Edition. Section "Access Controls (Security)
" page 10
states
"Access controls are designed to protect data from unauthorized use
disclosure
or modification... Authentication is the process of verifying a user’s identity." This directly links authentication to preventing unauthorized access.
2. The Institute of Internal Auditors (IIA)
Global Technology Audit Guide (GTAG) 1: Information Technology Controls
2nd Edition. Section "Logical Access Controls
" page 11
explains that the objective of logical access controls is to "restrict access to programs and data to authorized users." It lists authentication as a key control mechanism to achieve this objective.
3. Vaassen
E. H.
& Information Systems and Control Group. (2009). Accounting Information Systems and Internal Control. John Wiley & Sons. Chapter 10
"Application Controls
" distinguishes between different control types. It places authentication squarely within the category of logical access controls
whose function is to prevent or detect unauthorized access
separate from controls over input
processing
and output. (Specific reference to the concept of authentication as a gatekeeper for access).