A lot of folks have been posting about the latest update/supplement to NIST SP800-63b, Digital Identity Guidelines, which came out in August. Much of the document is really providing more clarity around prior recommendations, particularly in the area of passwords (see section 3.1.1 in the link below) and their requirements, but there is also an interesting expansion on the use of "syncable authenticators," aka passkey, which apparently were not authorized for use under AAL2 (see Appendix B). https://lnkd.in/gmV8nxFy From the NIST blog post here: https://lnkd.in/g8s8FNyr "What is a syncable authenticator? A syncable authenticator is any cryptographic authenticator that allows for the private key to be cloned and stored separate of the authenticator to support use of that key across different devices (for example, syncing). In practice, these are typically what are called ‘passkeys’ by the FIDO Alliance and make use of multiple standards and protocols such as the Client-to-Authenticator Protocol and World Wide Web Consortium’s (W3C) Web Authentication (WebAuthn). When implemented correctly, they provide a phishing-resistant authenticator with many benefits, such as simplified recovery, cross device support, and consumer friendly platform authentication support (for example, native biometrics). Such authenticators would have been considered non-compliant in the context of Digital Identity Guidelines, and the supplement provides additional requirements and considerations to allow for their use at Authentication Assurance Level 2 (AAL2). "
good insights thanks
This is valuable thank you
Director of Cybersecurity at ACT | Building partnerships to secure data, systems & AI while supporting innovation | Granite State Leadership Academy Fellow | Opinions are my own.
2moSuper helpful, thanks John!