Best Practices for Privileged User PIV Authentication

Published: April 21, 2016

Author(s)

Hildegard Ferraiolo, David A. Cooper, Andrew R. Regenscheid, Karen A. Scarfone, Murugiah P. Souppaya

Abstract

The Cybersecurity Strategy and Implementation Plan (CSIP), published by the Office of Management and Budget (OMB) on October 30, 2015, requires that federal agencies use Personal Identity Verification (PIV) credentials for authenticating privileged users. This will greatly reduce unauthorized access to privileged accounts by attackers impersonating system, network, security, and database administrators, as well as other information technology (IT) personnel with administrative privileges. This white paper further explains the need for multi-factor PIV-based user authentication to take the place of password-based single-factor authentication for privileged users. It also provides best practices for agencies implementing PIV authentication for privileged users.
Citation: OTHER -
NIST Pub Series: Other
Pub Type: NIST Pubs

Keywords

authentication, Cybersecurity Strategy and Implementation Plan (CSIP), Derived PIV Credential, identification, multi-factor authentication, Personal Identity Verification (PIV), PIV Card, privileged access, privileged user
Created April 21, 2016, Updated November 10, 2018