NIST SPECIAL PUBLICATION 1800 -12 Derived Personal Identi ty Verification (PIV) Credentials Includes Executive Summary (A); Approach, Architecture, and Security Characteristics (B); and How -To Guide s (C) William Newhouse Michael Bartock Jeffrey Cichonski Hildegard Ferraiolo Murugiah Souppaya Christopher Brown Spike E. Dog Susan Prince Julian Sexton SECOND DRAFT This publication is available free of charge from: https://www.nccoe.nist.gov/projects/building -blocks/piv -credentials NIST SPECIAL PUBLICATION 1800 -12 Derived Personal Identi ty Verification (PIV) Credentials Includes Executive Summary (A); Approach, Architecture, an d Security Characteristics (B); and How -To Guides (C) William Newhouse National Cybersecurity Center of Excellence Information Technology Laboratory Michael Bartock Jeffrey Cichonski Hildegard Ferraiolo Murugiah Souppaya National Institute of Standards and Technology Information Technology Laboratory Christopher Brown Spike E. Dog Susan Prince Julian Sexton The MITRE Corporation McLean, VA August 2018 U.S. Department of Commerce Wilbur Ross , Secretary National Institute of Standards and Technology Walter G. Copan, Undersecretary of Commerce for Standards and Technology and Director NIST SPECIAL PUBLICATION 1800 -12A Derived Personal Identi ty Verification (PIV) Credentials Volume A : Executive Summary William Newhouse National Cybersecurity Center of Excellence Information Technology Laboratory Michael Bartock Jeffrey Cichonski Hildegard Ferraiolo Murugiah Souppaya National Institute of Standards and Technology Information Technology Laboratory Christopher Brown Spike E. Dog Susan Prince Julian Sexton The MITRE Corporation McLean, VA August 2018 SECOND DRAFT This publication is available free of charge from: https://www.nccoe.nist.gov/projects/building -blocks/piv -credentials DRAFT NIST SP 1800 -12A: Derived Personal Identity Verification (PIV) Credentials 1 Executive Summary ▪ Misuse of identity, especially through stolen passwords, is a primary source for cyber breaches. 1 Enabling stronger processes to recognize a user’s identity is a key component to securing an 2 organization’s information systems. 3 ▪ Access to federal information systems relies on the strong authenti cation of the user with a 4 Person al Identity Verification (PIV) Card . These “smart cards” contain identifying information 5 about the user that enables strong er authentication to federal facilities, information systems, 6 and applications . 7 ▪ Today, access to information systems is increasingly from mobile phones, tablets, and some 8 laptops that lack an integrated smart card reader found in older , stationary computing devices , 9 forci ng organizations to have separate authentication processes for these devices . 10 ▪ Derived PIV Credentials (DPC ) leverage identity proofing and vetting results of current and valid 11 credentials used in PIV Cards by enabling the secure storage of an equivalent credential on 12 devices without PIV Card readers . 13 ▪ The National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards 14 and Technology ( NIST ) built a laboratory environment to explore the development of a security 15 architecture that uses commercial ly available technology to manage the life cycle of DPC. 16 ▪ This NIST Cybersecurity Practice Guide demonstrates how organizations can provide multi -factor 17 authentication for users to access PIV-enabled website s and exchange secure d email s—from 18 mobile devices that lack PIV Card readers . 19 CHALLENGE 20 In accordance with Homeland Security Presidential Directive 12 (HSPD -12), the PIV standard was created 21 to enhance national security by providin

pdf文档 NIST.SP.1800-12-v2 Derived Personal Identity Verification (PIV) Credentials

安全标准 > NIST > 文档预览
中文文档 242 页 50 下载 1000 浏览 0 评论 0 收藏 3.0分
温馨提示:本文档共242页,可预览 3 页,如浏览全部内容或当前文档出现乱码,可开通会员下载原始文档
NIST.SP.1800-12-v2 Derived Personal Identity Verification (PIV) Credentials 第 1 页 NIST.SP.1800-12-v2 Derived Personal Identity Verification (PIV) Credentials 第 2 页 NIST.SP.1800-12-v2 Derived Personal Identity Verification (PIV) Credentials 第 3 页
下载文档到电脑,方便使用
本文档由 思安2022-12-05 09:12:49上传分享
给文档打分
您好可以输入 255 个字符
网站域名是多少( 答案:github5.com )
评论列表
  • 暂时还没有评论,期待您的金玉良言
站内资源均来自网友分享或网络收集整理,若无意中侵犯到您的权利,敬请联系我们微信(点击查看客服),我们将及时删除相关资源。