Authentication - Acceptable Management of Authenticator Loss, Theft, Damage, and Unauthorized Duplication Requirements, v1.0

Compromised authenticators (do to loss, damage, or unauthorized duplication/disclosure) must be suspended, revoked, or destroyed as appropriate.

Assessment Step

1
Authenticator Loss (AuthenticatorLoss)
Are lost, damaged, or otherwise compromised authenticators handled appropriately? This includes suspension, revocation, or destruction of the authenticator as appropriate. It also requires a CSP to offer alternate means of reporting a lost authenticator (still over an authenticated channel, but it can be one that requires simpler authentication, single factor, password, etc.).
Artifact
A1
Provide evidence (e.g. policies, operational details) that there are sufficient mechanisms and procedures in place to handle compromised authenticators.

Conformance Criteria (1)

C1
Compromised authenticators include those that have been lost, stolen, or subject to unauthorized duplication. Generally, one must assume that a lost authenticator has been stolen or compromised by someone that is not the legitimate subscriber of the authenticator. Damaged or malfunctioning authenticators are also considered compromised to guard against any possibility of extraction of the authenticator secret. One notable exception is a memorized secret that has been forgotten without other indications of having been compromised, such as having been obtained by an attacker. Suspension, revocation, or destruction of compromised authenticators SHOULD occur as promptly as practical following detection. Agencies SHOULD establish time limits for this process. To facilitate secure reporting of the loss, theft, or damage to an authenticator, the CSP SHOULD provide the subscriber with a method of authenticating to the CSP using a backup or alternate authenticator. This backup authenticator SHALL be either a memorized secret or a physical authenticator. Either MAY be used, but only one authentication factor is required to make this report. Alternatively, the subscriber MAY establish an authenticated protected channel to the CSP and verify information collected during the proofing process. The CSP MAY choose to verify an address of record (i.e., email, telephone, postal) and suspend authenticator(s) reported to have been compromised. The suspension SHALL be reversible if the subscriber successfully authenticates to the CSP using a valid (i.e., not suspended) authenticator and requests reactivation of an authenticator suspended in this manner. The CSP MAY set a time limit after which a suspended authenticator can no longer be reactivated.
Citation
NIST SP 800-63B
Section 6.2