Authentication - Replay Resistance, v1.0

Multi-factor authentication should include some factor that is replay resistant.

Assessment Step

1
Replay Resistant (ReplayResistant)
Does the authentication scheme include a replay resistant authenticator?
Artifact
A1
Provide evidence (e.g. policies, operational details, processes) that one of the authentication steps is replay resistant.

Conformance Criteria (1)

C1
An authentication process resists replay attacks if it is impractical to achieve a successful authentication by recording and replaying a previous authentication message. Replay resistance is in addition to the replay-resistant nature of authenticated protected channel protocols, since the output could be stolen prior to entry into the protected channel. Protocols that use nonces or challenges to prove the "freshness" of the transaction are resistant to replay attacks since the verifier will easily detect when old protocol messages are replayed since they will not contain the appropriate nonces or timeliness data. Examples of replay-resistant authenticators are OTP devices, cryptographic authenticators, and look-up secrets.
Citation
NIST SP 800-63B
Section 5.2.8