Authentication - Risk Assessment for Side Channel Attacks Against Hardware-Based Authenticators and Verifiers, v1.0

Credential Service Providers using hardware based authenticators should document their resistance to side channel attacks within their risk assessment.

Assessment Step

1
Risk of HW Authenticators (RiskofHWAuthenticators)
Does the CSP document the risk of side-channel attacks against their hardware based authenticators within their risk assessment?
Artifact
A1
Provide evidence (e.g. policies, risk assessment documentation) that the use of hardware based authenticators is covered by the CSP's risk assessment.

Conformance Criteria (1)

C1
Relevant side-channel attacks [against hardware-based authenticators and verifiers at AAL3] SHALL be determined by a risk assessment performed by the CSP.
Citation
NIST SP 800-63B
Section 4.3.2, Paragraph 5