Authentication - Use of Look-Up Secret, v1.0

Lookup Secrets are shared secrets between the claimant and CSP that the claimant provides to the CSP as an authentication factor. The claimant either is prompted for a specific secret or provides one from a set they have and it is no longer valid. Use of lookup secrets must adhere to the rules found within NIST 800-63-3B: 5.1.2.

Assessment Steps (2)

1
Look-Up Secrets (Look-UpSecrets)
Does all use of look-up secrets meet the criteria specified in NIST 800-63-3 (approved random generation, secure delivery, and sufficient entropy)?
Artifact
A1
Provide evidence (e.g. policies, risk assessment documentation) that the use of look-up secrets adheres to the mandatory requirements.
2
Look-Up Secret Verifiers (Look-UpSecretVerifiers)
Does the look-up secret verifier meet the criteria specified in NIST 800-63-3.
Artifact
A1
Provide evidence (e.g. policies, risk assessment documentation) that the look-up secret verifier adheres to the mandatory requirements.

Conformance Criteria (2)

C1
CSPs creating look-up secret authenticators SHALL use an approved random bit generator to generate the list of secrets and SHALL deliver the authenticator securely to the subscriber. Look-up secrets SHALL have at least 20 bits of entropy. Look-up secrets MAY be distributed by the CSP in person, by postal mail to the subscriber's address of record, or by online distribution. If distributed online, look-up secrets SHALL be distributed over a secure channel.
Citation
NIST SP 800-63B
Section 5.1.2.1
C2
Look-up secret verifiers MUST adhere to numerous requirements specified in detail within NIST 800-63-3.
Citation
NIST SP 800-63B
Section 5.1.2.2