Authentication - Use of Memorized Secret, v1.0

Memorized Secrets (passwords and pins) must be sufficiently hard to guess and adhere to the rules found within NIST 800-63-3B: 5.1.1

Assessment Steps (2)

1
Memorized Secrets (MemorizedSecrets)
Does all use of memorized secrets meet the criteria specified in NIST 800-63-3 (minimum lengths, complexity, character sets, not blacklisted, etc.)?
Artifact
A1
Provide evidence (e.g. policies, risk assessment documentation) that the use of memorized secrets adheres to the mandatory requirements.
2
Memorized Secret Verifiers (MemorizedSecretVerifiers)
Do all memorized secret verifiers meet the criteria specified in NIST 800-63-3B: 5.1.1.2, including meeting entropy minimums, avoiding common passwords, rate limiting, exclusively use encrypted channels, and store secrets suitably such as properly salted hashes.
Artifact
A1
Provide evidence (e.g. policies, risk assessment documentation) that the memorized secret verifier adheres to the mandatory requirements.

Conformance Criteria (2)

C1
Memorized secrets SHALL be at least 8 characters in length if chosen by the subscriber. Memorized secrets chosen randomly by the CSP or verifier SHALL be at least 6 characters in length and MAY be entirely numeric. If the CSP or verifier disallows a chosen memorized secret based on its appearance on a blacklist of compromised values, the subscriber SHALL be required to choose a different memorized secret.
Citation
NIST SP 800-63B
Section 5.1.1.1
C2
Memorized secret verifiers MUST adhere to mandatory requirements specified within NIST 800-63-3B: 5.1.1.2.
Citation
NIST SP 800-63B
Section 5.1.1.2