Authentication - Use of Multi-Factor Cryptographic Software, v1.0

Multi-factor cryptographic software may be used for authentication and must adhere to the rules found within NIST 800-63-3B: 5.1.8

Assessment Steps (2)

1
Soft Crypto Authenticators (SoftCryptoAuthenticators)
Does the multi-factor cryptographic software adhere to NIST 800-63-3B: 5.1.8.1?
Artifact
A1
Provide evidence (e.g. policies, software documentation) that the use of multi-factor crypto software adheres to requirements.
2
Soft Crypto Verifiers (SoftCryptoVerifiers)
Does the multi-factor cryptographic software verifier adhere to NIST 800-63-3B: 5.1.7.2?
Artifact
A1
Provide evidence (e.g. policies, software documentation) that the use of multi-factor crypto software verifiers adheres to requirements.

Conformance Criteria (2)

C1
CSPs using multi-factor cryptographic software MUST adhere to NIST 800-63-3B: 5.1.8.1.
Citation
NIST SP 800-63B
Section 5.1.8.1
C2
CSPs using multi-factor cryptographic software verifiers MUST adhere to NIST 800-63-3B: 5.1.7.2.
Citation
NIST SP 800-63B
Section 5.1.7.2