A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)
Total Page:16
File Type:pdf, Size:1020Kb
NIST Special Publication 800-116 A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS) William MacGregor Ketan Mehta David Cooper Karen Scarfone I N F O R M A T I O N S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD, 20899-8930 November 2008 U.S. Department of Commerce Carlos M. Gutierrez, Secretary National Institute of Standards and Technology Patrick D. Gallagher, Deputy Director Special Publication 800-116 A Recommendation for the Use of PIV Credentials in PACS REPORTS ON COMPUTER SYSTEMS TECHNOLOGY The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analyses to advance the development and productive use of information technology. ITL’s responsibilities include the development of management, administrative, technical, and physical standards and guidelines for the cost-effective security and privacy of non-national security-related information in Federal information systems. This Special Publication 800-series reports on ITL’s research, guidelines, and outreach efforts in information system security, and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Special Publication 800-116, 71 pages (November 2008) Page ii Special Publication 800-116 A Recommendation for the Use of PIV Credentials in PACS Acknowledgements The authors, David Cooper, William MacGregor, and Karen Scarfone of the National Institute of Standards and Technology (NIST) and Ketan Mehta of Mehta, Inc., wish to thank their colleagues who reviewed drafts of this document and contributed to its development. We thank Tony Cieri and Ron Martin for substantial written contributions to the document. The authors gratefully acknowledge and appreciate the support received from the Interagency Security Committee, Department of Justice (DOJ), General Services Administration (GSA), Department of Homeland Security (DHS), Department of Defense (DoD), Social Security Administration (SSA), and Department of Treasury in developing this document. Special thanks to our expert collaborators who participated in weekly conference calls and provided comments on many versions of the document: + Tim Baldridge + Magdalena Benitez + Joe Broghamer + Mike Defrancisco + Hildegard Ferraiolo + Scott Glaser + Christopher Hernandez + Gwainevere Hess + Everett Hilliard + Nolin Huddleston + Lemar Jones + C. Larson + Edward Layo + Diana Londergan + Ron Martin + Eric Mitchell + Steve Mitchell + Benjamin Overbey Page iii Special Publication 800-116 A Recommendation for the Use of PIV Credentials in PACS + Ron Ross + Austin Smith + Carlton Stevenson + David Vanderweele + Tom Whittle + Craig Zeigler Page iv Special Publication 800-116 A Recommendation for the Use of PIV Credentials in PACS Table of Contents 1. Executive Summary ............................................................................................................1 2. Introduction .........................................................................................................................4 2.1 Authority ......................................................................................................................4 2.2 Background .................................................................................................................4 2.3 Purpose and Scope.....................................................................................................5 2.4 Audience .....................................................................................................................6 3. Terminology.........................................................................................................................7 4. Threat Environment ..........................................................................................................12 4.1 Identifier Collisions ....................................................................................................12 4.2 Terminated PIV Cards...............................................................................................13 4.3 Visual Counterfeiting .................................................................................................13 4.4 Skimming...................................................................................................................14 4.5 Sniffing ......................................................................................................................14 4.6 Social Engineering ....................................................................................................14 4.7 Electronic Cloning .....................................................................................................15 4.8 Electronic Counterfeiting ...........................................................................................15 4.9 Other Threats ............................................................................................................15 5. Limitations of Deployed Physical Access Control Systems.........................................16 5.1 Cardholder Identification ...........................................................................................16 5.2 Door Reader Interface...............................................................................................16 5.3 Authentication Capability...........................................................................................16 5.4 Deployed Wiring ........................................................................................................17 5.5 Software Upgrades....................................................................................................17 5.6 Deployed Non-PIV PACS Cards and PIV Card Differences......................................17 6. The PIV Vision ...................................................................................................................19 6.1 Interoperability...........................................................................................................19 6.2 Qualities of the Complete Implementation.................................................................20 6.3 Benefits of the Complete Implementation..................................................................21 6.4 Infrastructure Requirements......................................................................................23 Page v Special Publication 800-116 A Recommendation for the Use of PIV Credentials in PACS 7. PIV Authentication Mechanisms......................................................................................24 7.1 Authentication Factors...............................................................................................24 7.1.1 Deployed Proximity or Magnetic Stripe Authentication..................................25 7.1.2 Visual (VIS) Authentication............................................................................25 7.1.3 Cardholder Unique Identifier (CHUID) Authentication ...................................25 7.1.4 Card Authentication Key (CAK) Authentication .............................................26 7.1.5 PIV Authentication Key (PKI) Authentication.................................................26 7.1.6 BIO Authentication.........................................................................................27 7.1.7 BIO-A Authentication .....................................................................................27 7.1.8 CAK + BIO(-A) Authentication .......................................................................28 7.2 Multi-Factor Authentication........................................................................................28 7.3 Selection of PIV Authentication Mechanisms............................................................28 7.4 PACS Registration ....................................................................................................32 7.5 Credential Validation and Path Validation .................................................................33 7.6 Lost PIV Card or Suspicion of Fraudulent Use..........................................................34 8. PACS Use Cases ...............................................................................................................36 8.1 Single-Tenant Facility................................................................................................37 8.2 Multi-Tenant Facility ..................................................................................................37 8.3 Mixed-Multi-Tenant Facility........................................................................................38 8.4 Single-Tenant Campus..............................................................................................39 8.4.1 FSL I or II Campus Facility ............................................................................39 8.4.2 FSL III Campus Facility..................................................................................40 8.4.3 FSL IV or V Campus Facility..........................................................................41 8.5 Multi-Tenant Campus ................................................................................................41