2120 P 07.2
2120 P 07.2
2120 P 07.2
PROCEDURE
1. PURPOSE
To implement security control requirements for the Identification and Authentication (IA)
control family, as identified in National Institute of Standards and Technology (NIST)
Special Publication (SP) 800-53, Revision 4, Security and Privacy Controls for Federal
Information Systems and Organizations.
3. AUDIENCE
The audience is all EPA employees, contractors, and all other users of EPA information
and information systems that support the operations and assets of the EPA.
4. BACKGROUND
Based on federal requirements and mandates, the EPA is responsible for ensuring that all
offices within the agency meet the minimum security requirements defined in the Federal
Information Processing Standards (FIPS) Publication 200, Minimum Security
Requirements for Federal Information and Information Systems. All EPA information
systems must meet the security requirements through the use of the security controls
defined in the NIST SP 800-53, Revision 4, Security and Privacy Controls for Federal
Information Systems and Organizations. This document addresses the procedures and
standards set forth by the EPA to implement the family of Identification and Authentication
controls.
Page 1
Information Security - Identification and Authentication Procedure
EPA Classification No.: CIO 2120-P-07.2 CIO Approval Date: 11/30/2015
CIO Transmittal No.: 16-002 Review Date: 11/30/2018
5. AUTHORITY
E-Government Act of 2002, Public Law 107-347, Title III, Federal Information Security
Management Act (FISMA) as amended
Federal Information Security Modernization Act of 2014, Public Law 113-283, chapter
35 of title 44, United States Code (U.S.C.)
Freedom of Information Act (FOIA), 5 U.S.C. 552, as amended by Public Law No.
104-231, 110 Stat. 3048, Electronic Freedom of Information Act Amendments of 1996
Clinger-Cohen Act of 1996, Public Law 104-106
Paperwork Reduction Act (44 USC 3501-3519), May 1995
Privacy Act of 1974 (5 USC 552a), as amended
Office of Management and Budget (OMB) Memorandum M-04-04, E-Authentication
Guidance for Federal Agencies, December 2003
OMB Memorandum M-05-24, Homeland Security Presidential Directive 12 (HSPD-12),
Policy for a Common Identification Standard for Federal Employees and Contractors,
August 2004
OMB Memorandum M-06-16, Protection of Sensitive Agency Information, June 2006
OMB Memorandum M-08-05, Implementation of Trusted Internet Connections (TIC),
November 2007
OMB Memorandum M-08-22, Guidance on the Federal Desktop Core Configuration
(FDCC), August 2008
OMB Memorandum M-14-04, Fiscal Year 2013 Reporting Instructions for the Federal
Information Security Management Act (FISMA) and Agency Privacy Management,
November 2013
Federal Information Processing Standards (FIPS) 140-2, Security Requirements for
Cryptographic Modules, May 2001
Federal Information Processing Standards (FIPS) 199, Standards for Security
Categorization of Federal Information and Information Systems, February 2004
Federal Information Processing Standards (FIPS) 200, Minimum Security
Requirements for Federal Information and Information Systems, March 2006
Federal Information Processing Standards (FIPS) 201-1, Personal Identity Verification
(PIV) of Federal Employees and Contractors, March 2006
EPA Information Security Program Plan
EPA Information Security Policy
EPA Information Security Roles and Responsibilities Procedures
CIO Policy Framework and Numbering System
Page 2
Information Security - Identification and Authentication Procedure
EPA Classification No.: CIO 2120-P-07.2 CIO Approval Date: 11/30/2015
CIO Transmittal No.: 16-002 Review Date: 11/30/2018
6. PROCEDURES
For the following section titles, the "IA" designator identified in each procedure represents
the NIST-specified identifier for the Identification and Authentication control family and the
number represents the control identifier, as identified in NIST SP 800-53, Revision 4,
Security and Privacy Controls for Federal Information Systems and Organizations.
Abbreviations including acronyms are summarized in Attachment A.
Note: Users include EPA employees, contractors, interns, and others that access EPA
information and information systems.
i) Users shall be uniquely identified and authenticated for all access other than those
accesses explicitly identified and documented as exceptions regarding permitted
actions without identification and authentication.
(1) Refer to the latest version of the EPA Information Security Access Control
Procedures for requirements on permitted actions without identification and
authentication.
(2) Unique identification of individuals in group accounts (e.g., shared privilege
accounts) may not be needed for detailed accountability of activity depending
upon risks. SOs shall base their recommendation to not use unique identifiers
for individuals in group accounts on a risk assessment.
b) Implement identification and authentication mechanisms at the application level, as
determined by a risk assessment, to provide increased security for the information
system and the information processes. This shall be in addition to identifying and
authenticating users at the information system level (e.g., when initially logging into a
desktop, laptop or smart phone).
c) Authenticate user identities through the use of passwords, personal identification
numbers (PINs), tokens, biometrics, or in the case of multifactor authentication, some
combination thereof.1
1 Multifactor authentication consists of factors of different types, e.g., for two-factor authentication, an acceptable combination
is where one is something you know (PIN) and one is something you have (PIV card). Two of the same factor types, e.g.,
both factors are something you know, is not two-factor.
Page 3
Information Security - Identification and Authentication Procedure
EPA Classification No.: CIO 2120-P-07.2 CIO Approval Date: 11/30/2015
CIO Transmittal No.: 16-002 Review Date: 11/30/2018
2 Assurance levels are defined in National Institute for Standards and Technology, Special Publication 800-63 rev 2.
3 Access to organizational information systems is defined as either local access or network access. Local access is any access to
organizational information systems by users (or processes acting on behalf of users) where such access is obtained by direct
connections without the use of networks. Network access is access to organizational information systems by users (or
processes acting on behalf of users) where such access is obtained through network connections (i.e., nonlocal accesses).
Page 4
Information Security - Identification and Authentication Procedure
EPA Classification No.: CIO 2120-P-07.2 CIO Approval Date: 11/30/2015
CIO Transmittal No.: 16-002 Review Date: 11/30/2018
accounts.
i) Techniques used to address this include protocols that use challenges (e.g.,
Transport Layer Security TLS), and time synchronous or challenge-response one-
time authenticators.
4 The Federal Risk and Authorization Management Program (FedRAMP) is a government-wide program that provides a
standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services.
Page 5
Information Security - Identification and Authentication Procedure
EPA Classification No.: CIO 2120-P-07.2 CIO Approval Date: 11/30/2015
CIO Transmittal No.: 16-002 Review Date: 11/30/2018
5 As defined in OMB issued Memorandum M-14-04, an e-authentication application is an application that meets the following
criteria: 1) Is web-based; 2) Requires authentication; and 3) Extends beyond the borders of the enterprise (e.g. multi-
agency, government-wide, or public facing). For additional e-authentication requirements, refer to NIST SP 800-63,
Electronic Authentication Guidance, at http://csrc.nist.gov/publications.
Page 6
Information Security - Identification and Authentication Procedure
EPA Classification No.: CIO 2120-P-07.2 CIO Approval Date: 11/30/2015
CIO Transmittal No.: 16-002 Review Date: 11/30/2018
be included (e.g., the system is a public site or the system does not require user
authentication).
vi) Technologies for E-Authentication shall be selected and implemented based on
technical guidance provided in NIST SP 800-63, Revision 2 as amended.
(1) Authenticators (e.g., passwords, randomly generated PINs, tokens, biometric,
and other authenticators) and the selected technologies shall comply with
Level 2, 3 or 4 requirements.
(2) Technology selection shall be based first on technology standards or approved
technologies within the EPAs approved technology and security architecture.
(3) If available technologies and mechanisms prove inadequate, alternatives that
are consistent with NIST guidance may be proposed.
vii) The guidance provided by NIST SP 800-63, Revision 2 shall apply to both local
and remote access to the information system.
(1) Remote access connections shall be both authenticated and authorized to be
accepted.
viii) Validation shall be conducted to ensure that the implemented system has met the
required assurance level.
c) Reassess the information system periodically, subsequent to the e-RA and in
accordance with requirements of the information systems life cycle stage and Security
Assessment and Authorization (SA&A) requirements, to determine technology refresh
requirements.
6 Note: An authentication process resists replay attacks if it is impractical to achieve a successful authentication by recording
and replaying a previous authentication message. Techniques used to address this include protocols that use challenges
(e.g., Transport Layer Security TLS), and time synchronous or challenge-response one-time authenticators.
Page 7
Information Security - Identification and Authentication Procedure
EPA Classification No.: CIO 2120-P-07.2 CIO Approval Date: 11/30/2015
CIO Transmittal No.: 16-002 Review Date: 11/30/2018
Network Authentication
Page 8
Information Security - Identification and Authentication Procedure
EPA Classification No.: CIO 2120-P-07.2 CIO Approval Date: 11/30/2015
CIO Transmittal No.: 16-002 Review Date: 11/30/2018
Page 9
Information Security - Identification and Authentication Procedure
EPA Classification No.: CIO 2120-P-07.2 CIO Approval Date: 11/30/2015
CIO Transmittal No.: 16-002 Review Date: 11/30/2018
7 User authenticators include, for example, tokens, Public Key Infrastructure (PKI) certificates, biometrics, passwords, and key
cards (smart cards).
Page 10
Information Security - Identification and Authentication Procedure
EPA Classification No.: CIO 2120-P-07.2 CIO Approval Date: 11/30/2015
CIO Transmittal No.: 16-002 Review Date: 11/30/2018
(1) Passwords shall have a minimum lifetime of one (1) day and a maximum
lifetime of 60 days.
(a) Passwords cannot be changed in less than one (1) day.
(2) Password reuse for a specific account is prohibited for 24 generations or four
(4) years.
(a) Password history shall be set with a history of at least 24 passwords, so a
user cannot quickly re-use a previous password.
vii) Authenticator content shall be protected from unauthorized disclosure and
modification.
viii) Users shall take reasonable and specific measures to safeguard authenticators.
(1) Users shall maintain possession of their individual authenticators, not loan or
share authenticators with others, and report lost or compromised
authenticators immediately to their supervisor and the EPA Call Center as a
security event.
(2) Devices shall be configured to safeguard authenticators (e.g., certificates,
passwords).
ix) Authenticators for shared group/role accounts shall be changed when membership
to those accounts changes.
Page 11
Information Security - Identification and Authentication Procedure
EPA Classification No.: CIO 2120-P-07.2 CIO Approval Date: 11/30/2015
CIO Transmittal No.: 16-002 Review Date: 11/30/2018
Page 12
Information Security - Identification and Authentication Procedure
EPA Classification No.: CIO 2120-P-07.2 CIO Approval Date: 11/30/2015
CIO Transmittal No.: 16-002 Review Date: 11/30/2018
Authenticators
Page 13
Information Security - Identification and Authentication Procedure
EPA Classification No.: CIO 2120-P-07.2 CIO Approval Date: 11/30/2015
CIO Transmittal No.: 16-002 Review Date: 11/30/2018
1) SOs, in coordination with ISOs, IMOs, IOs, ISSOs, CCPs, and SCAs, for EPA-operated
systems shall; and SMs, in coordination with IOs, ISOs, IMOs, ISSOs, CCPs, and SCAs,
for systems operated on behalf of the EPA, shall ensure service providers:
a) Employ mechanisms that satisfy NIST SP 800-63, Level 4 requirements for hardware
token-based authentication.
1) SOs, in coordination with ISOs, IMOs, IOs, ISSOs, CCPs, and SCAs, for EPA-operated
systems shall; and SMs, in coordination with IOs, ISOs, IMOs, ISSOs, CCPs, and SCAs,
for systems operated on behalf of the EPA, shall ensure service providers:
a) Ensure the information system obscures feedback of authentication information during
the authentication process to protect the information from possible exploitation or use
by unauthorized individuals.
i) Passwords shall be masked upon entry (e.g., displaying asterisks or dots when a
user types in a password) and not displayed in clear text.
Page 14
Information Security - Identification and Authentication Procedure
EPA Classification No.: CIO 2120-P-07.2 CIO Approval Date: 11/30/2015
CIO Transmittal No.: 16-002 Review Date: 11/30/2018
b) Ensure feedback from the information system does not provide information that would
allow an unauthorized user to compromise the authentication mechanism.
Page 15
Information Security - Identification and Authentication Procedure
EPA Classification No.: CIO 2120-P-07.2 CIO Approval Date: 11/30/2015
CIO Transmittal No.: 16-002 Review Date: 11/30/2018
Page 16
Information Security - Identification and Authentication Procedure
EPA Classification No.: CIO 2120-P-07.2 CIO Approval Date: 11/30/2015
CIO Transmittal No.: 16-002 Review Date: 11/30/2018
IA-11 Re-Authentication
Not selected as part of the control baseline.
7. RELATED DOCUMENTS
NIST Special Publications, 800 series
Page 17
Information Security - Identification and Authentication Procedure
EPA Classification No.: CIO 2120-P-07.2 CIO Approval Date: 11/30/2015
CIO Transmittal No.: 16-002 Review Date: 11/30/2018
d) Assist SOs and IOs with determining information systems security controls in
Page 18
Information Security - Identification and Authentication Procedure
EPA Classification No.: CIO 2120-P-07.2 CIO Approval Date: 11/30/2015
CIO Transmittal No.: 16-002 Review Date: 11/30/2018
implemented.
Users/Individuals
1) Users/individuals have the following responsibilities with respect to identification and
authentication:
a) Notify their supervisors immediately if they suspect their password, PIN, or other
authenticator has been compromised.
b) Report a known or potential security breach to the EPA Call Center.
c) Change a compromised password or request the EPA Call Center to reset or change
their password immediately.
Page 19
Information Security - Identification and Authentication Procedure
EPA Classification No.: CIO 2120-P-07.2 CIO Approval Date: 11/30/2015
CIO Transmittal No.: 16-002 Review Date: 11/30/2018
9. DEFINITIONS
Assurance for identity authentication, (1) the degree of confidence in the vetting
process used to establish the identity of the individual or device to which the credential
was issued, and (2) the degree of confidence that the individual or device that uses
the credential is the resource to which the credential was issued.
Authentication the process of verifying the identity of an individual, group, role,
process, or device, often as a prerequisite to allowing access to resources in an
information system.
Identity a unique name of an individual, group, role, or device. Since the legal names
of persons are not necessarily unique, the identity of a person must include sufficient
additional information (for example an address, or some unique identifier such as an
employee or account number) to make the complete name unique.
Local Access access to an organizational information system by a user (or process
acting on behalf of a user) where such access is obtained by direct connection without
the use of a network.
Multifactor Authentication the process of using two or more different factors for
verifying identity. Factors are typically categorized as something you know (e.g., a
password), something you have (e.g., a token), and something you are (e.g., a
biometric).
Network Access access to an organizational information system by a user, or
process acting on behalf of a user, where such access is obtained through a network
connection.
Non-Organizational Users all information system users other than organizational
users explicitly covered by IA-2.
Organizational Users organizational employees or individuals the organization deems
to have equivalent status of employees (e.g., contractors, guest researchers,
individuals from allied nations).
Remote Access a type of network access that involves communication through an
external network (e.g., the Internet).
Signature (of an individual) a mark or sign made by an individual to signify
knowledge, approval, acceptance or obligation (can be accomplished manually,
sometimes referred to as a wet signature, or electronically).
Written (or in writing) to officially document the action or decision, either manually or
electronically, and includes a signature.
10. WAIVERS
Waivers may be requested from the CIO by submitting a justification based on:
Substantive business case need(s)
Page 20
Information Security - Identification and Authentication Procedure
EPA Classification No.: CIO 2120-P-07.2 CIO Approval Date: 11/30/2015
CIO Transmittal No.: 16-002 Review Date: 11/30/2018
Ann Dunkin
Chief Information Officer
U.S. Environmental Protection Agency
Page 21
APPENDIX A: ACRONYMS & ABBREVIATIONS
Page 22