[cabfpub] Ballot 221 v3: Two-Factor Authentication and Password Improvements
Tim Hollebeek
tim.hollebeek at digicert.com
Thu May 17 21:44:59 UTC 2018
Yup, and if we could get an expedited change on this one after the ballot passes and comes into force, that would be great 😊
-Tim
From: Public [mailto:public-bounces at cabforum.org] On Behalf Of Ryan Sleevi via Public
Sent: Thursday, May 17, 2018 5:18 PM
To: Patrick Tronnier <Patrick.Tronnier at oati.net>; CA/Browser Forum Public Discussion List <public at cabforum.org>
Subject: Re: [cabfpub] Ballot 221 v3: Two-Factor Authentication and Password Improvements
The doc you just cited is based on the BRs and Network Security requirements, so yes, as the BR and Network Security requirements change, we generally see WebTrust change ;)
On Thu, May 17, 2018 at 5:05 PM, Patrick Tronnier via Public <public at cabforum.org <mailto:public at cabforum.org> > wrote:
Thanks Eric.
I would also like to point out that WEBTRUST PRINCIPLES AND CRITERIA FOR CERTIFICATION AUTHORITIES –SSLBASELINE WITH NETWORK SECURITY Version 2.3, which was updated in February 2018, (http://www.webtrust.org/principles-and-criteria/docs/item85437.PDF) requires passwords to be changed every 3 months. Hopefully webTrust will adjust to the NIST guidelines also.
Thanks
With kind regards,
Patrick Tronnier
Principal Security Architect &
Sr. Director of Quality Assurance & Customer Support
Phone: 763.201.2000
Direct Line: 763.201.2052
Open Access Technology International, Inc.
3660 Technology Drive NE, Minneapolis, MN
CONFIDENTIAL INFORMATION: This email and any attachment(s) contain confidential and/or proprietary information of Open Access Technology International, Inc. Do not copy or distribute without the prior written consent of OATI. If you are not a named recipient to the message, please notify the sender immediately and do not retain the message in any form, printed or electronic.
From: Eric Mill [mailto:eric.mill at gsa.gov <mailto:eric.mill at gsa.gov> ]
Sent: Thursday, May 17, 2018 10:43 AM
To: Geoff Keating <geoffk at apple.com <mailto:geoffk at apple.com> >; CA/Browser Forum Public Discussion List <public at cabforum.org <mailto:public at cabforum.org> >
Cc: Patrick Tronnier <Patrick.Tronnier at oati.net <mailto:Patrick.Tronnier at oati.net> >
Subject: Re: [cabfpub] Ballot 221 v3: Two-Factor Authentication and Password Improvements
{External email message: This email is from an external source. Please exercise caution prior to opening attachments, clicking on links, or providing any sensitive information.}
FedRAMP has published guidance about the new NIST password/identity guidelines:
https://www.fedramp.gov/assets/resources/documents/CSP_Digital_Identity_Requirements.pdf
They note that the formal baseline is still not updated, but encourage folks to follow NIST's new guidance regardless:
NOTE: At the time of this document’s publication, FedRAMP Moderate and High controls IA-5 (g)
and IA-5 (1) (a,d) are known to be more restrictive than the new password requirements in 800-
63B, AAL2 and AAL3 respectively. FedRAMP recommends Agency AOs accept compliance with
NIST’s guidance that is most up-to-date and consistent with current cyber security threats. This
may be done using an implementation status of “Alternative Implementation.”
I also confirmed with the FedRAMP program that the baseline is expected to be updated to match NIST's SP 800-63, and thus avoid the need for any special acceptance. But the point is that FedRAMP is not an obstacle to dropping password rotation -- they are expecting service providers to follow NIST's guidance and drop it.
-- Eric
On Tue, May 15, 2018 at 6:48 PM, Geoff Keating via Public <public at cabforum.org <mailto:public at cabforum.org> > wrote:
> On May 15, 2018, at 8:37 AM, Patrick Tronnier via Public <public at cabforum.org <mailto:public at cabforum.org> > wrote:
>
> I want to make it clear that OATI agrees with the minimum 2 year password period as the more secure route. It is FedRAMP and other standards which don’t. J
I've been looking at FedRAMP, because I was surprised they'd be putting out guidelines that conflict with NIST guidelines, and I can't find this requirement; for the 'high security controls' (https://www.fedramp.gov/assets/resources/documents/FedRAMP_High_Security_Controls.xlsx), it does require you have a minimum and maximum password lifetime in IA-05(1)(d), but it says the actual limits are organization-defined, so you can ask the organization to set the maximum lifetime to, say, 3 years.
_______________________________________________
Public mailing list
Public at cabforum.org <mailto:Public at cabforum.org>
https://cabforum.org/mailman/listinfo/public
--
Eric Mill
Senior Advisor, Technology Transformation Services
Federal Acquisition Service, GSA
eric.mill at gsa.gov <mailto:eric.mill at gsa.gov> , +1-617-314-0966
_______________________________________________
Public mailing list
Public at cabforum.org <mailto:Public at cabforum.org>
https://cabforum.org/mailman/listinfo/public
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.cabforum.org/pipermail/public/attachments/20180517/033f030a/attachment-0003.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image001.png
Type: image/png
Size: 16821 bytes
Desc: not available
URL: <http://lists.cabforum.org/pipermail/public/attachments/20180517/033f030a/attachment-0003.png>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 4940 bytes
Desc: not available
URL: <http://lists.cabforum.org/pipermail/public/attachments/20180517/033f030a/attachment-0003.p7s>
More information about the Public
mailing list