Announcing Approval of Federal Information Processing Standard (FIPS) Publication 201-2, Personal Identity Verification (PIV) of Federal Employees and Contractors, 54626-54629 [2013-21491]

Download as PDF 54626 Federal Register / Vol. 78, No. 172 / Thursday, September 5, 2013 / Notices Dated: August 29, 2013. Gary Taverman, Senior Advisor for Antidumping and Countervailing Duty Operations. withdrew its request for an administrative review. Rescission, in Part Pursuant to 19 CFR 351.213(d)(1), the Secretary will rescind an administrative review, in whole or in part, if a party that requested the review withdraws the request within 90 days of the date of publication of the notice of initiation of the requested review. Laiwu’s withdrawal was submitted within the 90-day period and, thus, is timely. Because Laiwu’s withdrawal request was timely and no other party requested a review of Laiwu, the Department is rescinding this review with respect to Laiwu, in accordance with 19 CFR 351.213(d)(1). The Department will continue to conduct the CVD administrative review of RZBC. Assessment Notification Regarding Administrative Protective Orders ehiers on DSK2VPTVN1PROD with NOTICES BILLING CODE 3510–DS–P DEPARTMENT OF COMMERCE National Institute of Standards and Technology [Docket No. 130402311–3311–01] Announcing Approval of Federal Information Processing Standard (FIPS) Publication 201–2, Personal Identity Verification (PIV) of Federal Employees and Contractors National Institute of Standards and Technology (NIST), Commerce. ACTION: Notice. AGENCY: This notice announces the Secretary of Commerce’s approval of Federal Information Processing Standard (FIPS) Publication 201–2, Personal Identity Verification (PIV) of Federal Employees and Contractors. FIPS 201–2 includes clarifications to existing text, additional text in cases where there were ambiguities, adaptation to changes in the environment since the publication of FIPS 201–1, and specific changes requested by Federal agencies and implementers. DATES: FIPS 201–2 is effective on September 5, 2013. ADDRESSES: FIPS 201–2 is available electronically from the NIST Web site at: https://csrc.nist.gov/publications/ PubsFIPS.html. Comments that were received on the proposed changes will also be published electronically at https://csrc.nist.gov/groups/SNS/piv/ index.html. FOR FURTHER INFORMATION CONTACT: Hildegard Ferraiolo, (301) 975–6972, National Institute of Standards and Technology, 100 Bureau Drive, Mail Stop 8930, Gaithersburg, MD 20899– 8930, email: hildegard.ferraiolo@ nist.gov, or David Cooper, (301) 975– 3194, david.cooper@nist.gov. SUPPLEMENTARY INFORMATION: FIPS 201 was issued on April 8, 2005 (70 FR 17975) in response to Homeland Security Presidential Directive 12 (HSPD–12), and in accordance with NIST policy was due for review in 2010. In consideration of technological advancements over the last five years and specific requests for changes from United States Government (USG) stakeholders, NIST determined that a revision of FIPS 201–1 (version in SUMMARY: The Department will instruct U.S. Customs and Border Protection (CBP) to assess CVDs on all appropriate entries. Laiwu shall be assessed CVDs at rates equal to the cash deposit of estimated CVDs required at the time of entry, or withdrawal from warehouse, for consumption, during the period January 1, 2012, through December 31, 2012, in accordance with 19 CFR 351.212(c)(1)(i). The Department intends to issue appropriate assessment instructions directly to CBP 15 days after publication of this notice. This notice serves as a reminder to parties subject to administrative protective orders (APOs) of their responsibility concerning the return or destruction of proprietary information disclosed under APO in accordance with 19 CFR 351.305, which continues to govern business proprietary information in this segment of the proceeding. Timely written notification of the return/destruction of APO materials or conversion to judicial protective order is hereby requested. Failure to comply with the regulations and terms of an APO is a violation which is subject to sanction. This notice is issued and published in accordance with section 777(i)(1) of the Tariff Act of 1930, as amended, and 19 CFR 351.213(d)(4). Request for Revocation in Part, 78 FR 38924 (June 28, 2013). VerDate Mar<15>2010 [FR Doc. 2013–21645 Filed 9–4–13; 8:45 am] 14:10 Sep 04, 2013 Jkt 229001 PO 00000 Frm 00010 Fmt 4703 Sfmt 4703 effect) was warranted. NIST received numerous change requests, some of which, after analysis and coordination with the Office of Management and Budget (OMB) and USG stakeholders, were incorporated in a proposed draft of FIPS 201–2 (‘‘2011 Draft’’). Other change requests incorporated in the 2011 Draft resulted from the 2010 Business Requirements Meeting held at NIST. The meeting focused on business requirements of federal departments and agencies. On March 8, 2011, a notice was published in the Federal Register (76 FR 12712), soliciting public comments on the 2011 Draft. During the public comment period, a public workshop was held at NIST on April 18–19, 2011, in order to present the 2011 Draft. Comments and questions regarding the 2011 Draft were submitted by 46 entities, composed of 25 U.S. federal government organizations, two state government organizations, one foreign government organization, 16 private sector organizations, and two private individuals. NIST made significant changes to the 2011 Draft based on the public comments received. On July 9, 2012, NIST published a notice in the Federal Register (77 FR 40338) announcing the Revised Draft FIPS 201–2 (‘‘2012 Revised Draft’’), which incorporated the changes from the 2011 Draft, based on the received public comments, and solicited comments on the revised draft standard. Comments and questions on the 2012 Revised Draft were submitted by 36 entities, composed of 16 U.S. federal government organizations, 19 private sector organizations, and one private individual. All comments received in response to both Federal Register notices have been made available by NIST at https://csrc.nist.gov. None of the commenters opposed the approval of a revised standard. Many commenters asked for clarification of the text of the standard and/or recommended editorial and/or formatting changes. Other commenters suggested modifying the requirements and asked questions concerning the implementation of the standard. All of the suggestions, questions, and recommendations within the scope of this FIPS were carefully reviewed, and changes were made to the standard, where appropriate. Some commenters submitted questions or raised issues that were related but outside the scope of this FIPS. Comments that were outside the scope of this FIPS, but that were within the scope of one of the related Special Publications, were deferred for later consideration in the context of the revisions to the Special Publications. E:\FR\FM\05SEN1.SGM 05SEN1 ehiers on DSK2VPTVN1PROD with NOTICES Federal Register / Vol. 78, No. 172 / Thursday, September 5, 2013 / Notices The disposition of each comment that was received has been provided along with the comments at https:// csrc.nist.gov. The following is a summary and analysis of the comments received during the public comment period, and NIST’s responses to them, including the interests, concerns, recommendations, and issues considered in the development of FIPS 201–2: Comment: Four commenters questioned the concept of backward compatibility as described in Section 1.3, Change Management, of the 2012 Revised Draft. They suggested that the Change Management section should not be restricted to the effects of changes to the Standard on PIV Cards but also address the effects of change to PIV systems and sub-components. Other commenters questioned whether any change to the Standard could be considered backward compatible. Response: The Change Management section provides change management principles and guidelines to implementers of relying systems to manage newly introduced changes and modifications to the previous version of this Standard. In this context, changes to the Standard that do not necessitate changes to existing relying systems are considered to be backward compatible. Comment: Two Federal agencies were concerned about their ability to implement the Standard with the indicated implementation schedule specified in the Standard. Response: Issues concerning the Standard’s implementation schedule have been referred to OMB. Comment: Three commenters proposed that the procedures for PIV Card renewal and reissuance be combined. Response: The Standard combines the two sections on PIV Card renewal and reissuance into one section called ‘‘Reissuance.’’ It addresses all instances in which a new PIV Card is issued to an existing cardholder without repeating the entire identity proofing and registration process. Comment: Two commenters proposed adding a PIV-Interoperable (PIV–I) Card as a valid identity source document. Response: The Standard does not list a PIV–I Card as an acceptable form of identity source documentation because it is not guaranteed to be a Federal or State government issued form of identification. Comment: One commenter requested that the Standard prohibit the long-term storage of biometric data. Response: FIPS 201–2 does not require the long-term storage of biometric data. However, PIV Card VerDate Mar<15>2010 14:10 Sep 04, 2013 Jkt 229001 maintenance processes, such as reissuance, may be performed more efficiently if biometric data is maintained. Efficiency is a stated goal of HSPD–12. Comment: The 2012 Revised Draft states that if the biometric data for the background investigation and the biometric data for the PIV Card are collected on separate occasions, then during the second visit, a one-to-one biometric match of the applicant must be performed against the biometric data collected during the first visit. One commenter requested to remove the requirement for the one-to-one biometric match during the second visit, and that any requirements for one-toone biometric matches begin after the biometric data for the PIV Card has been collected. Response: In order to satisfy the control objectives of HSPD–12, it is necessary to verify that the biometric data for the background investigation was collected from the person to whom the PIV Card will be issued. A one-toone biometric comparison is therefore required. Comment: The 2012 Revised Draft imposes requirements to revoke the PIV Card under certain circumstances. Two commenters noted that the Standard should be more specific about the process for PIV Card revocation. One commenter also requested that the requirement to revoke the PIV Authentication and Card Authentication certificates during PIV Card termination be eliminated when the PIV Card is terminated for benign reasons. Response: The text has been reorganized to clearly indicate the steps required to revoke a PIV Card. These steps include collecting and destroying the PIV card, if possible, and updating any databases maintained by the PIV Card issuer to reflect the change in status. Additionally, the requirements for certificate revocation during PIV Card termination have been relaxed. At PIV Card termination, revocation of the PIV Authentication and Card Authentication certificates is limited to cases where the PIV Card cannot be collected and destroyed. Comment: One commenter indicated that a PIV derived credential on a mobile device should be revoked when the PIV Card’s PIV Authentication certificate is revoked or expires. Response: The PIV Authentication certificate on a PIV Card is revoked when the PIV Card is lost or stolen. If the cardholder is eligible for a replacement PIV Card, the revocation of the derived credential would preclude the cardholder from using the derived credential to gain logical access to PO 00000 Frm 00011 Fmt 4703 Sfmt 4703 54627 federally controlled information systems as an interim measure while waiting for a new PIV Card to be issued. Nothing in the Standard, however, prevents an agency from requiring its derived credential issuer to revoke a derived credential when the PIV Authentication certificate is revoked or expires. Comment: The Standard includes a new feature to remotely reset the PIV Card’s Personal Identification Number (PIN). One commenter suggested that the requirement to perform a biometric match as part of a remote PIN reset is too restrictive and should be removed. Response: Removing the requirement to perform a biometric match from the remote PIN reset procedure would weaken the multi-factor authentication provided by the PIV Card. A biometric match is therefore required for all PIN reset procedures, regardless of whether the reset is performed in-person at an issuer’s facility, at an unattended issueroperated kiosk, or remotely from a general computing platform. Comment: After publication of the Standard, SP 800–104, A Scheme for PIV Visual Card Topography, will be withdrawn, since all information of the Special Publication has been incorporated in the Standard. One commenter requested that the visual color scheme requirement from Special Publication 800–104, be made optional in FIPS 201–2 so that Federal departments and agencies with a need to distinguish between U.S. citizens and foreign nationals could use the color scheme on the PIV Card of their employees and contractors, while other Federal departments and agencies without the need to visually distinguish between U.S. citizens and foreign nationals could issue PIV Cards without the distinction. Response: The color scheme will remain mandatory in FIPS 201–2 because departments and agencies are required to accept PIV Cards issued by other Federal agencies, as directed by HSPD–12. Departments and agencies with a need to visually identify foreign nationals need the color scheme to be present on all PIV Cards, not just the PIV Cards that they issue. Comment: Two commenters requested that a fourth category be added to the PIV Card’s visual color scheme for employee affiliation or that the category for ‘‘contractor’’ be changed to ‘‘nongovernment employee.’’ Response: HSPD–12 establishes the scope for the Standard as ‘‘forms of identification issued by the Federal Government to its employees and contractors (including contractor employees).’’ With the scope established in HSPD–12, it would not be E:\FR\FM\05SEN1.SGM 05SEN1 ehiers on DSK2VPTVN1PROD with NOTICES 54628 Federal Register / Vol. 78, No. 172 / Thursday, September 5, 2013 / Notices appropriate for the Standard to address employee affiliation color-codes other than employees and contractors. Comment: Two commenters requested that the optional tactile markers on the PIV Card be more precisely defined. Response: The two zones that are specified for tactile markers are intended to provide optional placement of orientation markers as a possible response to achieve Section 508 compliance. The implementation of tactile markers on PIV Cards should be coordinated with card manufacturers/ vendors. Comment: Three commenters expressed concern that the PIV Card’s fingerprint reference data used for oncard biometric authentication and the PIV Card’s fingerprint reference data used for off-card biometric authentication should not originate from the same anatomical fingers. The commenters noted that an attacker may maliciously obtain the PIV Card’s fingerprint reference data during an offcard biometric authentication event. With the harvested reference data and with a malware injected computing platform, other attacks can be staged to target applications that use the on-card authentication mechanisms. Response: Section 4.4.4 of the Standard stresses the need for general good practices to mitigate malicious code threats. In addition to general good practice, the Standard allows the fingerprint reference data to originate from a different finger. Additionally, NIST Special Publication 800–76–2 will clarify the usability versus security trade off associated with a possible confusion about which finger to present at an authentication event. Comment: Four commenters noted that 2012 Revised Draft allows for use of the electronic facial image as an option for authentication in operatorattended PIV Card issuance and reissuance processes but does not extend its use as an authentication mechanism in physical access control environments. Response: Comparison of electronic facial images depends on carefully controlled environments with controls to camera height and lighting. These controls are not consistently found in general purpose physical access control environments. This Standard therefore limits facial recognition as a costefficient and optional authentication mechanism for PIV Card issuance, reissuance and verification data reset processes where the environment is controllable. FIPS 201–2 offers fingerprint biometric and iris recognition for general-purpose physical access control environments, as both VerDate Mar<15>2010 14:10 Sep 04, 2013 Jkt 229001 mechanisms provide better accuracy, security, and speed. Comment: Technical issues were raised by three commenters concerning the need for a person identifier to be present on the PIV Card. The commenters stated that without a person identifier, access control systems are required to re-provision cardholders each time a cardholder replaces his or her card. A person identifier, however, alleviates re-provisioning by providing a persistent identifier for the access control systems to recognize a cardholder with a new PIV Card. Response: An optional person identifier will be proposed in the Standard’s associated publication, Special Publication 800–73. Comment: Issues were raised by two commenters about the PIV Card’s cryptographic keys that are used in authentication and digital signatures. The commenters pointed out that a PIV Card issuer should have the flexibility to generate the PIV Authentication key, the Card Authentication key, and Digital Signature key off-card. Response: Because the authentication mechanism used with the asymmetric Card Authentication key provides only some confidence in the cardholder’s identity, off-card generation and import of this key, is allowed by the Standard. For the PIV Authentication key and Digital Signature key, however, on-card generation of the keys remains a requirement because an off-card generation of these keys adversely affects the perceived level of assurance in the cardholder’s identity. Comment: Three commenters requested that the PIV Card’s secure messaging feature and its virtual contact interface be made mandatory as soon as possible for the many beneficial features that they enable. Response: While there has been significant demand for the inclusion of secure messaging and the virtual contact interface in the Standard, some Federal departments and agencies have expressed concerns about the risks of adopting this technology. Therefore, it is appropriate to allow individual agencies to make a risk-based decision as to whether to include these technologies in their PIV Cards. Comment: Two commenters requested that specific requirements for the public key infrastructure (PKI) be addressed in the ‘‘X.509 Certificate Policy For The U.S. Federal Common Policy Framework’’ rather than in the Standard, in order to allow for the requirements to be modified to accommodate new and emerging technologies. PO 00000 Frm 00012 Fmt 4703 Sfmt 4703 Response: As the scope of the Common Policy is not limited to PIV Cards, the Standard needs to include information about which certificate policies may be used to issue the different types of certificates needed for PIV Cards, as well as other PIV-specific information. Care has been taken to ensure that any PKI-related requirements specified in FIPS 201–2 are unlikely to change before the next revision of the Standard. Comment: Three commenters requested that the Standard either allow or require the use of a content signingspecific certificate policy Object Identifier (OID) in certificates issued to entities that sign data objects on PIV Cards. Response: Sections 4.2.1 and 4.2.3.2 now require that after a transition period, certificates used to sign data objects on PIV Cards shall assert a content signing-specific policy OID from the ‘‘X.509 Certificate Policy For The U.S. Federal Common Policy Framework.’’ Comment: Three commenters noted that the 2012 Revised Draft describes authentication mechanisms that utilize the PIV Card and requested that the Standard indicate that agencies may choose to use other authentication mechanisms that are not applicable to the Standard. Response: OMB has oversight of agency implementation of the Standard. Thus, it is not suitable for FIPS 201–2 to indicate that agencies are permitted to implement authentication mechanisms other than those described in FIPS 201–2. Comment: The 2012 Revised Draft lowers the assurance level of the Cardholder Unique Identifier (CHUID) authentication mechanism from some confidence in the identity of the cardholder to little or no confidence, and deprecates its use. Two commenters indicated that Federal departments and agencies have been working to enable their physical access control systems to use the CHUID authentication mechanism and suggested that the authentication mechanism should continue to be described as providing some confidence, and its use should not be deprecated. Response: In order for an authentication mechanism to provide some confidence in the identity of the cardholder, it would have to align with the requirements comparable to those specified for E-Authentication Level 2 of NIST Special Publication 800–63–1. The CHUID authentication mechanism does not satisfy these requirements. It is, therefore, appropriate to describe the authentication mechanism as providing E:\FR\FM\05SEN1.SGM 05SEN1 Federal Register / Vol. 78, No. 172 / Thursday, September 5, 2013 / Notices little or no confidence in the identity of the cardholder and to deprecate its use in authentication events. Revised FIPS 201–2 is available electronically from the NIST Web site at: https://csrc.nist.gov/publications/ PubsFIPS.html. Authority: In accordance with the Information Technology Management Reform Act of 1996 (Pub. L. 104–106) and the Federal Information Security Management Act (FISMA) of 2002 (Pub. L. 107–347), the Secretary of Commerce is authorized to approve Federal Information Processing Standards (FIPS). Homeland Security Presidential Directive (HSPD) 12, entitled ‘‘Policy for a Common Identification Standard for Federal Employees and Contractors,’’ dated August 27, 2004, directed the Secretary of Commerce to promulgate, by February 27, 2005, ‘‘. . . a Federal Standard for secure and reliable forms of identification (the ‘Standard’) . . . ,’’ and further directed that the Secretary of Commerce ‘‘shall periodically review the Standard and update the Standard as appropriate in consultation with the affected agencies.’’ E.O. 12866: This notice has been determined not to be significant for the purposes of E.O. 12866. Dated: August 28, 2013. Willie E. May, Associate Director for Laboratory Programs. [FR Doc. 2013–21491 Filed 9–4–13; 8:45 am] BILLING CODE 3510–13–P DEPARTMENT OF COMMERCE National Oceanic and Atmospheric Administration RIN 0648–XC848 Fisheries of the Exclusive Economic Zone Off Alaska; American Fisheries Act, Amendment 80 Program, Western Alaska Community Development Quota Program, Freezer Longline Cooperative; Public Workshop National Marine Fisheries Service (NMFS), National Oceanic and Atmospheric Administration (NOAA), Commerce. ACTION: Notice of public workshop. AGENCY: NMFS announces a workshop to solicit input from participants in the pollock fishery in the Bering Sea authorized under the American Fisheries Act (AFA), the Aleutian Islands pollock fishery, the Amendment 80 trawl fisheries in the Bering Sea and Aleutian Islands, the Western Alaska Community Development Quota (CDQ) Program, and the hook-and-line catcher/ processor (freezer longline) Pacific cod fishery in the Bering Sea and Aleutian Islands. The workshop will address: (1) The applicability of cost recovery fees ehiers on DSK2VPTVN1PROD with NOTICES SUMMARY: VerDate Mar<15>2010 14:10 Sep 04, 2013 Jkt 229001 mandated under section 304(d)(2) of the Magnuson-Stevens Fishery Conservation and Management Act (Magnuson-Stevens Act) to the AFA, Aleutian Islands pollock fishery, Amendment 80 Program, CDQ Program, and the freezer longline Pacific cod fishery in the Bering Sea and Aleutian Islands; (2) an overview of the potential impacts of cost recovery programs; and (3) an overview of proposed regulatory approaches to implement cost recovery programs. The meeting is open to the public, but NMFS is particularly seeking participation by people who are knowledgeable about the AFA, Aleutian Islands pollock fishery, Amendment 80, CDQ Program, and the freezer longline Pacific cod fishery in the Bering Sea and Aleutian Islands and who can discuss with NMFS the potential impacts of cost recovery programs and proposed regulatory approaches. DATES: The workshop will be held on Friday, September 20, 2013, from 9 a.m. to 12 p.m. Pacific daylight savings time. ADDRESSES: The workshop will be held at the Nordby Conference Center, 3919 18th Avenue, Fishermen’s Terminal, Seattle, WA 98199. FOR FURTHER INFORMATION CONTACT: Darrell Brannan, 352–562–4388, or Glenn Merrill, 907–586–7228. SUPPLEMENTARY INFORMATION: The meeting will address several issues regarding the proposed cost recovery fee that are of interest to stakeholders and will provide an opportunity for those individuals to comment. Issues to be addressed include: • Why the cost recovery fee would be implemented and under what authority; • Why these fisheries would be included in the proposed program and not others; • How costs would be determined, how they would be used, and what they are estimated to be, given current information; • What landings would be subject to a cost recovery fee; • How the standard ex-vessel price would be determined for each species subject to the fee; • Who would be responsible for payment of the fee liability; • The timeframe for implementation; and • The role of the North Pacific Fishery Management Council (Council) in this process. NMFS plans to present a draft analysis of the potential effects of cost recovery fee programs to the Council at its meeting scheduled from September 30 through October 8 in Anchorage, AK. The workshop will provide stakeholders information before the Council meeting PO 00000 Frm 00013 Fmt 4703 Sfmt 4703 54629 so that they have the opportunity to present any concerns to the Council and NMFS. Input from the public received at these workshops and the Council will help inform NMFS as it prepares proposed regulations pursuant to section 305(d) of the Magnuson-Stevens Act. This meeting is open to the public, but NMFS is particularly seeking participation by people who are knowledgeable about the AFA, Aleutian Islands pollock fishery, Amendment 80 Program, CDQ Program, and the freezer longline Pacific cod fishery in the Bering Sea and Aleutian Islands. Special Accommodations The meeting will be physically accessible to people with disabilities. Requests for sign language interpretation or other auxiliary aids should be directed to Glenn Merrill, 907–586–7228, at least 10 workdays prior to the meeting date. Authority: 16 U.S.C. 1801 et seq. Dated: August 30, 2013. Kelly Denit, Acting Deputy Director, Office of Sustainable Fisheries, National Marine Fisheries Service. [FR Doc. 2013–21617 Filed 9–4–13; 8:45 am] BILLING CODE 3510–22–P CONSUMER FINANCIAL PROTECTION BUREAU Consumer Advisory Board meeting Bureau of Consumer Financial Protection. ACTION: Notice of public meeting. AGENCY: This notice sets forth the announcement of a public meeting of the Consumer Advisory Board (‘‘CAB’’ or ‘‘Board’’) of the Consumer Financial Protection Bureau (Bureau). The notice also describes the functions of the Board. Notice of the meeting is permitted by section 5 of the CAB Charter and is intended to notify the public of this meeting. Specifically: Section X of the CAB Charter states: (1) Each meeting of the Board shall be open to public observation, to the extent that a facility is available to accommodate the public, unless the Bureau, in accordance with paragraph (4) of this section, determines that the meeting shall be closed. The Bureau also will make reasonable efforts to make the meetings available to the public through live web streaming. (2) Notice of the time, place and purpose of each meeting, as well as a summary of the proposed agenda, shall be published in the Federal Register not more than 45 SUMMARY: E:\FR\FM\05SEN1.SGM 05SEN1

Agencies

[Federal Register Volume 78, Number 172 (Thursday, September 5, 2013)]
[Notices]
[Pages 54626-54629]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2013-21491]


-----------------------------------------------------------------------

DEPARTMENT OF COMMERCE

National Institute of Standards and Technology

[Docket No. 130402311-3311-01]


Announcing Approval of Federal Information Processing Standard 
(FIPS) Publication 201-2, Personal Identity Verification (PIV) of 
Federal Employees and Contractors

AGENCY: National Institute of Standards and Technology (NIST), 
Commerce.

ACTION: Notice.

-----------------------------------------------------------------------

SUMMARY: This notice announces the Secretary of Commerce's approval of 
Federal Information Processing Standard (FIPS) Publication 201-2, 
Personal Identity Verification (PIV) of Federal Employees and 
Contractors. FIPS 201-2 includes clarifications to existing text, 
additional text in cases where there were ambiguities, adaptation to 
changes in the environment since the publication of FIPS 201-1, and 
specific changes requested by Federal agencies and implementers.

DATES: FIPS 201-2 is effective on September 5, 2013.

ADDRESSES: FIPS 201-2 is available electronically from the NIST Web 
site at: https://csrc.nist.gov/publications/PubsFIPS.html. Comments that 
were received on the proposed changes will also be published 
electronically at https://csrc.nist.gov/groups/SNS/piv/.

FOR FURTHER INFORMATION CONTACT: Hildegard Ferraiolo, (301) 975-6972, 
National Institute of Standards and Technology, 100 Bureau Drive, Mail 
Stop 8930, Gaithersburg, MD 20899-8930, email: 
hildegard.ferraiolo@nist.gov, or David Cooper, (301) 975-3194, 
david.cooper@nist.gov.

SUPPLEMENTARY INFORMATION: FIPS 201 was issued on April 8, 2005 (70 FR 
17975) in response to Homeland Security Presidential Directive 12 
(HSPD-12), and in accordance with NIST policy was due for review in 
2010. In consideration of technological advancements over the last five 
years and specific requests for changes from United States Government 
(USG) stakeholders, NIST determined that a revision of FIPS 201-1 
(version in effect) was warranted. NIST received numerous change 
requests, some of which, after analysis and coordination with the 
Office of Management and Budget (OMB) and USG stakeholders, were 
incorporated in a proposed draft of FIPS 201-2 (``2011 Draft''). Other 
change requests incorporated in the 2011 Draft resulted from the 2010 
Business Requirements Meeting held at NIST. The meeting focused on 
business requirements of federal departments and agencies. On March 8, 
2011, a notice was published in the Federal Register (76 FR 12712), 
soliciting public comments on the 2011 Draft. During the public comment 
period, a public workshop was held at NIST on April 18-19, 2011, in 
order to present the 2011 Draft. Comments and questions regarding the 
2011 Draft were submitted by 46 entities, composed of 25 U.S. federal 
government organizations, two state government organizations, one 
foreign government organization, 16 private sector organizations, and 
two private individuals. NIST made significant changes to the 2011 
Draft based on the public comments received.
    On July 9, 2012, NIST published a notice in the Federal Register 
(77 FR 40338) announcing the Revised Draft FIPS 201-2 (``2012 Revised 
Draft''), which incorporated the changes from the 2011 Draft, based on 
the received public comments, and solicited comments on the revised 
draft standard. Comments and questions on the 2012 Revised Draft were 
submitted by 36 entities, composed of 16 U.S. federal government 
organizations, 19 private sector organizations, and one private 
individual. All comments received in response to both Federal Register 
notices have been made available by NIST at https://csrc.nist.gov. None 
of the commenters opposed the approval of a revised standard. Many 
commenters asked for clarification of the text of the standard and/or 
recommended editorial and/or formatting changes. Other commenters 
suggested modifying the requirements and asked questions concerning the 
implementation of the standard. All of the suggestions, questions, and 
recommendations within the scope of this FIPS were carefully reviewed, 
and changes were made to the standard, where appropriate. Some 
commenters submitted questions or raised issues that were related but 
outside the scope of this FIPS. Comments that were outside the scope of 
this FIPS, but that were within the scope of one of the related Special 
Publications, were deferred for later consideration in the context of 
the revisions to the Special Publications.

[[Page 54627]]

The disposition of each comment that was received has been provided 
along with the comments at https://csrc.nist.gov.
    The following is a summary and analysis of the comments received 
during the public comment period, and NIST's responses to them, 
including the interests, concerns, recommendations, and issues 
considered in the development of FIPS 201-2:
    Comment: Four commenters questioned the concept of backward 
compatibility as described in Section 1.3, Change Management, of the 
2012 Revised Draft. They suggested that the Change Management section 
should not be restricted to the effects of changes to the Standard on 
PIV Cards but also address the effects of change to PIV systems and 
sub-components. Other commenters questioned whether any change to the 
Standard could be considered backward compatible.
    Response: The Change Management section provides change management 
principles and guidelines to implementers of relying systems to manage 
newly introduced changes and modifications to the previous version of 
this Standard. In this context, changes to the Standard that do not 
necessitate changes to existing relying systems are considered to be 
backward compatible.
    Comment: Two Federal agencies were concerned about their ability to 
implement the Standard with the indicated implementation schedule 
specified in the Standard.
    Response: Issues concerning the Standard's implementation schedule 
have been referred to OMB.
    Comment: Three commenters proposed that the procedures for PIV Card 
renewal and reissuance be combined.
    Response: The Standard combines the two sections on PIV Card 
renewal and reissuance into one section called ``Reissuance.'' It 
addresses all instances in which a new PIV Card is issued to an 
existing cardholder without repeating the entire identity proofing and 
registration process.
    Comment: Two commenters proposed adding a PIV-Interoperable (PIV-I) 
Card as a valid identity source document.
    Response: The Standard does not list a PIV-I Card as an acceptable 
form of identity source documentation because it is not guaranteed to 
be a Federal or State government issued form of identification.
    Comment: One commenter requested that the Standard prohibit the 
long-term storage of biometric data.
    Response: FIPS 201-2 does not require the long-term storage of 
biometric data. However, PIV Card maintenance processes, such as 
reissuance, may be performed more efficiently if biometric data is 
maintained. Efficiency is a stated goal of HSPD-12.
    Comment: The 2012 Revised Draft states that if the biometric data 
for the background investigation and the biometric data for the PIV 
Card are collected on separate occasions, then during the second visit, 
a one-to-one biometric match of the applicant must be performed against 
the biometric data collected during the first visit. One commenter 
requested to remove the requirement for the one-to-one biometric match 
during the second visit, and that any requirements for one-to-one 
biometric matches begin after the biometric data for the PIV Card has 
been collected.
    Response: In order to satisfy the control objectives of HSPD-12, it 
is necessary to verify that the biometric data for the background 
investigation was collected from the person to whom the PIV Card will 
be issued. A one-to-one biometric comparison is therefore required.
    Comment: The 2012 Revised Draft imposes requirements to revoke the 
PIV Card under certain circumstances. Two commenters noted that the 
Standard should be more specific about the process for PIV Card 
revocation. One commenter also requested that the requirement to revoke 
the PIV Authentication and Card Authentication certificates during PIV 
Card termination be eliminated when the PIV Card is terminated for 
benign reasons.
    Response: The text has been reorganized to clearly indicate the 
steps required to revoke a PIV Card. These steps include collecting and 
destroying the PIV card, if possible, and updating any databases 
maintained by the PIV Card issuer to reflect the change in status. 
Additionally, the requirements for certificate revocation during PIV 
Card termination have been relaxed. At PIV Card termination, revocation 
of the PIV Authentication and Card Authentication certificates is 
limited to cases where the PIV Card cannot be collected and destroyed.
    Comment: One commenter indicated that a PIV derived credential on a 
mobile device should be revoked when the PIV Card's PIV Authentication 
certificate is revoked or expires.
    Response: The PIV Authentication certificate on a PIV Card is 
revoked when the PIV Card is lost or stolen. If the cardholder is 
eligible for a replacement PIV Card, the revocation of the derived 
credential would preclude the cardholder from using the derived 
credential to gain logical access to federally controlled information 
systems as an interim measure while waiting for a new PIV Card to be 
issued. Nothing in the Standard, however, prevents an agency from 
requiring its derived credential issuer to revoke a derived credential 
when the PIV Authentication certificate is revoked or expires.
    Comment: The Standard includes a new feature to remotely reset the 
PIV Card's Personal Identification Number (PIN). One commenter 
suggested that the requirement to perform a biometric match as part of 
a remote PIN reset is too restrictive and should be removed.
    Response: Removing the requirement to perform a biometric match 
from the remote PIN reset procedure would weaken the multi-factor 
authentication provided by the PIV Card. A biometric match is therefore 
required for all PIN reset procedures, regardless of whether the reset 
is performed in-person at an issuer's facility, at an unattended 
issuer-operated kiosk, or remotely from a general computing platform.
    Comment: After publication of the Standard, SP 800-104, A Scheme 
for PIV Visual Card Topography, will be withdrawn, since all 
information of the Special Publication has been incorporated in the 
Standard. One commenter requested that the visual color scheme 
requirement from Special Publication 800-104, be made optional in FIPS 
201-2 so that Federal departments and agencies with a need to 
distinguish between U.S. citizens and foreign nationals could use the 
color scheme on the PIV Card of their employees and contractors, while 
other Federal departments and agencies without the need to visually 
distinguish between U.S. citizens and foreign nationals could issue PIV 
Cards without the distinction.
    Response: The color scheme will remain mandatory in FIPS 201-2 
because departments and agencies are required to accept PIV Cards 
issued by other Federal agencies, as directed by HSPD-12. Departments 
and agencies with a need to visually identify foreign nationals need 
the color scheme to be present on all PIV Cards, not just the PIV Cards 
that they issue.
    Comment: Two commenters requested that a fourth category be added 
to the PIV Card's visual color scheme for employee affiliation or that 
the category for ``contractor'' be changed to ``non-government 
employee.''
    Response: HSPD-12 establishes the scope for the Standard as ``forms 
of identification issued by the Federal Government to its employees and 
contractors (including contractor employees).'' With the scope 
established in HSPD-12, it would not be

[[Page 54628]]

appropriate for the Standard to address employee affiliation color-
codes other than employees and contractors.
    Comment: Two commenters requested that the optional tactile markers 
on the PIV Card be more precisely defined.
    Response: The two zones that are specified for tactile markers are 
intended to provide optional placement of orientation markers as a 
possible response to achieve Section 508 compliance. The implementation 
of tactile markers on PIV Cards should be coordinated with card 
manufacturers/vendors.
    Comment: Three commenters expressed concern that the PIV Card's 
fingerprint reference data used for on-card biometric authentication 
and the PIV Card's fingerprint reference data used for off-card 
biometric authentication should not originate from the same anatomical 
fingers. The commenters noted that an attacker may maliciously obtain 
the PIV Card's fingerprint reference data during an off-card biometric 
authentication event. With the harvested reference data and with a 
malware injected computing platform, other attacks can be staged to 
target applications that use the on-card authentication mechanisms.
    Response: Section 4.4.4 of the Standard stresses the need for 
general good practices to mitigate malicious code threats. In addition 
to general good practice, the Standard allows the fingerprint reference 
data to originate from a different finger. Additionally, NIST Special 
Publication 800-76-2 will clarify the usability versus security trade 
off associated with a possible confusion about which finger to present 
at an authentication event.
    Comment: Four commenters noted that 2012 Revised Draft allows for 
use of the electronic facial image as an option for authentication in 
operator-attended PIV Card issuance and reissuance processes but does 
not extend its use as an authentication mechanism in physical access 
control environments.
    Response: Comparison of electronic facial images depends on 
carefully controlled environments with controls to camera height and 
lighting. These controls are not consistently found in general purpose 
physical access control environments. This Standard therefore limits 
facial recognition as a cost-efficient and optional authentication 
mechanism for PIV Card issuance, reissuance and verification data reset 
processes where the environment is controllable. FIPS 201-2 offers 
fingerprint biometric and iris recognition for general-purpose physical 
access control environments, as both mechanisms provide better 
accuracy, security, and speed.
    Comment: Technical issues were raised by three commenters 
concerning the need for a person identifier to be present on the PIV 
Card. The commenters stated that without a person identifier, access 
control systems are required to re-provision cardholders each time a 
cardholder replaces his or her card. A person identifier, however, 
alleviates re-provisioning by providing a persistent identifier for the 
access control systems to recognize a cardholder with a new PIV Card.
    Response: An optional person identifier will be proposed in the 
Standard's associated publication, Special Publication 800-73.
    Comment: Issues were raised by two commenters about the PIV Card's 
cryptographic keys that are used in authentication and digital 
signatures. The commenters pointed out that a PIV Card issuer should 
have the flexibility to generate the PIV Authentication key, the Card 
Authentication key, and Digital Signature key off-card.
    Response: Because the authentication mechanism used with the 
asymmetric Card Authentication key provides only some confidence in the 
cardholder's identity, off-card generation and import of this key, is 
allowed by the Standard. For the PIV Authentication key and Digital 
Signature key, however, on-card generation of the keys remains a 
requirement because an off-card generation of these keys adversely 
affects the perceived level of assurance in the cardholder's identity.
    Comment: Three commenters requested that the PIV Card's secure 
messaging feature and its virtual contact interface be made mandatory 
as soon as possible for the many beneficial features that they enable.
    Response: While there has been significant demand for the inclusion 
of secure messaging and the virtual contact interface in the Standard, 
some Federal departments and agencies have expressed concerns about the 
risks of adopting this technology. Therefore, it is appropriate to 
allow individual agencies to make a risk-based decision as to whether 
to include these technologies in their PIV Cards.
    Comment: Two commenters requested that specific requirements for 
the public key infrastructure (PKI) be addressed in the ``X.509 
Certificate Policy For The U.S. Federal Common Policy Framework'' 
rather than in the Standard, in order to allow for the requirements to 
be modified to accommodate new and emerging technologies.
    Response: As the scope of the Common Policy is not limited to PIV 
Cards, the Standard needs to include information about which 
certificate policies may be used to issue the different types of 
certificates needed for PIV Cards, as well as other PIV-specific 
information. Care has been taken to ensure that any PKI-related 
requirements specified in FIPS 201-2 are unlikely to change before the 
next revision of the Standard.
    Comment: Three commenters requested that the Standard either allow 
or require the use of a content signing-specific certificate policy 
Object Identifier (OID) in certificates issued to entities that sign 
data objects on PIV Cards.
    Response: Sections 4.2.1 and 4.2.3.2 now require that after a 
transition period, certificates used to sign data objects on PIV Cards 
shall assert a content signing-specific policy OID from the ``X.509 
Certificate Policy For The U.S. Federal Common Policy Framework.''
    Comment: Three commenters noted that the 2012 Revised Draft 
describes authentication mechanisms that utilize the PIV Card and 
requested that the Standard indicate that agencies may choose to use 
other authentication mechanisms that are not applicable to the 
Standard.
    Response: OMB has oversight of agency implementation of the 
Standard. Thus, it is not suitable for FIPS 201-2 to indicate that 
agencies are permitted to implement authentication mechanisms other 
than those described in FIPS 201-2.
    Comment: The 2012 Revised Draft lowers the assurance level of the 
Cardholder Unique Identifier (CHUID) authentication mechanism from some 
confidence in the identity of the cardholder to little or no 
confidence, and deprecates its use. Two commenters indicated that 
Federal departments and agencies have been working to enable their 
physical access control systems to use the CHUID authentication 
mechanism and suggested that the authentication mechanism should 
continue to be described as providing some confidence, and its use 
should not be deprecated.
    Response: In order for an authentication mechanism to provide some 
confidence in the identity of the cardholder, it would have to align 
with the requirements comparable to those specified for E-
Authentication Level 2 of NIST Special Publication 800-63-1. The CHUID 
authentication mechanism does not satisfy these requirements. It is, 
therefore, appropriate to describe the authentication mechanism as 
providing

[[Page 54629]]

little or no confidence in the identity of the cardholder and to 
deprecate its use in authentication events.
    Revised FIPS 201-2 is available electronically from the NIST Web 
site at: https://csrc.nist.gov/publications/PubsFIPS.html.

    Authority:  In accordance with the Information Technology 
Management Reform Act of 1996 (Pub. L. 104-106) and the Federal 
Information Security Management Act (FISMA) of 2002 (Pub. L. 107-
347), the Secretary of Commerce is authorized to approve Federal 
Information Processing Standards (FIPS). Homeland Security 
Presidential Directive (HSPD) 12, entitled ``Policy for a Common 
Identification Standard for Federal Employees and Contractors,'' 
dated August 27, 2004, directed the Secretary of Commerce to 
promulgate, by February 27, 2005, ``. . . a Federal Standard for 
secure and reliable forms of identification (the `Standard') . . . 
,'' and further directed that the Secretary of Commerce ``shall 
periodically review the Standard and update the Standard as 
appropriate in consultation with the affected agencies.''
    E.O. 12866: This notice has been determined not to be significant 
for the purposes of E.O. 12866.

    Dated: August 28, 2013.
Willie E. May,
Associate Director for Laboratory Programs.
[FR Doc. 2013-21491 Filed 9-4-13; 8:45 am]
BILLING CODE 3510-13-P
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.