Minimum Standards for Driver's Licenses and Identification Cards Acceptable by Federal Agencies for Official Purposes; Waiver for Mobile Driver's Licenses, 85340-85386 [2024-23881]
Download as PDF
85340
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
are also available by contacting the
individual identified for ‘‘Technical
Questions’’ in the FOR FURTHER
INFORMATION CONTACT section. Make sure
to identify the docket number of this
rulemaking.
DEPARTMENT OF HOMELAND
SECURITY
6 CFR Part 37
[Docket No. TSA–2023–0002]
RIN 1652–AA76
Abbreviations and Terms Used in This
Document
Minimum Standards for Driver’s
Licenses and Identification Cards
Acceptable by Federal Agencies for
Official Purposes; Waiver for Mobile
Driver’s Licenses
Transportation Security
Administration (TSA), Department of
Homeland Security (DHS).
ACTION: Final rule.
AGENCY:
The Department of Homeland
Security (DHS) is amending the REAL
ID regulations to waive, on a temporary
and State-by-State basis, the regulatory
requirement that mobile or digital
driver’s licenses or identification cards
(collectively ‘‘mobile driver’s licenses’’
or ‘‘mDLs’’) must be compliant with
REAL ID requirements to be accepted by
Federal agencies for official purposes, as
defined by the REAL ID Act, when full
enforcement of the REAL ID Act and
regulations begins on May 7, 2025.
DATES: Effective date: This rule is
effective November 25, 2024.
Incorporation by Reference: The
incorporation by reference of certain
material listed in the rule is approved
by the Director of the Federal Register
as of November 25, 2024. The
incorporation by reference of certain
other material listed in the rule was
approved by the Director of the Federal
Register as of January 14, 2016.
FOR FURTHER INFORMATION CONTACT:
Technical questions: George Petersen,
Senior Program Manager, REAL ID
Program, Enrollment Services and
Vetting Programs, Transportation
Security Administration; telephone:
(571) 227–2215; email: george.petersen@
tsa.dhs.gov.
Legal questions: Anurag Maheshwary,
Attorney Advisor, Office of Chief
Counsel, Transportation Security
Administration; telephone: (571) 227–
4812; email: anurag.maheshwary@
tsa.dhs.gov.
SUPPLEMENTARY INFORMATION:
ddrumheller on DSK120RN23PROD with RULES3
SUMMARY:
Availability of Rulemaking Document
You can find an electronic copy of
this rulemaking using the internet by
accessing the Government Publishing
Office’s web page at https://
www.govinfo.gov/app/collection/FR/ to
view the daily published Federal
Register edition or accessing the Office
of the Federal Register’s web page at
https://www.federalregister.gov. Copies
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
AAMVA—American Association of Motor
Vehicle Administrators
CA/Browser Forum—Certification Authority
Browser Forum
CISA—Cybersecurity and Infrastructure
Security Agency
DHS—U.S. Department of Homeland
Security
EDL—Enhanced driver’s license and
identification card
FIPS—Federal Information Processing
Standards
HSM—Hardware security module
IBR—Incorporation by reference or
Incorporate by reference
IEC—International Electrotechnical
Commission
ISO—International Organization for
Standardization
IT—Information technology
mDL—Mobile driver’s license and mobile
identification card
NIST—National Institute for Standards and
Technology
NPRM—Notice of proposed rulemaking
OFR—Office of Federal Register
OMB—Office of Management and Budget
PUB—Publication
RFI—Request for information
SP—Special publication
TSA—Transportation Security
Administration
Table of Contents
I. Executive Summary
A. Purpose of this Rulemaking
B. Summary of the Major Provisions
C. Need for a Multi-Phased Rulemaking
D. Costs and Benefits
II. Background
A. REAL ID Act, Regulations, and
Applicability to mDLs
B. Rulemaking History
C. mDL Overview
D. Industry Standards and Government
Guidelines for mDLs
III. General Discussion of the Rulemaking
A. Changes Between NPRM and Final Rule
B. Summary of Regulatory Provisions
C. Specific Provisions
D. Impacted Stakeholders
E. Use Cases Affected by This Rule
F. Severability
IV. Discussion of Comments
A. Waiver Eligibility
B. Conditions on Federal Agencies
Accepting mDLs
C. Waiver Application Criteria
D. TSA Waiver Application Guidance
E. General Concerns About mDLs
F. Scope of Rulemaking and mDL
Acceptance
G. Privacy
H. Waiver Validity Period and Renewals
I. Vendor and Technology ‘‘Lock-in’’
Effects
PO 00000
Frm 00002
Fmt 4701
Sfmt 4700
J. Pseudonymous Validation and OnDevice Biometric Matching
K. Access to Standards
L. Standards and Standards Development
Generally
M. TSA’s Identity Verification Policies
N. Paperwork Reduction Act
O. Legal Authority
P. Economic Impact Analysis
Q. Communicating Status of Waiver;
System Disruptions
R. Impact of Waiver on States Currently
Testing mDLs With TSA
S. Notice for Changes to State mDL
Issuance Processes
T. Clarification Regarding ‘‘Days’’
U. Audit Requirements
V. Appendix A to Subpart A: mDL
Issuance Requirements
W. Protection of Sensitive Security
Information in Waiver Applications
V. Consultation With States and the
Department of Transportation
VI. Regulatory Analyses
A. Economic Impact Analyses
B. Paperwork Reduction Act
C. Federalism (E.O. 13132)
D. Customer Service (E.O. 14058)
E. Energy Impact Analysis (E.O. 13211)
F. Environmental Analysis
I. Executive Summary
A. Purpose of This Rulemaking
This rule is part of an incremental,
multi-phased rulemaking that will
culminate in the promulgation of
comprehensive requirements that enable
States to issue mobile driver’s licenses
and mobile identification cards
(collectively ‘‘mDLs’’) that comply with
the REAL ID Act of 2005 (‘‘REAL ID
Act’’ or ‘‘Act’’) and regulations 1
[hereinafter ‘‘REAL ID-Compliant’’]. In
this first phase, the Transportation
Security Administration (TSA) is
making two changes to the current
regulations in 6 CFR part 37, ‘‘REAL ID
Driver’s Licenses and Identification
Cards.’’ First, TSA is adding definitions
for, among others, mobile driver’s
licenses and mobile identification cards.
These definitions provide a precise
explanation of those terms as referenced
in the REAL ID Act, which applies to
only State-issued driver’s licenses and
State-issued identification cards.2 Any
other types of identification cards, such
1 The REAL ID Act of 2005, Division B Title II of
the FY05 Emergency Supplemental Appropriations
Act, as amended, Public Law 109–13, 119 Stat. 302
(May 11, 2005) (codified at 49 U.S.C. 30301 note)
[hereinafter ‘‘REAL ID Act’’]; 6 CFR part 37.
Effective May 22, 2023, authority to administer the
REAL ID program was delegated from the Secretary
of Homeland Security to the Administrator of TSA
pursuant to DHS Delegation No. 7060.2.1.
2 See sec. 201 of the REAL ID Act (defining a
‘‘driver’s license’’ to include ‘‘driver’s licenses
stored or accessed via electronic means, such as
mobile or digital driver’s licenses, which have been
issued in accordance with regulations prescribed by
the Secretary’’; mirroring definition for
‘‘identification card’’).
E:\FR\FM\25OCR3.SGM
25OCR3
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
ddrumheller on DSK120RN23PROD with RULES3
as those issued by a Federal agency, or
commercial, educational, or non-profit
entity, are beyond the scope of the
REAL ID Act and regulations, and hence
this rulemaking, because they do not
meet the definition of driver’s license or
identification card as defined by the
REAL ID Act. The definition of ‘‘mDL’’
as used in this rulemaking is limited
strictly to the REAL ID Act and
regulations and does not include
‘‘mDLs’’ as defined by other entities.
Second, TSA is establishing a
temporary waiver process that permits
Federal agencies to accept mDLs for
official purposes,3 as defined in the
REAL ID Act and regulations, on an
interim basis when full enforcement
begins on May 7, 2025,4 but only if TSA
has issued a waiver to the State. To
qualify for the waiver, this final rule
requires States to (1) be in full
compliance with all applicable REAL ID
requirements as defined in subpart E of
this part, and (2) submit an application
demonstrating that they meet the
requirements specified in this rule,
which are drawn from 19 industry
standards and government guidelines.
The rulemaking incorporates by
reference (IBRs) those standards and
guidelines, which cover technical areas
such as mDL communication, digital
identity, encryption, cybersecurity, and
network/information system security
and privacy.
As noted above, this final rule is part
of an incremental rulemaking that
temporarily permits Federal agencies to
accept mDLs for official purposes until
TSA issues a subsequent rule that
would set comprehensive requirements
for mDLs. TSA believes it is premature
to issue such requirements before the
May 7, 2025 deadline due to the need
for emerging industry standards and
government guidelines 5 to be finalized.
3 The REAL ID Act defines official purposes as
including but not limited to accessing Federal
facilities, boarding Federally regulated commercial
aircraft, entering nuclear power plants, and any
other purposes that the Secretary shall determine.
See REAL ID Act. Notably, because the Secretary
has not determined any other official purposes, the
REAL ID Act and regulations do not apply to
Federal acceptance of driver’s licenses and
identification cards for other purposes, such as
applying for Federal benefits programs, submitting
immigration documents, or other Federal programs.
4 DHS, Final Rule, Minimum Standards for
Driver’s Licenses and Identification Cards
Acceptable by Federal Agencies for Official
Purposes, 88 FR 14473 (Mar. 9, 2023); DHS Press
Release, DHS Announces Extension of REAL ID
Full Enforcement Deadline (Dec. 5, 2022), https://
www.dhs.gov/news/2022/12/05/dhs-announcesextension-real-id-full-enforcement-deadline (last
visited July 17, 2024).
5 See TSA, Notice of Proposed Rulemaking,
Waiver for Mobile Driver’s Licenses, 88 FR 60056,
60063–64 (Aug. 30, 2023) [hereinafter ‘‘NPRM’’].
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
The need for this rulemaking arises
from TSA’s desire to accommodate and
foster the rapid pace of mDL innovation,
while ensuring the intent of the REAL
ID Act and regulations are met. Secure
driver’s licenses and identification cards
are a vital component of our national
security framework. In the REAL ID Act,
Congress acted to implement the 9/11
Commission’s recommendation that the
Federal Government ‘‘set standards for
the issuance of sources of identification,
such as driver’s licenses.’’ Under the
REAL ID Act and regulations, a Federal
agency may not accept for any official
purpose a State-issued driver’s license
or identification card, either physical or
an mDL, that does not meet specified
requirements, as detailed in the REAL
ID regulations (see Part II.A., below, for
more discussion on these requirements).
This final rule will result in the
development of mDLs with a higher
level of security, privacy, and
interoperability features necessary for
Federal acceptance for official purposes.
Because the current regulatory
provisions do not include requirements
that would enable States to issue REAL
ID-compliant mDLs, several States are
investing significant resources to
develop mDLs based on varying and
often proprietary standards, many of
which may lack security and privacy
safeguards commensurate with REAL ID
requirements and the privacy needs of
users. Without timely regulatory
guidance concerning potential
requirements for developing a REAL IDcompliant mDL, States risk investing in
mDLs that are not aligned with
emerging industry standards and
government guidelines that may be
IBR’d in a future rulemaking. States,
therefore, may become locked-in to
existing solutions and could face a
substantial burden to redevelop
products acceptable to Federal agencies
under this future rulemaking.
This final rule addresses these
concerns by enabling TSA to grant a
temporary waiver to States whose mDLs
TSA determines provide sufficient
safeguards for security and privacy,
pending finalization of emerging
standards. Although this rule does not
set standards for the issuance of REAL
ID-compliant mDLs, it does establish
minimum requirements that States must
meet to be granted a waiver so that
mDLs can be accepted by Federal
agencies for official purposes. These
minimum standards and requirements
ensure that States’ investments in mDLs
provide minimum privacy and security
safeguards consistent with information
currently known to the TSA.
PO 00000
Frm 00003
Fmt 4701
Sfmt 4700
85341
B. Summary of the Major Provisions
As further discussed in Part II.A.,
below, mDLs cannot be accepted by
Federal agencies for official purposes
when REAL ID full enforcement begins
on May 7, 2025, unless 6 CFR part 37
is amended to address mDLs. This final
rule establishes a process for waiving,
on a temporary and State-by-State basis,
the current prohibition on Federal
acceptance of mDLs for official
purposes, and enables Federal agencies
to accept mDLs on an interim basis
while the industry matures to a point
sufficient to enable TSA to develop
more comprehensive mDL regulatory
requirements.
The current regulations prohibit
Federal agencies from accepting noncompliant driver’s licenses and
identification cards, including both
physical cards and mDLs, when REAL
ID enforcement begins on May 7, 2025.
Any modification of this regulatory
provision must occur through
rulemaking (or legislation). Until and
unless TSA promulgates comprehensive
mDL regulations that enable States to
issue REAL ID-compliant mDLs, mDLs
cannot be developed to comply with
REAL ID, and Federal agencies therefore
cannot accept mDLs for official
purposes after REAL ID enforcement
begins on May 7, 2025. The rule allows
the Federal government to accept mDLs
on an interim basis, but only if TSA has
issued a waiver to such State based on
that State’s compliance with all
applicable REAL ID requirements as
defined in subpart E of this part, and
with the minimum privacy, safety, and
interoperability requirements in this
rulemaking. Please see Part II.A., below,
for an explanation of the REAL ID
requirement that both cards and issuing
States must be REAL ID compliant.
C. Need for a Multi-Phased Rulemaking
TSA recognizes both that regulations
can influence long-term industry
research and investment decisions, and
that premature regulations can distort
the choices of technologies, which
could harm competition and innovation.
As noted above, there are clear reasons
for TSA to issue requirements for mDLs
in the context of REAL ID.
Simultaneously, however, TSA observes
that this is a rapidly innovating market,
with multiple industry and government
standards and guidelines necessary to
ensure mDL privacy and security still in
development.6 Accordingly, TSA has
concluded that it is premature to
promulgate comprehensive
requirements for mDLs while key
6 See
E:\FR\FM\25OCR3.SGM
NPRM, 88 FR at 60062–66.
25OCR3
ddrumheller on DSK120RN23PROD with RULES3
85342
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
standards are being finalized because of
the risk of unintended consequences,
such as chilling innovation and
competition in the marketplace, and
‘‘locking-in’’ stakeholders to certain
technologies. TSA is therefore
establishing a temporary waiver process
with clear standards and requirements
to facilitate the acceptance of mDLs
while the industry matures and moves
to accepted standards.
TSA is proceeding with a multiphased rulemaking approach. This
‘‘Phase 1’’ rule establishes a temporary
waiver process that enables continuing
Federal acceptance of mDLs for official
purposes when REAL ID enforcement
begins on May 7, 2025, and affords
Federal agencies additional operational
experience and data that would inform
comprehensive regulations in the
upcoming ‘‘Phase 2’’ rulemaking. The
Phase 1 rule is intended to serve as a
regulatory bridge until the emerging
standards are finalized and a
comprehensive Phase 2 rulemaking is
effective.
TSA anticipates the future Phase 2
rulemaking would repeal the temporary
waiver provisions established in Phase
1 and establish comprehensive
requirements enabling States to issue
mDLs that comply with REAL ID
requirements. TSA envisions the Phase
2 rulemaking would draw heavily from
pertinent parts of the emerging
standards (pending review of those
final, published documents) to set
specific requirements for security,
privacy, and interoperability. In
addition, the Phase 2 rule would
distinguish between existing regulatory
requirements that apply only to mDLs
versus physical cards. As one
commenter 7 to a previously-issued
Request for Information (RFI) urged
(discussed in Part II.B., below), DHS is
taking ‘‘a slow and careful approach’’ to
regulation in order to fully understand
the implications of mDLs.
This multi-phased rulemaking
approach supports Executive Order
(E.O.) 14058 of December 13, 2021
(Transforming Federal Customer
Experience and Service Delivery to
Rebuild Trust in Government), by using
‘‘technology to modernize Government
and implement services that are simple
to use, accessible, equitable, protective,
transparent, and responsive for all
people of the United States.’’ 8 As
highlighted above and discussed in
7 See comment from Electronic Privacy
Information Center, https://
downloads.regulations.gov/DHS-2020-0028-0048/
attachment_1.pdf (last visited July 17, 2024); DHS,
Request for Information, Mobile Driver’s Licenses,
86 FR 20320 (Apr. 19, 2021).
8 See 86 FR 71357 (Dec. 16, 2021).
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
more detail below, allowing acceptance
of mDLs issued by States that meet the
waiver requirements enables the public
to more immediately realize potential
benefits of mDLs, including greater
convenience, security, and privacy.
D. Costs and Benefits
TSA estimates the 10-year total cost of
the rule to be $829.8 million
undiscounted, $698.1 million
discounted at 3 percent ($81.8 million
annualized), and $563.9 million
discounted at 7 percent ($80.3 million
annualized). Affected entities include
States, TSA, and relying parties (Federal
agencies that voluntarily choose to
accept mDLs for official purposes).
States incur costs to familiarize
themselves with the requirements of the
final rule, purchase access to an
industry standard, submit an mDL
waiver application, submit mDL waiver
reapplications, and comply with waiver
application requirements. TSA
estimates that 40 States will seek an
mDL waiver over the next 10 years at a
10-year State cost of $813.1 million
undiscounted, $683.7 million
discounted at 3 percent, and $552.0
million discounted at 7 percent.
TSA incurs costs associated with
purchasing access to industry standards,
reviewing mDL waiver applications and
mDL waiver reapplications, acquiring,
installing, and operating mDL readers,
and training transportation security
officers. TSA estimates the 10-year cost
to TSA is $10.13 million undiscounted,
$8.87 million discounted at 3 percent,
and $7.56 million discounted at 7
percent.
Relying parties will incur costs to
procure mDL readers should they
voluntarily choose to accept mDLs for
official purposes. TSA estimates the 10year cost to relying parties is $6.57
million undiscounted, $5.48 million
discounted at 3 percent, and $4.38
million discounted at 7 percent.
TSA also identifies other nonquantified costs that affected parties
may incur. States may incur incremental
costs to: monitor and study mDL
technology as it evolves; resolve
underlying issues that could lead to a
suspension or termination of an mDL
waiver; report serious threats to
security, privacy, or data integrity;
report material changes to mDL issuance
processes; remove conflicts of interest
with an independent auditor; and
request reconsideration of a denied mDL
waiver application. TSA may incur
costs to: investigate circumstances that
could lead to suspension or termination
of a State’s mDL waiver; provide notice
to States, relying parties, and the public
related to mDL waiver suspensions or
PO 00000
Frm 00004
Fmt 4701
Sfmt 4700
terminations; develop an IT solution
that maintains an up-to-date list of
States with valid mDL waivers; develop
materials related to process changes to
adapt to mDL systems; and resolve
requests for reconsideration of a denied
mDL waiver application. An mDL user
may incur costs with additional
application requirements to obtain an
mDL. States may also pass on mDL
related costs to the public.9 Relying
parties may incur costs to resolve any
security or privacy issue with the mDL
reader; report serious threats to security,
privacy, or data integrity; verify the list
of States with valid mDL waivers; train
personnel to verify mDLs; and update
the public on identification policies.
The final rule provides benefits to
affected parties which include, but are
not limited to: promoting higher
security, privacy, and interoperability
safeguards; reducing uncertainty in the
mDL technology environment by
helping to foster a minimum level of
security, privacy and interoperability;
and allowing Federal agencies to
continue to accept mDLs for official
purposes when REAL ID enforcement
begins. Also, mDLs themselves may
provide additional security benefits by
offering a more secure verification of an
individual’s identity and authentication
of an individual’s credential compared
to usage of physical cards.
II. Background
A. REAL ID Act, Regulations, and
Applicability to mDLs
This rulemaking is authorized by the
REAL ID Act of 2005 and REAL ID
Modernization Act. The REAL ID Act
authorizes the Secretary of Homeland
Security, in consultation with the States
and the Secretary of Transportation, to
promulgate regulations to implement
the requirements under the REAL Act.10
The REAL ID Modernization Act
amended the definitions of ‘‘driver’s
license’’ and ‘‘identification card’’ to
specifically include mDLs that have
been issued in accordance with
regulations prescribed by the Secretary
of Homeland Security.11
The REAL ID Act and implementing
regulations, 6 CFR part 37, set minimum
requirements for State-issued driver’s
licenses and identification cards
accepted by Federal agencies for official
purposes, including accessing Federal
9 TSA does not possess data to quantify how
States may implement a pass through or recoup
costs associated with implementation of mDLs.
10 Sec. 205 of the REAL ID Act.
11 Sec. 1001 of the REAL ID Modernization Act,
Title X of Division U of the Consolidated
Appropriations Act, 2021, Public Law 116–260, 134
Stat. 2304 [hereinafter ‘‘REAL ID Modernization
Act’’].
E:\FR\FM\25OCR3.SGM
25OCR3
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
facilities, boarding Federally regulated
commercial aircraft, entering nuclear
power plants, and any other purposes
that the Secretary shall determine.12 The
Act defines ‘‘driver’s licenses’’ and
‘‘identification cards’’ strictly as Stateissued documents,13 and the regulations
further refine the definition of
‘‘identification card’’ as ‘‘a document
made or issued by or under the
authority of a State Department of Motor
Vehicles or State office with equivalent
function.’’ 14 The REAL ID Act and
regulations do not apply to
identification cards that are not made or
issued under a State authority, such as
cards issued by a Federal agency or any
commercial, educational, or non-profit
entity.
The regulations include a schedule
describing when individuals must
obtain a REAL ID-compliant driver’s
license or identification card intended
for use for official purposes, known as
‘‘card-based’’ enforcement.15 Card-based
enforcement begins on May 7, 2025.16
On this date, Federal agencies will be
prohibited from accepting a State- or
territory-issued driver’s license or
identification card for official purposes
unless the card is compliant with the
REAL ID Act and regulations.17
On December 21, 2020, Congress
passed the REAL ID Modernization
Act,18 which amended the REAL ID Act
to update the definitions of ‘‘driver’s
license’’ and ‘‘identification card’’ to
specifically include mDLs that have
been issued in accordance with
regulations prescribed by the Secretary,
among other updates.19 Accordingly,
mDLs must be REAL ID-compliant to be
accepted by Federal agencies for official
purposes when card-based enforcement
begins on May 7, 2025. However, States
cannot issue REAL ID-compliant mDLs
until the regulations are updated to
include requirements to ensure that
mDLs meet equivalent levels of security
currently imposed on REAL IDcompliant physical cards.
ddrumheller on DSK120RN23PROD with RULES3
12 REAL
ID Act; 6 CFR part 37.
13 Sec. 201 of the REAL ID Act.
14 6 CFR 37.3.
15 See 6 CFR 37.5(b). The regulations also include
a schedule for State-based compliance, known as
‘‘State-based enforcement.’’ See 6 CFR 37.51(a).
16 See 6 CFR 37.5(b).
17 See 6 CFR 37.5(b). Additionally, TSA is
conducting a separate rulemaking that would allow
Federal agencies to implement the card-based
enforcement provisions of the REAL ID regulations
under a phased approach beginning on the May 7,
2025 enforcement deadline. See NPRM, Phased
Approach for Card-Based Enforcement, 89 FR 74137
(Sept. 12, 2024).
18 REAL ID Modernization Act, 134 Stat. 2304.
19 Sec. 1001 of the REAL ID Modernization Act,
134 Stat. 2304.
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
B. Rulemaking History
In April 2021, DHS issued an RFI
announcing DHS’s intent to commence
future rulemaking to set the minimum
technical requirements and security
standards for mDLs to enable Federal
agencies to accept mDLs for official
purposes. The RFI requested comments
and information to inform DHS’s
rulemaking.20 In response, DHS
received 63 comments 21 through a
twice-extended comment period of 180
days, which closed on October 18, 2021.
In August 2023, TSA published a
Notice of Proposed Rulemaking
(NPRM) 22 drawing on comments to the
RFI, which are summarized at 88 FR
60056, 60071–72. The NPRM comment
period closed on October 16, 2023, and
TSA received 31 comments. NPRM
comments are discussed in detail in Part
IV, below.
C. mDL Overview
1. mDLs Generally
An mDL is generally recognized as the
digital representation of an individual’s
identity information contained on a
State-issued physical driver’s license or
identification card.23 An mDL may be
stored on a diverse range of portable or
mobile electronic devices, such as
smartphones, smartwatches, and storage
devices containing memory. Like a
physical card, mDL data originates from
identity information about an individual
that is maintained in the database of a
State driver’s licensing agency. An mDL
has potential benefits for all
stakeholders. For Federal agencies,
mDLs may provide security and
efficiency enhancements compared to
physical cards, because mDLs rely on
digital security features that are immune
to many vulnerabilities of physical
security features. For individuals, mDLs
may provide a more secure, convenient,
privacy-enhancing, and ‘‘touchless’’
method of identity verification
compared to physical IDs.
Unlike physical cards that employ
physical security features to deter fraud
and tampering, mDLs combat fraud
through the use of digital security
features that are not recognizable
through human inspection, such as
asymmetric cryptography/public key
infrastructure (PKI). As discussed in the
NPRM,24 asymmetric cryptography
20 86
FR 20320 (Apr. 19, 2021).
63 total comments included three
duplicates and one confidential submission.
22 88 FR 60056.
23 A technical description of mDLs as envisioned
by the American Association of Motor Vehicle
Administrators may be found at https://
www.aamva.org/Mobile-Drivers-License/ (last
visited July 17, 2024).
24 88 FR at 60060.
21 The
PO 00000
Frm 00005
Fmt 4701
Sfmt 4700
85343
generates a pair of encryption ‘‘keys’’ to
encrypt and decrypt protected data. One
key, a ‘‘public key,’’ is distributed
publicly, while the other key, a ‘‘private
key,’’ is held by the State driver’s
licensing agency (e.g., a Department of
Motor Vehicles). When the driver’s
licensing agency issues an mDL to an
individual, the agency uses its private
key to digitally ‘‘sign’’ the mDL data. A
Federal agency accepting an mDL
validates the integrity of the mDL data
by obtaining the State driver’s licensing
agency’s public key to verify the digital
signature. Private keys and digital
signatures are elements of data
encryption that protect against
unauthorized access, tampering, and
fraud. Generally, mDL-based identity
verification under REAL ID involves a
triad of secure communications between
a State driver’s licensing agency, an
mDL holder, and a Federal agency.
Standardized communication interfaces
are necessary to enable Federal agencies
to exchange information with all U.S.
States and territories that issue mDLs.
Please see the NPRM for a more detailed
discussion.25
In contrast to physical driver’s
licenses that are read and verified
visually through human inspection of
physical security features, an mDL is
read and verified electronically using a
device known simply as a ‘‘reader. Any
Federal agency that accepts mDLs for
official purposes must use readers to
validate an mDL holder’s identity data
from their mobile device and establish
trust that the mDL is secure by using
private-public key data encryption.26
An mDL reader compliant with this
requirement can take multiple forms,
such as an app installed on a mobile
device, or a dedicated device. Although
reader development is evolving, some
companies already offer reader apps for
free, and TSA therefore expects readers
will be offered in a wide range
capabilities and associated price
points.27
25 88
FR at 60060–61.
agencies and other entities who
choose to accept mDLs for uses beyond the scope
of REAL ID should also recognize the need for a
reader to ensure the validity of the mDL. Any
verifying entity can validate in the same manner as
a Federal agency if they implement the
standardized communication interface
requirements specified in this final rule, which
would require investment to develop the necessary
IT infrastructure and related processes.
27 Readers for mDLs have specific requirements
and at this time are not interchangeable with
readers for other types of Federal cards, such as the
Transportation Worker Identification Credential
(TWIC). Although TSA is evaluating some mDLs at
select airport security checkpoints, cost estimates
for readers used in the evaluations are not available
because those readers are non-commercially
26 Non-Federal
E:\FR\FM\25OCR3.SGM
Continued
25OCR3
85344
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
2. State mDL Issuance and TSA Testing
As noted above, mDL issuance is
proliferating rapidly among States, with
at least half of all States believed to be
preparing for or issuing mDLs.28
Although detailed mDL adoption
statistics are unavailable, anecdotal
information and media reports indicates
that mDLs are rapidly gaining public
acceptance. For example, Maryland
commented that it has issued more than
200,000 mDLs to residents following a
pilot in 2017 and more recent expansion
in 2022 and 2023.29 Iowa commented
that in the 3 months since it began
offering its mDL app, it has been
downloaded by more than 7,000 users.30
TSA understands that States are
issuing mDLs using widely varying
technology solutions, raising concerns
whether such technological diversity
provides the safeguards and
interoperability necessary for Federal
acceptance. Since 2022, TSA has been
collaborating with States and industry
to test the use of mDLs issued by
participating States at select TSA airport
security checkpoints.31 As of the date of
this final rule, TSA is currently testing
mDLs issued by 11 States (Arizona,
California, Colorado, Georgia, Hawaii,
Iowa, Louisiana, Maryland, New York,
Ohio, Utah) at 27 airports.32
D. Industry Standards and Government
Guidelines for mDLs
The nascence of mDLs and absence of
standardized mDL-specific requirements
provide an opportunity for industry and
government to develop standards and
guidelines to close this void. TSA is
aware of multiple such documents,
published and under development, from
both Federal and non-government
sources. As discussed in Part III.C.8,
below, this final rule amends § 37.4 by
IBR’g into part 37 19 standards and
guidelines that form the basis of many
of the requirements in this final rule.
TSA understands that these standards
and guidelines discussed are the most
comprehensive and relevant references
governing mDLs today. TSA also
acknowledges that many additional
standards and guidelines are in
development and may provide
additional standardized mechanisms for
mDLs.33
III. General Discussion of the
Rulemaking
A. Changes Between NPRM and Final
Rule
After carefully considering all
comments received to the NPRM (see
detailed discussion of comments and
TSA’s responses in Part IV, below), TSA
finalizes the NPRM with several
revisions in response to public
comments. Table 1 summarizes the
changes made in the final rule
compared to the NPRM.
TABLE 1—SUMMARY OF CHANGES BETWEEN THE NPRM AND THE FINAL RULE
Section
Final rule
Reason for the change
37.3 ......................................
Adds definition for ‘‘Provisioning.’’ ..................................
37.4 ......................................
Revises points of contact for the public to contact TSA;
provides additional means to access certain standards that are IBR’d in this rule.
Corrects title of ‘‘Cybersecurity Incident & Vulnerability
Response Playbooks’’ to ‘‘Federal Government Cybersecurity Incident & Vulnerability Response Playbooks.’’.
Updates standard NIST FIPS PUB 197 to NIST FIPS
PUB 197–upd1 to reflect revised version of standard.
Technical change to add definition of a key term to improve clarity.
Technical changes to improve access to IBR materials.
37.4(c)(1) ..............................
37.4(g)(4) .............................
37.4(g)(7) .............................
37.7(a) ..................................
37.7(b)(3) .............................
Corrects website address to the cited standard .............
Clarifies conditions under which TSA will issue a waiver
Deleted ............................................................................
37.8(c) ..................................
Adds paragraph (c) to require Federal agencies accepting mDLs to confirm, consistent with the deadlines
set forth in § 37.5, that the mDL data element ‘‘DHS_
compliance’’ is encoded ‘‘F,’’ as required by
§§ 37.10(a)(4)(ii) & (a)(1)(vii).
Renumbers § 37.8(c), as proposed in the NPRM, to
§ 37.8(d) in light of addition of new § 37.8(c).
Corrects website address from dhs.gov to tsa.gov ........
Adds requirement regarding protection of SSI ...............
ddrumheller on DSK120RN23PROD with RULES3
37.8(d) ..................................
available prototypes designed specifically for
integration into TSA-specific IT infrastructure that
few, if any, other Federal agencies use. In addition,
mDL readers are evolving and entities who accept
mDLs would participate voluntarily. Accordingly,
associated reader costs are not quantified at this
time but TSA intends to gain a greater
understanding of any costs to procure reader
equipment as the technology continues to evolve.
28 See, e.g., AAMVA, Driver and Vehicle Services
Data Map, https://www.aamva.org/jurisdictiondata-maps#anchorformdlmap (last visited July 17,
2024); PYMNTS, States Embrace Mobile Driver’s
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
Technical correction.
Technical change to reflect revisions to standard to improve public access. Revisions include editorial improvements, but no technical changes to the algorithm specified in the earlier version.
Technical change to correct a typo.
Clarification regarding impact of the waiver.
Deleted proposed language that would have made a
State ineligible to apply for a waiver if the State
issues mDLs to individuals with non-REAL ID compliant physical cards (in addition to issuing mDLs to
other individuals that have compliant physical cards).
Clarifies that when REAL ID enforcement begins, Federal agencies may accept mDLs from States only if
the underlying physical card is REAL ID compliant.
Technical changes renumber provision from 37.8(c) to
37.8(d), update agency name and website address,
and clarify the mechanics of reporting.
Provides that reports may contain sensitive security information (SSI) 34 and if so, would be subject to requirements of 49 CFR part 1520.
Licenses to Fight Fraud Amid Privacy Scrutiny
(Apr. 9, 2024), https://www.pymnts.com/identity/
2024/states-embrace-mobile-drivers-licenses-tofight-fraud-amid-privacy-scrutiny/ (last visited July
17, 2024); Government Technology, Digital IDs Are
Here, but Where Are They Used and Accepted?
(Mar. 12, 2024), https://www.govtech.com/biz/data/
digital-ids-are-here-but-where-are-they-used-andaccepted (last visited July 17, 2024).
29 Comment by Maryland MVA, https://
www.regulations.gov/comment/TSA-2023-00020032 (last visited July 17, 2024).
PO 00000
Frm 00006
Fmt 4701
Sfmt 4700
30 Comment by Iowa Department of
Transportation, https://www.regulations.gov/
comment/TSA-2023-0002-0023 (last visited July 17,
2024).
31 See NPRM, 88 FR at 60066–67.
32 See TSA, Facial Recognition and Digital
Identity Solutions, https://www.tsa.gov/digital-id
(last visited Aug. 9, 2024).
33 See NPRM, 88 FR at 60063–66, for a discussion
of these standards.
E:\FR\FM\25OCR3.SGM
25OCR3
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
85345
TABLE 1—SUMMARY OF CHANGES BETWEEN THE NPRM AND THE FINAL RULE—Continued
Section
Final rule
37.9(a) ..................................
Corrects agency name from DHS to TSA ......................
Corrects website address from dhs.gov to tsa.gov ........
Revises ‘‘days’’ to ‘‘calendar days.’’ ...............................
Corrects website address from dhs.gov to tsa.gov ........
37.9(b) ..................................
37.9(c) ..................................
Revises ‘‘days’’ to ‘‘calendar days.’’ ...............................
Corrects website address from dhs.gov to tsa.gov ........
37.9(e)(2) .............................
37.9(e)(4)(ii) .........................
Revises ‘‘days’’ to ‘‘calendar days.’’ ...............................
Corrects website address from dhs.gov to tsa.gov ........
Provides a means for States to contact TSA if the State
is unclear whether certain modifications to its mDL
issuance processes require reporting.
Revises ‘‘days’’ to ‘‘calendar days.’’ ...............................
37.9(e)(5)(i) ..........................
37.9(e)(5)(ii) .........................
Corrects agency name from DHS to TSA ......................
Revises ‘‘days’’ to ‘‘calendar days.’’ ...............................
37.9(g) ..................................
Adds new paragraph (g), which provides that information submitted in response to requirements to apply
for and maintain a waiver may contain SSI, and if so,
would be subject to requirements of 49 CFR part
1520.
Replaces NPRM requirement that States must issue
mDLs only to residents who have been issued physical cards that are valid, unexpired, and REAL IDcompliant with requirement that States must populate
the ‘‘DHS_compliance’’ data field to correspond to
the REAL ID-compliance status of the underlying
physical driver’s license or identification card, or as
required by the AAMVA Guidelines.
37.10(a)(1)(vii) ......................
37.10(a)(4) ...........................
Corrects version number of AAMVA Mobile Driver’s License (mDL) Implementation Guidelines (Jan. 2023).
Updates NIST FIPS PUB 197 to NIST FIPS PUB 197–
upd1 to reflect revised version of standard.
37.10(b)(1) ...........................
Clarifies that ‘‘independent entity’’ includes State employees or contractors that are independent of the
State’s driver’s licensing agency.
Corrects website address from dhs.gov to tsa.gov ........
Clarifies that TSA will publish in the Federal Register a
notice advising of the availability of updated TSA
mDL Waiver Application Guidance, which itself will
be published at www.tsa.gov/mDL/.
Corrections to titles of:
CISA Federal Government Cybersecurity Incident &
Vulnerability Response Playbooks.
DHS National Cyber Incident Response Plan ................
NIST FIPS PUB 140–3 ...................................................
NIST Framework for Improving Critical Infrastructure
Cybersecurity.
Adds section numbers to certain references ..................
Deletes requirement to comply with NIST SP 800–53B
37.10(c) ................................
Appendix A, Throughout ......
Appendix A, paragraph 1.1 ..
ddrumheller on DSK120RN23PROD with RULES3
Reason for the change
Appendix A, paragraph 2.2 ..
Appendix A, paragraph 2.13
Appendix A, paragraph 5.13
VerDate Sep<11>2014
18:55 Oct 24, 2024
Revises ‘‘privileged account or service’’ in NPRM to
‘‘trusted role.’’.
Adds section numbers to a certain reference .................
Reduces requirements for minimum number of personnel to generate issuing authority certificate authority (IACA) root certificate keys from a minimum of
three to two persons, consisting of at least one ceremony administrator and one qualified witness.
Jkt 265001
PO 00000
Frm 00007
Fmt 4701
Sfmt 4700
Technical changes update agency name and website
address.
Clarifies that ‘‘days’’ means calendar days, not business days.
Technical change updates agency website address.
Clarifies that ‘‘days’’ means calendar days, not business days.
Technical change updates agency website address.
Clarifies that ‘‘days’’ means calendar days, not business days.
Technical change updates agency website address.
Provides a means for States to resolve potential questions regarding reporting requirements.
Clarifies that ‘‘days’’ means calendar days, not business days.
Technical change updates agency name.
Clarifies that ‘‘days’’ means calendar days, not business days.
SSI protection.
Proposed language would have required States to
issue mDLs only to individuals to whom that State
previously issued a physical card that is valid, unexpired, and REAL ID-compliant. This would have denied States the discretion to issue mDLs to holders
of non-compliant physical cards.
Revisions require States to issue mDLs in a manner
that reflects the REAL ID compliance status of the
underlying physical card. This is consistent with the
intent of the NPRM, which was to enable Federal
agencies to determine the REAL ID-compliance status of the underlying physical card, and accept only
compliant cards when enforcement begins.
Technical change corrects version number of AAMVA
Guidelines.
Changes reflect current version of NIST FIPS PUB 197
to ensure continuing public access. Revisions to the
standard include editorial improvements, but no technical changes to the algorithm specified in the earlier
version.
Provides States additional options to select auditors.
Reduces burdens without impact on security or privacy.
Technical changes update agency website address,
and clarify means of notifying and publishing updates
to TSA mDL Waiver Application Guidance.
Technical corrections.
Technical changes clarify which parts of cited reference
require compliance, and remove an unnecessary requirement.
Technical change corrects terminology.
Technical change clarifies which parts of cited reference require compliance.
Provides States greater freedom to select products.
Does not impact security, privacy, or interoperability.
E:\FR\FM\25OCR3.SGM
25OCR3
85346
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
TABLE 1—SUMMARY OF CHANGES BETWEEN THE NPRM AND THE FINAL RULE—Continued
Section
Final rule
Reason for the change
Appendix A, paragraph 5.14
Modifies requirements for minimum number of personnel to generate document signer keys. Final rule
requires either at least one administrator and one
qualified witness (other than a person involved in key
generation), or at least 2 administrators using split
knowledge processes.
Revises ‘‘days’’ to ‘‘calendar days ..................................
Provides States greater freedom to select products.
Does not impact security, privacy, or interoperability.
Appendix A, paragraph 6.3 ..
ddrumheller on DSK120RN23PROD with RULES3
Appendix A, paragraph 8.6 ..
Modifies cyber incident reporting requirements to incidents as defined in the TSA Cybersecurity Lexicon
available at www.tsa.gov that may harm state certificate systems.
Corrects website address from dhs.gov to tsa.gov ........
Adds SSI protection requirements ..................................
B. Summary of Regulatory Provisions
In addition to revising definitions
applicable to the REAL ID Act to
incorporate mDLs, this rule amends 6
CFR part 37 to enable TSA to grant a
temporary waiver to States that TSA
determines issue mDLs consistent with
specified requirements concerning
security, privacy, and interoperability.
This rule enables Federal agencies, at
their discretion, to accept for REAL ID
official purposes, mDLs issued by a
State that has been granted a waiver,
provided that the underlying physical
card upon which the mDL was based is
REAL ID-compliant. The rule applies
only to Federal agency acceptance of
State-issued mDLs as defined in this
final rule for REAL ID official purposes,
but not other forms of digital
identification, physical driver’s licenses
or physical identification cards, or nonREAL ID purposes. Any temporary
waiver issued by TSA would be valid
for a period of 3 years from the date of
issuance.
To obtain a waiver, § 37.9(a) requires
a State to submit an application,
supporting data, and other
documentation to establish that their
mDLs meet the criteria specified in
§§ 37.10(a) and (b) (discussed in Part
III.C.4., below) concerning security,
privacy, and interoperability. If TSA
determines, upon evaluation of a State’s
application and supporting documents,
that a State’s mDL could be securely
accepted under the terms of a waiver,
TSA may issue such State a certificate
of waiver. TSA intends to work with
each State applying for a waiver on a
case-by-case basis to ensure that its
mDLs meet the minimum requirements
34 SSI is information obtained or developed in the
conduct of security activities, the disclosure of
which would constitute an unwarranted invasion of
privacy, reveal trade secrets or privileged or
confidential information, or be detrimental to the
security of transportation. The protection of SSI is
governed by 49 CFR part 1520.
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
Clarifies that ‘‘days’’ means calendar days, not business days.
Clarifies types of incidents that must be reported, updates agency website address, and adds SSI protection.
necessary to obtain a waiver. This
rulemaking establishes the full process
for a State to apply for and maintain a
waiver, including: instructions for
submitting the application and
responding to subsequent
communications from TSA as necessary;
specific information and documents that
a State must provide with its
application; requirements concerning
timing, issuance of decisions, requests
for reconsideration; and post-issuance
reporting requirements and other terms,
conditions, and limitations. To assist
States that are considering applying for
a waiver, TSA has developed
guidelines, entitled, ‘‘Mobile Driver’s
License Waiver Application Guidance’’
(hereinafter ‘‘TSA Waiver Guidance’’ or
‘‘the Guidance’’), which provides nonbinding recommendations of some ways
that States can meet the application
requirements set forth in this
rulemaking.35 This final rule makes
several technical and administrative
changes to the NPRM, as set forth in
Table 1, above. These changes are as
follows:
• Corrections to agency name,
website address, points of contact for
access and compliance with reporting
requirements: See §§ 37.4, 37.8(d),
37.9(a)–(c), (e)(2) & (e)(5)(i), 37.10(c),
and Appendix A, paragraph 8.6.
35 The specific measures and practices discussed
in the TSA Waiver Application Guidance are
neither mandatory nor necessarily the ‘‘preferred
solution’’ for complying with the requirements in
this final rule. Rather, they are examples of
measures and practices that a State issuer of mDLs
may choose to consider as part of its overall strategy
to issue mDLs. States have the ability to choose and
implement other measures to meet these
requirements based on factors appropriate to that
State, so long as DHS determines that the measures
implemented provide the levels of security and data
integrity necessary for Federal acceptance of mDLs
for official purposes as defined in the REAL ID Act
and 6 CFR part 37. As provided in § 37.10(c), TSA
may periodically update the Guidance as necessary
to recommend mitigations of evolving threats to
security, privacy, or data integrity.
PO 00000
Frm 00008
Fmt 4701
Sfmt 4700
• Corrections to inadvertent
omissions, typographical errors,
paragraph numbering, title/version
number of publications: See §§ 37.3,
37.4, 37.4(c)(1), 37.8(d), 37.4(g)(4) & (7),
37.10(a)(4), Appendix A, paragraphs 1.1,
2.13, 2.2, 8.4, 8.5, 8.8.
• Clarifying that ‘‘days’’ means
‘‘calendar days’’: See §§ 37.9(b), 37.9(c),
37.9(e)(2), (4)(i) & (5)(ii), and Appendix
A, paragraph 6.3.
C. Specific Provisions
This section describes the final
regulatory provisions in this rule,
including the changes discussed above.
Unless otherwise noted, these
provisions were described in the NPRM.
1. Definitions
The final rule adds new definitions to
subpart A, § 37.3, consistent with those
proposed in the NPRM. In particular,
new definitions for ‘‘mobile driver’s
license’’ and ‘‘mobile identification
card’’ are necessary because the current
regulations predated the emergence of
mDL technology and, therefore, do not
define these terms. Additionally, the
definitions reflect changes made by the
REAL ID Modernization Act, which
amended the definitions of ‘‘driver’s
license’’ and ‘‘identification card’’ to
specifically include ‘‘mobile or digital
driver’s licenses’’ and ‘‘mobile or digital
identification cards.’’ The definitions in
this rule provide a more precise
definition of ‘‘mobile driver’s license’’
and ‘‘mobile identification card’’ by
clarifying that those forms of
identification require a mobile
electronic device to store the
identification information, as well as an
electronic device to read that
information. The rule also adds a new
definition of ‘‘mDL’’ that collectively
refers to mobile versions of both Stateissued driver’s licenses and State-issued
identification cards as defined in the
REAL ID Act.
E:\FR\FM\25OCR3.SGM
25OCR3
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
ddrumheller on DSK120RN23PROD with RULES3
The final rule includes additional
definitions to explain terms used in the
waiver application criteria set forth in
§§ 37.10(a)–(b) and Appendix A to
subpart A of this part (Appendix A).
Generally, this rule defines terms that
lack a common understanding or that
are common terms of art for information
systems, and that require an explanation
to enable stakeholders to comply with
the rule. The definitions were informed
by TSA’s knowledge and experience, as
well as a publication by the National
Institute of Standards and Technology
(NIST).36 For example, the rule adds
definitions for ‘‘digital certificates’’ and
‘‘certificate systems,’’ which are
necessary elements of risk controls for
the IT systems that States use to issue
mDLs. In addition, this final rule adds
a definition for ‘‘certificate policy,’’
which forms the governance framework
for States’ certificate systems. A State
must develop, maintain, and execute a
certificate policy to comply with the
requirements set forth in Appendix A.
In addition, ‘‘Digital Signatures’’ are
mathematical algorithms that States use
to validate the authenticity and integrity
of a message. Each of these terms is
fundamental to understanding the
requirements set forth in this rule.
The final rule adds a definition for
‘‘provisioning’’ which was not proposed
in the NPRM. See § 37.3. As defined by
this final rule, ‘‘provisioning’’ means the
process by which a State transmits and
installs an mDL on an individual’s
mobile device. Although TSA did not
receive any comments seeking clarity or
requesting the addition of this or other
definitions, TSA believes provisioning
is a critical concept that requires a
definition in order to facilitate
stakeholder compliance.
2. TSA Issuance of Temporary Waiver
and State Eligibility Criteria
The final rule adds to subpart A new
§ 37.7, entitled ‘‘Temporary waiver for
mDLs; State eligibility.’’ This waiver
framework temporarily allows Federal
agencies to accept for official purposes
mDLs (which today are all noncompliant) issued by States with a
waiver, if the mDL is based on a REAL
ID-compliant physical card, when REAL
ID enforcement begins on May 7, 2025
(see § 37.8, discussed in Part III.C.3.,
below). However, the waiver framework
does not apply to any other
requirements in 6 CFR part 37 or
physical cards. Section 37.7(a)
authorizes TSA to issue a temporary
certificate of waiver to States that meet
36 See NIST, Computer Security Resource Center,
https://csrc.nist.gov/glossary (last visited July 17,
2024).
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
the waiver application criteria set forth
in §§ 37.10(a) and (b). TSA’s
determination of whether a State
satisfies these requirements will be
based on TSA’s evaluation of the
information provided by the State in its
application (see Part III.C.4., below), as
well as other information available to
TSA. Federal agencies are not required
to accept mDLs, and retain discretion to
determine their own policies regarding
identity verification.
Although NPRM § 37.7(a) stated that a
waiver would exempt a State’s mDLs
from meeting the card-based compliance
requirement of § 37.5(b), the final rule
deletes this clause because a waiver
impacts Federal agency acceptance, not
State issuance, of non-compliant mDLs.
Stated differently, a waiver allows
Federal agencies to accept noncompliant mDLs issued by States to
whom TSA has granted a waiver. As
discussed above in this preamble, the
waiver application criteria set forth
temporary security requirements
commensurate with REAL ID standards
for physical cards, ensuring that mDLs
meeting the criteria are suitable for
Federal acceptance. However, States
cannot issue REAL ID-compliant mDLs
until TSA sets forth such requirements
in the subsequent Phase 2 rulemaking.
Section 37.7(b) sets forth criteria that
a State must meet to be eligible for
consideration of a waiver. These criteria
require that the issuing State: (1) is in
full compliance with all applicable
REAL ID requirements as defined in
subpart E of this part, and (2) has
submitted an application, under
§§ 37.10(a) and (b) demonstrating that
the State issues mDLs that provide
security, privacy, and interoperability
necessary for Federal acceptance.37 The
NPRM proposed paragraph (b)(3) of this
section, which provided an additional
waiver eligibility criterion that a State
must issue mDLs only to individuals
who have been issued REAL IDcompliant physical cards. However, the
final rule does not adopt this proposal
given TSA’s evaluation of public
comments (see Part IV.A.) that this
provision would have made a State
ineligible for a waiver if the State issued
mDLs to both individuals with REAL
ID-compliant physical cards and
individuals with non-compliant
physical cards. The final rule similarly
amends § 37.10(a)(1)(vii), as proposed
by the NPRM, to remove a provision
that would have required States to issue
an mDL only to a resident who has been
issued a valid, unexpired, and REAL ID37 Sections
PO 00000
37.7(b)(1) & (2).
Frm 00009
Fmt 4701
Sfmt 4700
85347
compliant physical card that underlies
the mDL. See Part III.C.4, below.
3. Requirements for Federal Agencies
that Accept mDLs
The final rule adds to subpart A new
§ 37.8, entitled ‘‘Requirements for
Federal agencies accepting mDLs issued
by States with temporary waiver.’’ This
section requires that any Federal agency
that elects to accept mDLs for REAL ID
official purposes must meet four
requirements in new § 37.8. First, under
§ 37.8(a), a Federal agency must confirm
that the State holds a valid certificate of
waiver. Agencies would make this
confirmation by verifying that the
State’s name appears in a list of States
to whom TSA has granted a waiver.
TSA will publish this list on the REAL
ID website at www.tsa.gov/real-id/mDL
(as provided in § 37.9(b)(1)).
Second, § 37.8(b) requires Federal
agencies to use an mDL reader to
retrieve mDL data from an individual’s
mobile device and validate that the data
is authentic and unchanged following
the processes required by industry
standard ISO/IEC 18013–5:2021(E).38
Third, under § 37.8(c), Federal
agencies may accept, consistent with the
deadlines set forth in § 37.5, only those
mDLs that are issued based on an
underlying physical card that is REAL
ID compliant. Agencies would make this
determination by confirming that mDL
data element ‘‘DHS_compliance’’ has a
value of ‘‘F’’. As discussed in Part
III.C.8.a., below, the data field ‘‘DHS_
compliance’’ (defined in the American
Association of Motor Vehicle
Administrators Mobile Driver’s License
(mDL) Implementation Guidelines
Version 1.2 (Jan. 2023) (AAMVA
Guidelines)) enables an mDL to convey
the REAL ID compliance status of the
underlying physical card. TSA notes
that § 37.8(c) is a new provision that
was not included in the NPRM. TSA
intended, in proposed §§ 37.7(b)(3) and
37.10(a)(1)(vii) of the NPRM, that
Federal agencies would accept only
mDLs issued by States to whom TSA
has issued a waiver, and that are based
on an underlying physical card that is
REAL ID-compliant. Final rule § 37.8(c),
together with revisions to
§ 37.10(a)(1)(vii) (see discussion in Part
III.C.4., below), achieves that intent.
Finally, under § 37.8(d), if a Federal
agency discovers that acceptance of a
State’s mDL is likely to cause imminent
or serious threats to security, privacy, or
data integrity, the agency must report
the threats to TSA at www.tsa.gov/realid/mDL within 72 hours of such
38 See NPRM, 88 FR at 60063–64, for a discussion
of this standard.
E:\FR\FM\25OCR3.SGM
25OCR3
85348
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
discovery. Examples of reportable
threats include cyber incidents and
other events that cause serious harm to
a State’s mDL issuance system. Reports
may contain SSI, and if so, would be
subject to requirements of 49 CFR part
1520. Although the NPRM did not
propose the SSI protection provision,
TSA evaluated comments to the NPRM
(see Part IV.W., below) seeking
clarification on SSI protection for other
information (State waiver applications)
and determined that SSI protection is
warranted for Federal agency reports
under this § 37.8(d), which has been
added in this final rule. TSA will
consider whether such information
warrants suspension of that State’s
waiver under § 37.9(e)(4)(i)(B) (see
discussion in Part III.C.6., below). If
TSA elects not to issue a suspension,
Federal agencies would continue to
exercise their own discretion regarding
continuing acceptance of mDLs.
4. Requirements for States Seeking To
Apply for a Waiver
The final rule adds to subpart A new
§ 37.9, which sets forth a process for a
State to request a temporary certificate
of waiver established in new § 37.7. As
provided in § 37.9(a), a State seeking a
waiver must file a complete application
as set forth in §§ 37.10(a) and (b),
following instructions available at
www.tsa.gov/real-id/mDL. Sections
37.10(a) and (b) set forth all information,
documents, and data that a State must
include in its application for a waiver.
If TSA determines that the means that
a State implements to comply with the
requirements in §§ 37.10(a) and (b)
provide the requisite levels of security,
privacy, and data integrity for Federal
acceptance of mDLs for official
purposes, TSA would grant such State
a waiver. This rule does not, however,
prescribe specific means (other than the
requirements specified in Appendix A,
which is discussed further in Part
III.C.4.iv, below) that a State must
implement. Instead, States would retain
broad discretion to choose and
implement measures to meet these
requirements based on factors
appropriate to that State.
ddrumheller on DSK120RN23PROD with RULES3
(i) Application Requirements
As set forth in §§ 37.10(a)(1) through
(4), a State is required to establish in its
application how it issues mDLs under
the specified criteria for security,
privacy, and interoperability suitable for
acceptance by Federal agencies, as
follows:
• Paragraph (a)(1) sets forth
requirements for mDL provisioning.
Specific requirements include:
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
Æ Encryption of mDL data and an
mDL holder’s Personally Identifiable
Information,
Æ Escalated review of repeated failed
provisioning attempts,
Æ Authentication of the mDL
applicant’s mobile device,
Æ Mobile device identification keys,
Æ User identity verification controls,
Æ Applicant presentation controls,
Æ Encoding of the ‘‘DHS_compliance’’
data field. States must populate this
data field to correspond to the REAL ID
compliance status of the underlying
physical driver’s license or
identification card that a State has
issued to an mDL holder. Specifically,
‘‘DHS_compliance’’ should be
populated with ‘‘F’’ if the underlying
card is REAL ID compliant, or as
required by American Association of
Motor Vehicle Administrator (AAMVA)
Mobile Driver’s License (mDL)
Implementation Guidelines v. 1.2,
Section 3.2 (IBR’d; see § 37.4), or ‘‘N’’ if
the underlying card is not REAL IDcompliant. Although § 37.10(a)(1)(vii) of
the NPRM proposed requiring that
States issue an mDL only to a resident
who has been issued a valid, unexpired,
and REAL ID-compliant physical card
that underlies the mDL, the final rule
does not adopt this provision, based on
TSA’s evaluation of public comments
(see Part IV.A.), that this provision
would have made a State ineligible to
apply for a waiver if the State issued
mDLs to both individuals with REAL
ID-compliant physical cards and
individuals with non-compliant
physical cards,
Æ Data record requirements, and
Æ Records retention specifications.
• Paragraph (a)(2) specifies
requirements for managing state
certificate systems, which are set forth
in Appendix A.
• Paragraph (a)(3) requires a State to
demonstrate how it protects personally
identifiable information of individuals
during the mDL provisioning process.
• Paragraph (a)(4) requires a State to
explain the means it uses to:
Æ Issue mDLs that are interoperable
with requirements set forth in standard
ISO/IEC 18013–5:2021(E),
Æ Comply with the ‘‘AAMVA mDL
data element set’’ as defined in the
AAMVA Guidelines v. 1.2, Section
3.2,39 and
39 See NPRM, 88 FR at 60062–65, for a discussion
of these standards.
PO 00000
Frm 00010
Fmt 4701
Sfmt 4700
Æ Use only those algorithms for
encryption,40 secure hash function,41
and digital signatures that are specified
in ISO/IEC 18013–5:2021(E), and in
NIST FIPS PUB 180–4, 186–5, 197–
upd1, 198–1, and 202.
(ii) Audit Requirements
Section 37.10(b) requires a State to
submit an audit report prepared by an
independent auditor verifying the
accuracy of the information provided by
the State in response to § 37.10(a), as
follows:
• Paragraph (1) sets forth specific
experience, qualifications, and
accreditations that an auditor must
meet.
• Paragraph (2) requires a State to
provide information demonstrating the
absence of a potential conflict of interest
of the auditing entity.
The term ‘‘independent’’ does not
exclude an entity that is employed or
contracted by a State, so long as that
entity is independent of (i.e., not an
employee or contractor) the State’s
driver’s licensing agency. TSA provides
this clarification at the request of
commenters (see Part IV.U., below).
(iii) Waiver Application Guidance
As set forth in § 37.10(c), TSA has
published Mobile Driver’s License
Waiver Application Guidance on the
REAL ID website at www.tsa.gov/realid/mDL to assist States in completing
their applications. The Guidance
provides TSA’s recommendations for
some ways that States can meet the
requirements in § 37.10(a)(1). The
Guidance does not establish legally
enforceable requirements for States
applying for a waiver. Instead, the
Guidance provides non-binding
examples of measures and practices that
States may choose to consider as part of
their overall strategy to issue mDLs.
States continue to exercise discretion to
select processes not included in the
Guidance. Given the rapidly-evolving
cyber threat landscape, however, TSA
may periodically update the Guidance
to provide additional information
regarding newly published standards or
other sources, or recommend
mitigations of newly discovered risks to
40 Encryption refers to the process of
cryptographically transforming data into a form in
a manner that conceals the data’s original meaning
to prevent it from being read. Decryption is the
process of restoring encrypted data to its original
state. IETF RFC 4949, internet Security Glossary,
Version 2, Aug. 2007, https://datatracker.ietf.org/
doc/html/rfc4949 (last visited July 17, 2024).
41 A function that processes an input value
creating a fixed-length output value using a method
that is not reversible (i.e., given the output value of
a function it is computationally impractical to find
the function’s corresponding input value).
E:\FR\FM\25OCR3.SGM
25OCR3
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
(iv) Appendix A: Requirements for State
mDL Issuance Systems
Appendix A sets forth fundamental
requirements to ensure the security and
integrity of State mDL issuance
processes. More specifically, these
requirements concern the creation,
issuance, use, revocation, and
destruction of the State’s certificate
systems and cryptographic keys.
Appendix A consists of requirements in
eight categories: (1) Certificate Authority
Certificate Life Cycle Policy, (2)
Certificate Authority Access
Management, (3) Facility, Management,
and Operational Controls, (4) Personnel
Security Controls, (5) Technical
Security Controls, (6) Threat Detection,
(7) Logging, and (8) Incident Response
and Recovery Plan. Adherence to these
requirements, described below, ensures
that States issue mDLs in a standardized
manner with security and integrity to
establish the trust necessary for Federal
acceptance for official purposes.
• Certificate Authority Certificate Life
Cycle Policy requirements (Appendix A,
paragraph 1) ensure that a State issuing
an mDL creates and manages a formal
process which follows standardized
management and protections of digital
certificates. These requirements must be
implemented in full compliance with
the references cited in Appendix A: CA/
Browser Forum Baseline Requirements
for the Issuance and Management of
Publicly-Trusted Certificates; CA/
Browser Forum Network and Certificate
System Security Requirements; ISO/IEC
18013–5:2021(E), Annex B; NIST
Framework for Improving Critical
Infrastructure Cybersecurity; NIST SP
800–53 Rev. 5; and NIST SP 800–57.42
• Certificate Authority Access
Management requirements (Appendix
A, paragraph 2) set forth policies and
processes for States concerning, for
example, restricting access to mDL
issuance systems, policies for multifactor authentication, defining the scope
and role of personnel, and certificate
system architecture which separates and
isolates certificate system functions to
defined security zones. These
requirements must be implemented in
full compliance with the references
cited in Appendix A: CA/Browser
Forum Network and Certificate System
Security Requirements; NIST
Framework for Improving Critical
Infrastructure Cybersecurity; NIST 800–
53 Rev. 5; NIST SP 800–63–3; and NIST
SP 800–63B.43
Although NPRM Appendix A,
paragraph 1.1, proposed requiring States
to comply with NIST SP 800–53B
(among other references) as part of
States’ development of a policy to
govern their certificate systems, the final
rule does not adopt the proposal
requiring compliance with NIST SP
800–53B. Document NIST SP 800–53B,
‘‘Control Baselines for Information
Systems and Organizations,’’ defines
minimum security and privacy risk
controls for Federal Government
agencies to protect information security
systems. In addition, the publication
provides guidance, but not
requirements, for other entities that
implement NIST SP 800–53 Rev. 5 in
their own organizations. Although TSA
did not receive any public comments on
NIST SP 800–53B, after re-evaluating
the usefulness of this document, TSA
concludes that other provisions in the
final rule prescribe the necessary
security and privacy requirements for
States issuing mDLs, and NIST SP 800–
53B only serves as guidance without
providing security or privacy
enhancements. Accordingly, the
inclusion of NIST SP 800–53B is
unnecessary, and the final rule therefore
declines to adopt the NPRM’s proposal.
• Under the requirements concerning
Facility, Management, and Operational
Controls (Appendix A, paragraph 3),
States must provide specified controls
protecting facilities where certificate
systems reside from unauthorized
access, environmental damage, physical
breaches, and risks from foreign
ownership, control, or influence. These
requirements must be implemented in
full compliance with the references
42 See NPRM, 88 FR at 60062–65, for a discussion
of these standards.
43 See NPRM, 88 FR at 60062–65, for a discussion
of these standards.
ddrumheller on DSK120RN23PROD with RULES3
the mDL ecosystem. TSA will publish a
notice in the Federal Register advising
that updated Guidance is available, and
TSA will publish the updated Guidance
on the REAL ID website at www.tsa.gov/
real-id/mDL and provide a copy to all
States that have applied for or been
issued a certificate of waiver. Updates to
the Guidance will not impact issued
waivers or pending applications.
Although the NPRM proposed that TSA
would publish updated Guidance in the
Federal Register, in addition to TSA’s
website, the final rule modifies this
requirement to provide that the agency
will publish in the Federal Register
only a notice of availability of updated
guidance, but the Guidance itself will be
published on TSA’s website. This
change will enable TSA to more
expediently provide updated guidance
to the public.
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
PO 00000
Frm 00011
Fmt 4701
Sfmt 4700
85349
cited in Appendix A: NIST SP 800–53
Rev. 5.44
• Personnel security controls
(Appendix A, paragraph 4) require
States to establish policies to control
insider threat risks to certificate systems
and facilities. Such policies must
establish screening criteria for personnel
who access certificate systems, postemployment access termination,
updates to personnel security policy,
training, records retention schedules,
among other policies. These
requirements must be implemented in
full compliance with the references
cited in Appendix A: NIST SP 800–53
Rev. 5 and CA/Browser Forum Baseline
Requirements for the Issuance and
Management of Publicly-Trusted
Certificates.45
• Technical security controls
(Appendix A, paragraph 5) specify
requirements to protect certificate
system networks. In addition, States are
required to protect private
cryptographic keys of issuing authority
root certificates using dedicated
hardware security modules (HSMs) of
Level 3 or higher and document signer
private cryptographic keys in hardware
security modules of Level 2 and higher.
Dedicated HSMs are used (1) solely for
IACA root private key functions and no
other functions within the State’s
certificate system, including document
signer private key functions, and (2)
exclusively to support a single State.
States are not permitted to share with
any other State an HSM that physically
supports multiple States. Other controls
are specified regarding certificate
system architecture and cryptographic
key generation processes. These
requirements must be implemented in
full compliance with the references
cited in Appendix A: CA/Browser
Forum Network and certificate system
Security Requirements; CA/Browser
Forum Baseline Requirements for the
Issuance and Management of PubliclyTrusted Certificates; NIST Framework
for Improving Critical Infrastructure
Cybersecurity; NIST SP 800–53 Rev. 5;
NIST SP 800–57; and NIST FIPS PUB
140–3.46
• Under requirements for threat
detection (Appendix A, paragraph 6),
States must implement controls to
monitor and log evolving threats to
various mDL issuance infrastructure,
including digital certificate, issuance,
and support systems. These
requirements must be implemented in
44 See NPRM, 88 FR at 60065, for a discussion of
this standard.
45 See NPRM, 88 FR at 60062–63 & 60065, for a
discussion of these standards.
46 See NPRM, 88 FR at 60062–63 & 60065, for a
discussion of these standards.
E:\FR\FM\25OCR3.SGM
25OCR3
ddrumheller on DSK120RN23PROD with RULES3
85350
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
full compliance with the references
cited in Appendix A: CA/Browser
Forum Network and certificate system
Security Requirements; NIST
Framework for Improving Critical
Infrastructure Cybersecurity; and NIST
SP 800–53 Rev. 5.47
• Logging controls (Appendix A,
paragraph 7) require States to record
various events concerning certificate
systems, including the management of
cryptographic keys, and digital
certificate lifecycle events. The controls
set forth detailed requirements
concerning specific types of events that
must be logged, as well as timeframes
for maintaining such logs. These
requirements must be implemented in
full compliance with the references
cited in Appendix A: CA/Browser
Forum Baseline Requirements for the
Issuance and Management of
Publicly-Trusted Certificates; NIST
Framework for Improving Critical
Infrastructure Cybersecurity; and NIST
SP 800–53 Rev. 5.48
• Incident Response and Recovery
Plan (Appendix A, paragraph 8) requires
States to implement policies to respond
to and recover from security incidents.
States must act on logged events, issue
alerts to relevant personnel, respond to
alerts within a specified time period,
perform vulnerability scans, among
other things. In particular, States must
report to TSA at www.tsa.gov/real-id/
mDL within 72 hours of discovering a
reportable cybersecurity incident. In
response to comments to the NPRM
seeking clarity on the reporting
requirements (see Part IV.V.5.c., below),
the final rule adds a provision that
reportable incidents are those defined in
the TSA Cybersecurity Lexicon at
www.tsa.gov that could compromise the
integrity of a certificate system. These
requirements must be implemented in
full compliance with the references
cited in Appendix A: CA/Browser
Forum Network and Certificate System
Security Requirements; CISA Federal
Government Cybersecurity Incident &
Vulnerability Response Playbooks; 49
DHS National Cyber Incident Response
Plan; NIST SP 800–53 Rev. 5; and NIST
Framework for Improving Critical
Infrastructure Cybersecurity.50
Information submitted in response to
this section may contain SSI, and if so,
would be subject to requirements of 49
CFR part 1520. Although the NPRM did
47 See NPRM, 88 FR at 60062–63 & 60065, for a
discussion of these standards.
48 See NPRM, 88 FR at 60062–63 & 60065, for a
discussion of these standards.
49 The NPRM inadvertently omitted ‘‘Federal
Government’’ from the title of this publication.
50 See NPRM, 88 FR at 60062–63 & 60065, for a
discussion of these standards.
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
not propose the SSI protection
provision, TSA evaluated comments to
the NPRM (see Part IV.W., below)
seeking clarification on SSI protection
for other information (State waiver
applications) and determined that SSI
protection is warranted for State reports
under this Appendix paragraph 8,
which has been added in this final rule.
5. Decisions on Applications for Waiver
Section 37.9(b) establishes a timeline
and process for TSA to issue decisions
on a waiver application. Under this
paragraph, TSA endeavors to provide
States a decision on initial applications
within 60 calendar days, but not longer
than 90 calendar days. TSA will provide
three types of written notice via email:
approved, insufficient, or denied.
If TSA approves a State’s application
for a waiver, TSA will issue a certificate
of waiver to that State, and include the
State in a list of mDLs approved for
Federal use, published by TSA on the
REAL ID website at www.tsa.gov/realid/mDL.51 A certificate of waiver will
specify the date that the waiver becomes
effective, the expiration date, and any
other terms and conditions with which
a State must comply, as provided under
§ 37.9(d). A State seeking to renew its
certificate beyond the expiration date
must reapply for a waiver, as provided
in § 37.9(e)(6).
If TSA determines that an application
is insufficient, did not respond to
certain information required in
§§ 37.10(a) or (b), or contains other
deficiencies, TSA will provide an
explanation of such deficiencies and
allow the State an opportunity address
the deficiencies within the timeframe
specified in § 37.9(b)(2). TSA will
permit States to submit multiple
amended applications if necessary, with
the intent of working with States
individually to enable their mDLs to
comply with the requirements of
§§ 37.10(a) and (b).
As provided in § 37.9(b)(3), if TSA
denies an application, TSA will provide
the specific grounds for the basis of the
denial and afford the State an
opportunity to submit a new application
or to seek reconsideration of a denied
application. Under § 37.9(c)(1), States
will have 90 calendar days to file a
request for reconsideration, and TSA
will provide its final determination
within 60 calendar days. Instructions for
seeking reconsideration are provided by
TSA on the REAL ID website at
www.tsa.gov/real-id/mDL. As provided
in § 37.9(c)(2), an adverse decision upon
reconsideration would be considered a
final agency action. However, a State
51 Section
PO 00000
37.9(b)(1).
Frm 00012
Fmt 4701
Sfmt 4700
whose request for reconsideration has
been denied may submit a new
application for a waiver.
6. Limitations, Suspension, and
Termination of Certificate of Waiver
Section 37.9(e) sets forth various
terms regarding a certificate of waiver.
Specifically, under paragraph (e)(1) of
this section, a certificate of waiver is
valid for a period of three years from the
date of issuance. This period was
selected to align with the frequency of
States’ recertification under § 37.55(b).
Paragraph (e)(2) requires that a State
must report to TSA if, after it receives
a waiver, it makes significant
modifications to its mDL issuance
processes that differ in a material way
from information that the State provided
in its application. If the State makes
such modifications, it is required to
report such changes, at www.tsa.gov/
real-id/mDL, 60 calendar days before
implementing the changes. This
requirement is intended to apply to
changes that may undermine the bases
on which TSA granted a waiver. The
reporting requirement is not intended to
apply to routine, low-level changes,
such as systems maintenance and
software updates and patches. States
that are uncertain about whether a
change would trigger the reporting
requirements should contact TSA as
directed at www.tsa.gov/real-id/mDL.
The final rule added this provision to
contact TSA to provide greater certainty
to States, following TSA’s evaluation of
public comments seeking clarification
about the reporting requirements
specified in the NPRM (see Part IV.S.,
below).
Paragraph (e)(3) requires a State that
is issued a waiver to comply with all
requirements specified in §§ 37.51(a)
and 37.9(d)(3).
Paragraph (e)(4) sets forth processes
for suspension of certificates of waiver.
As provided in § 37.9(e)(4)(i)(A), TSA
may suspend the validity of a certificate
of waiver if TSA determines that a State:
• fails to comply with any terms and
conditions (see § 37.9(d)(3)) specified in
the certificate of waiver;
• fails to comply with reporting
requirements (see § 37.9(e)(2)); or
• issues mDLs in a manner that is not
consistent with the information the
State provided in its application for a
waiver under §§ 37.10(a) and (b).
Before suspending a waiver for these
reasons, TSA will provide such State
written notice via email that it intends
to suspend its waiver, along with an
explanation of the reasons, information
on how the State may address the
deficiencies, and a timeline for the State
to respond and for TSA to reply to the
E:\FR\FM\25OCR3.SGM
25OCR3
ddrumheller on DSK120RN23PROD with RULES3
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
State, as set forth in § 37.9(e)(4)(ii). TSA
may withdraw the notice of suspension,
request additional information, or issue
a final suspension. If TSA issues a final
suspension of a State’s certificate of
waiver, TSA will temporarily remove
the name of that State from the list,
published at www.tsa.gov/real-id/mDL,
of mDLs approved for Federal
acceptance for official purposes.52 TSA
intends to work with States to resolve
the conditions that result in a final
suspension, and resume validity of that
State’s waiver. A State receiving a final
suspension may apply for a new
certificate of waiver by submitting a
new application following the
procedures in § 37.9(a).
TSA additionally may suspend a
State’s waiver at any time upon
discovery that Federal acceptance of a
State’s mDL is likely to cause imminent
or serious threats to the security,
privacy, or data integrity of any Federal
agency, as set forth in § 37.9(e)(4)(i)(B).
These are more exigent circumstances
than those set forth in § 37.9(e)(4)(i)(A).
Examples of such triggering events
include cyber-attacks and other events
that cause serious harm to a State’s mDL
issuance systems. If a State discovers a
reportable cybersecurity incident, as
defined in the TSA Cybersecurity
Lexicon available at www.tsa.gov, that it
believes could compromise the integrity
of its mDL issuance systems, paragraph
8.6 of Appendix A requires States to
provide written notice to TSA as
directed at www.tsa.gov/real-id/mDL, of
such incident within no more than 72
hours of discovery. If TSA determines
such suspension is necessary, TSA will
provide written notice via email to each
State whose certificate of waiver is
affected, as soon as practicable after
discovery of the triggering event,
providing an explanation for the
suspension, as well as an estimated
timeframe for resumption of the validity
of the certificate of waiver.
Under § 37.9(e)(5)(i), TSA may
terminate a certificate of waiver for
serious or egregious violations. More
specifically, TSA may terminate a
waiver if TSA determines that a State:
• does not comply with REAL ID
requirements in § 37.51(a);
• is committing an egregious
violation of any terms and conditions
(see § 37.9(d)(3)) specified in the
certificate of waiver and is unwilling to
cure such violation;
• is committing an egregious
violation of reporting requirements (see
§ 37.9(e)(2)) and is unwilling to cure
such violation; or
52 Section
37.9(e)(4)(iii).
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
• provided false information in its
waiver application.
As required in § 37.9(e)(5)(ii), before
terminating a certificate of waiver, TSA
will provide written notice via email of
intent to terminate, including findings
supporting the termination and an
opportunity for the State to present
information. As specified, a State would
have 7 calendar days to respond to the
notice, and TSA will respond via email
within 30 calendar days. TSA may
withdraw the notice of termination,
request additional information, or issue
a final termination. Under
§ 37.9(e)(5)(iii), if TSA issues a final
termination of a State’s certificate of
waiver, TSA will remove the name of
that State from the list of mDLs
approved for Federal acceptance for
official purposes. A State whose
certificate of waiver has been terminated
may apply for a new certificate of
waiver by submitting a new application.
Section 37.9(g) provides that
information provided by States in
response to paragraphs (a), (b)(2), (c),
(e)(2), (e)(4)(ii), and (e)(5)(ii) of this
section, which concern requirements on
States to apply for and maintain a
waiver, may contain SSI and therefore
must be handled and protected in
accordance with 49 CFR part 1520.
Although the NPRM did not propose
§ 37.9(g), the final rule adds this
provision based on TSA’s evaluation of
comments to the NPRM (see Part IV.W.,
below) seeking clarification on SSI
protection for information in State
waiver applications. TSA determined
that a provision concerning SSI
protection is warranted not only for
information in State waiver
applications, but also for other
information provided by States in
response to §§ 37.9(b)(2), (c), (e)(2),
(e)(4)(ii), and (e)(5)(ii), which has been
added in this final rule.
7. Effect of Status of Waiver on REAL ID
Compliance
Section 37.9(f) clarifies that the status
of a State’s issued certificate of waiver,
including the status of a pending
application for a waiver, has no bearing
on TSA’s determination of that State’s
compliance or non-compliance with any
other section of this part. A certificate
of waiver that TSA has issued to a State
is not a determination that the State is
in compliance with any other section in
this part. Similarly, an application for a
waiver that TSA has deemed
insufficient or denied, or a certificate of
waiver TSA has suspended or
terminated, or that has expired, is not a
determination that the State is not in
compliance with any other section in
this part.
PO 00000
Frm 00013
Fmt 4701
Sfmt 4700
85351
8. Incorporation by Reference
Sections 37.8(b) and 37.10(a) and
Appendix A of this final rule provide
that States must comply with applicable
sections of specified industry standards
and government guidelines. The Office
of Federal Register (OFR) has published
regulations concerning IBR.53 These
regulations require that, for a final rule,
agencies must discuss in the preamble
to the rule the way in which materials
that the agency IBRs are reasonably
available to interested persons, and how
interested parties can obtain the
materials. Additionally, the preamble to
the rule must summarize the material.54
The final rule amends subpart A,
§ 37.4, by revising the introductory
paragraph and adding new IBR material
specified below. TSA has worked to
ensure that IBR materials are reasonably
available to the class of persons affected.
All materials may be obtained from their
publisher, as discussed below, and
certain materials as noted are available
in the Federal Docket Management
System at https://www.regulations.gov,
docket number TSA–2023–0002. In
addition, all but one of the IBR’d
standards (ISO/IEC 18013–5:2021(E),
discussed in Part II.D., below) are
available to the public for free at the
hyperlinks provided, and all are
available for inspection on a read-only
basis at TSA. Please contact TSA at
Transportation Security Administration,
Attn.: OS/ESVP/REAL ID Program, TSA
Mail Stop 6051, 6595 Springfield Center
Dr., Springfield, VA 20598–6051, (866)
289–9673, or visit www.tsa.gov. You
may also contact the REAL ID Program
Office at REALID-mDLwaiver@
tsa.dhs.gov or visit www.tsa.gov/REALID/mDL.55
The rule revises the introductory
paragraph proposed in the NPRM to
clarify availability of IBR materials.
Specifically, the final rule replaces DHS
with TSA as a location where IBR
material is available for inspection, and
provides additional points of contact at
TSA. TSA also notes that certain
material is available in the Federal
Docket Management System at https://
regulations.gov, docket number TSA–
2023–0002. The final rule makes these
revisions given TSA’s evaluation of
public comments concerning access to
IBR materials (see Part IV.K., below).
The final rule IBRs the following
material:
53 1
CFR part 51.
CFR 51.5(b).
55 The National Archives and Records
Administration (NARA) maintains the official
Federal copy of the IBR’d standards, but does not
provide or distribute copies. See www.archives.gov/
federal-register/cfr/ibr-locations.htm (last visited
Sept. 17, 2024).
54 1
E:\FR\FM\25OCR3.SGM
25OCR3
85352
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
a. American Association of Motor
Vehicle Administrators
In September 2022, the American
Association of Motor Vehicle
Administrators (AAMVA) published
Mobile Driver’s License (mDL)
Implementation Guidelines Version 1.2
(Jan. 2023) (AAMVA Guidelines),
American Association of Motor Vehicle
Administrators, 4401 Wilson Boulevard,
Suite 700, Arlington, VA 22203,
available at https://aamva.org/getmedia/
b801da7b-5584-466c-8aebf230cef6dda5/mDL-ImplementationGuidelines-Version-1-2_final.pdf (last
visited July 17, 2024). The AAMVA
Guidelines are available to the public
for free at the link provided above. The
AAMVA Guidelines adapt industry
standard ISO/IEC 18013–5:2021(E)
(discussed in Part II.D.4., below), for
State driver’s licensing agencies through
the addition of more qualified
recommendations, as the ISO/IEC
standard has been developed for
international purposes and may not
meet all purposes and needs of States
and the Federal Government. For
example, Part 3.2 of the AAMVA
Guidelines modify and expand the data
elements specified in ISO/IEC 18013–
5:2021(E), in order to enable the mDL to
indicate the REAL ID compliance status
of the underlying physical card, as well
as to ensure interoperability necessary
for Federal acceptance. AAMVA has
added mDL data fields ‘‘DHS_
compliance’’ and ‘‘DHS_temporary_
lawful_status.’’ These data fields
provide the digital version of the
requirements for data fields for physical
cards defined in 6 CFR 37.17(n) 56 and
6 CFR 37.21(e),57 respectively. As
discussed generally in Part III.C.4,
below, §§ 37.10(a)(1) and (4) of this rule
require a State to explain, as part of its
application for a waiver, how the State
issues mDLs that are compliant with
specified requirements of the AAMVA
Guidelines.
ddrumheller on DSK120RN23PROD with RULES3
b. Certification Authority Browser
Forum
The Certification Authority Browser
Forum (CA/Browser Forum) is an
organization of vendors of hardware and
software used in the production and use
of publicly trusted certificates. These
56 Section 37.17(n) provides, ‘‘The card shall bear
a DHS-approved security marking on each driver’s
license or identification card that is issued
reflecting the card’s level of compliance as set forth
in § 37.51 of this Rule.’’
57 Section 37.21(e) provides, ‘‘Temporary or
limited-term driver’s licenses and identification
cards must clearly indicate on the face of the
license and in the machine readable zone that the
license or card is a temporary or limited-term
driver’s license or identification card.’’
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
certificates are used by forum members,
non-member vendors, and governments
to establish the security and trust
mechanisms for public key
infrastructure-enabled systems. The CA/
Browser Forum has published two sets
of requirements applicable for any
implementers of PKI, including States
that are seeking to deploy certificate
systems that must be publicly trusted
and used by third parties:
• Baseline Requirements for the
Issuance and Management of PubliclyTrusted Certificates v. 1.8.6 (December
14, 2022), available at https://
cabforum.org/wp-content/uploads/CABrowser-Forum-BR-1.8.6.pdf (last
visited July 17, 2024), establishes a set
of fundamental controls for the
management of publicly trusted
certificate authorities, including the
controls and processes required for the
secure generation of digital signing keys;
and
• Network and Certificate System
Security Requirements v. 1.7 (April 5,
2021), available at https://cabforum.org/
wp-content/uploads/CA-BrowserForum-Network-Security-Guidelinesv1.7.pdf (last visited July 17, 2024),
establishes a broad set of security
controls needed to securely manage a
publicly trusted certificate authority and
key infrastructure management system.
CA/Browser Forum, 815 Eddy St, San
Francisco, CA 94109, (415) 436–9333.
To issue mDLs that can be trusted by
Federal agencies, each issuing State
must establish a certificate system,
including a root certification authority
that is under control of the issuing State.
TSA believes the CA/Browser Forum
requirements for publicly trusted
certificates have been proven to be an
effective model for securing online
transactions. As discussed generally in
Part III.C.4, below, Appendix A,
paragraphs 1, 2, and 4–8, require
compliance with specified requirements
of the CA/Browser Forum Baseline
Requirements and/or Network and
Certificate System Security
Requirements.
c. DHS and Cybersecurity and
Infrastructure Security Agency
DHS protects the nation from multiple
threats, including cybersecurity,
aviation and border security, among
others. The Cybersecurity and
Infrastructure Security Agency (CISA), a
component of DHS, is the operational
lead for Federal cybersecurity and the
national coordinator for critical
infrastructure security and resilience.
DHS and CISA have published two
guidelines which are relevant to the
operations of States’ mDL issuance
systems:
PO 00000
Frm 00014
Fmt 4701
Sfmt 4700
• DHS, National Cyber Incident
Response Plan (Dec. 2016), available at
https://www.cisa.gov/uscert/sites/
default/files/ncirp/National_Cyber_
IncidentResponse_Plan.pdf (last visited
July 17, 2024), further standardizes the
response process for cyber incidents
including the preparation, detection and
analysis, containment, eradication and
recovery, and post-incident activities.
Department of Homeland Security, 2707
Martin Luther King Jr. Ave. SE,
Washington, DC 20528; (202) 282–8000;
and
• CISA, Federal Government
Cybersecurity Incident & Vulnerability
Response Playbooks (Nov. 2021),58
available at https://www.cisa.gov/sites/
default/files/publications/Federal_
Government_Cybersecurity_Incident_
and_Vulnerability_Response_
Playbooks_508C.pdf (last visited July
17, 2024), was developed consistent
with the direction of Presidential Policy
Directive 41 (PPD–41) to establish how
the U.S. responds to and recovers from
significant cyber incidents which pose a
risk to critical infrastructure, including
the identity issuance infrastructure
operated by U.S. States issuing mDLs.
Cybersecurity and Infrastructure
Security Agency, Mail Stop 0380, 245
Murray Lane, Washington, DC 20528–
0380, (888) 282–0870. These guidelines,
available for free at the links provided
above and in the Federal Docket
Management System at https://
www.regulations.gov, docket number
TSA–2023–0002, provide details on best
practices for management of systems
during a cybersecurity incident,
providing recommendations on incident
and vulnerability response.
Management of cybersecurity incidents
and vulnerabilities is critical to
maintenance of a State’s mDL issuance
IT infrastructure. As discussed generally
in Part III.C.4, below, Appendix A,
paragraph 8, requires compliance with
specified requirements of the DHS
National Cyber Incident Response Plan
and the CISA Federal Government
Cybersecurity Incident & Vulnerability
Response Playbooks.
d. International Organization for
Standardization and International
Electrotechnical Commission
International standards-setting
organizations, the International
Organization for Standardization (ISO)
and the International Electrotechnical
Commission (IEC),59 are jointly drafted
58 The NPRM inadvertently omitted ‘‘Federal
Government’’ from the title of this publication.
59 ISO is an independent, non-governmental
international organization with a membership of
164 national standards bodies. ISO creates
documents that provide requirements,
E:\FR\FM\25OCR3.SGM
25OCR3
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
ddrumheller on DSK120RN23PROD with RULES3
international standards specific to
mDLs.60 In September 2021, ISO and
IEC published ISO/IEC 18013, Part 5,
entitled, ‘‘Personal identification—ISOcompliant driving licence.’’ ISO/IEC
18013–5:2021(E), Personal
identification—ISO-compliant driving
licence—Part 5: Mobile driving licence
(mDL) application (Sept. 2021),
International Organization for
Standardization, Chemin de Blandonnet
8, CP 401, 1214 Vernier, Geneva,
Switzerland, +41 22 749 01 11,
www.iso.org/contact-iso.html. This
standard is available for inspection at
TSA as discussed above. In addition,
TSA is working with the American
National Standards Institute (ANSI), a
private organization not affiliated with
DHS, to add this standard to the ANSI
IBR Standards Portal which provides
free, read-only access.61 TSA has
participated in the development of these
standards as a non-voting member of the
United States national body member of
the Joint Technical Committee.62
Standard ISO/IEC 18013–5:2021(E)
standardizes communications interfaces
between an mDL holder and an entity
seeking to read an individual’s mDL for
identify verification purposes, and
between a verifying entity and a State
driver’s licensing agency. This standard
also sets full operational and
communication requirements for both
mDLs and mDL readers. Standard ISO/
IEC 18013–5:2021(E) applies to
‘‘attended’’ mode verification, in which
both the mDL holder and an officer or
agent of a verifying entity are physically
present together during the time of
identity verification.63 TSA believes
specifications, guidelines or characteristics that can
be used consistently to ensure that materials,
products, processes and services are fit for their
purpose. The IEC publishes consensus-based
international standards and manages conformity
assessment systems for electric and electronic
products, systems and services, collectively known
as ‘‘electrotechnology.’’ ISO and IEC standards are
voluntary and do not include contractual, legal or
statutory obligations. ISO and IEC standards contain
both mandatory requirements and optional
recommendations, and those who choose to
implement the standards must adopt the mandatory
requirements.
60 ISO defines an International Standard as
‘‘provid[ing] rules, guidelines or characteristics for
activities or for their results, aimed at achieving the
optimum degree of order in a given context. It can
take many forms. Apart from product standards,
other examples include: test methods, codes of
practice, guideline standards and management
systems standards.’’ www.iso.org/deliverablesall.html (last visited July 17, 2024).
61 ANSI, IBR Standards Portal, https://
ibr.ansi.org/ (last visited July 17, 2024).
62 A member of TSA serves as DHS’s
representative to the Working Group.
63 Part 7 of Series ISO/IEC 18013, entitled ‘‘mDL
add-on function,’’ is an upcoming technical
specification that will standardize interfaces for
‘‘unattended’’ mode verification, in which the mDL
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
ISO/IEC 18013–5:2021(E) is critical to
enabling the interoperability, security,
and privacy necessary for wide
acceptance of mDLs by Federal agencies
for official purposes. Specifically, § 37.8
of this rule requires Federal agencies to
validate an mDL as required by standard
ISO/IEC 18013–5:2021(E), and
§ 37.10(a)(4) requires a State to explain,
as part of its application for a waiver,
how the State issues mDLs that are
interoperable with this standard to
provide the security necessary for
Federal acceptance.
e. National Institute for Standards and
Technology
The National Institute of Standards
and Technology (NIST), part of the U.S.
Department of Commerce, promotes
U.S. innovation and industrial
competitiveness by advancing
measurement science, standards, and
technology in ways that enhance
economic security and quality of life. As
part of this mission, NIST produces
measurements and standards relied on
by the U.S. agencies and industry.
i. Federal Information Processing
Standards
NIST maintains the Federal
Information Processing Standards (FIPS)
which relate to the specific protocols
and algorithms necessary to securely
process data. This suite of standards
includes:
• NIST FIPS PUB 140–3, Security
Requirements for Cryptographic
Modules (March 22, 2019), available at
https://nvlpubs.nist.gov/nistpubs/FIPS/
NIST.FIPS.140-3.pdf (last visited July
17, 2024), specifies the security
requirements for cryptographic modules
that are used to secure the keys which
are used in digitally signing mDLs, and
properly securing these keys is essential
to creating a publicly trusted certificate
authority for mDL issuance;
• NIST FIPS PUB 180–4, Secure Hash
Standard (SHS) (August 4, 2015),
available at https://nvlpubs.nist.gov/
nistpubs/FIPS/NIST.FIPS.180-4.pdf (last
visited July 17, 2024), specifies the
secure hash standard, a cryptographic
algorithm necessary to provide message
holder and officer/agent of the verifying agency are
not physically present together, and the identity
verification is conducted remotely. Unattended
identity verification is not currently considered a
REAL ID use case. ISO defines a ‘‘Technical
Specification’’ as ‘‘address[ing] work still under
technical development, or where it is believed that
there will be a future, but not immediate, possibility
of agreement on an International Standard. A
Technical Specification is published for immediate
use, but it also provides a means to obtain feedback.
The aim is that it will eventually be transformed
and republished as an International Standard.’’ ISO,
Deliverables, www.iso.org/deliverables-all.html (last
visited July 17, 2024).
PO 00000
Frm 00015
Fmt 4701
Sfmt 4700
85353
and data element integrity while using
the transaction modes specified in ISO/
IEC 18013–5:2021(E) for mDL data
transmission;
• NIST FIPS PUB 186–5, Digital
Signature Standard (DSS) (February 3,
2023), available at https://nvlpubs.
nist.gov/nistpubs/FIPS/NIST.FIPS.1865.pdf (last visited July 17, 2024),
specifies digital signature standards
used in ISO/IEC 18013–5:2021(E)
standard to provide data integrity for
mDL data elements issued by states; and
• NIST FIPS PUB 197–upd1,
Advanced Encryption Standard (AES)
(May 9, 2023) available at https://
nvlpubs.nist.gov/nistpubs/FIPS/
NIST.FIPS.197-upd1.pdf (last visited
July 17, 2024), specifies the Advanced
Encryption Standard, which is a
cryptographic algorithm used to
securely encrypt data messages used in
the transmission of mDL data in ISO/
IEC 18013–5:2021(E).
Although the NPRM proposed to IBR
the prior (2001) version, NIST FIPS PUB
197, the final rule IBRs the current (May
2023) updated version, NIST FIPS PUB
197–upd1, which NIST confirms makes
editorial improvements, but no
technical changes to the version
specified in the NPRM.64 TSA has
reviewed the updates and confirms they
are formatting and stylistic
clarifications. Although the public had
an opportunity to comment, no such
comments were received. Given the
absence of public comments, no
substantive changes to the updated
standard, and to ensure continuing
public access to this standard, the final
rule IBRs the updated version, NIST
FIPS PUB 197–upd1, which is
consistent with the NPRM’s proposal to
IBR the previous version. TSA
concludes that the compliance impact
on stakeholders of both versions of this
standard is identical.
• NIST FIPS PUB 198–1, The KeyedHash Message Authentication Code
(HMAC) (July 16, 2008) available at
https://nvlpubs.nist.gov/nistpubs/FIPS/
NIST.FIPS.198-1.pdf (last visited July
17, 2024), specifies the keyed hash
message authentication code which is
an essential cryptographic algorithm to
create a properly interoperable mDL
using ISO/IEC 18013–5:2021(E); and
• NIST FIPS PUB 202, SHA–3
Standard: Permutation-Based Hash and
Extendable-Output Functions (August 4,
2015) available at https://
64 See https://csrc.nist.gov/News/2023/nistupdates-fips-197-advanced-encryption-standard
(last visited July 17, 2024); https://nvlpubs.nist.gov/
nistpubs/FIPS/NIST.FIPS.197-upd1.pdf (last visited
July 17, 2024) at 37; https://nvlpubs.nist.gov/
nistpubs/FIPS/NIST.FIPS.197.pdf (last visited July
17, 2024) at 1.
E:\FR\FM\25OCR3.SGM
25OCR3
85354
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
ddrumheller on DSK120RN23PROD with RULES3
nvlpubs.nist.gov/nistpubs/FIPS/
NIST.FIPS.202.pdf (last visited July 17,
2024), specifies the secure hash
algorithm 3, a cryptographic algorithm
necessary to provide message and data
element integrity in ISO/IEC 18013–
5:2021(E) for mDL data transmission.
National Institute of Standards and
Technology, U.S. Department of
Commerce, 100 Bureau Drive,
Gaithersburg, MD 20899. This suite of
FIPS standards, available in the Federal
Docket Management System at https://
www.regulations.gov, docket number
TSA–2023–0002, are critical to the
transactions required for mDLs, and any
Federal systems which interact with or
are used to verify an mDL for REAL ID
official purposes will be required to use
the algorithms and protocols defined.
As discussed generally in Part III.C.4,
below, § 37.10(a)(4) requires compliance
with specified requirements of NIST
FIPS PUB 180–4, 186–5, 197–upd1,
198–1, and 202, and Appendix A,
paragraph 5, requires compliance with
FIPS PUB 140–3.
ii. Security and Privacy Controls for
Information Systems and Organizations;
Key Management
NIST has published several guidelines
to protect the security and privacy of
information systems:
• NIST SP 800–53 Rev. 5, Security
and Privacy Controls for Information
Systems and Organizations (September
2020), available at https://nvlpubs.
nist.gov/nistpubs/SpecialPublications/
NIST.SP.800-53r5.pdf (last visited July
17, 2024), specifies a broad set of
security and privacy controls which
states must use to manage the
information systems involved in the
issuance and management of mDLs;
• NIST SP 800–57 Part 1, Rev. 5,
Recommendation for Key Management:
Part 1—General (May 2020), available at
https://nvlpubs.nist.gov/nistpubs/
SpecialPublications/NIST.SP.80057pt1r5.pdf (last visited July 17, 2024),
provides general recommendations for
states managing cryptographic keys that
are used to securely issue mDLs;
• NIST SP 800–57 Part 2, Rev. 1,
Recommendation for Key Management:
Part 2—Best Practices for Key
Management Organizations (May 2019),
available at https://nvlpubs.nist.gov/
nistpubs/SpecialPublications/
NIST.SP.800-57pt2r1.pdf (last visited
July 17, 2024), provides best practices
states must follow while managing
cryptographic keys; and
• NIST SP 800–57 Part 3, Rev. 1,
Recommendation for Key Management,
Part 3: Application-Specific Key
Management Guidance (January 2015)
available at https://nvlpubs.nist.gov/
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
nistpubs/SpecialPublications/
NIST.SP.800-57Pt3r1.pdf (last visited
July 17, 2024), provides for application
specific controls for the management of
cryptographic keys.
National Institute of Standards and
Technology, U.S. Department of
Commerce, 100 Bureau Drive,
Gaithersburg, MD 20899. All of these
documents are available in the Federal
Docket Management System at https://
www.regulations.gov, docket number
TSA–2023–0002.
All four of these standards relate to
the administration of a certificate
system including: access management;
certificate life-cycle policies;
operational controls for facilities and
personnel; technical security controls;
and vulnerability management such as
threat detection, incident response, and
recovery planning. Due to the sensitive
nature of State certificate system
processes and the potential for
significant harm to security if
confidentiality, integrity, or availability
of the certificate systems is
compromised, the minimum risk
controls specified in Appendix A
require compliance with the NIST SP
800–53 Rev. 5 ‘‘high baseline’’ as set
forth in that document, as well as
compliance with the specific risk
controls described in Appendix A. In
addition, and as discussed generally in
Part III.C.4, below: Appendix A,
paragraphs 1–8, require compliance
with NIST SP 800–53 Rev. 5; paragraphs
1 and 5 require compliance with NIST
SP 800–57 Part 1, Rev. 5; paragraph 1
requires compliance with NIST SP 800–
57 Part 2 Rev. 1; and paragraph 1
requires compliance with NIST SP 800–
57 Part 3, Rev. 1.
iii. Digital Identity Guidelines
NIST has published NIST SP 800–63–
3, which covers technical requirements
for Federal agencies implementing
digital identity: NIST Special
Publication 800–63–3, Digital Identity
Guidelines (June 2017), National
Institute of Standards and Technology,
U.S. Department of Commerce, 100
Bureau Drive, Gaithersburg, MD 20899,
available at https://nvlpubs.nist.gov/
nistpubs/SpecialPublications/
NIST.SP.800-63-3.pdf (last visited July
17, 2024)and in the Federal Docket
Management System at https://
www.regulations.gov, docket number
TSA–2023–0002.
The Digital Identity Guidelines define
technical requirements in each of the
areas of identity proofing, registration,
user authentication, and related issues.
Because TSA is not aware of a common
industry standard for mDL provisioning
that is appropriate for official REAL ID
PO 00000
Frm 00016
Fmt 4701
Sfmt 4700
purposes today, TSA views the Digital
Identity Guidelines as critical to
informing waiver application
requirements for States regarding
provisioning. As discussed generally in
Part III.C.4, below, under § 37.10(a)(2) of
the final rule, which requires
compliance with Appendix A, a State
must explain, as part of its application
for a waiver, how the State issues mDLs
that are compliant with NIST SP 800–
63–3 to provide the security for mDL IT
infrastructure necessary for Federal
acceptance.
NIST has also published Special
Publication 800–63B, Digital Identity
Guidelines: Authentication and
Lifecycle Management (June 2017),
National Institute of Standards and
Technology, U.S. Department of
Commerce, 100 Bureau Drive,
Gaithersburg, MD 20899, available at
https://nvlpubsnist.gov/nistpubs/
specialpublications/nist.sp.800-63b.pdf
(last visited July 17, 2024) and in the
Federal Docket Management System at
https://www.regulations.gov, docket
number TSA–2023–0002. This
document, which is a part of NIST SP
800–63–3, provides technical
requirements for Federal agencies
implementing digital identity services.
The standard focuses on the
authentication of subjects interacting
with government systems over open
networks, establishing that a given
claimant is a subscriber who has been
previously authenticated and
establishes three authenticator
assurance levels. As discussed generally
in Part III.C.4, below, § 37.10(a)(2) of
this rule requires compliance with
Appendix A, which requires a State to
explain, as part of its application for a
waiver, how the State manages its mDL
issuance infrastructure using
authenticators at assurance levels
provided in NIST SP 800–63B.
iv. Framework for Improving Critical
Infrastructure Cybersecurity
NIST has published Framework for
Improving Critical Infrastructure
Cybersecurity v. 1.1 (April 16, 2018),
National Institute of Standards and
Technology, U.S. Department of
Commerce, 100 Bureau Drive,
Gaithersburg, MD 20899, available at
https://nvlpubs.nist.gov/nistpubs/
CSWP/NIST.CSWP.04162018.pdf (last
visited July 17, 2024). This document,
available in the Federal Docket
Management System at https://
www.regulations.gov, docket number
TSA–2023–0002, provides relevant
information for cybersecurity for States
issuing mDLs. As discussed generally in
Part III.C.4, below, certain requirements
from the NIST Framework for Improving
E:\FR\FM\25OCR3.SGM
25OCR3
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
Critical Infrastructure Cybersecurity
have been adopted in Appendix A,
paragraphs 1, 2, and 5–8.
ddrumheller on DSK120RN23PROD with RULES3
D. Impacted Stakeholders
This final rule applies to State driver’s
licensing agencies issuing mDLs that
seek a temporary waiver from TSA for
its mDLs. The waiver established by this
rule enables Federal agencies to accept
such mDLs for official purposes, defined
in the REAL ID Act as accessing Federal
facilities, entering nuclear power plants,
boarding Federally regulated
commercial aircraft, and any other
purposes that the Secretary shall
determine. Any Federal agency that
chooses to accept mDLs for official
purposes must procure a reader in order
to receive an individual’s identity data.
This final rule does not apply to:
• States that do not seek a waiver for
mDLs;
• Non-State issuers of other forms of
digital identification; or
• Federal agencies that elect not to
accept mDLs.
A State seeking a waiver for Federal
acceptance of its mDLs for official
purposes is required to file with TSA a
complete application and supporting
documents.65 A State must demonstrate
how its mDLs meet the requirements for
a waiver set forth in §§ 37.10(a) and (b)
when completing the application.
E. Use Cases Affected by This Rule
This final rule applies only to Federal
acceptance of mDLs for official
purposes, defined by the REAL ID
regulations as accessing Federal
facilities, entering nuclear power plants,
and boarding Federally regulated
commercial aircraft. Any other purpose
is beyond the scope of this rulemaking.
For example, a waiver issued under this
rule does not apply to any of the
following:
• mDL acceptance by Federal
agencies for non-REAL ID official uses
(e.g., applying for Federal benefits);
• mDL acceptance by non-Federal
agencies (e.g., State agencies,
businesses, private persons);
• Commercial transactions; or
• Physical driver’s licenses or
identification cards.
Nothing in this rule requires Federal
agencies to accept mDLs, as each
Federal agency retains the discretion to
determine its identification policies.
Additionally, nothing in this rule
requires a State to seek a waiver or issue
mDLs.
F. Severability
TSA notes that these changes impact
multiple provisions that are not
65 Section
37.9(a).
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
necessarily interrelated and can
function independent of one another. As
such, TSA believes that some of the
provisions of each new part can
function sensibly independent of other
provisions. Therefore, in the event that
any provisions in this rulemaking action
as finalized are invalidated by a
reviewing court, TSA intends remaining
provisions to remain in effect to the
fullest extent possible.
IV. Discussion of Comments
TSA published the NPRM on August
30, 2023,66 and the deadline for public
comments was October 16, 2023. TSA
received 31 comments,67 including
some comments that were submitted
shortly after the comment period closed.
TSA carefully considered every
comment received as part of the official
record, including those that were
submitted late. Comments and TSA’s
responses are as summarized by topic
below.
A. Waiver Eligibility
Comments: Several State driver’s
licensing agencies, an association, and
some vendors expressed concerns that
under §§ 37.7(b)(3) and 37.10(a)(1)(vii)
of the NPRM, TSA would issue waivers
to States that issued mDLs only to
holders of REAL ID-compliant physical
cards, but a State that issues mDLs to
two groups of individuals—both holders
of REAL ID-compliant AND noncompliant physical cards—would be
ineligible for a waiver because of
issuance to the latter group. Stated
differently, a State’s issuance of mDLs to
holders of non-compliant physical cards
alone would remove the State’s
eligibility to apply for a waiver.
Another commenter requested
clarification regarding whether a State
may still apply for and receive a waiver
after enforcement of the REAL ID Act
and regulations begins on May 7, 2025.
TSA Response: TSA agrees with
commenters and is revising the final
rule to clarify that a State will not be
excluded from eligibility to apply for a
waiver if a State issues mDLs to both
REAL ID compliant and non-compliant
physical cardholders. The intended
purpose of TSA’s requirement is for
States to ensure that an individual’s
mDL matches the compliance status of
the underlying physical card, and for
States to issue an mDL in a manner that
enables a verifying Federal agency to
confirm the underlying physical card’s
REAL ID compliance status.
66 See
88 FR 60056.
67 The 31 total comments include one duplicate,
one correction, and one confidential submission.
PO 00000
Frm 00017
Fmt 4701
Sfmt 4700
85355
Consistent with that intent, and to
address commenters’ concerns, the final
rule makes three changes to the NPRM.
First, this final rule deletes § 37.7(b)(3),
as proposed by the NPRM, which
provided as a criterion of waiver
eligibility that a State must issue mDLs
only to individuals who have been
issued REAL ID-compliant physical
cards.
Second, the final rule deletes a similar
requirement from § 37.10(a)(1)(vii), as
proposed by the NPRM, which provided
that States must issue an mDL only to
a resident who has been issued a valid,
unexpired, and REAL ID-compliant
physical card that underlies the mDL.
The final rule modifies this provision to
require States to populate this data field
to correspond to the REAL ID
compliance status of the underlying
physical driver’s license or
identification card that a State has
issued to an mDL holder. Specifically,
§ 37.10(a)(1)(vii)(A) requires mDL data
element ‘‘DHS_compliance’’ to be
populated with ‘‘F’’ if the underlying
card is REAL ID-compliant, or as
required by the AAMVA Guidelines,68
Section 3.2. In addition,
§ 37.10(a)(1)(vii)(B) requires mDL data
element ‘‘DHS_compliance’’ to be
populated ‘‘N’’ if the underlying card is
not REAL ID-compliant.
Third, the final rule adds new
§ 37.8(c), which requires Federal
agencies to confirm that the physical
card underlying the mDL is REAL IDcompliant, as Federal agencies will only
be permitted to accept mDLs if the
underlying card is REAL ID-compliant.
Federal agencies would make that
determination by reviewing data
element ‘‘DHS_compliance’’ and
confirming that it has been marked ‘‘F.’’
These changes ensure—without
compromising a State’s waiver
eligibility—that an individual’s mDL
matches the compliance status of the
physical card, and that Federal agency
will accept only those mDLs that are
based on a REAL ID-compliant
underlying physical card.
Separately, in response to the
commenter’s question regarding waiver
applications after REAL ID enforcement
begins on May 7, 2025, TSA confirms
that a State indeed may apply for and
receive a waiver after enforcement
begins.
B. Conditions on Federal Agencies
Accepting mDLs
Comments: An association requested
clarification concerning requirements
68 The AAMVA Guidelines require, among other
things, that if the ‘EDL_credential’ element is
present, the ‘DHS_compliance’ element shall have
a value of ‘‘F.’’
E:\FR\FM\25OCR3.SGM
25OCR3
ddrumheller on DSK120RN23PROD with RULES3
85356
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
on Federal agencies that choose to
accept mDLs. Specifically, the
commenter noted that the preamble
provided that one of the ‘‘conditions for
TSA acceptance’’ is that TSA has
determined the mDL issuing State is
REAL ID-compliant. The commenter
sought clarification on the timing of
when this compliance determination is
made, specifically, whether this is a
one-time determination, whether it is
made at the time when TSA is
reviewing a State’s application, or if the
State’s re-certification schedule is
applicable.
TSA Response: First, TSA notes that
this rule does not set conditions only for
‘‘TSA Acceptance.’’ Instead, the rule
sets forth requirements for all Federal
agencies who choose to accept mDLs for
official purposes as defined in the REAL
ID Act. Second, TSA clarifies that
determination of a State’s REAL ID
compliance status is not a requirement
for other Federal agencies to make. The
only conditions on Federal agencies
who accept mDLs are set forth in § 37.8,
which requires the agency to: (1)
confirm the State holds a valid waiver
by reviewing the specified TSA website,
(2) use an mDL reader to communicate
with and validate an individual’s mDL,
(3) confirm that the underlying physical
card is REAL ID-compliant, and (4)
notify TSA within 72 hours of the
discovery of specified security, privacy,
or data integrity threats. A State’s
compliance status is an element of a
State’s eligibility to apply for a waiver,
as set forth in § 37.7(b)(1), and TSA will
make this determination when
reviewing a State’s application.
However, TSA acknowledges that the
preamble to the NPRM states that a
Federal agency must make this
compliance determination. TSA has
revised the preamble to this final rule to
reflect the intended requirements.
In response to comments, TSA also
provides further clarification on the
timing of its determination of a State’s
compliance status. TSA will make an
initial determination of State
compliance status at the time of
application, but this is not a one-time
determination. States have a continuing
obligation, under 6 CFR 37.55(b), to
maintain their compliance status by
recertifying compliance every 3 years,
an obligation which continues
throughout the duration of the waiver.
If recertification occurs after a State is
issued a waiver and TSA determines the
State is no longer in compliance, the
waiver may be subject to review
pursuant to § 37.9(e)(5).
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
C. Waiver Application Criteria
1. Personally Identifiable Information
and Privacy
Comments: An association remarked
that § 37.10(a)(1)(i) introduces
additional requirements concerning
individuals’ Personally Identifiable
Information (PII) that are not related to
mDL issuance and exceed existing
requirements in the regulations. The
commenter advised that the rule should
not expand REAL ID requirements that
are unrelated to mDLs.
The association further noted that
although privacy is an important
concept, it applies mostly to the
agreement between an issuing State and
the mDL holder, and that the only
applicability to verifying Federal
agencies is ensuring that the agency
receives only the information necessary
for identity verification. The commenter
therefore recommended updating
§ 37.10(a)(3) so that States are only
required to provision mDLs to digital
wallets in a manner that will release
only the data requested by the verifier.
Additional privacy requirements, the
commenter submitted, while important
to individuals and States, may not affect
verifying agencies.
TSA Response: Sections 37.10(a)(1)(i)
and (a)(3) of this rule extend to mDLs
PII protections that are analogous to
those in the existing regulations
regarding physical cards. This rule is
adding mirroring PII provisions because
mDLs involve a new data set and
additional elements that must be
protected, which are not addressed in
the current regulations. Section
37.10(a)(1)(i) requires encryption of PII,
and § 37.10(a)(3) requires an
explanation of the means used to protect
PII during processing, storage, and
destruction of mDL records and
provisioning records. Nothing in this
final rule modifies or imposes new
requirements regarding physical cards.
While TSA concurs that there is a
privacy interest between individuals
and States, verifying Federal agencies
have an equally important privacy
interest in trusted mDL transactions.
2. Provisioning
Comments: An association contended
that although the intended goal of
§§ 37.10(a)(1)(iii)–(vi) is the step of
‘‘binding,’’ which means ensuring that
an mDL is provisioned to the correct
mDL holder’s device, binding has no
value to verifying Federal agencies,
other than copy protection, at the time
of identity verification. The association
questions, therefore, the need for these
requirements.
PO 00000
Frm 00018
Fmt 4701
Sfmt 4700
TSA Response: ‘‘Binding,’’ a critical
step in mDL provisioning, refers to the
process where the issuing State binds,
or pairs, the mDL data to a specific
device through the generation of the
device key and signing of the mobile
security object. Binding is critically
important to all stakeholders involved
in an mDL transaction, including
verifying Federal agencies, as they share
a strong interest in a secure, trusted
mDL ecosystem in which identity data
is protected during mDL provisioning,
provided only to the rightful holder of
the data, bound to that holder’s device,
and resists cloning to other devices
unless approved by the issuing State.
Section 37.10(a)(1) sets forth
requirements for provisioning, and the
requirements specified in
§ 37.10(a)(1)(iii)-(vi) provide the
requisite security and privacy
protections to achieve secure binding.
The TSA Waiver Guidance also sets
forth recommendations for provisioning
and binding. To clarify the relationship
between provisioning and binding, the
final rule adds a new definition to § 37.3
for ‘‘provisioning.’’
3. AAMVA mDL Implementation
Guidelines
Comments: AAMVA noted that
§ 37.10(a)(4) refers to version 1.1 of the
AAMVA Guidelines, conflicting with
§ 37.4, which incorporates by reference
version 1.2 of this document.
TSA Response: TSA agrees that
§ 37.10(a)(4) of the NPRM inadvertently
listed version 1.1, instead of version 1.2,
of the AAMVA Guidelines. TSA notes
that the NPRM correctly cited version
1.2 in all other instances 69 where it
referenced the AAMVA Guidelines, and
only made a typographical error to
version ‘‘1.1’’ in a single instance, in
§ 37.10(a)(4). TSA did not receive any
comments to the contrary. Accordingly,
the final rule has made a technical
correction in § 37.10(a)(4) to address
this typographical error and correctly
refer to version 1.2.
4. Resident Address Data Element
Comments: AAMVA submitted that
§ 37.10(a)(4)(i) of the NPRM
characterizes the ‘‘resident_address’’
data element as ‘‘optional,’’ despite that
the AAMVA Guidelines define this data
element as mandatory.
TSA Response: TSA clarifies that the
‘‘resident_address’’ data element
required in § 37.10(a)(4)(i) refers to the
data element as defined in the ISO/IEC
18013–5:2021(E) standard namespace
‘‘org.iso.18013.5.1,’’ not any data
69 See 88 FR 60056, 60062, 60068, 60071, 60085,
& 60087 (Aug. 30, 2023).
E:\FR\FM\25OCR3.SGM
25OCR3
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
ddrumheller on DSK120RN23PROD with RULES3
elements defined in the AAMVA
Guidelines. The use of the term
‘‘optional’’ in § 37.10(a)(4)(i) reflects
ISO/IEC’s designation of that data
element as defined in ISO/IEC 18013–
5:2021(E). For clarification, despite ISO/
IEC’s designation of ‘‘resident_address’’
as an ‘‘optional’’ data field in ISO/IEC
18013–5:2021(E), § 37.10(a)(4)(i) of this
final rule mandates inclusion of that
data field.
D. TSA Waiver Application Guidance
Comments: An association
recommended that the TSA Waiver
Guidance should include references to
the corresponding sections of the rule.
The association further recommended
that the documents incorporated by
reference in § 37.4 should be moved to
the Guidance to facilitate efficient
updates as new standards are published.
A State noted that the Guidance was not
available at the website specified in
§ 37.10(c).
TSA Response: TSA agrees that the
Guidance would be more helpful if it
references the applicable provisions in
the final rule to which the Guidance
applies. The Guidance has been revised
to specifically include the
corresponding regulatory provisions
where possible. TSA appreciates the
commenter’s perspective and this
opportunity to provide clarity to the
public and stakeholders.
Regarding the recommendation to
move the standards from § 37.4 to the
Guidance to reflect updated or newlypublished standards, TSA notes that the
Guidance is non-binding and does not
establish any legally enforceable
requirements. All security measures,
practices, and metrics set forth are
simply illustrative, non-exclusive
examples for States to consider as part
of their overall strategy to address the
requirements under § 37.10(a). Any
legally enforceable requirements must
be set forth in regulatory text. Moreover,
as provided in § 37.10(c), TSA may
update this Guidance as necessary to
provide additional information or
address evolving threats to security,
privacy, or data integrity.
TSA also clarifies that the Guidance
was available during the comment
period at the public rulemaking docket
at www.regulations.gov, and continues
to be available. The website specified in
§ 37.10(c), and throughout the rule, was
under development at the time of the
NPRM but is now live.
E. General Concerns About mDLs
Comments: Some public interest
organizations posited that public
demand for mDLs is ‘‘non-existent’’ and
‘‘conjectural.’’ However, some States
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
disagreed. One State commented that it
has issued more than 200,000 mDLs to
residents following a pilot in 2017 and
more recent expansion in 2022 and
2023. Another State commented that in
the 3 months since it began offering its
mDL app, it has been downloaded more
than 7,000 times. Other commenters
questioned the claimed mDL benefits
concerning security, privacy, consumer
protection, contact-free hygiene, among
others, with one commenter opining
that any such benefits would be realized
only by those with the financial and
technical means to purchase mobile
devices that meet the specifications in
the proposed rule. Some commenters
further noted that mDLs would increase
the vulnerability of driver’s licensing
agency databases to cyberattacks.
However, other commenters believe
mDLs provide potential security and
privacy benefits. One industry vendor
commented that the rule would
strengthen mDL integrity and security,
which the commenter believes is critical
to mDL holders and verifying entities.
The commenter specifically noted that
unlike physical cards, which require an
agency’s verifying officer to have
specialized knowledge of potentially
‘‘hundreds’’ of different card designs of
56 issuing jurisdictions, the electronic
safeguards built into mDLs obviate the
need for such knowledge. The
commenter further opined that mDLs
provide privacy protections by
empowering the mDL holder to control
precisely what information is shared
and with whom.
TSA Response: TSA disagrees that
public demand for mDLs is weak. As
discussed in Part II.C.2., above, TSA
understands that more than half of all
56 issuing jurisdictions are considering
or issuing mDLs, and this number
continues to increase. Indeed, TSA
notes that some States submitted
comments disagreeing about the
purported lack of demand for mDLs.
Regarding potential benefits of mDLs,
TSA continues to believe that mDLs
provide potential benefits, including
security, privacy, efficiency, and
contact-free hygiene, as discussed
further in the NPRM.70 TSA has directly
observed some of these benefits through
its ongoing mDL testing at airport
checkpoints (discussed in Part II.C.2,
above). In addition, as discussed above,
some commenters agreed with TSA’s
view that mDLs provide potential
security and privacy benefits.
TSA disagrees that the rule effectively
requires the purchase of smartphones
that are costly or technologically
complex, which commenters contend
70 See
PO 00000
88 FR at 60062.
Frm 00019
Fmt 4701
Sfmt 4700
85357
would limit potential mDL benefits only
to those with financial and technical
means. The potential benefits of mDLs
can be realized using nearly any
smartphone available today. The only
technical requirements for such devices,
as a result of this final rule, are a
smartphone that employs Bluetooth
Low Energy and has secure hardware
capability to protect the device key
associated with the mDL. These
technologies are widely available on
most smartphones.
With respect to concerns that mDLs
introduce new cyber vulnerabilities,
TSA continues to believe that the
minimum security requirements set
forth in this rule would minimize the
potential for harm resulting from such
threats. As discussed in Part III.C.4.iii
above, cyber threats are diverse and
evolving, and TSA intends to address
them by updating its Waiver
Application Guidance as necessary.
Some commenters agreed that this
rulemaking would improve mDL
security and the ability to resist cyber
threats. An advocacy group shared that
some States and industry today are
using non-standardized technological
approaches with wide substantive
variances in security methodologies,
thereby making some mDLs susceptible
to fraud and privacy intrusions. The
commenter noted that the proposed rule
would overcome those concerns by
providing standardized approaches to
protect security and privacy.
F. Scope of Rulemaking and mDL
Acceptance
Comments: An association opined
that mDLs could provide benefits to
Federal agencies beyond the uses
discussed in the proposed rule.
Specifically, the association noted that
the Departments of State and
Transportation could accept mDLs to
improve issuance of passports and
commercial driver’s licenses,
respectively. The commenter also
sought clarification on how mDL
acceptance, and REAL ID broadly, will
be operationalized at TSA, both today
and when enforcement of the REAL ID
Act begins.
One State recommended that the
definition of mDLs in the proposed rule
be expanded to include Enhanced
Driver’s Licenses and Enhanced
Identification Cards (collectively
‘‘Enhanced Driver’s Licenses’’ or
‘‘EDLs’’).
TSA Response: TSA reiterates that the
final rule applies only to Federal
acceptance of mDLs for official
purposes, defined by the REAL ID Act
regulations as accessing Federal
facilities, entering nuclear power plants,
E:\FR\FM\25OCR3.SGM
25OCR3
85358
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
ddrumheller on DSK120RN23PROD with RULES3
and boarding Federally regulated
commercial aircraft. Any other purpose
is beyond the scope of this rulemaking.
TSA further notes that each Federal
agency that chooses to accept mDLs for
official purposes must build its
infrastructure, train its workforce, and
operationalize mDL acceptance. Each
Federal agency has the discretion to
determine its own policies concerning
acceptable IDs for access to their
facilities, and for communicating this
information to the public. TSA advises
that questions concerning individual
Federal agency identification policies
and operational details should be
directed to the appropriate program
offices of individual agencies.
Regarding EDLs, the definition of
‘‘mDL’’ does not require modification
because EDLs comply with REAL ID
standards (despite that they are not
governed by the REAL ID Act).71 For
that reason, this rule makes clear that
mDLs issued based on EDLs will be
accepted by Federal agencies under the
waiver process. Indeed, the AAMVA
Guidelines (incorporated by reference;
see § 37.4) similarly treat EDLs as
synonymous with REAL ID-compliant
driver’s licenses, requiring that States
encode EDL-based mDLs as REAL IDcompliant. To confirm that States
properly encode an EDL as REAL IDcompliant, § 37.10(a)(1)(vii)(A) of this
final rule requires States to populate the
‘‘DHS_compliance’’ data element with
‘‘F,’’ indicating REAL ID-compliant, as
required by the AAMVA Guidelines (see
Part IV.A., above). This ensures that a
Federal officer verifying an EDL-based
mDL will correctly identify the REAL ID
compliance status of the underlying
EDL. TSA appreciates the commenter’s
perspective and this opportunity to
provide clarity to stakeholders.
G. Privacy
Comments: Several public interest
organizations expressed concerns that
this rulemaking would establish a
national digital ID that Federal agencies
could use in wide ranging
circumstances and purposes. They
suggested that this type of ID could lead
to sharing of data between State driver’s
licensing agencies and Federal agencies,
producing serious harms to privacy and
security, particularly for immigrant
communities. Immigrants, the
commenters argue, could suffer because
many States are issuing non-compliant
cards to them, and this rule could
71 EDLs are governed by the Western Hemisphere
Travel Initiative. As explained in the 2008 Final
Rule, DHS worked closely with States to ensure that
EDLs would comply with REAL ID standards. 73 FR
5272, 5276 (Jan. 29, 2008). Some States mark EDLs
as REAL ID compliant on the front of the card.
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
influence States to share with Federal
agencies information provided in
immigrant applications, potentially
resulting in deportation.
Other public interest organizations
noted that the proposed rule would
facilitate tracking and surveillance
because the rule requires ‘‘installation of
a government app on a mobile device of
a certain type.’’ An organization further
suggested that it be allowed to view
source code for these apps in order to
learn their true intent. Commenters
recommended that the rule should not
go forward without additional privacy
safeguards, noting that standard ISO/IEC
18013–5:2021(E) is not sufficient.
TSA Response: In the REAL ID Act,
Congress established minimum
standards for the issuance of Stateissued driver’s licenses and
identification cards acceptable for
official Federal purposes. Neither the
Act nor implementing regulations, 6
CFR part 37, contemplate the creation of
a sole national identification card or
Federal database of driver’s license
information. Under the statute, the
official purposes for Federal agency
acceptance of mDLs relate to identity
verification, and Congress neither
created nor authorized a national
identification card. Each individual
licensing jurisdiction continues to issue
its own unique licenses, maintain its
own records, and control access to those
records and the circumstances under
which access may be provided. In
addition, States continue to have full
discretion to issue driver’s licenses that
are non-REAL ID compliant, or to issue
dual classes of compliant and noncompliant cards, which some States are
doing. States also have full discretion to
choose not to issue mDLs at all. The
REAL ID Act does not prevent
compliant States from issuing driver’s
licenses and identification cards where
the identity of the applicant cannot be
assured or for whom lawful presence is
not determined. This rule does not
intend to interfere with existing State
laws that are designed to protect driver’s
licensing agency data from being shared
and used to enforce Federal immigration
laws.
Nothing in this final rule requires a
Federal agency to accept mDLs.
Agencies that choose to do so will
receive mDL user information only with
the individual’s consent, and
individuals will control access and use
of the mDL in their mobile devices. For
example, in TSA mDL testing at airport
security checkpoints, passengers present
their mDLs to TSA, which uses an mDL
reader to establish a secure
communications channel with the
passenger’s mobile device to receive the
PO 00000
Frm 00020
Fmt 4701
Sfmt 4700
passenger’s mDL data. TSA’s mDL
readers are programmed to request
access only to the relevant data needed
for identity verification, which TSA
cannot receive unless the passenger
provides consent. Upon consent, the
passenger’s mobile device releases the
mDL data to TSA, which automatically
validates the authenticity of the
information by confirming the digital
signature of the issuing State driver’s
licensing agency (see discussion in Part
II.C.1., above). TSA emphasizes that it
receives passenger data only from the
passenger’s mobile device, and not from
the issuing State driver’s licensing
agency. Although TSA does
communicate with a driver’s licensing
agency, this is solely to receive the
agency’s private key for data validation
purposes—not identity verification.
TSA further emphasizes that it never
communicates with driver’s licensing
agencies information regarding the
locations or instances of passengers’
mDL use. The passenger’s PII is used in
the same manner that biographic
information from physical IDs is used.
The PII that is collected from the mDL,
along with the live photo taken by TSA,
is overwritten when the next passenger
scan occurs or when TSA switches off
its ID scanner, whichever occurs first.
An mDL offers additional privacy and
security benefits over physical IDs. An
mDL transmits only the necessary
information requested by TSA, rather
than sharing all data elements found on
a physical ID, and requires user’s
consent. All mDL data is encrypted at
rest, during transfer, and during all
transactions through secure channels.
Nothing in this rule mandates that
individuals must install a ‘‘government’’
app or any type of app at all. Nothing
in this rule requires individuals to use
a mobile device of any type, or to
choose to receive an mDL at all. TSA
appreciates the opportunity to provide a
detailed explanation of the privacy
protections conferred by mDLs.
Additional information can be found in
DHS’s Privacy Impact Assessment 72
concerning privacy risks in the use of
digital IDs in the identity verification
process at TSA airport security
checkpoints.
H. Waiver Validity Period and Renewals
Comments: An industry vendor
sought clarification on whether a waiver
is valid until revoked or for a defined
period. An association urged that the
72 See DHS, Privacy Impact Assessment for the
Travel Document Checker Automation—Digital
Identity Technology Pilots, www.dhs.gov/sites/
default/files/2022-01/privacy-pia-tsa051digitalidentitytechnologypilots-january2022_0.pdf
(last visited July 17, 2024).
E:\FR\FM\25OCR3.SGM
25OCR3
ddrumheller on DSK120RN23PROD with RULES3
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
validity period of a waiver should be
long enough such that States are not
frequently submitting applications for
renewals and awaiting determinations,
and that the period should cover both
waiver applications and State recertifications. The association further
submitted that TSA should consider a
grace period to allow a waiver to remain
valid for some period after the Phase 2
rule is effective. A State sought
clarification of requirements for
renewing a waiver if the subsequent
Phase 2 rulemaking does not commence
within 3 years of publication of this
final rule in order to assess the
resources required to prepare the
renewal application. A vendor sought
clarification regarding whether a new
audit report is required for renewal
applications if a State uses the same
issuance vendors for both the initial and
renewal applications.
TSA Response: Under § 37.9(e)(1), a
waiver will be valid for three years from
date of issuance unless suspended or
terminated under §§ 37.9(e)(4) or (5). As
discussed in Part III.C.6., above, this
rule specifies a three-year waiver
validity period because it aligns with
the frequency for States to re-certify
compliance with § 37.55(b). TSA
believes this period is sufficient given
the expedient timeframes specified in
§ 37.9(b) for TSA to respond to
applications. As set forth therein, TSA
will provide: an initial decision on
applications within 60–90 calendar
days, replies to States responses to
notices of insufficiency within 30
calendar days, and determinations on
petitions for reconsideration within 60
calendar days. These timeframes resist
the commenter’s concern about
potentially being trapped in an enduring
cycle of submitting renewal applications
and waiting extensive period for TSA
responses. Moreover, the three-year
waiver validity period equals the threeyear frequency of States to recertify
compliance required by § 37.55(b), as
the commenter notes.
Regarding the timing of the Phase 2
rulemaking and the need for a grace
period, § 37.9(e)(6) specifies
requirements for States that seek to
renew waivers beyond the validity
period. Renewal provides a mechanism
for waivers to persist independent of the
timing of future rulemakings, which
obviates the need for a grace period.
With respect to audit reports for
renewal applications, TSA confirms that
States must submit an audit report for
renewals, regardless of a State’s mDL
issuance vendors or system changes.
Regarding the resources required for
renewal applications, TSA assumes
such audit costs for subsequent waiver
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
applications will remain the same as the
audit for the initial application, but TSA
does estimate a 25 percent to 70 percent
reduction in the renewal application
cost because the State would have
gained experience and collected
evidence from the previously approved
waiver application.73 The processes to
renew a waiver are identical to those set
forth in § 37.9 for initial applications.
I. Vendor and Technology ‘‘Lock-in’’
Effects
Comments: Some public interest
organizations commented that the
NPRM would promote a ‘‘lock-in’’
effect, in which certain technologies and
vendors would gain a durable
competitive advantage that would be
difficult for competitors to overcome. In
particular, the commenters expressed
concern that markets for digital wallets
and mDL readers are likely to be harmed
because of the rule’s reliance on
standards such as ISO/IEC 18013–
5:2021(E), which the commenters
believe create security, privacy, and
interoperability risks. According to the
commenters, digital wallets and other
necessary mDL technology should be
based on open standards.
TSA Response: TSA is currently
testing mDLs issued by seven States
who are partnering with multiple
providers of digital wallets. One
provider, SpruceID, is based on an
open-source toolkit for developing
decentralized IDs.74 Additional digital
wallet providers are expected to enter
the market in the near-term, and States
are expected to partner with them and
seek to test their mDLs with TSA. The
rule provides States broad discretion to
select technology vendors of their
choice, and does not prescribe any
specific type of technology. This
absence of prescriptive requirements is
intentional, as it accommodates
innovation and organic demand from
consumers to facilitate technological
diversity.
The final rule resists technology lockin by providing minimum standards for
security, privacy, and interoperability,
while remaining technology-agnostic.
The ISO/IEC 18013–5:2021(E) standard
enables the required interoperability for
73 States with an established mDL program will
incur a 45-hour time burden to complete an mDL
waiver reapplication, down from a 60-hour time
burden for the initial mDL waiver application (25
percent reduction). States without an established
program may experience a 70 percent reduction in
the time to complete a waiver reapplication
compared to the initial mDL waiver application
(from 140 hours to 45 hours). See § 2.4.1 of the
Regulatory Impact Analysis.
74 See generally SpruceID, https://spruceid.com/
products/issuing-digital-ids (last visited July 17,
2024).
PO 00000
Frm 00021
Fmt 4701
Sfmt 4700
85359
REAL ID use cases where mDL holders
present their mDLs in person to an mDL
reader. Adhering to this standard for
interoperability does not harm the
developers of digital wallets or readers
because the standard does not prohibit
other standards or technologies from
working alongside the ISO/IEC 18013–
5:2021(E) standard. Indeed, California is
pursuing this approach with SpruceID.
The California mDL digital wallet, built
on the open-source SpruceID toolkit,
supports both ISO/IEC 18013–5:2021(E)
requirements and an alternative
technology, known as TruAge®, which
allows the mDL to be used in broader
transactions, such as age-verified
purchases.75 TSA recognizes that in a
broad sense, there may be a false ‘‘lockin’’ effect of certain types of mDLs,
namely, those that meet the waiver
application criteria set forth in the rule.
However, this is not a true lock-in in the
traditional sense of economic path
dependence, in which barriers prevent
innovation and deployment of equal or
potentially superior alternatives. The
rule requires States to demonstrate that
they issue mDLs that provide security,
privacy, and interoperability necessary
for Federal acceptance for official
purposes, but also allows States and
industry wide latitude to innovate as
necessary to meet the regulatory
requirements.
As structured, this rule does not
create dependencies on specific
vendors, systems, or technologies.
Instead, the rule facilitates development
of more secure, privacy enhancing, and
interoperable mDLs using technologyagnostic solutions. Accordingly, this
rule resists the risk of true technology
lock-in that otherwise may have
occurred if market participants select
technologies, developed by first-movers,
that lack the protections necessary for
Federal acceptance for official purposes.
J. Pseudonymous Validation and OnDevice Biometric Matching
Comments: An individual urged that
it is critical to support ‘‘pseudonymous
validation’’ under standard ETSI TR 119
476. In addition, the commenter argued
that mDL transactions should support
biometric matching on the mobile
device itself to avoid sharing biometric
data. The commenter claimed these
recommendations are necessary to avoid
becoming ‘‘an autocratic state.’’
TSA Response: ‘‘Pseudonymous
validation’’ is the concept of using a
pseudonym or alias to identify an
75 See State of California Department of Motor
Vehicles, TruAge Age-Verified Purchasing, https://
www.dmv.ca.gov/portal/ca-dmv-wallet/truage/ (last
visited July 17, 2024).
E:\FR\FM\25OCR3.SGM
25OCR3
85360
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
ddrumheller on DSK120RN23PROD with RULES3
individual without revealing that
person’s true identity. Although this
may provide valuable privacy protection
in some uses, it also enables an
individual to operate under a
consistent—but false—identity. This is
contrary to the REAL ID Act and
regulations’ purpose of improving the
security of State-issued identity cards.
On-device biometric sharing is the
subject of standards ISO/IEC 23220–5
and ISO/IEC 23220–6, which are
currently in development. TSA is not
aware of any currently published
standards enabling the establishment of
trusted on-device biometric matching in
the mDL ecosystem, which makes it
premature to require such functionality
in the final rule.
K. Access to Standards
Comments: A public interest
organization contended that the NPRM
failed to provide adequate access to the
19 standards incorporated by reference
in the proposed rule. Specifically, the
commenter noted that under the NPRM,
‘‘the only way’’ for the public to gain
access was to email a request to the
address specified in the rule. The
commenter noted that it sent multiple
emails to this address, but never
received a response. The commenter
also noted that the NPRM directed
individuals to visit ‘‘DHS headquarters
in Washington DC’’ but did not provide
a specific address.
Other public interest organizations
asserted that NPRM failed to provide
reasonable access to ISO/IEC 18013–
5:2021(E) without a substantial fee. A
commenter noted that the ANSI link
providing free access to the standard
was not helpful, and that attempts ‘‘to
even load the standards on a modern
computer failed completely.’’ Further,
the commenter stated that ANSI
required ‘‘an unnecessarily onerous
process,’’ which required signing up for
an account and completing an online
license agreement form, and that access
was on a view-only basis.
TSA Response: TSA regrets that the
commenter’s multiple emails seeking
access were not answered. However,
TSA notes that the NPRM specified
multiple mechanisms for the public to
access the standards, consistent with
IBR requirements specified by the
OFR.76 All but one of the 19 standards
incorporated by reference in § 37.4 are
available to the public for free
download, and the NPRM provided the
website addresses to access each of
76 See 1 CFR 51.5(a); Office of Federal Register,
Incorporation by Reference Handbook (June 2023,
rev’d Aug. 28, 2023), https://www.archives.gov/
federal-register/write/handbook/ibr/ (last visited
July 17, 2024) [hereinafter ‘‘IBR Handbook’’].
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
these documents. In addition, the NPRM
provided detailed information for the
publisher of each of these standards,
including most, if not all, of the
following: publisher name, address,
phone, email, and website. For the sole
standard that is not publicly available
for free, ISO/IEC 18013–5:2021(E), the
NPRM facilitated free access via ANSI,
a private organization with whom TSA
has no affiliation. The NPRM
specifically noted that ANSI’s policy
required individuals to complete an
online license agreement form asking for
only name, professional affiliation, and
email address. The NPRM also stated
that access would be available on a
view-only basis, and provided publisher
information for individuals who sought
a greater level of access. TSA received
many comments discussing the 19
standards, demonstrating that the NPRM
provided sufficient notice regarding
access to these standards.
Although the NPRM provided
sufficient notice to access the standards,
the final rule modifies access
instructions in existing § 37.4 to clarify
and provide additional means for
access. Specifically, the final rule
replaces DHS with TSA as a location
where IBR material is available for
inspection and provides additional
points of contact at TSA. The final rule
also specifies that certain IBR material
is available in the Federal Docket
Management System at https://
www.regulations.gov, docket number
TSA–2023–0002.
L. Standards and Standards
Development Generally
Comments: Several commenters
sought clarification on how TSA would
update the final rule to reflect evolving
industry standards and government
guidelines. Commenters suggested that
instead of incorporating by reference a
specific version of a document, the rule
should require compliance with the
‘‘most recent version.’’ Some
commenters requested specificity
regarding the process and timeframes
given to States to conform to any
updated standards.
Other commenters questioned the
validity of the standards-development
processes followed by ISO/IEC,
AAMVA, and others. Commenters
asserted that these bodies are secretive,
unaccountable to the public, have
onerous membership criteria, are
influenced by foreign authoritarian
governments, among other deficiencies.
Some commenters asserted that the
documents incorporated by reference in
§ 37.4 of the proposed rule were
insufficient because they provided only
partial requirements to address security
PO 00000
Frm 00022
Fmt 4701
Sfmt 4700
and operational issues. Commenters
also criticized some of the references for
their absence of protections to address:
emerging threats from quantum
computing, evolving risks from digital
identification, outdated encryption
algorithms, and digital wallet design,
user experience, among other
deficiencies.
TSA Response: Under applicable legal
requirements, Federal agencies must
seek approval from the OFR for a
specific version, edition, or date of a
publication that an agency seeks to IBR
in a final rule.77 Revisions or updates to
a publication already IBR’d in a final
rule require re-approval from the OFR,
and rules therefore do not update
‘‘dynamically’’ to reflect future
versions.78 Therefore, the rule cannot
exclude publication version or date
information, or update dynamically to
reflect future versions. States will be
expected to comply with the standards
as published in the final rule. TSA
actively monitors evolving standards
and guidelines, and may consider
whether to IBR those publications
(pending review of the final documents)
through subsequent rulemaking.
Regarding criticisms of standardsdevelopment bodies and their
deliberations generally, the standards
development process for international
technology standards, particularly those
intended to be interoperable globally, is
developed by membership-based bodies
comprised of interested parties
representing participants from
international governmental entities,
educational organizations, research
groups, non-profit organizations,
commercial entities, and the public at
large. Each standards-development
organization sets its own criteria for
membership, fees, standards
development processes, and publication
structure.
With respect to the criticism that the
chosen standards and guidelines
provide insufficient protections and
lack future-proofing to address
unknown threats, TSA notes that due to
the nature of innovation and evolving
technology, and legal constraints of
Federal rulemaking, it is not possible to
develop ‘‘future-proofed’’ regulations.
TSA acknowledged in the NPRM that
this is a nascent market experiencing
rapid innovation, and that many key
standards and guidelines are currently
being developed. Although imperfect,
the chosen standards reflect industry
77 See 1 CFR 51.5(b) & 51.9; IBR Handbook, https://
www.archives.gov/federal-register/write/handbook/
ibr/.
78 See IBR Handbook, https://www.archives.gov/
federal-register/write/handbook/ibr/.
E:\FR\FM\25OCR3.SGM
25OCR3
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
state-of-the-art ahead of publication of
emerging standards that likely will
support the subsequent Phase 2
rulemaking. TSA made a risk-based
determination that the 19 standards
provide the key security, privacy, and
interoperability requirements necessary
for trusted Federal acceptance, and are
commensurate with existing REAL ID
standards for physical cards. The twophased rulemaking approach is
intended to address the near-term need
for established security, privacy, and
interoperability requirements, while
accommodating the medium-term
evolution of technology and
standardization.
With respect to comments regarding
specific deficiencies in some of the
chosen standards, TSA offers the
following responses. TSA acknowledges
that ISO/IEC 18013–5:2021(E) was
developed broadly for international
consumption and does not fully address
the needs for REAL ID use cases in the
U.S. The waiver application criteria set
forth in § 37.10(a), therefore, adapt ISO/
IEC 18013–5:2021(E) for REAL ID use
cases by supplementing this standard
with requirements from other references
as set forth in this rule. For example,
§§ 37.10(a)(1) and (a)(3) address the
provisioning and privacy requirements
not covered by ISO/IEC 18013–
5:2021(E). Other issues relevant to mDL
transactions that are not addressed in
ISO/IEC 18013–5:2021(E), such as
device user experience and digital
wallet design are beyond the scope of
this rule and intentionally omitted.
ddrumheller on DSK120RN23PROD with RULES3
M. TSA’s Identity Verification Policies
Comments: A public interest
organization raised questions regarding
TSA’s identity verification policies at
the screening checkpoint.
TSA Response: This rulemaking is
focused on allowing Federal agencies to
accept mDLs for Federal official
purposes as defined by the REAL ID
Act. Issues regarding TSA’s identify
verification processes unrelated to
mDLs are beyond the scope of this
rulemaking.:
N. Paperwork Reduction Act
Comments: A public interest
organization argued that every mDL
transaction with a Federal agency is a
collection of information subject to the
Paperwork Reduction Act (PRA), and
that no exemptions apply. The
organization further contended that
because neither TSA nor any other
Federal agency has sought approval
from the Office of Management and
Budget (OMB) for these collections, any
use of mDLs violates the PRA. Without
an approved information collection, the
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
commenter noted that it is not able to
determine the costs or purposes of this
information collection.
TSA Response: TSA disagrees with
the commenter’s assertion that every
mDL transaction with a Federal agency
is a collection of information subject to
the PRA because a request for identify
verification is not the ‘‘soliciting . . . of
facts or opinions . . . calling for . . .
answers to identical questions.’’ 44
U.S.C. 3502(3) (defining ‘‘collection of
information’’); cf. 5 CFR 1320.3(h)(1)
(excepting from the definition
information affirmations or
certifications that ‘‘entail no burden
other than that necessary to identify the
respondent’’). This final rule establishes
a process for States to apply to TSA for
a temporary waiver that enables Federal
agencies to accept mDLs issued by those
States when REAL ID enforcement
begins on May 7, 2025. This rule does
not, however, require any mDL
transactions with a Federal agency or set
requirements for the use of mDL
information. Therefore, this comment is
beyond the scope of this rulemaking.
O. Legal Authority
Comments: A public interest
organization questioned the legality of
DHS’s delegation of authority to TSA to
administer the REAL ID program
because the public was deprived of an
opportunity to comment on it. The
commenter further argued that it is
improper for TSA, a transportationfocused agency, to regulate use of mDLs
by other Federal agencies for nontransportation uses.
Other public interest organizations
posited that neither the REAL ID Act,
nor subsequent amendments in the
REAL ID Modernization Act, authorize
issuance of the waiver as set forth in the
NPRM. The commenters argued that
DHS is statutorily authorized only to
prescribe standards, certify State
compliance, and extend time to
facilitate compliance, and the
implementing regulations prevent DHS
from waiving any mandatory minimum
standards.
TSA Response: Generally, Federal
agencies’ delegations of duties and
authority are exempt from notice-andcomment requirements of the
Administrative Procedure Act because
they are matters of ‘‘agency
management’’ and ‘‘rules of agency
organization, procedure or practice.’’ 79
Matters involving internal agency
organization, procedure, practice, and
delegations of duties and authority are
directed primarily towards improving
the efficiency and effectiveness of
79 5
PO 00000
U.S.C. 553(a)(2), (b)(A).
Frm 00023
Fmt 4701
Sfmt 4700
85361
agency operations, and therefore are not
required to be posted for public
comment. DHS’s delegation of authority
to TSA to administer the REAL ID
program falls within this exemption,
obviating the need for public comment.
TSA further clarifies that the REAL ID
Act, as amended, authorizes the
Secretary to promulgate regulations to
implement the requirements under the
REAL ID Act.80 And the REAL ID
Modernization Act amended the
definitions of ‘‘driver’s license’’ and
‘‘identification card’’ to specifically
include mDLs that have been issued in
accordance with regulations prescribed
by the Secretary of Homeland
Security.81 TSA is adopting the waiver
process established in this final rule
pursuant to its authority to implement
the requirements of the REAL ID Act as
amended, and the final rule is
consistent with all statutory
requirements.’’ The waiver application
criteria specify issuance-related security
and privacy requirements that are
commensurate with requirements for
physical cards. The final rule further
provides that these are temporary
requirements that will be superseded by
a subsequent rulemaking setting forth
more comprehensive requirements after
emerging industry standards are
published over the next few years.
P. Economic Impact Analysis
1. Alternatives
Comments: Several commenters,
including a State, associations, and an
individual, commented on various
aspects of the assessment regarding the
costs and benefits of available regulatory
alternatives.82 Some commenters
recommended that TSA should accept
Alternatives 1, 3, or 4 compared to the
proposed rule. The commenter
recommending acceptance of
Alternative 1 stated the proposed rule
does not address the market failures
associated with a lack of common
standards, such as increased complexity
of mDL use across States, and may
result in larger costs in the long run
when formal mDL standards are
finalized. The commenter supporting
Alternative 3 recommended that TSA
promulgate comprehensive mDL
regulations that enable States to develop
and issue REAL ID-compliant mDLs, as
well as a process for Federal agencies to
accept them. The commenter
recommending acceptance of
Alternative 4 stated it would eliminate
the time and expense required to
80 Sec.
205 of the REAL ID Act.
1001 of the REAL ID Modernization Act,
134 Stat. 2304.
82 See NPRM, 88 FR at 60079–80.
81 Sec.
E:\FR\FM\25OCR3.SGM
25OCR3
ddrumheller on DSK120RN23PROD with RULES3
85362
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
prepare and submit a waiver application
and audit report, and another
commenter sought clarification on how
the scope of Alternative 4 differs from
the proposed rule.
TSA Response: Regarding Alternative
1, TSA reiterates that this rule
establishes requirements for States to
issue mDLs that provide specified levels
of security, privacy, and
interoperability, which provides
guidance and direction for State mDL
issuance systems and reduces the
complexity of mDL use across different
jurisdictions. The mDL waiver
application criteria would likely form
the foundation of the more
comprehensive requirements in the
Phase 2 rulemaking. While States may
have to incur cost to alter their mDL
programs when more comprehensive
requirements are issued, they are less
likely to have to make significant
changes and incur larger costs under
this rule than under Alternative 1.
The final rule provides benefits to
States and mDL users. The waiver
process will allow the continued use of
mDLs for official purposes when REAL
ID enforcement begins on May 7, 2025.
An mDL is more secure than a physical
card, affords users privacy controls over
the information transmitted to the
relying party, and enables contact-free
transactions. TSA does not believe the
waiver process delays development of
industry standards and Federal
guidelines. Many such standards and
guidelines are in development that
would inform requirements in the Phase
2 rulemaking, and this final rule will
facilitate, not impede, this process. For
these reasons, TSA recommends the
final rule over Alternative 1.
Regarding Alternative 3, TSA believes
it is premature to promulgate
comprehensive mDL regulations, given
that several important industry
standards and Federal guidelines are in
development and would likely inform
future requirements in the Phase 2
rulemaking, such as requirements
related to mDL provisioning. Until the
subsequent rulemaking is published,
this final rule sets requirements based
on current, available industry standards
and guidelines that serve as a basis for,
and bridge towards, more
comprehensive requirements.
Alternative 4 would establish interim
minimum requirements, similar to the
waiver application criteria, for States to
issue REAL ID compliant mDLs instead
of a wavier process that enables Federal
agencies to accept mDLs from States
that meet the waiver criteria. TSA
clarifies that Alternative 4 would largely
convert the waiver application criteria
to requirements for the issuance of
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
REAL ID-compliant mDLs. If States
could meet those requirements, under
Alternative 4, States’ mDLs would be
deemed REAL ID compliant. In contrast,
the final rule, through the waiver
process, enables Federal agencies to
accept for official purposes States’ mDLs
that meet the waiver criteria.
As discussed further in Part VI.A.4.,
below, TSA rejects this alternative
because it effectively would codify
standards that may become obsolete in
the near future, thereby implying a
degree of certainty that TSA believes is
premature given emerging standards
that are still in development. Although
Alternative 4 eliminates the waiver
process, TSA would continue to require
a mechanism to validate that a State’s
mDLs complies with the established
standards under Alternative 4. Thus,
States would still need to provide
information to TSA similar to the
waiver process, including audit reports,
to demonstrate compliance with the
requirements. TSA believes the time
and expense to provide such
information under Alternative 4 would
be similar to the waiver process under
the final rule, and a waiver process
provides more flexibility and allows
States and TSA to gain insight and
experience in the mDL environment.
2. Familiarization and Training Costs
Comments: A vendor recommended
inclusion in Table 2 of the NPRM (Total
Costs of the Rule to States) of States’
Familiarization Cost in years 2–5 to
reflect evolving standards, and a similar
inclusion in Table 3 (Total Cost of the
Rule to DHS) for DHS, but did not
provide any cost estimates.83 The
vendor further recommended inclusion
of States’ training or continuing
education costs in Table 2, which the
vendor believes should be similar to
DHS’s training costs set forth in Table
3 ($5 million over 10 years). The
commenter also requested clarification
of the definition of training costs in
Table 3, and whether it includes State
training related to certificate systems
and record maintenance.
An association posited that the
economic analysis did not address
TSA’s costs, training requirements, and
process changes to adapt to an mDL
system.
TSA Response: TSA does not believe
a State’s familiarization or training cost
estimates require modification. The
familiarization cost estimate represents
the cost and time burden for States to
review the final rule. All State driver’s
licensing agencies would incur this cost
in the first year after the publication of
83 See
PO 00000
NPRM, 88 FR at 60074–76.
Frm 00024
Fmt 4701
Sfmt 4700
the rule. Although familiarization costs
do not include time spent reviewing
new standards, the NPRM does discuss,
qualitatively, potential State costs to
monitor and study mDL technology as it
evolves including standards
development and other relevant factors.
TSA did not receive any cost estimates
related to reviewing new standards.
The training costs in Table 3 relate to
costs TSA would incur to train
Transportation Security Officers (TSOs)
to verify mDLs for identification
purposes at airport security
checkpoints. As such, States would not
incur similar costs of roughly $5 million
for such training. TSA is unclear as to
the type of or specific training or
continuing education the commenter
refers and what may be needed in the
future. However, for clarification, any
such training and certifications have
been added to the qualitative discussion
of potential additional State costs
(section 3.1.5 of the RIA).
TSA believes the costs related to
training and process changes to adapt to
an mDL system are accounted for and
quantified where available. TSA
quantifies the costs for TSOs to
undertake training to verify mDLs for
identification purposes at the security
checkpoint, and for additional clarity,
TSA has also added the cost to TSA to
provide such training for TSOs. TSA
also quantifies the costs related to the
equipment that must be acquired to
integrate the use of mDLs for identity
verification in section 2.6 of the RIA. In
addition, TSA added a qualitative
discussion in the economic analysis
(section 3.2.5) regarding costs TSA may
incur related to process changes to
adapt to an mDL system, such as
changes to standard operating
procedures and informational
campaigns.
3. Estimated Time To Complete Waiver
Applications; Estimated Costs for mDL
Readers
Comments: An industry vendor
recommended increasing the estimated
time to complete waiver applications
from 20 hours, as set forth in the NPRM,
to 80 hours, and increasing the
estimated cost for mDL readers by 35
percent, for both DHS and other Relying
Parties.
TSA Response: TSA clarifies that the
total time burden to complete a waiver
application does not require
modification because the estimate
includes two components: (1) the time
to complete the application and provide
the information required under
§ 37.10(a), and (2) the time to gather all
supporting documentation. TSA
estimates completing the application
E:\FR\FM\25OCR3.SGM
25OCR3
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
will require an average of 20 hours.
Separately, the time burden estimate for
gathering supporting documentation can
range from 40 to 120 hours. TSA
estimates States with existing mDL
solutions (15 States) will require a total
of 40 hours, while States considering
mDLs but lacking mDL solutions (25
States) will require a total 120 hours for
their initial waiver application
submission. Thus, TSA estimates an
average time burden of 110 hours to
complete a waiver application, by
adding the time to complete application
materials (20 hours) and a weighted
average time to gather supporting
documentation (90 hours).84 TSA also
estimates States will incur an average
time burden of 47.5 hours to complete
a waiver resubmission, which is
separate from the initial waiver
application. See Section 2.4 of the
Regulatory Impact Analysis (RIA) for
additional details.
The cost of mDL readers is uncertain
given evolving technology, and could
vary up or down by 35 percent
compared to TSA’s current estimate. For
example, within TSA specifically, TSA
may integrate mDL readers in existing
infrastructure, and TSA’s costs are
different than other relying parties
(other Federal agencies that choose to
accept mDLs for official purposes). For
TSA mDL reader costs, TSA structures
its estimate around internal data on
actual procurement to quantify the cost
of its mDL reader equipment, which
also includes the cost of quarterly
updates. Given the uncertainty of mDL
reader costs, the final rule expands the
range of possible reader costs for relying
parties up and down by the comment
suggested 35 percent of the TSA internal
estimate which results in a range of
about $260 to $540 with a midpoint of
$400. While TSA does not change its
primary estimate based on the estimated
cost of a smartphone which is assumed
to be used in combination with an
application to serve as the mDL reader,
it does recognize that such costs could
range from $2.1 million to $4.4 million
over 10 years.85
ddrumheller on DSK120RN23PROD with RULES3
4. Cost-Benefit Analysis Generally
Comments: A public interest
organization suggested that the costbenefit analysis was hastily prepared
and speculative.
84 Weighted average time to gathering supporting
documentation of 90 hours = ((15 States × 40 hours)
+ (25 States × 120 hours)) ÷ (15 States + 25 States).
85 DHS multiplies the total number of mDL
readers relying parties will procure over 10 years
of 8,174.9 (Table 2–11: Relying Party mDL Reader
Procurement in the Final Regulatory Impact
Analysis) by a low mDL reader cost of $261.30 and
high mDL reader cost of $542.70.
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
TSA Response: TSA recognizes mDLs
are an emerging market with uncertain
costs and benefits. Nonetheless, TSA
quantifies costs where it is able to with
the best available data along with
assumptions, proxies, and subject
matter expert estimates, and TSA
discusses potential additional costs
qualitatively where TSA was unable to
quantify the costs. TSA observes that
the commenter did not offer specific
recommendations to improve estimates
of future costs, urging only that TSA
should delay this rulemaking in light of
the uncertainty. However, TSA believes
there may be additional costs to
stakeholders by delaying the rule. For
example, mDL users would not be able
to use mDLs for official purposes when
full enforcement of REAL ID begins on
May 7, 2025, which would delay or
deny realization of the security, privacy,
convenience, and contact-free hygiene
benefits mDLs. States and industry
would risk continued investments based
on non-standardized processes that lack
the security, privacy, and
interoperability necessary for Federal
acceptance for official purposes. Federal
agencies would be delayed in realizing
the security and privacy benefits
conferred by mDLs compared to
physical cards. In addition, through
continued and increased mDL usage
enabled by this final rule, TSA will gain
insight and data that could better inform
costs and benefits of the Phase 2
rulemaking.
Q. Communicating Status of Waiver;
System Disruptions
Comments: Some commenters sought
clarification on how the status of a
waiver, specifically, suspensions and
terminations, would be communicated
to Federal agencies. Another commenter
asked whether TSA would provide
support mechanisms to communicate
information about system disruptions
that could impact mDL acceptance by
Federal agencies.
TSA Response: As provided in
§§ 37.9(b)(1), (e)(4)(iii), and (e)(5)(iii),
TSA will publish, at www.tsa.gov/realid/mDL, a list of States that hold valid
waivers, including updates to note any
final suspensions and terminations. As
required by § 37.8, any Federal agency
that elects to accept, for REAL ID official
purposes, mDLs issued by States with a
waiver must regularly review the
specified website to confirm that a State
holds a valid waiver. Suspensions and
terminations will occur only for the
violations specified in § 37.9(e), which
TSA anticipates will be rare instances.
Regarding support mechanisms for
system outages and other disruptions to
mDL acceptance, each Federal agency
PO 00000
Frm 00025
Fmt 4701
Sfmt 4700
85363
that elects to accept mDLs for official
purposes will be responsible for
maintaining and supporting its mDL
acceptance infrastructure. With respect
to Federal agency access to the State
mDL waiver list at www.tsa.gov/real-id/
mDL, DHS and TSA IT systems already
provide the necessary level of support to
reduce the risk of widespread impacts
from a temporary system outage. To
further reduce risk of potential
disruptions, TSA strongly encourages
all mDL holders to carry their physical
REAL ID cards in addition to their
mDLs.
R. Impact of Waiver on States Currently
Testing mDLs With TSA
Comments: A State that is currently
testing mDLs with TSA sought
clarification regarding the extent to
which the waiver application criteria
align with or differ from terms in the
TSA-State testing agreement. The State
sought this comparison to assess the
amount of additional resources that the
State may require to meet the waiver
criteria.
TSA Response: Due to confidentiality
provisions in TSA’s contracts with
States, TSA cannot publicly disclose the
terms of such agreements or compare
any differences with the waiver
application criteria. However, to assist
any States who have entered into such
agreements with TSA, the agency
encourages such States to contact TSA
for further discussions. All States are
subject to the requirements of this rule
to obtain a waiver, and TSA intends to
work with States that are testing mDLs
with TSA to help ensure a smooth
transition.
Regarding concerns about the time
and resources necessary to successfully
apply for a waiver, TSA estimates the
10-year cost to all States seeking a
waiver is approximately $814 million.
On a per-State basis, TSA estimates the
average cost to complete a waiver
application is approximately $40,000
(this includes the cost to complete the
initial application and resubmission; see
Table 2–8 in the RIA), and the average
cost to comply with the application
criteria $3.13 million in the initial year
of a State’s application (as discussed in
Section 2.5 of the RIA).
S. Notice for Changes to mDL Issuance
Processes
Comments: A State requested
clarification regarding whether
§ 37.9(e)(2) requires States to provide 60
calendar days’ advance notice before
adding a new digital wallet provider.
TSA Response: In some
circumstances, the addition of a new
digital wallet provider may trigger the
E:\FR\FM\25OCR3.SGM
25OCR3
85364
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
requirement under § 37.9(e)(2) to
provide notice to TSA, depending on
the extent of the changes required to the
State’s mDL issuance processes. This is
especially true as more standards are
developed in the area of mDL
provisioning. Although States are
responsible for assessing if any changes
are significant and trigger the reporting
requirements, TSA recognizes that it is
not possible to define precise
circumstances that require, or do not
require, reporting. To assist States in
determining whether changes in their
specific circumstances warrant
notification under § 37.9(e)(2), the final
rule revises this section by adding the
following sentence at the end: ‘‘If a State
is uncertain whether its particular
changes require reporting, the State
should contact TSA as directed at
www.tsa.gov/real-id/mDL.’’ TSA will
collaborate with States to facilitate a
determination of whether reporting is
required. TSA appreciates this
opportunity to provide clarity and
reduce potential burdens on the entities
directly regulated by this final rule.
ddrumheller on DSK120RN23PROD with RULES3
T. Clarification Regarding ‘‘Days’’
Comments: A vendor requested
clarification whether § 37.9(b) of the
NPRM, under which TSA would
provide decisions on waiver
applications ‘‘within 60 days’’ and ‘‘in
no event longer than 90 days,’’ means
‘‘calendar days’’ or ‘‘business days.’’
TSA Response: TSA clarifies that all
references in this rulemaking to ‘‘days’’
means calendar days, not business days.
The final rule revises the following
NPRM provisions to implement this
clarification: §§ 37.9(b), (c) & (e), and
Appendix A, paragraph 6.3.
U. Audit Requirements
1. Questionable Necessity; Excessive
Costs; Alternatives to Independent
Auditor
Comments: An association
recommended that the requirement for
an independent, third-party audit was
unnecessary and should be optional, not
mandatory, and further suggested that
an audit could be a substantiating
element together with any selfcertification that a State already
presents to TSA under REAL ID
requirements. Another commenter
posited that an audit (and the waiver
application process) is extraneous for
States that have invested in mDLs and
entered into testing agreements with
TSA. Several States and an association
expressed concerns about the costs of,
and need for, an independent evaluator,
noting the timing of budgetary requests
and varying ability among States to
afford the costs.
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
Some commenters recommended
alternatives to independent auditors,
including internal State-conducted
audits, an audit conducted in
conformity with the AAMVA Digital
Trust Service (DTS), and processes in
lieu of audits entirely. Another
commenter recommended specifying
detailed criteria, based on a set of
established industry requirements and/
or guidelines, along with relevant Root
Program or industry policies, against
which auditors would perform an
assessment.
TSA Response: TSA clarifies that the
term ‘‘independent entity’’ in
§ 37.10(b)(1) is intended to include
entities that are employed or contracted
by a State and independent of the
State’s driver’s licensing agency. This
final rule revises the proposed
§ 37.10(b)(1) to include this
clarification.
TSA disagrees that an independent
audit is unnecessary or of questionable
importance. The purpose of the audit is
to validate the accuracy of the
information that a State provides to TSA
in support of its application for a
waiver. This validation ensures TSA has
correct information to efficiently
evaluate the sufficiency of a State’s
application. TSA believes an
independent auditor that meets the
requirements of § 37.10(b) can provide a
defensible level of accuracy that cannot
be achieved via other means, such as a
self-certification.
TSA also disagrees that costs for
independent audits will be excessive.
As discussed in section 2.4.1 of the RIA,
TSA estimates the audit cost range is
between $5,000 and $60,000 on a perState basis.
TSA disagrees that an audit
conducted in conformity with
requirements for a State to participate in
AAMVA’s DTS is an acceptable
alternative to the audit requirements
specified in this rule. The requirements
imposed on States to participate in the
AAMVA DTS are not identical to the
requirements imposed in this rule. In
particular, the AAMVA DTS
requirements lack the specific
cybersecurity risk control requirements
addressed in § 37.10(a)(2) to establish
public trust in States’ mDL issuance
systems. Finally, establishing specific
audit criteria may be the subject of the
upcoming Phase 2 rulemaking that will
set forth detailed requirements that
would enable States to issue mDLs that
comply with the REAL ID Act.
2. Auditor Qualifications
Comments: One association
recommended that the rule should
allow an auditor with credentials that
PO 00000
Frm 00026
Fmt 4701
Sfmt 4700
are more closely aligned to certification
of systems management, ethics, and
business practice. Alternatively, the
commenter recommended that instead
of requiring any specific license, the
rule should only require that the name
of the auditor be listed.
TSA Response: Regarding auditor
qualifications, the requirement in
§ 37.10(b) that auditor must hold a
Certified Public Accountant (CPA)
license provides the necessary duty of
care to report accurately and truthfully
in the State in which the audit occurs,
and TSA has not identified any suitable
alternatives. TSA understands that
auditors experienced in certification of
systems management, ethics, and
business practice are not an equivalent
substitute to auditors who are CPAs,
who possess additional qualifications as
specified through their Certified
Information Technology Professional
credential. Similarly, merely listing the
name of the auditor is not sufficient.
The certification requirements in
§ 37.10(b) are common in auditing
technical and information systems and
provide proof of expertise.
V. Appendix A to Subpart A: mDL
Issuance Requirements
1. Compliance With Full Reference or
Specific Provisions
Comments: An association noted that
some Appendix A provisions require
full compliance with the cited
references instead of specific parts of
those references. For illustration, the
association provided some nonexhaustive examples, including the CA/
Browser Forum’s Baseline Requirements
for the Issuance and Management of
Publicly-Trusted Certificates and
Network and Certificate System Security
Requirements. The association and
another commenter requested specifying
pertinent parts of the cited references
that are applicable to compliance with
requirements in this rule.
TSA Response: TSA agrees that the
agency can provide paragraph or section
numbers for some of the references cited
in Appendix A to aid in understanding
which parts of the references require
compliance. TSA made the following
technical corrections in the final rule:
• In Appendix A, paragraph 1.1, the
CA/Browser Forum Baseline
Requirements for the Issuance and
Management of Publicly-Trusted
Certificates were qualified with the
addition of the following identifiers:
sections 2, 4.3, 4.9, 5, and 6. TSA also
qualified ISO/IEC 18013–5:2021(E) with
the addition of Annex B to provide
guidance on requirements for a
certificate policy and to clarify its
E:\FR\FM\25OCR3.SGM
25OCR3
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
applicability. Compliance with ISO/IEC
18013–5:2021(E) Annex B is already
required by § 37.10(a)(4), and inclusion
here reduces burden by providing States
greater specificity on certificate profiles
to include in their mDL certificate
policy. For NIST SP 800–57, Part 1, Rev.
5, the final rule adds qualifications for
sections 3 and 5–8. For NIST SP 800–
57, Part 3, Rev. 1, the final rule adds
qualifications for sections 2–4 and 8–9.
• In Appendix A, paragraph 2.13, the
final rule adds a qualification to section
4.2 of NIST SP 800–63B to provide
further clarity on the specific
requirements for AAL2 authenticators.
Regarding the CA/Browser Forum
Network and Certificate System Security
Requirements document, the final rule
requires full compliance with this
document because these requirements
define a minimum set of security
controls to establish publicly trusted
certificate systems. This model has
proven successful as the basis for
securing the certificate systems used to
secure the global internet.
2. Paragraph 2.2: Changing
Authentication Keys and Passwords
Comments: An association
commented that the terms ‘‘privileged
account’’ and ‘‘service account’’ in this
paragraph are undefined.
TSA Response: The terms ‘‘privileged
account’’ and ‘‘service account’’ fall
under the definition of ‘‘trusted role’’ in
§ 37.3. Accordingly, the final rule has
revised proposed Appendix A,
paragraph 2.2, to replace ‘‘privileged
account’’ and ‘‘service account’’ with
‘‘trusted role.’’ TSA appreciates the
feedback and the opportunity to provide
this clarification.
ddrumheller on DSK120RN23PROD with RULES3
3. Paragraphs 2.11–2.14: Multifactor
Authentication
Comments: An association requested
clarification as to whether the
Multifactor Authentication (MFA)
required by paragraphs 2.11–2.14 of
Appendix A is PKI-based or cryptobased phishing-resistant MFA.
TSA Response: Appendix A,
paragraphs 2.11–2.14, do not require
PKI-based or crypto-based phishing
resistant MFA. While phishing resistant
cryptographic authenticators are a best
practice to achieve the highest level of
assurance for multi-factor
authentication, for the purposes of
demonstrating compliance with
Appendix A requirements in paragraphs
2.11–2.14, MFA is achievable through a
combination of technologies and
methods covered by NIST SP 800–63B
section 4.2. TSA believes this approach
optimally balances mitigation of risks
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
associated with access to certificate
systems with costs of implementation.
4. Paragraph 3: Facility, Management,
and Operational Controls
Comments: An industry vendor
questioned whether the requirements in
paragraph 3 of Appendix A mean that
only U.S. citizens or lawful permanent
residents are qualified to be authorized
personnel who can access such systems.
The commenter sought further
clarification on whether the specified
controls apply to ‘‘as a service’’ offerings
on www.GovCloud.com.
TSA Response: TSA clarifies that
Appendix A, paragraph 3.3, does not
require that only U.S. citizens or lawful
permanent residents can serve as
personnel authorized to access state
certificate systems. This provision
requires States to specify the controls
for employees, contractors, and
delegated third parties, including any
cloud service providers, necessary to
prevent risks posed by foreign
ownership, control, or influence.
Regarding applicability to other cloudbased services, this provision also
requires States to specify the security
controls for all ‘‘as-a-service’’ providers,
who are considered to be delegated
third parties.
5. Paragraph 4: Personnel Security
a. Background Checks
Comments: A commenter sought
clarification regarding whether this
section requires a Federal fingerprint
background check, State fingerprint
background check, or other nonfingerprint based background check.
TSA Response: Appendix A,
paragraph 4, does not specify any
particular types of screening
procedures. Instead, States are
responsible for specifying screening
procedures for employees, contractors,
and delegated third parties in trusted
roles. Title 6 CFR 37.45 specifies
requirements for background checks and
applies to covered employees, and this
final rule does not alter those
requirements.
b. Paragraph 4.1: Coordination Among
States; Applicable Laws
Comments: A commenter sought
clarification regarding how
‘‘coordination among State entities’’
applies to a policy to control security
risks from insider threats. The
commenter sought further clarification
of the requirement in this paragraph that
a State’s policy must comply with ‘‘all
applicable laws, executive orders,
directives, regulations, policies,
standards, and guidelines.’’
PO 00000
Frm 00027
Fmt 4701
Sfmt 4700
85365
TSA Response: TSA clarifies that
under Appendix A, paragraph 4.1, the
term ‘‘State entities’’ refers to the
agencies and offices that comprise the
State’s governmental operations.
Coordination among State entities is
intrastate for the purposes of State-run
insider threat programs, not interstate
coordination among different States.
TSA believes that States are likely
familiar, from decades of experience
issuing physical driver’s licenses under
the requirements of § 37.45, as well as
familiarity with other State-specific
information and security laws, with the
applicable legal requirements governing
policies to address risks from insider
threats, many of which are Statespecific.
c. Timeframe To Disable System Access;
Cybersecurity Incident Reporting
Comments: A State commented that
Appendix A, paragraph 4.5, which
requires a State to disable an employee’s
system access within 4 hours of the
employee’s termination, conflicts with
Appendix A, paragraph 8.6, which
requires States to provide notice to TSA
within 72 hours after discovery of a
cyber incident. The State recommends
that time periods in both sections be
amended to 24 hours, urging that
disabling an employee’s system access
within 4 hours of termination is overly
aggressive in situations where
termination is amicable, such as
retirements or transfers.
TSA Response: TSA maintains that a
4-hour requirement to disable system
access, as set forth in Appendix A,
paragraph 4.5, is essential in all
termination situations. A coordinated
and prompt surrender of logical and
physical access for all departing
employees is a critical component of a
program to address insider threats. It is
highly unlikely that a State would allow
employees to have physical access to
buildings or other infrastructure after
termination. Disabling access to logical
systems is as critical as requiring the
surrender of keys and media providing
physical access. When an employee is
terminated for misconduct or other
exigent circumstances that could
compromise security, timely denial of
system access is critical. Although
amicable termination situations may
present fewer security risks, States have
sufficient time, in these circumstances,
to pre-plan for the prompt disabling of
system access before the employee’s
final day, similar to how States pre-plan
the recovery of any physical keys or key
cards for building access.
TSA further maintains that the
proposed requirement for States to
report cybersecurity incidents within 72
E:\FR\FM\25OCR3.SGM
25OCR3
ddrumheller on DSK120RN23PROD with RULES3
85366
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
hours of discovery, as set forth in
Appendix A, paragraph 8.6, is
appropriate, and TSA therefore declines
the recommendation to shorten the
timeframe to 24 hours. While TSA has
established in other contexts outside of
this rulemaking a shorter timeframe for
reporting by certain transportation
owners or operators, that timeframe
reflects the potential impact of
cybersecurity incidents that could
jeopardize the safety of individuals and
property. In that context, early reporting
is critical to ensure the ongoing
availability of critical operational
capabilities. Here, in contrast, the
requirement for reports to be made
within no more than 72 hours is
appropriate given TSA’s assessment of
the operational impact of a
cybersecurity incident on a State’s mDL
issuance infrastructure. In addition, the
72-hour requirement is consistent with
the timeframe required for the
rulemaking by CISA under the Cyber
Incident Reporting for Critical
Infrastructure Act of 2022.86 The 72hour reporting requirement supports the
policy objective of regulatory
harmonization, to the greatest extent
possible.
In light of the comments, TSA also
seeks to provide greater clarity regarding
the types of incidents that must be
reported, and the mechanics of
reporting. Accordingly, this final rule
makes several clarifying edits to
Appendix A, paragraph 8.6. First, the
final rule modifies the requirement for
reporting ‘‘a significant cyber incident
or breach’’ to ‘‘any reportable
cybersecurity incident, as defined in the
TSA Cybersecurity Lexicon available at
www.tsa.gov.’’ This modification
provides greater certainty and assurance
regarding events that would trigger
reporting. Second, the final rule
modifies the requirement for reporting
‘‘within 72 hours’’ to ‘‘within no more
than 72 hours’’ to encourage more
timely reporting, as recommended by a
commenter. Third, the final rule
modifies the requirement that regulated
entities ‘‘provide written notice to TSA’’
at the specified website, to requiring
that ‘‘[r]eports must be made as
directed’’ at that website, which clarifies
that the website will include
information concerning the format or
content of the report. Finally, the final
rule adds a provision that reports may
contain SSI, and if so, would be subject
to requirements of 49 CFR part 1520.
TSA made similar edits to a requirement
concerning Federal agency reporting,
§ 37.8(d), to add that reports must be
86 Public Law 117–103, Div. Y (2022) (as codified
at 6 U.S.C. 681–681g).
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
made to TSA ‘‘as directed’’ at the
specified website, and that reports may
be subject to the requirements of 49 CFR
part 1520 if they contain SSI. The SSI
protection provisions were not proposed
in the NPRM and were added in
response to public comments, discussed
below in Part IV.W., below.
d. Paragraph 4.7: Training for Personnel
Performing Certificate Systems Duties
Comments: A commenter sought
clarification on whether training item 2
in paragraph 4.7 of Appendix A, which
concerns authentication and vetting,
applies to States that issue certificates to
other entities as described in the CA/
Browser Forum Baseline Requirements
for the Issuance and Management of
Publicly-Trusted Certificates. The
commenter believes that this training is
not applicable because in the mDL
context, States do not issue document
signer certificates to anyone beyond the
State.
TSA Response: TSA appreciates the
commenter’s perspective, but notes that
the training required under Appendix
A, paragraph 4.7, is essential for State
personnel in executing their duties
regarding certificate systems. Although
it is correct that States do not issue
document signer certificates to other
States, States issue document signer
certificates to support their own mDLs,
namely, to sign and establish public
trust. In particular, training on
authentication and vetting processes for
employees, contractors, and other
delegated third parties is a critical
component of a well-developed insider
threat program because each employee
will be aware of the processes for
employment and will be aided in
identifying potential suspicious activity.
6. Paragraph 5.4: Hardware Security
Modules (HSMs)
Comments: A commenter sought
clarification as to whether the term
‘‘dedicated hardware security modules’’
in paragraph 5.4 of Appendix A requires
HSMs to be dedicated to root certificate
private keys and/or dedicated only to
the issuing State. The commenter also
asked whether this requirement
excludes the use of an HSM that
physically supports multiple States, but
is partitioned into segments controlled
by individual States.
TSA Response: Under Appendix A,
paragraph 5.4, the term ‘‘dedicated’’
means that a State must use one HSM
solely for IACA root private key
functions and no other functions within
the State’s certificate system. TSA
clarifies that Appendix A, paragraph
5.6, requires a State to use a separate
HSM for document signer private key
PO 00000
Frm 00028
Fmt 4701
Sfmt 4700
functions, but this HSM does not have
to be ‘‘dedicated’’ solely to that function
and may be used to support additional
functions within the State’s certificate
system. TSA further clarifies that
Appendix A, paragraphs 5.4 and 5.6,
require ‘‘sole control’’ (as defined in
§ 37.3) of an HSM, which does not
permit multiple States to share a single
HSM, but States are permitted to use
multi-tenant cloud-based HSMs, where
each tenant-State is separated with
logical and physical controls.
In an effort to further enable the
availability of cloud HSMs, TSA is
revising related NPRM Appendix A,
paragraphs 5.13 and 5.14, which are
related to Appendix A, paragraphs 5.4
and 5.6. Paragraphs 5.13 and 5.14 set
forth requirements to generate IACA
root certificate key pairs, and document
signer key pairs, respectively. NPRM
Appendix A, paragraph 5.13 proposed
requiring two administrators
(hereinafter ‘‘multi-administrator split
knowledge key generation’’) and one
witness to perform this function, and
paragraph 5.14 proposed requiring at
least two administrators. However, TSA
understands that although States have
strong competitive procurement options
for local HSMs that support multiadministrator split knowledge key
generation, suitable options for multitenant cloud HSMs may not exist for
many States. States that are unable to
procure such devices potentially would
have been forced by the NPRM
requirement to purchase local HSMs,
which are not only costlier than cloud
HSMs, but potentially less secure for
States that lack HSM management
capabilities. TSA understands that
generally, security provided by cloud
HSM services exceeds the capabilities
that most States can afford to provide
for local HSMs. After carefully
considering a number of factors,
including potential security and privacy
risks, TSA believes that proposed
Appendix A, paragraphs 5.13 and 5.14,
imposed unnecessarily restrictive
requirements concerning the minimum
personnel required to perform multiadministrator split knowledge key
generation. Accordingly, the final rule
declines to adopt those proposals, and
revises the requirement in the proposed
Appendix A, paragraph 5.13, to reduce
the number of administrators required
to generate IACA root key pairs from
two to one. The final rule similarly
revises the proposed Appendix A,
paragraph 5.14, to allow for the
generation of document signer key pairs
using one administrator and one witness
as an alternate to using two
administrators with split knowledge key
E:\FR\FM\25OCR3.SGM
25OCR3
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
ddrumheller on DSK120RN23PROD with RULES3
generation. TSA believes this reduction
in personnel maximizes States’
competitive procurement options,
reflects current industry state-of-the-art,
reduces burdens on regulated
stakeholders, and does not compromise
security, privacy, or interoperability.
7. Certificate Policies and Practices
Comments: A vendor noted that
standard ISO/IEC 18013–5:2021(E)
defines profiles for online certificate
status protocol (OCSP) and certificate
revocation list (CRL), but the standard
does not mandate their implementation.
The vendor recommended that the rule
should specify which of the methods is
required, including implementation
requirements for certificate type.
According to the vendor, it is important
to immediately revoke a certificate
when the issuing State’s private key
shows signs of compromise.
The vendor also recommended that
the rule should require States to
maintain a Certificate Practice
Statement (CPS), in addition to the
requirement in the NPRM to maintain a
certificate policy. A CPS, the vendor
explained, should follow a format
specified by standard IETF RFC 3647
format, which covers certificate
issuance, revocation, and renewal.
TSA Response: Although both OCSP
and CRL are methods for validating the
revocation status of a certificate, OCSP
is out-of-scope for the IACA root and
document signer certificates for mDLs,
as that protocol is not part of a
certificate validation process because
mDLs must work in an offline
environment. In addition, standard ISO/
IEC 18013–5:2021(E) specifies that CRL
is mandatory, not optional, and the
standard fully defines the profiles and
implementation requirements. Section
37.10(a)(2) of this rule requires States to
explain the means used for revocation of
their certificate systems in compliance
with applicable requirements of
Appendix A. Paragraphs 1, 5, and 8 of
the Appendix set forth requirements
applicable to certificate revocation. As
discussed in Part IV.V.1, above, the final
rule revised Appendix A, paragraph 1.1,
as proposed in the NPRM, by adding
specific provisions of the cited
references with which States must
comply. This addition provides greater
clarity to States regarding requirements
for a certificate policy.
Regarding the recommendation to
require States to maintain a CPS
following standard IETF RFC 3647,87
87 Internet Engineering Task Force, Internet X.509
Public Key Infrastructure Certificate Policy and
Certification Practices Framework, Nov. 2003,
www.rfc-editor.org/rfc/rfc3647.html (last visited
July 17, 2024).
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
paragraph 1.1 of Appendix A of this
final rule already specifies that
requirement. The provision requires a
State to adopt certificate policies that
meet the requirements in CA/Browser
Forum Baseline Requirements for the
Issuance and Management of
Publicly-Trusted Certificates section 2.
In addition, the provision requires a
State to develop a CPS based on
requirements set forth in standard IETF
RFC 3647.
8. mDL Lifecycle Management
Comments: A commenter
recommended that the rule implement
requirements on States to manage the
lifecycle of issued mDLs. Examples of
such lifecycle management practices
include validity periods, refresh
periods, push-based updates,
harmonized expiration dates of mDL
and physical cards, and limitations on
the numbers of devices to which a given
mDL can be provisioned.
TSA Response: Because mDL issuance
and Federal agency experience are still
in their infancies, together with an
absence of standardized mechanisms to
implement certain lifecycle
management tasks and minimal data to
support specific requirements, TSA
believes it is premature to prescribe
requirements that the commenter
recommends. Imposing such
requirements now, while technologies
are unsettled and evolving, risks
upsetting this rule’s equilibrium
between security and privacy on the one
hand, and innovation on the other. TSA
also notes that mDL lifecycle
management is addressed in the
AAMVA mDL Implementation
Guidelines.
W. Protection of Sensitive Security
Information in Waiver Applications
Comments: A commenter sought
clarification on procedures for
protecting any SSI that may be included
in waiver applications.
TSA Response: TSA has
comprehensively re-evaluated the need
to protect SSI that may be included in
response to requirements throughout
this rule. TSA believes that SSI
protection is warranted not only for
information included in waiver
applications, but also in response to
other requirements in this rule
(§§ 37.9(b)(2), (c), (e)(2), (e)(4)(ii) &
(e)(5)(ii), and Appendix A, paragraph
8.6). Accordingly, this final rule revises
NPRM § 37.9 to add new paragraph (g),
which provides that information
provided in response to §§ 37.9(a),
(b)(2), (c), (e)(2), (e)(4)(ii), and (e)(5)(ii),
and Appendix A, paragraph 8.6, may
contain SSI and therefore must be
PO 00000
Frm 00029
Fmt 4701
Sfmt 4700
85367
handled and protected in accordance
with 49 CFR part 1520.
V. Consultation With States and the
Department of Transportation
Under section 205 of the REAL ID
Act, issuance of REAL ID regulations
must be done in consultation with the
Secretary of Transportation and the
States. During the development of this
final rule, DHS and TSA consulted with
the Department of Transportation and
other Federal agencies with an interest
in this rulemaking via regular meetings.
DHS and TSA also consulted with State
officials through meetings with their
representatives to AAMVA.
VI. Regulatory Analyses
A. Economic Impact Analyses
1. Regulatory Impact Analysis Summary
Changes to Federal regulations must
undergo several economic analyses.
First, E.O. 12866 (Regulatory Planning
and Review),88 as affirmed by E.O.
13563 (Improving Regulation and
Regulatory Review),89 and as amended
by E.O. 14094 (Modernizing Regulatory
Review),90 directs Federal agencies to
propose or adopt a regulation only upon
a reasoned determination that the
benefits of the intended regulation
justify its costs. Second, the Regulatory
Flexibility Act of 1980 (RFA) 91 requires
agencies to consider the economic
impact of regulatory changes on small
entities. Third, the Trade Agreement Act
of 1979 92 prohibits agencies from
setting standards that create
unnecessary obstacles to the foreign
commerce of the United States. Fourth,
the Unfunded Mandates Reform Act of
1995 93 (UMRA) requires agencies to
prepare a written assessment of the
costs, benefits, and other effects of
proposed or final rules that include a
Federal mandate likely to result in the
expenditure by State, local, or tribal
governments, in the aggregate, or by the
private sector, of $100 million or more
(adjusted for inflation) in any one year.
2. Assessments Required by E.O. 12866
and E.O. 13563
Executive Order 12866 (Regulatory
Planning and Review), as affirmed by
Executive Order 13563 (Improving
Regulation and Regulatory Review) and
88 58
FR 51735 (Oct. 4, 1993).
FR 3821 (Jan. 21, 2011).
90 88 FR 21879 (Apr. 11, 2023).
91 Public Law 96–354, 94 Stat. 1164 (Sept. 19,
1980) (codified at 5 U.S.C. 601 et seq., as amended
by the Small Business Regulatory Enforcement
Fairness Act of 1996 (SBREFA)).
92 Public Law 96–39, 93 Stat. 144 (July 26, 1979)
(codified at 19 U.S.C. 2531–2533).
93 Public Law 104–4, 109 Stat. 66 (Mar. 22, 1995)
(codified at 2 U.S.C. 1181–1538).
89 76
E:\FR\FM\25OCR3.SGM
25OCR3
85368
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
amended by Executive Order 14094
(Modernizing Regulatory Review),
directs agencies to assess the costs and
benefits of available regulatory
alternatives and, if regulation is
necessary, to select regulatory
approaches that maximize net benefits
(including potential economic,
environmental, public health and safety
effects, distributive impacts, and
equity). Executive Order 13563
emphasizes the importance of
quantifying costs and benefits, reducing
costs, harmonizing rules, and promoting
flexibility.
The OMB has designated this rule a
‘‘significant regulatory action’’ as
defined under section 3(f) of E.O. 12866,
as amended by Executive Order 14094.
Accordingly, OMB has reviewed this
rule.
In conducting these analyses, TSA has
made the following determinations:
(a) While TSA attempts to quantify
costs where available, TSA primarily
discusses the costs and benefits of this
rulemaking in qualitative terms. At
present, mDLs are part of an emerging
and evolving industry with an elevated
level of uncertainty surrounding costs
and benefits. Nonetheless, TSA
anticipates the final rule will not result
in an effect on the economy of $200
million or more in any year of the
analysis. The rulemaking will not
adversely affect the economy, interfere
with actions taken or planned by other
agencies, or generally alter the
budgetary impact of any entitlements.
(b) In accordance with the RFA, and
pursuant to 5 U.S.C. 605(b), TSA
certifies that the rule will not have a
significant economic impact on a
substantial number of small entities,
including small governmental
jurisdictions. The rule will only directly
regulate the 50 States, the District of
Columbia, and the five U.S. territories
who voluntarily participate in the mDL
waiver process, who under the RFA are
not considered small entities.
(c) TSA has determined that the final
rule imposes no significant barriers to
international trade as defined by the
Trade Agreement Act of 1979; and
(d) TSA has determined that the final
rule does not impose an unfunded
mandate on State, local, or tribal
governments, such that a written
statement will be required under the
UMRA, as its annual effect on the
economy does not exceed the $100
million threshold (adjusted for inflation)
in any year of the analysis.
TSA has prepared an analysis of its
estimated costs and benefits,
summarized in the following
paragraphs, and in the OMB Circular A–
4 Accounting Statement. When
estimating the cost of a rulemaking,
agencies typically estimate future
expected costs imposed by a regulation
over a period of analysis. For this final
rule’s period of analysis, TSA uses a 10year period of analysis to estimate costs.
This final rule establishes a temporary
waiver process that permits Federal
agencies to accept mDLs, on an interim
basis, for official purposes, as defined in
the REAL ID Act, when full enforcement
of the REAL ID Act and regulations
begins on May 7, 2025. Federal agencies
that opt to accept mDLs for official
purposes must also procure an mDL
reader in order to validate the identity
of the mDL holder. As part of the
application process for the mDL waiver,
States are required to submit to TSA an
application, including supporting data,
and other documentation necessary to
establish that their mDLs meet specified
criteria concerning security, privacy,
and interoperability. When REAL ID Act
and regulations enforcement begins on
May 7, 2025, Federal agencies will be
prohibited from accepting noncompliant driver’s licenses and
identification cards, including both
physical cards and mDLs, for official
purposes.
In the following paragraph TSA
summarizes the estimated costs of the
rule on the affected parties: States, TSA,
mDL users, and relying parties (Federal
agencies that voluntarily choose to
accept mDLs for official purposes). TSA
has also identified other non-quantified
impacts to affected parties. As Table 2
displays, TSA estimates the 10-year
total cost of the rule to be $829.8 million
undiscounted, $698.1 million
discounted at 3 percent, and $563.9
million discounted at 7 percent. The
total cost to States comprises
approximately 98 percent of the total
quantified costs of the rule.
TABLE 2—TOTAL COST OF THE RULE BY ENTITY
[$ Thousands]
States
cost
TSA
cost
Relying party
cost
a
b
c
Total rule
cost
Year
d=a+b+c
ddrumheller on DSK120RN23PROD with RULES3
Undiscounted
Discounted at
3%
Discounted at
7%
1 ...............................................................
2 ...............................................................
3 ...............................................................
4 ...............................................................
5 ...............................................................
6 ...............................................................
7 ...............................................................
8 ...............................................................
9 ...............................................................
10 .............................................................
$42,876
62,791
71,352
83,182
94,460
91,467
91,881
91,743
91,467
91,881
$1,595
1,715
1,209
1,102
864
695
727
730
719
774
$79
919
537
381
375
1,160
742
558
531
1,289
$44,551
65,424
73,098
84,665
95,699
93,323
93,351
93,031
92,717
93,944
$43,253
61,669
66,895
75,224
82,551
78,156
75,903
73,440
71,060
69,903
$41,636
57,144
59,670
64,591
68,232
62,185
58,134
54,145
50,432
47,757
Total ......................................................
813,102
10,128
6,573
829,803
698,054
563,925
Annualized ............................................
........................
........................
........................
........................
81,833
80,290
Note: Totals may not add due to rounding.
States incur costs to familiarize
themselves with the requirements of the
rule, purchase access to an industry
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
standard, submit their mDL waiver
application, submit an mDL waiver
reapplication, and comply with waiver
PO 00000
Frm 00030
Fmt 4701
Sfmt 4700
application criteria requirements. As
displayed in Table 3, the 10-year cost to
States is $813.1 million undiscounted,
E:\FR\FM\25OCR3.SGM
25OCR3
85369
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
$683.7 million discounted at 3 percent,
and $552.0 million discounted at 7
percent.
TABLE 3—TOTAL COST OF THE RULE TO STATES
[$ Thousands]
Familiarization
cost
Standards
cost
Waiver application cost
Reapplication
cost
Escalated
review cost
Infrastructure
security cost
Total cost to states
g=a+b+c+d+e+f
Year
a
b
c
d
e
f
Undiscounted
Discounted at
3%
Discounted at
7%
1 ....................
2 ....................
3 ....................
4 ....................
5 ....................
6 ....................
7 ....................
8 ....................
9 ....................
10 ..................
$63.3
0
0
0
0
0
0
0
0
0
$1.9
1.3
0.6
0.6
0.6
0
0
0
0
0
$592.1
394.7
197.4
197.4
197.4
0
0
0
0
0
$0
0
0
413.9
275.9
138.0
551.8
413.9
138.0
551.8
$7.2
12.0
14.4
16.8
19.2
19.2
19.2
19.2
19.2
19.2
$42,212
62,383
71,140
82,553
93,967
91,310
91,310
91,310
91,310
91,310
$42,876
62,791
71,352
83,182
94,460
91,467
91,881
91,743
91,467
91,881
$41,628
59,186
65,297
73,906
81,482
76,603
74,708
72,423
70,102
68,368
$40,071
54,844
58,244
63,459
67,349
60,949
57,219
53,395
49,752
46,708
Total ...........
63.3
5.0
1,578.9
2,483.2
165.2
808,807
813,102
683,704
551,991
........................
....................
........................
........................
....................
........................
........................
80,151
78,591
Annualized
Note: Totals may not add due to rounding.
TSA incurs costs associated with
reviewing mDL waiver applications and
mDL waiver renewals, purchasing
access to industry standards, procuring
mDL readers, and mDL training. As
displayed in Table 4, the 10-year cost to
TSA is $0.131 million undiscounted,
$8.87 million discounted at 3 percent,
and $7.56 million discounted at 7
percent.
TABLE 4—TOTAL COST OF THE RULE TO TSA ($ THOUSANDS)
Standards
cost
Application
review cost
Reapplication
review cost
mDL reader
cost
mDL training
cost
a
b
c
d
e
Total cost to TSA
f=a+b+c+d+e
Year
1 ........................................
2 ........................................
3 ........................................
4 ........................................
5 ........................................
6 ........................................
7 ........................................
8 ........................................
9 ........................................
10 ......................................
$0.4
0
0
0
0
0
0
0
0
0
$74.3
49.5
24.8
24.8
24.8
0.0
0.0
0.0
0.0
0.0
$0
0
0
39.9
26.6
13.3
53.2
39.9
13.3
53.2
$1,418.8
699.8
547.9
440.6
240.6
199.4
200.9
202.3
203.8
205.2
Undiscounted
$101.5
965.4
636.2
596.4
571.7
482.0
473.3
487.4
501.4
515.5
Discounted at
3%
Discounted at
7%
$1,548.5
1,616.3
1,106.4
978.9
745.0
581.8
591.5
576.0
550.7
575.9
$1,490.6
1,497.7
986.9
840.5
615.8
462.9
453.0
424.7
390.8
393.4
$1,595.0
1,714.7
1,208.9
1,101.8
863.7
694.7
727.5
729.7
718.5
773.9
Total ...........................
0.4
198.2
239.6
4,359.4
5,330.8
10,128.4
8,870.9
7,556.4
Annualized ..........
........................
........................
........................
........................
........................
........................
1,039.9
1,075.9
Note: Totals may not add due to rounding.
Relying parties represent Federal
agencies that elect to accept mDLs for
official purposes. Per the final rule,
relying parties are required to use an
mDL reader to retrieve and validate
mDL data. As a result, relying parties
will incur costs to procure mDL readers
should they voluntarily choose to accept
mDLs for official purposes. TSA is also
considered a relying party, but due to
the particular impact to TSA related to
the requirement for REAL ID related to
boarding Federally regulated
commercial aircraft, those impacts are
discussed separately. As displayed in
Table 5, the 10-year cost to relying
parties is $6.58 million undiscounted,
$5.48 million discounted at 3 percent,
and $4.38 million discounted at 7
percent.
ddrumheller on DSK120RN23PROD with RULES3
TABLE 5—TOTAL COST OF THE RULE TO RELYING PARTIES ($ THOUSANDS)
mDL reader
cost
Total cost to relying parties
b=a
79Year
a
1 .......................................................................................................................
2 .......................................................................................................................
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
PO 00000
Frm 00031
Fmt 4701
Sfmt 4700
Undiscounted
$79.3
918.8
E:\FR\FM\25OCR3.SGM
$79.3
918.8
25OCR3
Discounted at
3%
Discounted at
7%
$76.9
866.0
$74.1
802.5
85370
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
TABLE 5—TOTAL COST OF THE RULE TO RELYING PARTIES ($ THOUSANDS)—Continued
mDL reader
cost
Total cost to relying parties
b=a
79Year
a
Undiscounted
Discounted at
3%
Discounted at
7%
3 .......................................................................................................................
4 .......................................................................................................................
5 .......................................................................................................................
6 .......................................................................................................................
7 .......................................................................................................................
8 .......................................................................................................................
9 .......................................................................................................................
10 .....................................................................................................................
537.4
381.3
375.0
1,160.4
741.8
558.3
531.2
1,289.1
537.4
381.3
375.0
1,160.4
741.8
558.3
531.2
1,289.1
491.8
338.8
323.5
971.9
603.1
440.7
407.1
959.2
438.7
290.9
267.4
773.3
461.9
324.9
288.9
655.3
Total ..........................................................................................................
6,572.6
6,572.6
5,479.1
4,377.9
Annualized .........................................................................................
........................
........................
642.3
623.3
ddrumheller on DSK120RN23PROD with RULES3
Note: Totals may not add due to rounding.
TSA has also identified other nonquantified impacts to the affected
entities. States may incur costs to:
monitor and study mDL technology as it
evolves; resolve the underlying issues
that could lead to a suspension or
termination of an mDL waiver; report
serious threats to security, privacy, or
data integrity; report material changes to
mDL issuance processes; remove
conflicts of interest with independent
auditor; and request reconsideration of
a denied mDL waiver application. TSA
may incur costs to: investigate
circumstances that could lead to
suspension or termination of a State’s
mDL waiver; provide notice to States,
relying parties, and the public related to
mDL waiver suspensions or
terminations; develop an information
technology (IT) solution that maintains
an up-to-date list of States with valid
mDL waivers; develop materials related
to the process changes to adapt to mDL
systems; and resolve a request for
reconsideration of a denied mDL waiver
application. mDL users may incur costs
with additional application
requirements to obtain an mDL. Relying
parties may incur costs to resolve any
security or privacy issue with the mDL
reader; report serious threats to security,
privacy, or data integrity; verifying the
list of States with valid mDL waivers;
train personnel to verify mDLs; and
update the public on identification
policies.
TSA believes that States
implementing an mDL, absent the
rulemaking, would still comply with the
AAMVA Guidelines. Many of the
requirements of the waiver application
criteria are already contained within the
AAMVA Guidelines. This includes
waiver application criteria concerning:
data encryption; authentication; device
identification keys; user identity
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
verification; applicant presentation;
REAL ID compliant physical card; data
record; records retention; privacy; and
interoperability. Only the waiver
application criteria related to escalated
review and infrastructure security/
issuance are not contained with the
AAMVA Guidelines. Operating under
the assumption that States interested in
mDLs would comply with the AAMVA
Guidelines, TSA assumes the
application criteria that overlap with the
AAMVA Guidelines would otherwise be
incurred and thus not included as a cost
of the rule.
This final rule establishes waiver
application criteria that serves as
interim requirements regarding security,
privacy, and interoperability for those
States choosing to issue mDLs that can
be accepted for official purposes. The
waiver application criteria may help
guide States in their development of
mDL technologies which will provide a
shared standard that could potentially
improve efficiency while also promoting
higher security, privacy, and
interoperability safeguards.
The application criteria set
requirements establishing security and
privacy protections to safeguard an mDL
holder’s identity data. They also set
interoperability requirements to ensure
secure transactions with Federal
agencies. States, via their mDL waiver
application, must establish that their
mDLs meet the application criteria thus
helping to ensure adequate security and
privacy protections are in place. Absent
the rule, individual States may choose
insufficient security and privacy
safeguards for mDL technologies that
fail to meet the intended security
purposes of REAL ID and the privacy
needs of users.
An mDL may provide additional
security benefits by offering a more
PO 00000
Frm 00032
Fmt 4701
Sfmt 4700
secure verification of an individual’s
identity and authentication of an
individual’s credential compared to
physical cards. In general, mDLs use a
cryptographic protocol that ensures the
mDL was obtained through a trusted
authority, such as a State’s Department
of Motor Vehicles.94 This same protocol
may prevent the alteration of mDLs and
reduce the threat of counterfeit
credentials.95 An mDL also offers
increased protection of personal
identifiers by preventing over-collection
of information. An mDL may enable the
ability to share only those attributes
necessary to validate the user identity
with the relying party.96 When using a
physical card, the user has no ability to
limit the information that is shared,
regardless of the amount of information
required for verification.
The waiver application criteria can
help guide State development and
investment in mDLs. The waiver
application criteria will foster a level of
standardization that would potentially
reduce complexity by limiting
individual State nuances while also
ensuring interoperability across States
and with the Federal Government. This
increased interoperability reduces
implementation costs by limiting the
need for different protocols or
94 Global News Wire, Secure Technology
Alliance’s Mobile Driver’s License Workshop
Showcases mDLs Role in the Future of
Identification, Dec. 14, 2021, https://
www.globenewswire.com/en/news-release/2021/12/
14/2351757/22743/en/Secure-Technology-Alliances-Mobile-Driver-s-License-Workshop-ShowcasesmDLs-Role-in-The-Future-of-Identification.html
(last visited July 17, 2024).
95 Id.
96 Biometric Update, Mobile ID can bring both
convenience and citizen privacy, July 15, 2021,
https://www.biometricupdate.com/202107/mobileid-can-bring-both-convenience-and-citizen-privacy
(last visited July 17, 2024).
E:\FR\FM\25OCR3.SGM
25OCR3
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
Furthermore, the waiver application
criteria may potentially encourage
investment in mDLs and the pooling of
resources to develop mDL technology
capabilities across States and address
common concerns or issues. Such
collaboration, or unity of effort, can help
spread research and development risk
and reduce inefficiencies that may arise
from States working independently.
Greater clarity over mDL regulations,
with the rule part of an incremental,
multi-phased rulemaking approach, may
spur new entrants (States and
technology companies) into the mDL
ecosystem.
mechanisms to accept mDLs from
individual States.
Identification of waiver application
criteria that can be used across States
will result in efficiency gains through
multiple States pursuing similar
objectives, goals, and solutions.
Establishing application criteria early in
the technology development process has
the potential to align development
activities across disparate efforts. Early
guidance might also reduce re-work or
modifications required in future
regulations thus saving time and
resources redesigning systems and
functionality to adhere to subsequent
Federal guidelines.
85371
The rule allows Federal agencies to
continue to accept mDLs for official
purposes when REAL ID enforcement
begins. This will avoid the sudden
halting of mDL acceptance when REAL
ID enforcement begins which will
reverse trends in providing for a more
customer-friendly screening experience.
The experience and insight learned
through the mDL waiver process could
also be used to inform future standards
and rulemaking.
3. OMB A-4 Statement
The OMB A-4 Accounting Statement
presents annualized costs and
qualitative benefits of the rule.
TABLE 6—OMB A–4 ACCOUNTING STATEMENT
[$ Millions, 2022 dollars]
Estimates
Category
Primary
estimate
Units
Low estimate
High estimate
Year dollar
Discount rate
%
Period
covered
Notes
Benefits:
Annualized Monetized ($ millions/
year).
N/A
N/A
N/A
N/A
7
N/A
Not quantified.
Annualized Quantified ....................
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
3
7
3
N/A
N/A
N/A
Not quantified.
Qualitative ......................................
The rule will produce benefits by reducing uncertainty in the mDL technology environment by helping to foster a minimum
level of security, privacy and interoperability, and reduce potential costs through the alignment of development activities
across disparate efforts.
Costs:
Annualized Monetized ($ millions/
year).
$80.29
N/A
N/A
2022
7
10 years
Annualized Quantified ....................
$81.83
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
2022
N/A
N/A
3
7
3
10 years
N/A
N/A
Qualitative ......................................
NPRM Regulatory
Impact Analysis
(RIA).
Not quantified.
States may incur incremental costs to: monitor and study mDL technology as it evolves; resolve the underlying issues that
could lead to a suspension or termination of an mDL waiver; report serious threats to security, privacy, or data integrity;
report material changes to mDL issuance processes; remove conflicts of interest with an independent auditor; and request reconsideration of a denied mDL waiver application. TSA may incur costs to: investigate circumstances that
could lead to suspension or termination of a State’s mDL waiver; provide notice to States, relying parties, and the public related to mDL waiver suspensions or terminations; develop an IT solution that maintains an up-to-date list of States
with valid mDL waivers; develop materials related to the process changes to adapt to mDL systems; and resolve a request for reconsideration of a denied mDL waiver application. An mDL user may incur costs with additional application
requirements to obtain an mDL. Relying parties may incur costs to resolve any security or privacy issue with the mDL
reader; report serious threats to security, privacy, or data integrity; verifying the list of States with valid mDL waivers;
train personnel to verify mDLs; and update the public on identification policies.
Transfers:
From/To ..........................................
From:
N/A
To:
N/A
States may pass on costs associated with mDLs and the final rule to the public.
Effects On:
State, Local, and/or Tribal Government: The final rule will result in States incurring 552.0 million discounted at 7 percent.
Small Business: None ............................................................................................................................................................................................
NPRM Regulatory
Flexibility Analysis (RFA).
ddrumheller on DSK120RN23PROD with RULES3
Wages: None.
Growth: Not measured.
4. Alternatives Considered
In addition to the rule, or the
‘‘preferred alternative,’’ TSA also
considered four alternative regulatory
options.
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
The first alternative (Alternative 1)
represents the status quo, or no change
relative to the creation of an mDL
waiver. This represents a scenario
without a rulemaking or a waiver
process to enable mDL acceptance for
PO 00000
Frm 00033
Fmt 4701
Sfmt 4700
official Federal purposes. Under this
alternative, States would continue to
develop mDLs in a less structured
manner while waiting for relevant
guiding standards to be published
which would likely result in dissimilar
E:\FR\FM\25OCR3.SGM
25OCR3
ddrumheller on DSK120RN23PROD with RULES3
85372
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
mDL implementation and technology
characteristics. This alternative was not
selected because it does not address the
market failures associated with a lack of
common standards, such as increased
complexity of mDL use across States,
and may result in larger costs in the
long run when formal mDL standards
are finalized.
The second alternative (Alternative 2)
features the same requirements of the
rule, including an mDL waiver process,
but would allow Federal agencies to
accept mDLs issued by certain States
whose mDLs TSA has deemed to be
‘‘low-risk,’’ and therefore presumptively
eligible to be granted a waiver. TSA
would identify mDLs from States who
have fulfilled the rule’s minimum
requirements prior to applying for the
waiver and have sufficiently
demonstrated (e.g., via TSA initiative or
recent evaluation by a trusted party) to
TSA that their mDL systems present
adequate interoperability and low
security and privacy risk. The
presumptive eligibility provision would
allow Federal agencies to immediately
(or conditionally) accept those ‘‘lowrisk’’ mDLs for official purposes
pending final approval of the respective
State mDL waiver applications.
However, TSA rejects this alternative
because TSA believes the emerging
technology underlying mDLs is
insufficiently established to accept the
security, privacy, and interoperability of
States’ mDL systems without an
evaluation by TSA or another trusted
party. In addition, a similar presumptive
eligibility process is not available for
other aspects of REAL ID and such an
action would not reduce the burden on
States to comply with any framework
TSA develops.
Under the third alternative
(Alternative 3), TSA would establish
more comprehensive requirements than
those in the rule to ensure mDLs comply
with the REAL ID Act. States would be
required to adopt the more
comprehensive requirements to issue
valid mDLs that can be accepted for
official purposes. These technical
requirements could include specific
standards related to mDL issuance,
provisioning, verification, readers,
privacy, and other security measures.
TSA rejects this alternative because
promulgating more comprehensive
requirements for mDLs is premature, as
both industry standards and technology
used by States are still evolving.
Restrictive requirements could stifle
innovation by forcing all stakeholders to
pivot toward compliance. This could
impede TSA from identifying and
implementing a more efficient
regulatory approach in the future.
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
Finally, under the fourth alternative
(Alternative 4), instead of a waiver
process, TSA would first establish
minimum requirements for issuing
REAL ID compliant mDLs before TSA
later sets more comprehensive
requirements as additional guidance
and standards become available in the
mid- and long-term. The interim
minimum requirements would consist
of similar requirements for security,
privacy, and interoperability, based on
19 industry and government standards
and guidelines, described in the rule
regarding waiver applications.
Alternative 4 effectively would codify
standards that may become obsolete in
the near future, as existing standards are
revised, emerging standards publish,
and new cyber threats proliferate. TSA
rejects this alternative because
establishing minimum requirements
that may become obsolete in the near
future may limit the ability for TSA to
revise standards quickly and would
increase the security and privacy risks
of accepting mDLs. In addition, this
alternative implies a degree of certainty
that TSA believes is premature given
emerging standards that are still in
development. Also, costs under
Alternative 4 would roughly be similar
to costs under the rule, as both options
would require audits and other
compliance costs.
5. Regulatory Flexibility Act Assessment
The Regulatory Flexibility Act (RFA)
of 1980, as amended,97 was enacted by
Congress to ensure that small entities
(small businesses, small not-for-profit
organizations, and small governmental
jurisdictions) will not be unnecessarily
or disproportionately burdened by
Federal regulations. Section 605 of the
RFA allows an agency to certify a rule
in lieu of preparing an analysis if the
regulations are not expected to have a
significant economic impact on a
substantial number of small entities.
In accordance with the RFA, pursuant
to 5 U.S.C. 605(b), TSA certifies that the
rule will not have a significant
economic impact on a substantial
number of small entities. The rule will
directly impact States that voluntarily
choose to apply for a waiver that will
permit mDLs issued by those States to
be accepted for official Federal
purposes.
6. International Trade Impact
Assessment
The Trade Agreement Act of 1979
prohibits Federal agencies from
97 Public Law 96–354, 94 Stat. 1164 (Sept. 19,
1980) (codified at 5 U.S.C. 601 et seq., as amended
by the Small Business Regulatory Enforcement
Fairness Act of 1996 (SBREFA)).
PO 00000
Frm 00034
Fmt 4701
Sfmt 4700
establishing any standards or engaging
in related activities that create
unnecessary obstacles to the foreign
commerce of the United States. The
Trade Agreement Act does not consider
legitimate domestic objectives, such as
essential security, as unnecessary
obstacles. The statute also requires that
international standards be considered
and, where appropriate, that they be the
basis for U.S. standards. TSA has
assessed the potential effect of this rule
and has determined this rule will not
have an adverse impact on international
trade.
7. Unfunded Mandates Reform Act
Assessment
Title II of the Unfunded Mandates
Reform Act of 1995 (UMRA), Public
Law 104–4, establishes requirements for
Federal agencies to assess the effects of
their regulatory actions on State, local,
and tribal governments and the private
sector. Under section 202 of the UMRA,
TSA generally must prepare a written
Statement, including a cost-benefit
analysis, for and final rules with
‘‘Federal mandates’’ that may result in
expenditures by State, local, and tribal
governments in the aggregate or by the
private sector of $100 million or more
(adjusted for inflation) in any one year.
Before TSA promulgates a rule for
which a written statement is required,
section 205 of the UMRA generally
requires TSA to identify and consider a
reasonable number of regulatory
alternatives and adopt the least costly,
most cost-effective, or least burdensome
alternative that achieves the objectives
of the rulemaking. The provisions of
section 205 do not apply when they are
inconsistent with applicable law.
Moreover, section 205 allows TSA to
adopt an alternative other than the least
costly, most cost-effective, or least
burdensome alternative if the final rule
provides an explanation why that
alternative was not adopted. Before TSA
establishes any regulatory requirements
that may significantly or uniquely affect
small governments, including tribal
governments, it must develop under
section 203 of the UMRA a small
government agency plan. The plan must
provide for notifying potentially
affected small governments, enabling
officials of affected small governments
to have meaningful and timely input in
the development of TSA regulatory
proposals with significant Federal
intergovernmental mandates, and
informing, educating, and advising
small governments on compliance with
the regulatory requirements.
When adjusted for inflation, the
threshold for expenditures becomes
$177.1 million in 2022 dollars. TSA has
E:\FR\FM\25OCR3.SGM
25OCR3
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
determined that this rule does not
contain a Federal mandate as it is
voluntary. Furthermore, estimated
expenditures for State, local, and tribal
governments do not exceed that amount
in the aggregate in any one year.
B. Paperwork Reduction Act
The Paperwork Reduction Act of 1995
(PRA) (44 U.S.C. 3501 et seq.) requires
that TSA consider the impact of
paperwork and other information
collection burdens imposed on the
public. Under the provisions of PRA
section 3507(d), TSA must obtain
approval from the Office of Management
and Budget (OMB) for each collection of
information it conducts, sponsors, or
requires through regulations. This rule
calls for a collection of information
under the PRA. Accordingly, TSA has
submitted to OMB for review the
information collections that follow
below and is pending approval. See 5
CFR 1320.11(a). TSA has published a
separate notice in the Federal Register
soliciting comment on the PRA
collection included in this final rule. As
defined in 5 CFR 1320.3(c), ‘‘collection
of information’’ includes reporting,
recordkeeping, monitoring, posting,
labeling, and other similar actions. This
section provides the description of the
information collection and of those who
must collect the information as well as
an estimate of the total annual time
burden. TSA cannot request submission
of waiver applications under this rule
until OMB has approved the
information collection.
The rule establishes a process for
States to apply to TSA for a temporary
waiver. Such a request is voluntary but
will require the submission of an mDL
waiver application, resubmission of an
mDL waiver application deemed
insufficient or denied, and reapplication
for an mDL waiver when the term of the
mDL waiver expires. All of these items
are considered new information
collections.
TSA uses the current State of mDL
implementation to inform its estimate
on how many State entities will request
an mDL waiver during the period of
analysis.98 All 50 States, the District of
Columbia, and five territories
(collectively referred to as ‘‘States’’
hereafter) are eligible to apply for an
mDL waiver as discussed in the rule.
However, TSA assumes that not all
States will apply for the mDL waiver.
TSA assumes 15 States will apply for an
mDL waiver in Year 1 of the analysis,
10 States in Year 2, and five States in
Year 3.99
Following the State submission of its
mDL waiver application, TSA
determines if the application is
approved, insufficient, or denied. States
are allowed to amend an insufficient or
denied mDL waiver application and
resubmit to TSA review.
TSA assumes that all submissions
will initially be deemed insufficient due
to the mDL waiver criteria being new
and with mDLs an emerging technology.
Nonetheless, TSA intends to work
85373
individually with interested States to
meet the mDL criteria to maximize the
likelihood of receiving a waiver. Based
on these assumptions, TSA estimates all
initial mDL waiver applications will be
deemed insufficient and that 90 percent
of States will resubmit their mDL waiver
applications.100
A State’s mDL waivers will be valid
for three years. Therefore, States granted
an mDL waiver in Year 1 will need to
reapply in Year 4 which is beyond the
scope of this particular information
collection.
TSA technology subject matter
experts estimate that the mDL waiver
application will take, on average, 20
hours to complete. TSA also estimates
that mDL waiver resubmissions will
take 25 percent of the initial mDL
waiver application time which equates
to 5 hours.101 Finally, TSA estimates
that mDL waiver reapplications will
take 75 percent of the initial mDL
waiver application time which equates
to 15 hours. 102
These hour burden estimates are
combined with the number of collection
activities to calculate the total and
average time burden associated with the
rule. TSA estimates the rule’s total
three-year burden for mDL waiver
applications, mDL waiver
resubmissions, and mDL waiver
reapplications is 57 responses and 735
hours. TSA estimates an average yearly
burden of 19 responses and 245 hours.
Details of the calculation can be found
in Table 7.
TABLE 7—PRA INFORMATION COLLECTION RESPONSES AND BURDEN HOURS
Number of responses
Collection
activity
mDL Waiver
Application
mDL Waiver
Resubmission ...........
mDL Waiver
Reapplication ............
ddrumheller on DSK120RN23PROD with RULES3
Total ......
Year 1
Year 2
Average
annual
responses
Time per
response
(hours)
Total hours
Average
annual
hours
d=a+b+c
e = d/3
f
g=d*f
h = g/3
Year 3
15.0
10.0
5.0
30.0
10.0
20
600
200
13.5
9.0
4.5
27.0
9.0
5
135
45
0
0
0
0
0
15
0
0
28.5
19.0
9.5
57.0
19.0
........................
735
245
98 As of December 2023, 10 States currently
provide mDLs. Roughly 18 States have taken steps
towards mDL implementation, including six States
participating in the TSA mDL testing without a
current mDL solution.
99 Each State would submit one mDL waiver
application.
VerDate Sep<11>2014
Total
responses
18:55 Oct 24, 2024
Jkt 265001
100 DHS assumes that 10 percent of applications
deemed insufficient would no longer pursue an
mDL waiver due to the level of effort involved to
become sufficient and wait until the mDL
environment is more fully developed.
PO 00000
Frm 00035
Fmt 4701
Sfmt 4700
101 mDL Waiver Resubmission burden = 20 hours
[initial mDL waiver application burden] × 0.25 = 5
hours.
102 mDL Waiver Renewal burden = 20 hours
[initial mDL waiver application burden] × (1¥0.25)
= 15 hours.
E:\FR\FM\25OCR3.SGM
25OCR3
85374
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
ddrumheller on DSK120RN23PROD with RULES3
In addition, States will incur costs
associated with audits of their mDL
infrastructure. TSA estimates an average
cost of $26,974 per submission. States
will incur this cost for the initial mDL
waiver application and mDL waiver
reapplication. As there are no
reapplications anticipated for this
information collection request, TSA
multiplies the annual average number of
mDL waiver applications from Table 7
above (10) and the audit cost of $26,974
for a total mDL waiver application cost
of $269,742.
C. Federalism (E.O. 13132)
A rule has implications for federalism
under E.O. 13132 of August 6, 1999
(Federalism) if it has a substantial direct
effect on State or local governments and
would either preempt State law or
impose a substantial direct cost of
compliance on them. TSA analyzed this
rule under this order and determined
that although this rule affects the States,
it does not preempt State law or impose
substantial direct compliance costs.
This final rule establishes a process
for States to request a temporary waiver
that enables Federal agencies to accept
mDLs issued by those States when
REAL ID enforcement begins on May 7,
2025. The rule does not, however,
require States to apply for a waiver, and
does not impact States who elect not to
do so.
States that elect to apply for a waiver
under this rule must submit an
application, supporting data, and other
documentation to establish that its
mDLs meet the specified criteria
concerning security, privacy, and
interoperability. TSA intends to work
with each State a case-by-case basis to
ensure that its mDLs meet the minimum
requirements necessary to obtain a
waiver. This rule does not impact the
broad policymaking discretion that
States currently exercise regarding other
aspects of driver’s license issuance.
DHS recognizes that States seeking a
waiver will incur compliance costs for
which Federal funds are generally not
available. However, TSA emphasizes
again that this rule does not require
States to apply for a waiver, and TSA is
promulgating this rule in response to
States’ concerns regarding mDL
acceptance when REAL ID enforcement
begins. To minimize States’ costs, this
rule affords States the maximum
possible discretion consistent with the
purposes of the REAL ID Act and
regulations. Although the rule
prescribes baseline requirements, it
allows States broad discretion to
implement technology decisions,
tailored to each State’s unique situation,
that meet the requirements.
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
TSA therefore has determined that the
rule is consistent with Executive Order
13132 and does not have these
implications for federalism.
D. Customer Service (E.O. 14058)
E.O. 14058 of December 13, 2021
(Transforming Federal Customer
Experience and Service Delivery to
Rebuild Trust in Government), is
focused on enhancing the of technology
‘‘to modernize Government and
implement services that are simple to
use, accessible, equitable, protective,
transparent, and responsive for all
people of the United States.’’ The
Secretary of Homeland Security has
specifically committed to testing the use
of innovative technologies at airport
security checkpoints to reduce
passenger wait times. This rule supports
this commitment. Using mDLs to
establish identity at airport security
checkpoints is intended to provide the
public with increased convenience,
security, privacy, and health benefits
from ‘‘contact-free’’ identity verification.
In 2022, DHS and TSA began a
collaboration with States and industry
to test the use of mDLs issued by
participating States at select TSA airport
security checkpoints (see Part II.B.2.,
above). As of the date of this final rule,
TSA is currently testing mDLs issued by
11 States (Arizona, California, Colorado,
Georgia, Hawaii, Iowa, Louisiana,
Maryland, New York, Ohio, Utah) at 27
airports.103
E. Energy Impact Analysis (E.O. 13211)
TSA analyzed this rule under E.O.
13211 of May 18, 2001 (Actions
Concerning Regulations That
Significantly Affected Energy Supply,
Distribution or Use), and determined
that it is not a ‘‘significant energy
action’’ under that E.O. and is not likely
to have a significant adverse effect on
the supply, distribution, or use of
energy. Therefore, this rulemaking does
not require a Statement of Energy
Effects.
F. Environmental Analysis
DHS and its components review
actions to determine whether the
National Environmental Policy Act 104
(NEPA) applies to them and, if so, what
degree of analysis is required. DHS
Directive 023–01, Rev. 01 (Directive)
and Instruction Manual 023–01–001–
01,105 Rev. 01 (Instruction Manual)
103 TSA, Facial Recognition and Digital Identity
Solutions, https://www.tsa.gov/digital-id (last
visited July 17, 2024).
104 See Public Law 91–190, 42 U.S.C. 4321- 4347.
105 See DHS, Implementing the National
Environmental Policy Act, DHS Directive 023–01,
PO 00000
Frm 00036
Fmt 4701
Sfmt 4700
establish the procedures that DHS and
its components use to comply with
NEPA and the Council on
Environmental Quality (CEQ)
regulations 106 for implementing NEPA.
The CEQ regulations allow Federal
agencies to establish in their NEPA
implementing procedures categories of
actions (‘‘categorical exclusions’’) which
experience has shown normally do not
individually or cumulatively have a
significant effect on the human
environment and, therefore, do not
require an Environmental Assessment
(EA) or Environmental Impact
Statement (EIS).107
Under DHS NEPA implementing
procedures, for an action to be
categorically excluded, it must satisfy
each of the following three conditions:
(1) the entire action clearly fits within
one or more of the categorical
exclusions; (2) the action is not a piece
of a larger action; and (3) no
extraordinary circumstances exist that
create the potential for a significant
environmental effect.108
As discussed throughout this
preamble, this final rule amends
existing REAL ID regulations to add
definitions and establish a process
enabling States to apply to TSA for a
temporary waiver, which would allow
Federal agencies to accept, for official
purposes when REAL ID enforcement
begins in May 2025, mDLs issued by
States to whom TSA has issued a
waiver. These requirements interpret or
amend an existing regulation without
changing its environmental effect.
TSA therefore has determined that
this final rule clearly fits within by
categorical exclusion number A3 in
Appendix A of the Instruction Manual.
Categorical exclusion A3 applies to
promulgation of rules, issuance of
rulings or interpretations, and the
development and publication of
policies, orders, directives, notices,
procedures, manuals, advisory circulars,
and other guidance documents of the
following nature: (a) Those of a strictly
administrative or procedural nature; (b)
those that implement, without
substantive change, statutory or
regulatory requirements; (c) those that
implement, without substantive change,
procedures, manuals, and other
guidance documents; (d) those that
interpret or amend an existing
regulation without changing its
Rev 01 (Oct. 31, 2014), and DHS Instruction Manual
023–01–001–01, Rev. 01 (Nov. 6, 2014),
https://www.dhs.gov/publication/directive-02301-rev-01-and-instruction-manual-023-01-001-01rev-01-and-catex (last visited July 17, 2024).
106 40 CFR parts 1500 through 1508.
107 See 40 CFR 1501.4(a).
108 See Instruction Manual, section V.B.2 (a–c).
E:\FR\FM\25OCR3.SGM
25OCR3
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
environmental effect; (e) technical
guidance on safety and security matters;
or (f) guidance for the preparation of
security plans.
This final rule is not a piece of a
larger action. Under section V.B(2)(b) of
the Instruction Manual, and as informed
by the scoping requirements of 40 CFR
1501.9(e), actions must be considered in
the same review if the actions are
connected, meaning that an action may
trigger another action, an action cannot
or will not proceed unless another
action is taken, or an action depends on
a larger action for its justification. While
TSA anticipates future rulemaking
efforts to further amend REAL ID
regulations and create requirements
enabling States to issue REAL IDcompliant mDLs, any subsequent final
rule, as well as this final rule, are each
stand-alone regulatory actions. Thus,
this final rule is not connected to any
other action for purposes of the NEPA
categorical exclusion analysis.
In accordance with the Instruction
Manual’s NEPA implementing
procedures, TSA has completed an
evaluation of this rule to determine
whether it involves one or more of the
ten identified extraordinary
circumstances that present the potential
for significant environmental impacts.
TSA concludes from its analysis that no
extraordinary circumstances are present
requiring further environmental analysis
and documentation. Therefore, this
action is categorically excluded and no
further NEPA analysis is required.
List of Subjects in 6 CFR part 37
Document security, Driver’s licenses,
Identification cards, Incorporation by
reference, Licensing and registration,
Motor vehicle administrations, Motor
vehicle. safety, Motor vehicles,
Personally identifiable information,
Physical security, Privacy, Reporting
and recordkeeping requirements,
Security measures.
Regulatory Amendments
For the reasons set forth in the
preamble, the Department of Homeland
Security amends 6 CFR part 37 to read
as follows:
ddrumheller on DSK120RN23PROD with RULES3
PART 37—REAL ID DRIVER’S
LICENSES AND IDENTIFICATION
CARDS
1. The authority citation for part 37
continues to read as follows:
■
Authority: 49 U.S.C. 30301 note; 6 U.S.C.
111, 112.
Subpart A—General
2. Amend § 37.3 by adding the
definitions for ‘‘Administration’’,
■
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
‘‘Certificate authority’’, ‘‘Certificate
management system’’, ‘‘Certificate
policy’’, ‘‘Certificate system’’, ‘‘Critical
security event’’, ‘‘Delegated third party’’,
‘‘Delegated third party system’’, ‘‘Denial
of service’’, ‘‘Digital certificates’’,
‘‘Digital signatures’’, ‘‘Distributed denial
of service’’, ‘‘Execution environment’’,
‘‘Front end system’’, ‘‘Hardware security
module’’, ‘‘High security zone’’,
‘‘Identity proofing’’, ‘‘Identity
verification’’, ‘‘Internal support system’’,
‘‘Issuing authority’’, ‘‘Issuing authority
certificate authority’’, ‘‘Issuing system’’,
‘‘mDL’’, ‘‘Mobile driver’s license’’,
‘‘Mobile identification card’’, ‘‘MultiFactor authentication’’, ‘‘Online
certificate status protocol’’, ‘‘Penetration
test’’, ‘‘Provisioning’’, ‘‘Public key
infrastructure’’, ‘‘Rich execution
environment’’, ‘‘Root certificate
authority’’, ‘‘Root certificate authority
system’’, ‘‘Secure element’’, ‘‘Secure
hardware’’, ‘‘Secure key storage device’’,
‘‘Secure zone’’, ‘‘Security support
system’’, ‘‘Sole control’’, ‘‘State root
certificate’’, ‘‘System’’, ‘‘Trusted
execution environment’’, ‘‘Trusted
role’’, ‘‘Virtual local area network’’,
‘‘Vulnerability’’, ‘‘Vulnerability
scanning’’, and ‘‘Zone’’ in alphabetical
order to read as follows:
§ 37.3
Definitions.
*
*
*
*
*
Administration means management
actions performed on Certificate
Systems by a person in a Trusted Role.
*
*
*
*
*
Certificate authority means an issuer
of digital certificates that are used to
certify the identity of parties in a digital
transaction.
Certificate Management System
means a system used by a State or
delegated third party to process,
approve issuance of, or store digital
certificates or digital certificate status
information, including the database,
database server, and storage.
Certificate policy means the set of
rules and documents that forms a State’s
governance framework in which digital
certificates, certificate systems, and
cryptographic keys are created, issued,
managed, and used.
Certificate system means the system
used by a State or delegated third party
to provide services related to public key
infrastructure for digital identities.
Critical security event means
detection of an event, a set of
circumstances, or anomalous activity
that could lead to a circumvention of a
zone’s security controls or a
compromise of a certificate system’s
integrity, including excessive login
attempts, attempts to access prohibited
resources, Denial of service or
PO 00000
Frm 00037
Fmt 4701
Sfmt 4700
85375
Distributed denial of service attacks,
attacker reconnaissance, excessive
traffic at unusual hours, signs of
unauthorized access, system intrusion,
or an actual compromise of component
integrity.
*
*
*
*
*
Delegated third party means a natural
person or legal entity that is not the
state and that operates any part of a
certificate system under the State’s legal
authority.
Delegated third party system means
any part of a certificate system used by
a delegated third party while
performing the functions delegated to it
by the State.
Denial of service means the
prevention of authorized access to
resources or the delaying of time-critical
operations.
*
*
*
*
*
Digital certificates identify the parties
involved in an electronic transaction,
and contain information necessary to
validate Digital signatures.
*
*
*
*
*
Digital signatures are mathematical
algorithms used to validate the
authenticity and integrity of a message.
Distributed denial of service means a
denial of service attack where numerous
hosts perform the attack.
*
*
*
*
*
Execution environment means a place
within a device processer where active
application’s code is processed.
*
*
*
*
*
Front end system means a system
with a public IP address, including a
web server, mail server, DNS server,
jump host, or authentication server.
*
*
*
*
*
Hardware security module means a
physical computing device that
safeguards and manages cryptographic
keys and provides cryptographic
processing.
High security zone means a physical
location where a State’s or Delegated
third party’s private key or
cryptographic hardware is located.
*
*
*
*
*
Identity proofing refers to a series of
steps that the State executes to prove the
identity of a person.
Identity verification is the
confirmation that identity data belongs
to its purported holder.
*
*
*
*
*
Internal support system means a
system which operates on a State’s
internal network and communicates
with the certificate system to provide
business services related to mDL
management.
E:\FR\FM\25OCR3.SGM
25OCR3
ddrumheller on DSK120RN23PROD with RULES3
85376
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
Issuing authority means the State that
issues a mobile driver’s license or
mobile identification card.
Issuing authority certificate authority
means a certificate authority operated
by or on behalf of an issuing authority
or a State’s root certificate authority.
Issuing system means a system used
to sign mDLs, digital certificates, mobile
security objects, or validity status
information.
*
*
*
*
*
mDL means mobile driver’s license
and mobile identification cards,
collectively.
Mobile driver’s license means a
driver’s license that is stored on a
mobile electronic device and read
electronically.
Mobile identification card means an
identification card, issued by a State,
that is stored on a mobile electronic
device and read electronically.
Multi-Factor authentication means an
authentication mechanism consisting of
two or more of the following
independent categories of credentials
(i.e., factors) to verify the user’s identity
for a login or other transaction:
something you know (knowledge
factor), something you have (possession
factor), and something you are
(inherence factor).
*
*
*
*
*
Online certificate status protocol
means an online protocol used to
determine the status of a digital
certificate.
*
*
*
*
*
Penetration test means a process that
identifies and attempts to exploit
vulnerabilities in systems through the
active use of known attack techniques,
including the combination of different
types of exploits, with a goal of breaking
through layers of defenses and reporting
on unpatched vulnerabilities and
system weaknesses.
*
*
*
*
*
Provisioning means the process by
which a State transmits and installs an
mDL on an individual’s mobile device.
Public key infrastructure means a
structure where a certificate authority
uses digital certificates for issuing,
renewing, and revoking digital
credentials.
*
*
*
*
*
Rich execution environment, also
known as a ‘‘normal execution
environment,’’ means the area inside a
device processor that runs an operating
system.
Root certificate authority means the
State certificate authority whose public
encryption key establishes the basis of
trust for all other digital certificates
issued by a State.
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
Root certificate authority system
means a system used to create a State’s
root certificate or to generate, store, or
sign with the private key associated
with a State root certificate.
*
*
*
*
*
Secure element means a tamperresistant secure hardware component
which is used in a device to provide the
security, confidentiality, and multiple
application environment required to
support various business models.
Secure hardware means hardware
provided on a mobile device for key
management and trusted computation
such as a secure element (SE) or trusted
execution environment.
Secure key storage device means a
device certified as meeting the specified
FIPS PUB 140–3 Level 2 overall, Level
3 physical, or Common Criteria (EAL
4+).
Secure zone means an area (physical
or logical) protected by physical and
logical controls that appropriately
protect the confidentiality, integrity,
and availability of certificate systems.
Security support system means a
system used to provide security support
functions, which may include
authentication, network boundary
control, audit logging, audit log
reduction and analysis, vulnerability
scanning, and intrusion detection (hostbased intrusion detection, networkbased intrusion detection).
*
*
*
*
*
Sole control means a condition in
which logical and physical controls are
in place to ensure the administration of
a certificate system can only be
performed by a State or delegated third
party.
*
*
*
*
*
State root certificate means a public
digital certificate of a root certificate
authority operated by or on behalf of a
State.
System means one or more pieces of
equipment or software that stores,
transforms, or communicates data.
*
*
*
*
*
Trusted execution environment means
an execution environment that runs
alongside but isolated from a rich
execution environment and has the
security capabilities necessary to protect
designated applications.
Trusted role means an employee or
contractor of a State or delegated third
party who has authorized access to or
control over a secure zone or high
security zone.
*
*
*
*
*
Virtual local area network means a
broadcast domain that is partitioned and
isolated within a network.
PO 00000
Frm 00038
Fmt 4701
Sfmt 4700
Vulnerability means a weakness in an
information system, system security
procedures, internal controls, or
implementation that could be exploited
or triggered by a threat source.
Vulnerability scanning means a
technique used to identify host
attributes and associated vulnerabilities.
Zone means a subset of certificate
systems created by the logical or
physical partitioning of systems from
other certificate systems.
■ 3. Revise § 37.4 to read as follows:
§ 37.4
Incorporation by reference.
Certain material is incorporated by
reference into this part with the
approval of the Director of the Federal
Register under 5 U.S.C. 552(a) and 1
CFR part 51. All approved incorporation
by reference (IBR) material is available
for inspection at the Transportation
Security Administration (TSA) and at
the National Archives and Records
Administration (NARA). Please contact
TSA at Transportation Security
Administration, Attn.: OS/ESVP/REAL
ID Program, TSA Mail Stop 6051, 6595
Springfield Center Dr., Springfield, VA
20598–6051, (866) 289–9673, or visit
www.tsa.gov. You may also contact the
REAL ID Program Office at REALIDmDLwaiver@tsa.dhs.gov or visit
www.tsa.gov/REAL-ID/mDL. For
information on the availability of this
material at NARA, visit
www.archives.gov/federal-register/cfr/
ibr-locations.html or email
fr.inspection@nara.gov. The material
may also be obtained from the following
sources:
(a) American Association of Motor
Vehicle Administrators (AAMVA) 4301
Wilson Boulevard, Suite 400, Arlington,
VA 22203; phone: (703) 522–4200;
website: www.aamva.org.
(1) 2005 AAMVA Driver’s License/
Identification Card Design
Specifications, Annex A, section
A.7.7.2., March 2005 (AAMVA
Specifications); IBR approved for
§ 37.17.
(2) Mobile Driver’s License (mDL)
Implementation Guidelines, Version
1.2January 2023; IBR approved for
§ 37.10(a). (Available at https://
aamva.org/getmedia/b801da7b-5584466c-8aeb-f230cef6dda5/mDLImplementation-Guidelines-Version-12_final.pdf.)
(b) Certification Authority Browser
Forum (CA/Browser Forum), 815 Eddy
St., San Francisco, CA 94109; phone:
(415) 436–9333; email: questions@
cabforum.org; website:
www.cabforum.org.
(1) Baseline Requirements for the
Issuance and Management of
Publicly-Trusted Certificates, Version
E:\FR\FM\25OCR3.SGM
25OCR3
ddrumheller on DSK120RN23PROD with RULES3
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
1.8.6, December 14, 2022; IBR approved
for appendix A to this subpart.
(Available at https://cabforum.org/wpcontent/uploads/CA-Browser-ForumBR-1.8.6.pdf.)
(2) Network and Certificate System
Security Requirements, Version 1.7,
April 5, 2021; IBR approved for
appendix A to this subpart. (Available at
https://cabforum.org/wp-content/
uploads/CA-Browser-Forum-NetworkSecurity-Guidelines-v1.7.pdf.)
(c) Cybersecurity and Infrastructure
Security Agency, Mail Stop 0380,
Department of Homeland Security, 245
Murray Lane, Washington, DC 20528–
0380; phone: (888) 282–0870; email:
central@cisa.gov; website:
www.cisa.gov.
(1) Federal Government Cybersecurity
Incident & Vulnerability Response
Playbooks, November 2021; IBR
approved for appendix A to this
subpart. (Available at www.cisa.gov/
sites/default/files/publications/Federal_
Government_Cybersecurity_Incident_
and_Vulnerability_Response_
Playbooks_508C.pdf.)
(2) [Reserved]
(d) Department of Homeland Security,
2707 Martin Luther King Jr. Ave. SE,
Washington, DC 20528; phone: (202)
282–8000; website: www.dhs.gov.
(1) National Cyber Incident Response
Plan, December 2016; IBR approved for
appendix A to this subpart. (Available at
www.cisa.gov/uscert/sites/default/files/
ncirp/National_Cyber_Incident_
Response_Plan.pdf.)
(2) [Reserved]
(e) International Civil Aviation
Organization (ICAO), ICAO, Document
Sales Unit, 999 University Street,
Montreal, Quebec, Canada H3C 5H7;
phone: (514) 954–8219; email: sales@
icao.int; website: www.icao.int.
(1) ICAO 9303, ‘‘Machine Readable
Travel Documents,’’ Volume 1, part 1,
Sixth Edition, 2006; IBR approved for
§ 37.17.
(2) [Reserved]
(f) International Organization for
Standardization, Chemin de Blandonnet
8, CP 401, 1214 Vernier, Geneva,
Switzerland; phone: +41 22 749 01 11;
email: customerservice@iso.org; website:
www.iso.org/contact-iso.html. (Also
available by contacting ANSI at ANSI,
25 West 43rd Street, 4th Floor, New
York, New York 10036 website:
www.ansi.org.)
(1) ISO/IEC 19794–5:2005(E)
Information technology—Biometric Data
Interchange Formats—Part 5: Face
Image Data, dated June 2005; IBR
approved for § 37.17.
(2) ISO/IEC 15438:2006(E)
Information Technology—Automatic
identification and data capture
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
techniques—PDF417 symbology
specification, dated June 2006; IBR
approved for § 37.19.
(3) ISO/IEC 18013–5:2021(E), Personal
identification—ISO-compliant driving
license—Part 5: Mobile driving license
(mDL) application, First Edition,
September 2021; IBR approved for
§§ 37.8(b); 37.10(a); and appendix A to
this subpart.
(g) National Institute of Standards and
Technology, 100 Bureau Drive,
Gaithersburg, MD 20899; phone: (301)
975–2000; website: www.nist.gov.
(1) FIPS PUB 140–3, Federal
Information Processing Standard
Publication: Security Requirements for
Cryptographic Modules, March 22,
2019; IBR approved for appendix A to
this subpart. (Available at https://
nvlpubs.nist.gov/nistpubs/FIPS/
NIST.FIPS.140-3.pdf.)
(2) FIPS PUB 180–4, Federal
Information Processing Standard
Publication: Secure Hash Standard
(SHS), August 2015; IBR approved for
§ 37.10(a). (Available at https://nvlpubs.
nist.gov/nistpubs/FIPS/NIST.FIPS.1804.pdf.)
(3) FIPS PUB 186–5, Federal
Information Processing Standard
Publication: Digital Signature Standard
(DSS), February 3, 2023; IBR approved
for § 37.10(a). (Available at https://
nvlpubs.nist.gov/nistpubs/FIPS/
NIST.FIPS.186-5.pdf.)
(4) FIPS PUB 197-upd1, Federal
Information Processing Standard
Publication: Advanced Encryption
Standard (AES), May 9, 2023; IBR
approved for § 37.10(a). (Available at
https://nvlpubs.nist.gov/nistpubs/FIPS/
NIST.FIPS.197.pdf.)
(5) FIPS PUB 198–1, Federal
Information Processing Standard
Publication: The Keyed-Hash Message
Authentication Code (HMAC), July
2008; IBR approved for § 37.10(a).
(Available at https://nvlpubs.nist.gov/
nistpubs/FIPS/NIST.FIPS.198-1.pdf.)
(6) FIPS PUB 202, Federal Information
Processing Standard Publication: SHA–
3 Standard: Permutation-Based Hash
and Extendable-Output Functions,
August 2015; IBR approved for
§ 37.10(a). (Available at https://nvlpubs.
nist.gov/nistpubs/FIPS/
NIST.FIPS.202.pdf.)
(7) NIST SP 800–53 Rev.5, NIST
Special Publication: Security and
Privacy Controls for Information
Systems and Organizations, Revision 5,
September 2020 (including updates as
of December. 10, 2020); IBR approved
for appendix A to this subpart.
(Available at https://nvlpubs.nist.gov/
nistpubs/SpecialPublications/
NIST.SP.800-53r5.pdf.)
PO 00000
Frm 00039
Fmt 4701
Sfmt 4700
85377
(8) NIST SP 800–57 Part 1 Rev.5,
NIST Special Publication:
Recommendation for Key Management:
Part 1—General, Revision 5, May 2020;
IBR approved for appendix A to this
subpart. (Available at https://nvlpubs.
nist.gov/nistpubs/SpecialPublications/
NIST.SP.800-57pt1r5.pdf.)
(9) NIST SP 800–57 Part 2 Rev.1,
NIST Special Publication:
Recommendation for Key Management:
Part 2—Best Practices for Key
Management Organization, Revision 1,
May 2019; IBR approved for appendix A
to this subpart. (Available at https://
nvlpubs.nist.gov/nistpubs/
SpecialPublications/NIST.SP.80057pt2r1.pdf.)
(10) NIST SP 800–57 Part 3 Rev.1,
NIST Recommendation for Key
Management: Part 3: ApplicationSpecific Key Management Guidance,
Revision 1, January 2015; IBR approved
for appendix A to this subpart.
(Available at https://nvlpubs.nist.gov/
nistpubs/SpecialPublications/
NIST.SP.800-57Pt3r1.pdf.)
(11) NIST SP 800–63–3, NIST Special
Publication: Digital Identity Guidelines,
June 2017; IBR approved for appendix A
to this subpart. (Available at https://
nvlpubs.nist.gov/nistpubs/
SpecialPublications/NIST.SP.800-633.pdf.)
(12) NIST SP 800–63B, NIST Special
Publication: Digital Identity Guidelines
Authentication and Lifecycle
Management, June 2017 (including
updates as of December. 1, 2017); IBR
approved for appendix A to this
subpart. (Available at https://
nvlpubs.nist.gov/nistpubs/
SpecialPublications/NIST.SP.80063b.pdf.)
(13) NIST Framework for Improving
Critical Infrastructure Cybersecurity,
Version 1.1, April 16, 2018); IBR
approved for appendix A to this
subpart. (Available at https://nvlpubs.
nist.gov/nistpubs/CSWP/
NIST.CSWP.04162018.pdf.)
4. Add §§ 37.7 through 37.10 to read
as follows:
Sec.
37.7
Temporary waiver for mDLs; State
eligibility.
37.8 Requirements for Federal agencies
accepting mDLs issued by States with
temporary waiver.
37.9 Applications for temporary waiver for
mDLs.
37.10 Application criteria for issuance of
temporary waiver for mDLs; audit report;
waiver application guidance.
§ 37.7 Temporary waiver for mDLs; State
eligibility.
(a) Generally. TSA may issue a
temporary certificate of waiver to a State
E:\FR\FM\25OCR3.SGM
25OCR3
85378
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
that meets the requirements of
§§ 37.10(a) and (b).
(b) State eligibility. A State may be
eligible for a waiver only if, after
considering all information provided by
a State under §§ 37.10(a) and (b), TSA
determines that—
(1) The State is in full compliance
with all applicable REAL ID
requirements as defined in subpart E of
this part; and
(2) Information provided by the State
under §§ 37.10(a) and (b) sufficiently
demonstrates that the State’s mDL
provides the security, privacy, and
interoperability necessary for
acceptance by Federal agencies.
§ 37.8 Requirements for Federal agencies
accepting mDLs issued by States with
temporary waiver.
Notwithstanding § 37.5(b), Federal
agencies may accept an mDL for REAL
ID official purposes issued by a State
that has a valid certificate of waiver
issued by TSA under § 37.7(a). A
Federal agency that elects to accept
mDLs under this section must—
(a) Confirm the State holds a valid
certificate of waiver consistent with
§ 37.7(a) by verifying that the State
appears in a list of mDLs approved for
Federal use, available as provided in
§ 37.9(b)(1);
(b) Use an mDL reader to retrieve and
validate mDL data as required by
standard ISO/IEC 18013–5:2021(E)
(incorporated by reference; see § 37.4);
(c) In accordance with the deadlines
set forth in § 37.5, verify that the data
element ‘‘DHS_compliance’’ is marked
‘‘F’’, as required by §§ 37.10(a)(4)(ii) and
(a)(1)(vii); and
(d) Upon discovery that acceptance of
a State’s mDL is likely to cause
imminent or serious threats to the
security, privacy, or data integrity, the
agency’s senior official responsible for
REAL ID compliance, or equivalent
function, must report such discovery to
TSA as directed at www.tsa.gov/real-id/
mDL within 72 hours of such discovery.
Information provided in response to this
paragraph may contain SSI, and if so,
must be handled and protected in
accordance with 49 CFR part 1520.
ddrumheller on DSK120RN23PROD with RULES3
§ 37.9 Applications for temporary waiver
for mDLs.
(a) Application process. Each State
requesting a temporary waiver must file
with TSA a complete application as set
forth in §§ 37.10(a) and (b). Application
filing instructions may be obtained from
TSA at www.tsa.gov/real-id/mDL.
(b) Decisions. TSA will provide
written notice via email to States within
60 calendar days, to the extent
practicable, but in no event longer than
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
90 calendar days, indicating that TSA
has made one of the following
decisions:
(1) Approved. Upon approval of an
application for a temporary waiver, TSA
will issue a certificate of waiver to the
State, and publish the State’s name in a
list of mDLs approved for Federal use at
www.tsa.gov/real-id/mDL.
(2) Insufficient. Upon determination
that an application for a temporary
waiver is incomplete or otherwise
deficient, TSA will provide the State an
explanation of deficiencies, and an
opportunity to address any deficiencies
and submit an amended application.
States will have 60 calendar days to
respond to the notice, and TSA will
respond via email within 30 calendar
days.
(3) Denied. Upon determination that
an application for a waiver fails to meet
criteria specified in §§ 37.10(a) and (b),
TSA will provide the State specific
grounds on which the denial is based,
and provide the State an opportunity to
seek reconsideration as provided in
paragraph (c) of this section.
(c) Reconsideration—(1) How to File
Request. States will have 90 calendar
days to file a request for reconsideration
of a denied application. The State must
explain what corrective action it intends
to implement to correct any defects
cited in the denial or, alternatively,
explain why the denial is incorrect.
Instructions on how to file a request for
reconsideration for denied applications
may be obtained from TSA at
www.tsa.gov/real-id/mDL. TSA will
notify States of its final determination
within 60 calendar days of receipt of a
State’s request for reconsideration.
(2) Final agency action. An adverse
decision upon reconsideration is a final
agency action. A State whose request for
reconsideration has been denied may
submit a new application at any time
following the process set forth in
paragraph (a) of this section.
(d) Terms and conditions. A
certificate of waiver will specify—
(1) The effective date of the waiver;
(2) The expiration date of the waiver;
and
(3) Any additional terms or conditions
as necessary.
(e) Limitations; suspension;
termination—(1) Validity period. A
certificate of waiver is valid for a period
of 3 years from the date of issuance.
(2) Reporting requirements. If a State,
after it has been granted a certificate of
waiver, makes any significant additions,
deletions, or modifications to its mDL
issuance processes, other than routine
systems maintenance and software
updates, that differ materially from the
information the State provided in
PO 00000
Frm 00040
Fmt 4701
Sfmt 4700
response to §§ 37.10(a) and (b) under
which the waiver was granted, the State
must provide written notice of such
changes to TSA at www.tsa.gov/real-id/
mDL 60 calendar days before
implementing such additions, deletions,
or modifications. If a State is uncertain
whether its particular changes require
reporting, the State may contact TSA as
directed at www.tsa.gov/real-id/mDL.
(3) Compliance. A State that is issued
a certificate of waiver under this section
must comply with all applicable REAL
ID requirements in § 37.51(a), and with
all terms and conditions specified in
paragraph (d)(3) of this section.
(4) Suspension. (i) TSA may suspend
the validity of a certificate of waiver for
any of the following reasons:
(A) Failure to comply. TSA
determines that a State has failed to
comply with paragraph (d)(3) or (e)(2) of
this section, or has issued mDLs in a
manner not consistent with the
information provided under §§ 37.10(a)
or (b); or
(B) Threats to security, privacy, and
data integrity. TSA reserves the right to
suspend a certificate of waiver at any
time upon discovery that Federal
acceptance of a State’s mDL is likely to
cause imminent or serious threats to the
security, privacy, or data integrity of any
Federal agency. In such instances, TSA
will provide written notice via email to
each affected State as soon as
practicable after discovery of the
triggering event, including reasons for
suspension, an explanation of any
corrective actions a State must take to
resume validity of its certificate of
waiver.
(ii) Before suspending a certificate of
waiver under paragraph (e)(4)(i)(A) of
this section, TSA will provide to such
State written notice via email of intent
to suspend, including an explanation of
deficiencies and instructions on how
the State may cure such deficiencies.
States will have 30 calendar days to
respond to the notice, and TSA will
respond via email within 30 calendar
days. TSA’s response would include
one of the following: withdrawal of the
notice, a request for additional
information, or a final suspension.
(iii) If TSA issues a final suspension,
TSA will temporarily remove the State
from the list of mDLs approved for
Federal acceptance for official purposes.
TSA will continue to work with a State
to whom TSA has issued a final
suspension to resume validity of its
existing certificate of waiver. A State
that has been issued a final suspension
may seek a new certificate of waiver by
submitting a new application following
the process set forth in paragraph (a) of
this section.
E:\FR\FM\25OCR3.SGM
25OCR3
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
ddrumheller on DSK120RN23PROD with RULES3
(5) Termination. (i) TSA may
terminate a certificate of waiver at an
earlier date than specified in paragraph
(d)(2) of this section if TSA determines
that a State—
(A) Does not comply with applicable
REAL ID requirements in § 37.51(a);
(B) Is committing an egregious
violation of requirements specified
under paragraph (d)(3) or (e)(2) of this
section that the State is unwilling to
cure; or
(C) Provided false information in
support of its waiver application.
(ii) Before terminating a certificate of
waiver, TSA will provide the State
written notice via email of intent to
terminate, including findings on which
the intended termination is based,
together with a notice of opportunity to
present additional information. States
must respond to the notice within 7
calendar days, and TSA will reply via
email within 30 calendar days. TSA’s
response would include one of the
following: withdrawal of the notice, a
request for additional information, or a
final termination.
(iii) If TSA issues a final termination,
TSA will remove the State from the list
of mDLs approved for Federal
acceptance for official purposes. A State
whose certificate of waiver has been
terminated may seek a new waiver by
submitting a new application following
the process set forth in paragraph (a) of
this section.
(6) Reapplication. A State seeking
extension of a certificate of waiver after
expiration of its validity period must
file a new application under paragraph
(a) of this section.
(f) Effect of status of certificate of
waiver. (1) Issuance of a certificate of
waiver is not a determination of
compliance with any other section in
this part.
(2) An application for certificate of
waiver that TSA has deemed
insufficient or denied, or a certificate of
waiver that TSA has deemed
suspended, terminated, or expired, is
not a determination of non-compliance
with any other section in this part.
(g) SSI. Information provided in
response to paragraphs (a), (b)(2), (c),
(e)(2), (e)(4)(ii), and (e)(5)(ii) of this
section may contain SSI, and if so, must
be handled and protected in accordance
with 49 CFR part 1520.
§ 37.10 Application criteria for issuance of
temporary waiver for mDLs; audit report;
waiver application guidance.
(a) Application criteria. A State
requesting a certificate of waiver must
establish in its application that the
mDLs for which the State seeks a waiver
are issued with controls sufficient to
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
resist compromise and fraud attempts,
provide privacy protections sufficient to
safeguard an mDL holder’s identity data,
and provide interoperability for secure
acceptance by Federal agencies under
the terms of a certificate of waiver. To
demonstrate compliance with such
requirements, a State must provide
information, documents, and/or data
sufficient to explain the means, which
includes processes, methodologies, or
policies, that the State has implemented
to comply with requirements in this
paragraph (a).
(1) Provisioning. For both remote and
in-person provisioning, a State must
explain the means it uses to address or
perform the following—
(i) Data encryption. Securely encrypt
mDL data and an mDL holder’s
Personally Identifiable Information
when such data is transferred during
provisioning, and when stored on the
State’s system(s) and on mDL holders’
mobile devices.
(ii) Escalated review. Review repeated
failed attempts at provisioning, resolve
such failures, and establish criteria to
determine when the State will deny
provisioning an mDL to a particular
mDL applicant.
(iii) Authentication. Confirm that an
mDL applicant has control over the
mobile device to which an mDL is being
provisioned at the time of provisioning.
(iv) Device identification keys.
Confirm that the mDL applicant
possesses the mDL device private key
bound to the mDL during provisioning.
(v) User identity verification. Prevent
an individual from falsely matching
with the licensing agency’s records,
including portrait images, of other
individuals.
(vi) Applicant presentation. Prevent
physical and digital presentation attacks
by detecting the liveness of an
individual and any alterations to the
individual’s appearance during remote
and in-person provisioning.
(vii) DHS_compliance data element.
Set the value of data element ‘‘DHS_
compliance’’, as required by paragraph
(a)(4)(ii) of this section, to correspond to
the REAL ID compliance status of the
underlying physical driver’s license or
identification card that a State has
issued to an mDL holder as follows—
(A) ‘‘F’’ if the underlying card is
REAL ID-compliant, or as otherwise
required by AAMVA Mobile Driver’s
License (mDL) Implementation
Guidelines, Section 3.2 (incorporated by
reference; see § 37.4); or
(B) ‘‘N’’ if the underlying card is not
REAL ID-compliant.
(viii) Data record. Issue mDLs using
data, including portrait image, of an
individual that matches corresponding
PO 00000
Frm 00041
Fmt 4701
Sfmt 4700
85379
data in the database of the issuing
State’s driver’s licensing agency for that
individual.
(ix) Records retention. Manage mDL
records and related records, consistent
with requirements set forth in AAMVA
Mobile Driver’s License (mDL)
Implementation Guidelines
(incorporated by reference; see § 37.4).
(2) Issuance. A State must explain the
means it uses to manage the creation,
issuance, use, revocation, and
destruction of the State’s certificate
systems and keys in full compliance
with the requirements set forth in
appendix A to this subpart.
(3) Privacy. A State must explain the
means it uses to protect Personally
Identifiable Information during
processing, storage, and destruction of
mDL records and provisioning records.
(4) Interoperability. A State must
explain the means it uses to issue mDLs
that are interoperable with ISO/IEC
18013–5:2021(E) and the ‘‘AAMVA
mDL data element set’’ defined in the
AAMVA Mobile Driver’s License (mDL)
Implementation Guidelines
(incorporated by reference; see § 37.4) as
follows:
(i) A State must issue mDLs using the
data model defined in ISO/IEC 18103–
5:2021(E) section 7 (incorporated by
reference; see § 37.4), using the
document type
‘‘org.iso.18013.5.1.mDL’’, and using the
name space ‘‘org.iso.18013.5.1’’. States
must include the following mDL data
elements defined as mandatory in ISO/
IEC 18103–5:2021(E) Table 5: ‘‘family_
name’’, ‘‘given_name’’, ‘‘birth_date’’,
‘‘issue_date’’, ‘‘expiry_date’’, ‘‘issuing_
authority’’, ‘‘document_number’’,
‘‘portrait’’, and must include the
following mDL data elements defined as
optional in Table 5: ‘‘sex’’, ‘‘resident_
address’’, ‘‘portrait_capture_date’’,
‘‘signature_usual_mark’’.
(ii) States must use the AAMVA mDL
data element set defined in AAMVA
Mobile Driver’s License (mDL)
Implementation Guidelines, Section 3.2
(incorporated by reference; see § 37.4),
using the namespace
‘‘org.iso.18013.5.1.aamva’’ and must
include the following data elements in
accordance with the AAMVA mDL
Implementation Guidelines: ‘‘DHS_
compliance’’, and ‘‘DHS_temporary_
lawful_status’’.
(iii) States must use only encryption
algorithms, secure hashing algorithms,
and digital signing algorithms as
defined by ISO/IEC 18103–5:2021(E),
section 9 and Annex B (incorporated by
reference; see § 37.4), and which are
included in the following NIST Federal
Information Processing Standards
(FIPS): NIST FIPS PUB 180–4, NIST
E:\FR\FM\25OCR3.SGM
25OCR3
85380
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
FIPS PUB 186–5, NIST FIPS PUB 197upd1, NIST FIPS PUB 198–1, and NIST
FIPS PUB 202 (incorporated by
reference; see § 37.4).
(b) Audit report. States must include
with their applications a report of an
audit that verifies the information
provided under paragraph (a) of this
section.
(1) The audit must be conducted by a
recognized independent entity, which
may be an entity that is employed or
contracted by a State and independent
of the State’s driver’s licensing
agency,—
(i) Holding an active Certified Public
Accountant license in the issuing State;
(ii) Experienced with information
systems security audits;
(iii) Accredited by the issuing State;
and
(iv) Holding a current and active
American Institute of Certified Public
Accountants (AICPA) Certified
Information Technology Professional
(CITP) credential or ISACA (F/K/A
Information Systems Audit and Control
Association) Certified Information
System Auditor (CISA) certification.
(2) States must include information
about the entity conducting the audit
that identifies—
(i) Any potential conflicts of interest;
and
(ii) Mitigation measures or other
divestiture actions taken to avoid
conflicts of interest.
(c) Waiver application guidance—(1)
Generally. TSA will publish ‘‘Mobile
Driver’s License Waiver Application
Guidance’’ to facilitate States’
understanding of the requirements set
forth in paragraph (a) of this section.
The non-binding Guidance will include
recommendations and examples of
possible implementations for illustrative
purposes only. TSA will publish the
Guidance on the REAL ID website at
www.tsa.gov/real-id/mDL.
(2) Updates. TSA may periodically
update its Waiver Application Guidance
as necessary to provide additional
information or recommendations to
mitigate evolving threats to security,
Paragraph
privacy, or data integrity. TSA will
publish a notification in the Federal
Register advising that updated
Guidance is available, and TSA will
publish the updated Guidance at
www.tsa.gov/real-id/mDL and provide a
copy to all States that have applied for
or been issued a certificate or waiver.
5. Add appendix A to subpart A to
read as follows:
■
Appendix A to Subpart A of Part 37—
Mobile Driver’s License Issuance
Infrastructure Requirements
A State that issues mDLs for acceptance by
Federal agencies for official purposes as
specified in the REAL ID Act must
implement the requirements set forth in this
appendix A in full compliance with the cited
references. All references identified in this
appendix A are incorporated by reference,
see § 37.4. If a State utilizes the services of
a delegated third party, the State must ensure
the delegated third party complies with all
applicable requirements of this appendix A
for the services provided.
Requirement
1: Certificate Authority Certificate Life-Cycle Policy
1.1 .....................
1.2 .....................
1.3 .....................
Maintain a certificate policy, which forms the State’s certificate system governance framework. If certificate systems are managed at a facility not controlled by the State, the State must require any delegated third party to comply with the State’s
certificate policy. These requirements must be implemented in full compliance with the following references:
• CA/Browser Forum Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates, Sections
2, 4.3, 4.9, 5, 6, as applicable;
• ISO/IEC 18013–5:2021(E), Annex B;
• CA/Browser Forum Network and Certificate System Security Requirements;
• NIST SP 800–57 Part 1, Rev. 5, Sections 3, 5, 6, 7, 8;
• NIST SP 800–57 Part 2, Rev. 1;
• NIST SP 800–57 Part 3, Rev. 1, Sections 2, 3, 4, 8, 9;
• NIST 800–53 Rev. 5, AC–1, AT–1, AU–1, CA–1, CM–1, CP–1, IA–1, IR–1, MA–1, MP–1, PE–1, PL–1, PL–2, PL–8,
PL–10, PM–1, PS–1, PT–1, RA–1, SA–1, SC–1, SI–1, and SR–1.
Perform management and maintenance processes which includes baseline configurations, documentation, approval, and review of changes to certificate systems, issuing systems, certificate management systems, security support systems, and
front end and internal support systems. These requirements must be implemented in full compliance with the following references:
• CA/Browser Forum Network and Certificate System Security Requirements;
• NIST Framework for Improving Critical Infrastructure Cybersecurity PR.IP–3; and
• NIST SP 800–53 Rev. 5, CM–1, CM–2, CM–3, CM–4, CM–5, CM–6, CM–8, CM–9, CM–10, CM–11, CM–12, MA–2,
MA–3, MA–4, MA–5, MA–6, PE–16, PE–17, PE–18, PL–10, PL–11, RA–7, SA–2, SA–3, SA–4, SA–5, SA–8, SA–9,
SA–10, SA–11, SA–15, SA–17, SA–22, SC–18, SI–6, SI–7, SR–2, SR–5.
Apply recommended security patches, to certificate systems within six months of the security patch’s availability, unless the
State documents that the security patch would introduce additional vulnerabilities or instabilities that outweigh the benefits
of applying the security patch. These requirements must be implemented in full compliance with the following references:
• CA/Browser Forum Network and Certificate System Security Requirements;
• NIST Framework for Improving Critical Infrastructure Cybersecurity ID.RA–1, PR.IP–12; and
• NIST SP 800–53 Rev. 5, SI–2, SI–3.
2: Certificate Authority Access Management
ddrumheller on DSK120RN23PROD with RULES3
2.1 .....................
2.2 .....................
VerDate Sep<11>2014
Grant administration access to certificate systems only to persons acting in trusted roles, and require their accountability for
the certificate system’s security, in full compliance with the following references:
• CA/Browser Forum Network and Certificate System Security Requirements;
• NIST Framework for Improving Critical Infrastructure Cybersecurity PR.AC–4; and
• NIST SP 800–53 Rev. 5, AC–1, AC–2, AC–3, AC–5, AC–6, AC–8, AC–21, AC–22, AC–24, CA–6, PS–6.
Change authentication keys and passwords for any trusted role account on a certificate system whenever a person’s authorization to administratively access that account on the certificate system is changed or revoked, in full compliance with the
following references:
• CA/Browser Forum Network and Certificate System Security Requirements;
• NIST Framework for Improving Critical Infrastructure Cybersecurity PR.AC–1; and
• NIST SP 800–53 Rev. 5, AC–1, AC–2, AC–3, AC–6, IA–1, IA–2, PS–4, PS–5.
18:55 Oct 24, 2024
Jkt 265001
PO 00000
Frm 00042
Fmt 4701
Sfmt 4700
E:\FR\FM\25OCR3.SGM
25OCR3
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
Paragraph
Requirement
2.3 .....................
Follow a documented procedure for appointing individuals to trusted roles and assigning responsibilities to them, in full compliance with the following references:
• CA/Browser Forum Network and Certificate System Security Requirements;
• NIST Framework for Improving Critical Infrastructure Cybersecurity PR.AC–1; and
• NIST SP 800–53 Rev. 5, AC–1, AC–2, AC–3, AC–5, AC–6, IA–1, IA–2.
Document the responsibilities and tasks assigned to trusted roles and implement ‘‘separation of duties’’ for such trusted roles
based on the security-related concerns of the functions to be performed, in full compliance with the following references:
• CA/Browser Forum Network and Certificate System Security Requirements;
• NIST Framework for Improving Critical Infrastructure Cybersecurity—PR.AC–4; and
• NIST SP 800–53 Rev. 5, AC–1, AC–2, AC–5, AC–6, MP–2, PS–9.
Restrict access to secure zones and high security zones to only individuals assigned to trusted roles, in full compliance with
the following references:
• CA/Browser Forum Network and Certificate System Security Requirements;
• NIST Framework for Improving Critical Infrastructure Cybersecurity PR.AC; and
• NIST SP 800–53 Rev. 5, AC–1, AC–2, AC–3, AC–5, AC–6, MP–2, PS–1, PS–6.
Restrict individuals assigned to trusted roles from acting beyond the scope of such role when performing administrative tasks
assigned to that role, in full compliance with the following references:
• CA/Browser Forum Network and Certificate System Security Requirements;
• NIST Framework for Improving Critical Infrastructure Cybersecurity PR.AC–1, PR.AC–4, PR.AC–6, PR.AT–2; and
• NIST SP 800–53 Rev. 5, AT–2, AT–3, PM–13, PM–14.
Require employees and contractors to observe the principle of ‘‘least privilege’’ when accessing or configuring access privileges on certificate systems, in full compliance with the following references:
• CA/Browser Forum Network and Certificate System Security Requirements;
• NIST Framework for Improving Critical Infrastructure Cybersecurity PR.AC–4, PR.AC–2; and
• NIST SP 800–53 Rev. 5, AC–1, AC–2, AC–3, AC–5, AC–6, PE–1, PE–3, PL–4.
Require that individuals assigned to trusted roles use a unique credential created by or assigned to them in order to authenticate to certificate systems, in full compliance with the following references:
• CA/Browser Forum Network and Certificate System Security Requirements;
• NIST Framework for Improving Critical Infrastructure Cybersecurity PR.AC–1, PR.AC–6, PR.AC–4, PR.AC–7; and
• NIST SP 800–53 Rev. 5, AC–1, IA–1, IA–2, IA–3, IA–5, IA–8, IA–12.
Lockout account access to certificate systems after a maximum of five failed access attempts, provided that this security
measure:
1. Is supported by the certificate system;
2. Cannot be leveraged for a denial-of-service attack; and
3. Does not weaken the security of this authentication control.
These requirements must be implemented in full compliance with the following references:
• CA/Browser Forum Network and Certificate System Security Requirements;
• NIST Framework for Improving Critical Infrastructure Cybersecurity PR.AC–7; and
• NIST SP 800–53 Rev. 5, AC–7.
Implement controls that disable all privileged access of an individual to certificate systems within 4 hours of termination of the
individual’s employment or contracting relationship with the State or Delegated Third Party, in full compliance with the following references:
• CA/Browser Forum Network and Certificate System Security Requirements;
• NIST Framework for Improving Critical Infrastructure Cybersecurity PR.AC–7; and
• NIST SP 800–53 Rev. 5, AC–1, AC–2, PS–1, PS–4, PS–7.
Implement multi-factor authentication or multi-party authentication for administrator access to issuing systems and certificate
management systems, in full compliance with the following references:
• CA/Browser Forum Network and Certificate System Security Requirements;
• NIST Framework for Improving Critical Infrastructure Cybersecurity-PR.AC–6, PR.AC–7; and
• NIST SP 800–53 Rev. 5, AC–14, IA–1, IA–2, IA–3, IA–5, IA–8, IA–11.
Implement multi-factor authentication for all trusted role accounts on certificate systems, including those approving the
issuance of a Certificate and delegated third parties, that are accessible from outside a secure zone or high security zone,
in full compliance with the following references:
• CA/Browser Forum Network and Certificate System Security Requirements;
• NIST Framework for Improving Critical Infrastructure Cybersecurity PR.AC–7; and
• NIST SP 800–53 Rev. 5, AC–17, AC–18, AC–19, AC–20, IA–1, IA–2, IA–3, IA–4, IA–5, IA–6, IA–8.
If multi-factor authentication is used, implement only multi-factor authentication that achieves an Authenticator Assurance
Level equivalent to AAL2 or higher, in full compliance with the following references:
• NIST SP 800–63–3, Sections 4.3, 6.2;
• NIST SP 800–63B, Section 4.2;
• NIST Framework for Improving Critical Infrastructure Cybersecurity PR.AC–7; and
• NIST SP 800–53 Rev. 5, IA–5, IA–7.
If multi-factor authentication is not possible, implement a password policy for trusted role accounts in full compliance with
NIST SP 800–63B, Section 5.1.1.2, Memorized Secret Verifiers, and implement supplementary risk controls based on a
system risk assessment.
Require trusted roles to log out of or lock workstations when no longer in use, in full compliance with the following references:
• CA/Browser Forum Network and Certificate System Security Requirements; and
• NIST SP 800–53 Rev. 5, AC–11, AC–12.
Configure workstations with inactivity time-outs that log the user off or lock the workstation after a set time of inactivity without
input from the user. A workstation may remain active and unattended if the workstation is otherwise secured and running
administrative tasks that would be interrupted by an inactivity time-out or system lock. These requirements must be implemented in full compliance with the following references:
• CA/Browser Forum Network and Certificate System Security Requirements; and
• NIST SP 800–53 Rev. 5, AC–11, AC–12.
2.4 .....................
2.5 .....................
2.6 .....................
2.7 .....................
2.8 .....................
2.9 .....................
2.10 ...................
2.11 ...................
2.12 ...................
2.13 ...................
2.14 ...................
ddrumheller on DSK120RN23PROD with RULES3
85381
2.15 ...................
2.16 ...................
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
PO 00000
Frm 00043
Fmt 4701
Sfmt 4700
E:\FR\FM\25OCR3.SGM
25OCR3
85382
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
Paragraph
Requirement
2.17 ...................
Review all system accounts at least every three months and deactivate any accounts that are no longer necessary for operations, in full compliance with the following references:
• CA/Browser Forum Network and Certificate System Security Requirements;
• NIST Framework for Improving Critical Infrastructure Cybersecurity PR.AC–1; and
• NIST SP 800–53 Rev. 5, AC–2.
Restrict remote administration or access to a State issuing system, certificate management system, or security support system, including access to cloud environments, except when:
1. The remote connection originates from a device owned or controlled by the State or delegated third party;
2. The remote connection is through a temporary, non-persistent encrypted channel that is supported by Multi-Factor Authentication; and
3. The remote connection is made to a designated intermediary device—
a. located within the State’s network or secured Virtual Local Area Network (VLAN),
b. secured in accordance with the requirements of this Appendix, and
c. that mediates the remote connection to the issuing system.
These Requirements must be implemented in full compliance with the following references:
• CA/Browser Forum Network and Certificate System Security Requirements;
• NIST Framework for Improving Critical Infrastructure Cybersecurity PR.AC–3, PR.AC–7; and
• NIST SP 800–53 Rev. 5, AC–17, AC–19, AC–20, IA–3, IA–4, IA–6.
2.18 ...................
3: Facility, Management, and Operational Controls
3.1 .....................
3.2 .....................
3.3 .....................
3.4 .....................
Restrict physical access authorizations at facilities where certificate systems reside, including facilities controlled by a delegated third party, by:
1. Verifying individual access authorizations before granting access to the facility;
2. Controlling ingress and egress to the facility using appropriate security controls;
3. Controlling access to areas within the facility designated as publicly accessible;
4. Escorting visitors, logging visitor entrance and exit from facilities, and limiting visitor activities within facilities to minimize risks to certificate systems;
5. Securing physical keys, combinations, and other physical access devices;
6. Maintaining an inventory of physical keys, combinations, and physical access devices; conduct review of this inventory
at least annually; and
7. Changing combinations and keys every three years or when physical keys are lost, combinations are compromised, or
when individuals possessing the physical keys or combinations are transferred or terminated.
These requirements must be implemented in full compliance with the following reference:
• NIST SP 800–53 Rev. 5, PE–2, PE–3, PE–4, PE–5, PE–8.
Implement controls to protect certificate system operations and facilities where certificate systems reside from environmental
damage and/or physical breaches, including facilities controlled by a delegated third party, in full compliance with the following reference:
• NIST SP 800–53 Rev. 5, CP–2, CP–4, CP–6, CP–7, CP–8, CP–9, CP–10, PE–2, PE–9, PE–10, PE–11, PE–12, PE–
13, PE–14, PE–15, PE–21.
If certificate systems are managed at a facility not controlled by the State, implement controls to prevent risks to such facilities
presented by foreign ownership, control, or influence, in full compliance with the following reference:
• NIST SP 800–53 Rev. 5, SR–2, SR–3, SR–4, SR–6.
Implement controls to prevent supply chain risks for certificate systems including:
1. Employing acquisition strategies, tools, and methods to mitigate risks;
2. Establishing agreements and procedures with entities involved in the supply chain of certificate systems;
3. Implementing an inspection and tamper protection program for certificate systems components;
4. Developing and implementing component authenticity policies and procedures; and
5. Developing and implementing policies and procedures for the secure disposal of certificate systems components.
These requirements must be implemented in full compliance with the following reference:
• NIST SP 800–53 Rev. 5, SR–5, SR–8, SR–9, SR–10, SR–11, SR–12.
4: Personnel Security Controls
4.1 .....................
ddrumheller on DSK120RN23PROD with RULES3
4.2 .....................
4.3 .....................
4.4 .....................
4.5 .....................
VerDate Sep<11>2014
Implement and disseminate to personnel with access to certificate systems and facilities, including facilities controlled by a
delegated third party, a policy to control insider threat security risks that:
1. Addresses the purpose, scope, roles, responsibilities, management commitment, coordination among State entities,
and compliance;
2. Complies with all applicable laws, executive orders, directives, regulations, policies, standards, and guidelines; and
3. Designates an official in a trusted role to manage the development, documentation, and dissemination of the policy
and procedures.
These requirements must be implemented in full compliance with the following reference:
• NIST SP 800–53 Rev. 5, MA–5, PS–1, PS–8.
Assign a risk designation to all organizational positions with access to certificate systems and facilities, in full compliance with
the following reference:
• NIST SP 800–53 Rev. 5, PS–2, PS–9.
Establish screening criteria for personnel filling organization positions with access to certificate system and facilities, in full
compliance with the following reference:
• NIST SP 800–53 Rev. 5, PS–2, PS–3, SA–21.
Screen individual personnel in organizational positions with access to certificate systems and facilities, in full compliance with
the following reference:
• NIST SP 800–53 Rev. 5, PS–3.
Upon termination of individual employment, State or delegated third party must:
1. Disable system access within 4 hours;
18:55 Oct 24, 2024
Jkt 265001
PO 00000
Frm 00044
Fmt 4701
Sfmt 4700
E:\FR\FM\25OCR3.SGM
25OCR3
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
Paragraph
85383
Requirement
4.6 .....................
4.7 .....................
4.8 .....................
4.9 .....................
2. Terminate or revoke any authenticators and credentials associated with the individual;
3. Conduct exit interviews that include—
a. Notifying terminated individuals of applicable, legally binding post-employment requirements for the protection of organizational information, and
b. Requiring terminated individuals to sign an acknowledgment of post-employment requirements as part of the organizational termination process;
4. Retrieve all security-related organizational system-related property; and
5. Retain access to organizational information and systems formerly controlled by terminated individual.
These requirements must be implemented in full compliance with the following reference:
• NIST SP 800–53 Rev. 5, PS–4.
Review and update personnel security policy, procedures, and position risk designations at least once every 12 months, in full
compliance with the following reference:
• NIST SP 800–53 Rev. 5, PS–1, PS–2.
Provide training to all personnel performing certificate system duties, on the following topics:
1. Fundamental principles of Public Key Infrastructure;
2. Authentication and vetting policies and procedures, including the State’s certificate policy;
3. Common threats to certificate system processes, including phishing and other social engineering tactics;
4. Role specific technical functions related to the administration of certificate systems; and
5. The requirements of this Appendix.
These requirements must be implemented in full compliance with the following references:
• CA/Browser Forum Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates, Section
5.3.3; and
• NIST SP 800–53 Rev. 5, CP–3, IR–2, SA–16.
Maintain records of training as required by paragraph 4.7 of this Appendix, in full compliance with the following references:
• CA/Browser Forum Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates, Sections
5.3.3, 5.4.1; and
• NIST SP 800–53 Rev. 5, AT–4.
Implement policies and processes to prevent any delegated third party personnel managing certificate systems at a facility not
controlled by a State from being subject to risks presented by foreign control or influence, in full compliance with the following reference:
• NIST SP 800–53 Rev. 5, SR–3, SR–4, SR–6.
5: Technical Security Controls
5.1 .....................
5.2 .....................
5.3 .....................
5.4 .....................
5.5 .....................
ddrumheller on DSK120RN23PROD with RULES3
5.6 .....................
5.7 .....................
5.8 .....................
VerDate Sep<11>2014
Segment certificate systems into networks based on their functional or logical relationship, such as separate physical networks or VLANs, in full compliance with the following references:
• CA/Browser Forum Network and Certificate System Security Requirements;
• NIST Framework for Improving Critical Infrastructure Cybersecurity PR.AC–5; and
• NIST SP 800–53 Rev. 5, AC–4, AC–10, CA–3, CA–9, MP–3, MP–4, RA–2, RA–9, SC–2, SC–3, SC–4, SC–8.
Apply equivalent security controls to all systems co-located in the same network (including VLANs) with a certificate system,
in full compliance with the following references:
• CA/Browser Forum Network and Certificate System Security Requirements;
• NIST Framework for Improving Critical Infrastructure Cybersecurity PR.AC–5; and
• NIST SP 800–53 Rev. 5, MP–5, MP–6, MP–7, RA–2, SC–7, SC–10, SC–39.
Maintain State root certificate authority systems in a high security zone and in an offline state or air-gapped from all other network operations. If operated in a cloud environment, State root certificate authority systems must use a dedicated VLAN
with the sole purpose of Issuing Authority Certificate Authority (IACA) root certificate functions and be in an offline state
when not in use for IACA root certificate functions. These requirements must be implemented in full compliance with the following references:
• CA/Browser Forum Network and Certificate System Security Requirements; and
• NIST SP 800–53 Rev. 5, SC–32.
Protect IACA root certificate private keys using dedicated hardware security modules (HSMs), either managed on-premises or
provided through cloud platforms, that are under sole control of the State or delegated third party. These requirements must
be implemented in full compliance with the following references:
• NIST SP 800–57 Part 1, Rev. 5;
• NIST FIPS PUB 140–3; and
• NIST SP 800–53 Rev. 5, SC–12, SC–13.
Protect certificate systems private keys using NIST FIPS PUB 140–3 Level 3 or Level 4 certified HSMs, in full compliance
with the following references:
• NIST FIPS PUB 140–3; and
• NIST SP 800–53 Rev. 5, SC–12, SC–13.
Protect document signer private keys using HSMs, either managed on-premises or provided through cloud platforms, that are
under sole control of the State or delegated third party. These requirements must be implemented in full compliance with
the following references:
• NIST SP 800–57 Part 1, Rev. 5;
• NIST FIPS PUB 140–3; and
• NIST SP 800–53 Rev. 5, SC–12, SC–13.
Protect certificate systems document signer keys using NIST FIPS PUB 140–3 Level 2, Level 3, or Level 4 certified HSMs, in
full compliance with the following references:
• NIST FIPS PUB 140–3; and
• NIST SP 800–53 Rev. 5, SC–12, SC–13.
Maintain and protect issuing systems, certificate management systems, and security support systems in at least a secure
zone, in full compliance with the following references:
• CA/Browser Forum Network and Certificate System Security Requirements; and
18:55 Oct 24, 2024
Jkt 265001
PO 00000
Frm 00045
Fmt 4701
Sfmt 4700
E:\FR\FM\25OCR3.SGM
25OCR3
85384
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
Paragraph
Requirement
5.9 .....................
5.10 ...................
5.11 ...................
5.12 ...................
5.13 ...................
ddrumheller on DSK120RN23PROD with RULES3
5.14 ...................
• NIST SP 800–53 Rev. 5, SC–15, SC–20, SC–21, SC–22, SC–24, SC–28, SI–16.
Implement and configure: security support systems that protect systems and communications between systems inside secure
zones and high security zones, and communications with non-certificate systems outside those zones (including those with
organizational business units that do not provide PKI-related services) and those on public networks. These requirements
must be implemented in full compliance with the following references:
• CA/Browser Forum Network and Certificate System Security Requirements; and
• NIST SP 800–53 Rev. 5, SC–15, SC–20, SC–21, SC–22, SC–24, SC–28, SI–16.
Configure each network boundary control (firewall, switch, router, gateway, or other network control device or system) with
rules that support only the services, protocols, ports, and communications that the State has identified as necessary to its
operations. These requirements must be implemented in full compliance with the following references:
• CA/Browser Forum Network and Certificate System Security Requirements; and
• NIST SP 800–53 Rev. 5, AC–4, SI–3, SI–8, SC–7, SC–10, SC–23, CM–7.
Configure issuing systems, certificate management systems, security support systems, and front end and internal support
systems by removing or disabling all accounts, applications, services, protocols, and ports that are not used in the State’s
or delegated third party’s operations and restricting use of such systems to only those that are approved by the State or
delegated third party. These requirements must be implemented in full compliance with the following references:
• CA/Browser Forum Network and Certificate System Security Requirements;
• NIST Framework for Improving Critical Infrastructure Cybersecurity PR.PT–3; and
• NIST SP 800–53 Rev. 5, CM–7.
Implement multi-factor authentication on each component of the certificate system that supports multi-factor authentication, in
full compliance with the following references:
• CA/Browser Forum Network and Certificate System Security Requirements;
• NIST Framework for Improving Critical Infrastructure Cybersecurity PR.AC–7; and
• NIST SP 800–53 Rev. 5, IA–2.
Generate IACA root certificate key pairs with a documented and auditable multi-party key ceremony, performing at least the
following steps:
1. Prepare and follow a key generation script;
2. Require a qualified person who is in a trusted role and not a participant in the key generation to serve as a live witness of the full process of generating the IACA root certificate key pair, or record a video in lieu of a live witness;
3. Require the qualified witness to issue a report confirming that the State followed its key ceremony during its key and
certificate generation process, and confirming that controls were used to protect the integrity and confidentiality of the
key pair;
4. Generate the IACA root certificate key pair in a physically secured environment as described in the State’s certificate
policy and/or certification practice statement;
5. Generate the IACA root certificate key pair using personnel in trusted roles under the principles of multiple person control and split knowledge. IACA root certificate key pair generation requires a minimum of two persons, consisting of at
least one key generation ceremony administrator and one qualified witness);
6. Log the IACA root certificate key pair generation activities, sign the witness report (and video file, if applicable), with a
document signing key which has been signed by the IACA root certificate private key, and include signed files and document signing public certificate with the IACA root certificate key pair generation log files; and
7. Implement controls to confirm that the IACA root certificate private key was generated and protected in conformance
with the procedures described in the State’s certificate policy and/or certification practice statement and the State’s key
generation script. These requirements must be implemented in full compliance with the following reference:
• CA/Browser Forum Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates, Section 6.1.1.1.
Generate document signer key pairs with a documented and auditable multi-party key ceremony, performing at least the following steps:
1. Prepare and follow a key generation script;
2. Generate the document signer key pairs in a physically secured environment as described in the State’s certificate policy and/or certification practice statement;
3. Generate the document signer key pairs using only personnel in trusted roles under the principles of multiple person
control and split knowledge. document signer key pair generation requires a, minimum of two persons, consisting of at
least one key generation ceremony administrator and at least one qualified witness or at least two key generation ceremony administrators when split knowledge generation is in place;
4. If a witness observes the key generation, require a qualified person who is in a trusted role and not a participant in the
key generation to serve as a live witness of the full process of generating the document signer key pair; and
5. Require the qualified witness to issue a report confirming that the State followed its key ceremony during its key and
certificate generation process and confirming that controls were used to rotect the integrity and confidentiality of the
key pair;
6. Log the document signer key pairs generation activities and signed witness report, if applicable; and
7. Implement controls to confirm that the document signer private key was generated and protected in conformance with
the procedures described in the State’s certificate policy and/or certification practice statement and the State’s key generation script. These requirements must be implemented in full compliance with the following reference:
• CA/Browser Forum Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates, Section 6.1.1.1.
6: Threat Detection
6.1 .....................
VerDate Sep<11>2014
Implement a System under the control of State or delegated third party trusted roles that continuously monitors, detects, and
alerts personnel to any modification to certificate systems, issuing systems, certificate management systems, security support systems, and front-end/internal-support systems, unless the modification has been authorized through a change management process. The State or delegated third party must respond to the alert and initiate a plan of action within at most
24 hours. These requirements must be implemented in full compliance with the following references:
• CA/Browser Forum Network and Certificate System Security Requirements;
18:55 Oct 24, 2024
Jkt 265001
PO 00000
Frm 00046
Fmt 4701
Sfmt 4700
E:\FR\FM\25OCR3.SGM
25OCR3
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
Paragraph
85385
Requirement
6.2 .....................
6.3 .....................
• NIST Framework for Improving Critical Infrastructure Cybersecurity DE.CM–7; and
• NIST SP 800–53 Rev. 5, CA–7, CM–3, SI–5.
Identify any certificate systems under the control of State or delegated third party trusted roles that are capable of monitoring
and logging system activity, and enable those systems to log and continuously monitor the events specified in paragraph 7
of this Appendix. These requirements must be implemented in full compliance with the following references:
• CA/Browser Forum Network and Certificate System Security Requirements; and
• NIST SP 800–53 Rev. 5, AU–12.
Monitor the integrity of the logging processes for application and system logs using either continuous automated monitoring
and alerting, or human review, to confirm that logging and log-integrity functions meet the requirements set forth in paragraph 7 of this Appendix. Alternatively, if a human review is utilized and the system is online, the process must be performed at least once every 31 calendar days. These requirements must be implemented in full compliance with the following references:
• CA/Browser Forum Network and Certificate System Security Requirements; and
• NIST SP 800–53 Rev. 5, AU–1, AU–6, AU–5, AU–9, AU–12.
7: Logging
7.1 .....................
7.2 .....................
7.3 .....................
7.4 .....................
ddrumheller on DSK120RN23PROD with RULES3
7.5 .....................
Log records must include the following elements:
1. Date and time of record;
2. Identity of the person or non-person entity making the journal record; and
3. Description of the record.
These requirements must be implemented in full compliance with the following references:
• CA/Browser Forum Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates Section
5.4.1;
• NIST Framework for Improving Critical Infrastructure Cybersecurity PR.PT–1; and
• NIST SP 800–53 Rev. 5, AU–2, AU–3, AU–8.
Log at least certificate system and key lifecycle events for IACA root certificates, document signer certificates, and other intermediate certificates, including:
1. Key generation, backup, storage, recovery, archival, and destruction;
2. Certificate requests, renewal, and re-key requests, and revocation;
3. Approval and rejection of certificate requests;
4. Cryptographic device lifecycle management events;
5. Generation of Certificate Revocation Lists and OCSP entries;
6. Introduction of new Certificate Profiles and retirement of existing Certificate Profiles;
7. Issuance of certificates; and
8. All verification activities required in paragraph 2 of this Appendix and the State’s Certification System Policy.
These requirements must be implemented in full compliance with the following references:
• CA/Browser Forum Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates Section
5.4.1;
• NIST Framework for Improving Critical Infrastructure Cybersecurity PR.PT–1; and
• NIST SP 800–53 Rev. 5, AU–1, AU–2, AU–3, AU–4, AU–7, AU–10, SC–17.
Log certificate system Security events, including:
1. Successful and unsuccessful PKI system access attempts;
2. PKI and security system actions performed;
3. Security profile changes;
4. Installation, update and removal of software on a certificate system;
5. System crashes, hardware failures, and other anomalies;
6. Firewall and router activities; and
7. Entries to and exits from the IACA facility if managed on-premises.
These requirements must be implemented in full compliance with the following references:
• CA/Browser Forum Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates Section
5.4.1; and
• NIST SP 800–53 Rev. 5, AU–2, AU–3, AU–4, AU–7, AU–10, CM–3, PE–6, SI–11, SI–12.
Maintain certificate system logs for a period not less than 36 months, in full compliance with the following references:
• CA/Browser Forum Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates Section
5.4.3; and
• NIST SP 800–53 Rev. 5, AU–4, AU–10, AU–11.
Maintain IACA root certificate and key lifecycle management event logs for a period of not less than 24 months after the destruction of the IACA root certificate private key, in full compliance with the following references:
• CA/Browser Forum Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates Section
5.4.3;
• NIST Framework for Improving Critical Infrastructure Cybersecurity PR.PT–1; and
• NIST SP 800–53 Rev. 5, AU–2, AU–4, AU–10, AU–11.
8: Incident Response & Recovery Plan
8.1 .....................
VerDate Sep<11>2014
Implement automated mechanisms under the control of State or delegated third party trusted roles to process logged system
activity and alert personnel, using notices provided to multiple destinations, of possible critical security events. These requirements must be implemented in full compliance with the following references:
• CA/Browser Forum Network and Certificate System Security Requirements;
• DHS National Cyber Incident Response Plan;
• NIST Framework for Improving Critical Infrastructure Cybersecurity RS.CO–5, RS.AN–5; and
• NIST SP 800–53 Rev. 5, AU–1, AU–2, AU–6, IR–5, SI–4, SI–5.
18:55 Oct 24, 2024
Jkt 265001
PO 00000
Frm 00047
Fmt 4701
Sfmt 4700
E:\FR\FM\25OCR3.SGM
25OCR3
85386
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 / Rules and Regulations
Paragraph
Requirement
8.2 .....................
Require trusted role personnel to follow up on alerts of possible critical security events, in full compliance with the following
references:
• CA/Browser Forum Network and Certificate System Security Requirements;
• DHS National Cyber Incident Response Plan; and
• NIST SP 800–53 Rev. 5, AC–5, AC–6, IR–1, IR–4, IR–7, SI–4, SI–5.
If continuous automated monitoring and alerting is utilized, respond to the alert and initiate a plan of action within 24 hours, in
full compliance with the following references:
• CA/Browser Forum Network and Certificate System Security Requirements;
• DHS National Cyber Incident Response Plan; and
• NIST SP 800–53 Rev. 5, IR–1, PM–14, SI–4.
Implement intrusion detection and prevention controls under the management of State or delegated third party individuals in
trusted roles to protect certificate systems against common network and system threats, in full compliance with the following references:
• CA/Browser Forum Network and Certificate System Security Requirements;
• CISA Federal Government Cybersecurity Incident & Vulnerability Response Playbooks;
• DHS National Cyber Incident Response Plan;
• NIST Framework for Improving Critical Infrastructure Cybersecurity DE.AE–2, DE.AE–3; DE.DP–1; and
• NIST SP 800–53 Rev. 5, IR–1, IR–4, IR–7, IR–8, SI–4, SI–5.
Document and follow a vulnerability correction process that addresses the identification, review, response, and remediation of
vulnerabilities, in full compliance with the following references:
• CA/Browser Forum Network and Certificate System Security Requirements;
• CISA Federal Government Cybersecurity Incident & Vulnerability Response Playbooks;
• DHS National Cyber Incident Response Plan;
• NIST Framework for Improving Critical Infrastructure Cybersecurity PR.IP–9; and
• NIST SP 800–53 Rev. 5, CA–5, CP–2, CP–4, CP–6, CP–7, CP–8, CP–9, CP–10, SI–1, SI–2, SI–10.
Notify TSA of any reportable cybersecurity incident, as defined in the TSA Cybersecurity Lexicon available at www.tsa.gov,
that may compromise the integrity of the certificate systems within no more than 72 hours of the discovery of the incident.
Reports must be made as directed at www.tsa.gov/real-id/mDL. These requirements must be implemented in full compliance with the following references:
• DHS National Cyber Incident Response Plan; and
• NIST SP 800–53 Rev. 5, IR–6.
Information provided in response to this paragraph may contain SSI, and if so, must be handled and protected in accordance
with 49 CFR part 1520.
Undergo a vulnerability scan on public and private IP addresses identified by the State or delegated third party as the State’s
or delegated third party’s certificate systems at least every three months, and after performing any significant system or
network changes. These requirements must be implemented in full compliance with the following references:
• CA/Browser Forum Network and Certificate System Security Requirements;
• DHS National Cyber Incident Response Plan; and
• NIST SP 800–53 Rev. 5, CM–1, CM–4, IR–3, RA–1, RA–5.
Undergo a penetration test on the State’s and each delegated third party’s certificate systems at least every 12 months, and
after performing any significant infrastructure or application upgrades or modifications. These requirements must be implemented in full compliance with the following references:
• CA/Browser Forum Network and Certificate System Security Requirements;
• DHS National Cyber Incident Response Plan;
• NIST Framework for Improving Critical Infrastructure Cybersecurity PR.IP–7; and
• NIST SP 800–53 Rev. 5, CA–2, CA–8, CM–4, RA–3.
Record evidence that each vulnerability scan and penetration test was performed by a person or entity with the requisite
skills, tools, proficiency, code of ethics, and independence.
Review State and/or delegated third party incident response & recovery plan at least once during every 12 months to address
cybersecurity threats and vulnerabilities, in full compliance with the following references:
• CA/Browser Forum Network and Certificate System Security Requirements;
• DHS National Cyber Incident Response Plan; and
• NIST SP 800–53 Rev. 5, CP–2, IR–1, IR–2, SC–5.
8.3 .....................
8.4 .....................
8.5 .....................
8.6 .....................
8.7 .....................
8.8 .....................
8.9 .....................
8.10 ...................
Dated: October 10, 2024.
David P. Pekoske,
Administrator.
[FR Doc. 2024–23881 Filed 10–24–24; 8:45 am]
ddrumheller on DSK120RN23PROD with RULES3
BILLING CODE 9110–05–P
VerDate Sep<11>2014
18:55 Oct 24, 2024
Jkt 265001
PO 00000
Frm 00048
Fmt 4701
Sfmt 9990
E:\FR\FM\25OCR3.SGM
25OCR3
Agencies
[Federal Register Volume 89, Number 207 (Friday, October 25, 2024)]
[Rules and Regulations]
[Pages 85340-85386]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2024-23881]
[[Page 85339]]
Vol. 89
Friday,
No. 207
October 25, 2024
Part III
Department of Homeland Security
-----------------------------------------------------------------------
6 CFR Part 37
Minimum Standards for Driver's Licenses and Identification Cards
Acceptable by Federal Agencies for Official Purposes; Waiver for Mobile
Driver's Licenses; Final Rule
Federal Register / Vol. 89, No. 207 / Friday, October 25, 2024 /
Rules and Regulations
[[Page 85340]]
-----------------------------------------------------------------------
DEPARTMENT OF HOMELAND SECURITY
6 CFR Part 37
[Docket No. TSA-2023-0002]
RIN 1652-AA76
Minimum Standards for Driver's Licenses and Identification Cards
Acceptable by Federal Agencies for Official Purposes; Waiver for Mobile
Driver's Licenses
AGENCY: Transportation Security Administration (TSA), Department of
Homeland Security (DHS).
ACTION: Final rule.
-----------------------------------------------------------------------
SUMMARY: The Department of Homeland Security (DHS) is amending the REAL
ID regulations to waive, on a temporary and State-by-State basis, the
regulatory requirement that mobile or digital driver's licenses or
identification cards (collectively ``mobile driver's licenses'' or
``mDLs'') must be compliant with REAL ID requirements to be accepted by
Federal agencies for official purposes, as defined by the REAL ID Act,
when full enforcement of the REAL ID Act and regulations begins on May
7, 2025.
DATES: Effective date: This rule is effective November 25, 2024.
Incorporation by Reference: The incorporation by reference of
certain material listed in the rule is approved by the Director of the
Federal Register as of November 25, 2024. The incorporation by
reference of certain other material listed in the rule was approved by
the Director of the Federal Register as of January 14, 2016.
FOR FURTHER INFORMATION CONTACT:
Technical questions: George Petersen, Senior Program Manager, REAL
ID Program, Enrollment Services and Vetting Programs, Transportation
Security Administration; telephone: (571) 227-2215; email:
[email protected].
Legal questions: Anurag Maheshwary, Attorney Advisor, Office of
Chief Counsel, Transportation Security Administration; telephone: (571)
227-4812; email: [email protected].
SUPPLEMENTARY INFORMATION:
Availability of Rulemaking Document
You can find an electronic copy of this rulemaking using the
internet by accessing the Government Publishing Office's web page at
https://www.govinfo.gov/app/collection/FR/ to view the daily published
Federal Register edition or accessing the Office of the Federal
Register's web page at https://www.federalregister.gov. Copies are also
available by contacting the individual identified for ``Technical
Questions'' in the FOR FURTHER INFORMATION CONTACT section. Make sure
to identify the docket number of this rulemaking.
Abbreviations and Terms Used in This Document
AAMVA--American Association of Motor Vehicle Administrators
CA/Browser Forum--Certification Authority Browser Forum
CISA--Cybersecurity and Infrastructure Security Agency
DHS--U.S. Department of Homeland Security
EDL--Enhanced driver's license and identification card
FIPS--Federal Information Processing Standards
HSM--Hardware security module
IBR--Incorporation by reference or Incorporate by reference
IEC--International Electrotechnical Commission
ISO--International Organization for Standardization
IT--Information technology
mDL--Mobile driver's license and mobile identification card
NIST--National Institute for Standards and Technology
NPRM--Notice of proposed rulemaking
OFR--Office of Federal Register
OMB--Office of Management and Budget
PUB--Publication
RFI--Request for information
SP--Special publication
TSA--Transportation Security Administration
Table of Contents
I. Executive Summary
A. Purpose of this Rulemaking
B. Summary of the Major Provisions
C. Need for a Multi-Phased Rulemaking
D. Costs and Benefits
II. Background
A. REAL ID Act, Regulations, and Applicability to mDLs
B. Rulemaking History
C. mDL Overview
D. Industry Standards and Government Guidelines for mDLs
III. General Discussion of the Rulemaking
A. Changes Between NPRM and Final Rule
B. Summary of Regulatory Provisions
C. Specific Provisions
D. Impacted Stakeholders
E. Use Cases Affected by This Rule
F. Severability
IV. Discussion of Comments
A. Waiver Eligibility
B. Conditions on Federal Agencies Accepting mDLs
C. Waiver Application Criteria
D. TSA Waiver Application Guidance
E. General Concerns About mDLs
F. Scope of Rulemaking and mDL Acceptance
G. Privacy
H. Waiver Validity Period and Renewals
I. Vendor and Technology ``Lock-in'' Effects
J. Pseudonymous Validation and On-Device Biometric Matching
K. Access to Standards
L. Standards and Standards Development Generally
M. TSA's Identity Verification Policies
N. Paperwork Reduction Act
O. Legal Authority
P. Economic Impact Analysis
Q. Communicating Status of Waiver; System Disruptions
R. Impact of Waiver on States Currently Testing mDLs With TSA
S. Notice for Changes to State mDL Issuance Processes
T. Clarification Regarding ``Days''
U. Audit Requirements
V. Appendix A to Subpart A: mDL Issuance Requirements
W. Protection of Sensitive Security Information in Waiver
Applications
V. Consultation With States and the Department of Transportation
VI. Regulatory Analyses
A. Economic Impact Analyses
B. Paperwork Reduction Act
C. Federalism (E.O. 13132)
D. Customer Service (E.O. 14058)
E. Energy Impact Analysis (E.O. 13211)
F. Environmental Analysis
I. Executive Summary
A. Purpose of This Rulemaking
This rule is part of an incremental, multi-phased rulemaking that
will culminate in the promulgation of comprehensive requirements that
enable States to issue mobile driver's licenses and mobile
identification cards (collectively ``mDLs'') that comply with the REAL
ID Act of 2005 (``REAL ID Act'' or ``Act'') and regulations \1\
[hereinafter ``REAL ID-Compliant'']. In this first phase, the
Transportation Security Administration (TSA) is making two changes to
the current regulations in 6 CFR part 37, ``REAL ID Driver's Licenses
and Identification Cards.'' First, TSA is adding definitions for, among
others, mobile driver's licenses and mobile identification cards. These
definitions provide a precise explanation of those terms as referenced
in the REAL ID Act, which applies to only State-issued driver's
licenses and State-issued identification cards.\2\ Any other types of
identification cards, such
[[Page 85341]]
as those issued by a Federal agency, or commercial, educational, or
non-profit entity, are beyond the scope of the REAL ID Act and
regulations, and hence this rulemaking, because they do not meet the
definition of driver's license or identification card as defined by the
REAL ID Act. The definition of ``mDL'' as used in this rulemaking is
limited strictly to the REAL ID Act and regulations and does not
include ``mDLs'' as defined by other entities.
---------------------------------------------------------------------------
\1\ The REAL ID Act of 2005, Division B Title II of the FY05
Emergency Supplemental Appropriations Act, as amended, Public Law
109-13, 119 Stat. 302 (May 11, 2005) (codified at 49 U.S.C. 30301
note) [hereinafter ``REAL ID Act'']; 6 CFR part 37. Effective May
22, 2023, authority to administer the REAL ID program was delegated
from the Secretary of Homeland Security to the Administrator of TSA
pursuant to DHS Delegation No. 7060.2.1.
\2\ See sec. 201 of the REAL ID Act (defining a ``driver's
license'' to include ``driver's licenses stored or accessed via
electronic means, such as mobile or digital driver's licenses, which
have been issued in accordance with regulations prescribed by the
Secretary''; mirroring definition for ``identification card'').
---------------------------------------------------------------------------
Second, TSA is establishing a temporary waiver process that permits
Federal agencies to accept mDLs for official purposes,\3\ as defined in
the REAL ID Act and regulations, on an interim basis when full
enforcement begins on May 7, 2025,\4\ but only if TSA has issued a
waiver to the State. To qualify for the waiver, this final rule
requires States to (1) be in full compliance with all applicable REAL
ID requirements as defined in subpart E of this part, and (2) submit an
application demonstrating that they meet the requirements specified in
this rule, which are drawn from 19 industry standards and government
guidelines. The rulemaking incorporates by reference (IBRs) those
standards and guidelines, which cover technical areas such as mDL
communication, digital identity, encryption, cybersecurity, and
network/information system security and privacy.
---------------------------------------------------------------------------
\3\ The REAL ID Act defines official purposes as including but
not limited to accessing Federal facilities, boarding Federally
regulated commercial aircraft, entering nuclear power plants, and
any other purposes that the Secretary shall determine. See REAL ID
Act. Notably, because the Secretary has not determined any other
official purposes, the REAL ID Act and regulations do not apply to
Federal acceptance of driver's licenses and identification cards for
other purposes, such as applying for Federal benefits programs,
submitting immigration documents, or other Federal programs.
\4\ DHS, Final Rule, Minimum Standards for Driver's Licenses and
Identification Cards Acceptable by Federal Agencies for Official
Purposes, 88 FR 14473 (Mar. 9, 2023); DHS Press Release, DHS
Announces Extension of REAL ID Full Enforcement Deadline (Dec. 5,
2022), https://www.dhs.gov/news/2022/12/05/dhs-announces-extension-real-id-full-enforcement-deadline (last visited July 17, 2024).
---------------------------------------------------------------------------
As noted above, this final rule is part of an incremental
rulemaking that temporarily permits Federal agencies to accept mDLs for
official purposes until TSA issues a subsequent rule that would set
comprehensive requirements for mDLs. TSA believes it is premature to
issue such requirements before the May 7, 2025 deadline due to the need
for emerging industry standards and government guidelines \5\ to be
finalized.
---------------------------------------------------------------------------
\5\ See TSA, Notice of Proposed Rulemaking, Waiver for Mobile
Driver's Licenses, 88 FR 60056, 60063-64 (Aug. 30, 2023)
[hereinafter ``NPRM''].
---------------------------------------------------------------------------
The need for this rulemaking arises from TSA's desire to
accommodate and foster the rapid pace of mDL innovation, while ensuring
the intent of the REAL ID Act and regulations are met. Secure driver's
licenses and identification cards are a vital component of our national
security framework. In the REAL ID Act, Congress acted to implement the
9/11 Commission's recommendation that the Federal Government ``set
standards for the issuance of sources of identification, such as
driver's licenses.'' Under the REAL ID Act and regulations, a Federal
agency may not accept for any official purpose a State-issued driver's
license or identification card, either physical or an mDL, that does
not meet specified requirements, as detailed in the REAL ID regulations
(see Part II.A., below, for more discussion on these requirements).
This final rule will result in the development of mDLs with a
higher level of security, privacy, and interoperability features
necessary for Federal acceptance for official purposes. Because the
current regulatory provisions do not include requirements that would
enable States to issue REAL ID-compliant mDLs, several States are
investing significant resources to develop mDLs based on varying and
often proprietary standards, many of which may lack security and
privacy safeguards commensurate with REAL ID requirements and the
privacy needs of users. Without timely regulatory guidance concerning
potential requirements for developing a REAL ID-compliant mDL, States
risk investing in mDLs that are not aligned with emerging industry
standards and government guidelines that may be IBR'd in a future
rulemaking. States, therefore, may become locked-in to existing
solutions and could face a substantial burden to redevelop products
acceptable to Federal agencies under this future rulemaking.
This final rule addresses these concerns by enabling TSA to grant a
temporary waiver to States whose mDLs TSA determines provide sufficient
safeguards for security and privacy, pending finalization of emerging
standards. Although this rule does not set standards for the issuance
of REAL ID-compliant mDLs, it does establish minimum requirements that
States must meet to be granted a waiver so that mDLs can be accepted by
Federal agencies for official purposes. These minimum standards and
requirements ensure that States' investments in mDLs provide minimum
privacy and security safeguards consistent with information currently
known to the TSA.
B. Summary of the Major Provisions
As further discussed in Part II.A., below, mDLs cannot be accepted
by Federal agencies for official purposes when REAL ID full enforcement
begins on May 7, 2025, unless 6 CFR part 37 is amended to address mDLs.
This final rule establishes a process for waiving, on a temporary and
State-by-State basis, the current prohibition on Federal acceptance of
mDLs for official purposes, and enables Federal agencies to accept mDLs
on an interim basis while the industry matures to a point sufficient to
enable TSA to develop more comprehensive mDL regulatory requirements.
The current regulations prohibit Federal agencies from accepting
non-compliant driver's licenses and identification cards, including
both physical cards and mDLs, when REAL ID enforcement begins on May 7,
2025. Any modification of this regulatory provision must occur through
rulemaking (or legislation). Until and unless TSA promulgates
comprehensive mDL regulations that enable States to issue REAL ID-
compliant mDLs, mDLs cannot be developed to comply with REAL ID, and
Federal agencies therefore cannot accept mDLs for official purposes
after REAL ID enforcement begins on May 7, 2025. The rule allows the
Federal government to accept mDLs on an interim basis, but only if TSA
has issued a waiver to such State based on that State's compliance with
all applicable REAL ID requirements as defined in subpart E of this
part, and with the minimum privacy, safety, and interoperability
requirements in this rulemaking. Please see Part II.A., below, for an
explanation of the REAL ID requirement that both cards and issuing
States must be REAL ID compliant.
C. Need for a Multi-Phased Rulemaking
TSA recognizes both that regulations can influence long-term
industry research and investment decisions, and that premature
regulations can distort the choices of technologies, which could harm
competition and innovation. As noted above, there are clear reasons for
TSA to issue requirements for mDLs in the context of REAL ID.
Simultaneously, however, TSA observes that this is a rapidly innovating
market, with multiple industry and government standards and guidelines
necessary to ensure mDL privacy and security still in development.\6\
Accordingly, TSA has concluded that it is premature to promulgate
comprehensive requirements for mDLs while key
[[Page 85342]]
standards are being finalized because of the risk of unintended
consequences, such as chilling innovation and competition in the
marketplace, and ``locking-in'' stakeholders to certain technologies.
TSA is therefore establishing a temporary waiver process with clear
standards and requirements to facilitate the acceptance of mDLs while
the industry matures and moves to accepted standards.
---------------------------------------------------------------------------
\6\ See NPRM, 88 FR at 60062-66.
---------------------------------------------------------------------------
TSA is proceeding with a multi-phased rulemaking approach. This
``Phase 1'' rule establishes a temporary waiver process that enables
continuing Federal acceptance of mDLs for official purposes when REAL
ID enforcement begins on May 7, 2025, and affords Federal agencies
additional operational experience and data that would inform
comprehensive regulations in the upcoming ``Phase 2'' rulemaking. The
Phase 1 rule is intended to serve as a regulatory bridge until the
emerging standards are finalized and a comprehensive Phase 2 rulemaking
is effective.
TSA anticipates the future Phase 2 rulemaking would repeal the
temporary waiver provisions established in Phase 1 and establish
comprehensive requirements enabling States to issue mDLs that comply
with REAL ID requirements. TSA envisions the Phase 2 rulemaking would
draw heavily from pertinent parts of the emerging standards (pending
review of those final, published documents) to set specific
requirements for security, privacy, and interoperability. In addition,
the Phase 2 rule would distinguish between existing regulatory
requirements that apply only to mDLs versus physical cards. As one
commenter \7\ to a previously-issued Request for Information (RFI)
urged (discussed in Part II.B., below), DHS is taking ``a slow and
careful approach'' to regulation in order to fully understand the
implications of mDLs.
---------------------------------------------------------------------------
\7\ See comment from Electronic Privacy Information Center,
https://downloads.regulations.gov/DHS-2020-0028-0048/attachment_1.pdf (last visited July 17, 2024); DHS, Request for
Information, Mobile Driver's Licenses, 86 FR 20320 (Apr. 19, 2021).
---------------------------------------------------------------------------
This multi-phased rulemaking approach supports Executive Order
(E.O.) 14058 of December 13, 2021 (Transforming Federal Customer
Experience and Service Delivery to Rebuild Trust in Government), by
using ``technology to modernize Government and implement services that
are simple to use, accessible, equitable, protective, transparent, and
responsive for all people of the United States.'' \8\ As highlighted
above and discussed in more detail below, allowing acceptance of mDLs
issued by States that meet the waiver requirements enables the public
to more immediately realize potential benefits of mDLs, including
greater convenience, security, and privacy.
---------------------------------------------------------------------------
\8\ See 86 FR 71357 (Dec. 16, 2021).
---------------------------------------------------------------------------
D. Costs and Benefits
TSA estimates the 10-year total cost of the rule to be $829.8
million undiscounted, $698.1 million discounted at 3 percent ($81.8
million annualized), and $563.9 million discounted at 7 percent ($80.3
million annualized). Affected entities include States, TSA, and relying
parties (Federal agencies that voluntarily choose to accept mDLs for
official purposes).
States incur costs to familiarize themselves with the requirements
of the final rule, purchase access to an industry standard, submit an
mDL waiver application, submit mDL waiver reapplications, and comply
with waiver application requirements. TSA estimates that 40 States will
seek an mDL waiver over the next 10 years at a 10-year State cost of
$813.1 million undiscounted, $683.7 million discounted at 3 percent,
and $552.0 million discounted at 7 percent.
TSA incurs costs associated with purchasing access to industry
standards, reviewing mDL waiver applications and mDL waiver
reapplications, acquiring, installing, and operating mDL readers, and
training transportation security officers. TSA estimates the 10-year
cost to TSA is $10.13 million undiscounted, $8.87 million discounted at
3 percent, and $7.56 million discounted at 7 percent.
Relying parties will incur costs to procure mDL readers should they
voluntarily choose to accept mDLs for official purposes. TSA estimates
the 10-year cost to relying parties is $6.57 million undiscounted,
$5.48 million discounted at 3 percent, and $4.38 million discounted at
7 percent.
TSA also identifies other non-quantified costs that affected
parties may incur. States may incur incremental costs to: monitor and
study mDL technology as it evolves; resolve underlying issues that
could lead to a suspension or termination of an mDL waiver; report
serious threats to security, privacy, or data integrity; report
material changes to mDL issuance processes; remove conflicts of
interest with an independent auditor; and request reconsideration of a
denied mDL waiver application. TSA may incur costs to: investigate
circumstances that could lead to suspension or termination of a State's
mDL waiver; provide notice to States, relying parties, and the public
related to mDL waiver suspensions or terminations; develop an IT
solution that maintains an up-to-date list of States with valid mDL
waivers; develop materials related to process changes to adapt to mDL
systems; and resolve requests for reconsideration of a denied mDL
waiver application. An mDL user may incur costs with additional
application requirements to obtain an mDL. States may also pass on mDL
related costs to the public.\9\ Relying parties may incur costs to
resolve any security or privacy issue with the mDL reader; report
serious threats to security, privacy, or data integrity; verify the
list of States with valid mDL waivers; train personnel to verify mDLs;
and update the public on identification policies.
---------------------------------------------------------------------------
\9\ TSA does not possess data to quantify how States may
implement a pass through or recoup costs associated with
implementation of mDLs.
---------------------------------------------------------------------------
The final rule provides benefits to affected parties which include,
but are not limited to: promoting higher security, privacy, and
interoperability safeguards; reducing uncertainty in the mDL technology
environment by helping to foster a minimum level of security, privacy
and interoperability; and allowing Federal agencies to continue to
accept mDLs for official purposes when REAL ID enforcement begins.
Also, mDLs themselves may provide additional security benefits by
offering a more secure verification of an individual's identity and
authentication of an individual's credential compared to usage of
physical cards.
II. Background
A. REAL ID Act, Regulations, and Applicability to mDLs
This rulemaking is authorized by the REAL ID Act of 2005 and REAL
ID Modernization Act. The REAL ID Act authorizes the Secretary of
Homeland Security, in consultation with the States and the Secretary of
Transportation, to promulgate regulations to implement the requirements
under the REAL Act.\10\ The REAL ID Modernization Act amended the
definitions of ``driver's license'' and ``identification card'' to
specifically include mDLs that have been issued in accordance with
regulations prescribed by the Secretary of Homeland Security.\11\
---------------------------------------------------------------------------
\10\ Sec. 205 of the REAL ID Act.
\11\ Sec. 1001 of the REAL ID Modernization Act, Title X of
Division U of the Consolidated Appropriations Act, 2021, Public Law
116-260, 134 Stat. 2304 [hereinafter ``REAL ID Modernization Act''].
---------------------------------------------------------------------------
The REAL ID Act and implementing regulations, 6 CFR part 37, set
minimum requirements for State-issued driver's licenses and
identification cards accepted by Federal agencies for official
purposes, including accessing Federal
[[Page 85343]]
facilities, boarding Federally regulated commercial aircraft, entering
nuclear power plants, and any other purposes that the Secretary shall
determine.\12\ The Act defines ``driver's licenses'' and
``identification cards'' strictly as State-issued documents,\13\ and
the regulations further refine the definition of ``identification
card'' as ``a document made or issued by or under the authority of a
State Department of Motor Vehicles or State office with equivalent
function.'' \14\ The REAL ID Act and regulations do not apply to
identification cards that are not made or issued under a State
authority, such as cards issued by a Federal agency or any commercial,
educational, or non-profit entity.
---------------------------------------------------------------------------
\12\ REAL ID Act; 6 CFR part 37.
\13\ Sec. 201 of the REAL ID Act.
\14\ 6 CFR 37.3.
---------------------------------------------------------------------------
The regulations include a schedule describing when individuals must
obtain a REAL ID-compliant driver's license or identification card
intended for use for official purposes, known as ``card-based''
enforcement.\15\ Card-based enforcement begins on May 7, 2025.\16\ On
this date, Federal agencies will be prohibited from accepting a State-
or territory-issued driver's license or identification card for
official purposes unless the card is compliant with the REAL ID Act and
regulations.\17\
---------------------------------------------------------------------------
\15\ See 6 CFR 37.5(b). The regulations also include a schedule
for State-based compliance, known as ``State-based enforcement.''
See 6 CFR 37.51(a).
\16\ See 6 CFR 37.5(b).
\17\ See 6 CFR 37.5(b). Additionally, TSA is conducting a
separate rulemaking that would allow Federal agencies to implement
the card-based enforcement provisions of the REAL ID regulations
under a phased approach beginning on the May 7, 2025 enforcement
deadline. See NPRM, Phased Approach for Card-Based Enforcement, 89
FR 74137 (Sept. 12, 2024).
---------------------------------------------------------------------------
On December 21, 2020, Congress passed the REAL ID Modernization
Act,\18\ which amended the REAL ID Act to update the definitions of
``driver's license'' and ``identification card'' to specifically
include mDLs that have been issued in accordance with regulations
prescribed by the Secretary, among other updates.\19\ Accordingly, mDLs
must be REAL ID-compliant to be accepted by Federal agencies for
official purposes when card-based enforcement begins on May 7, 2025.
However, States cannot issue REAL ID-compliant mDLs until the
regulations are updated to include requirements to ensure that mDLs
meet equivalent levels of security currently imposed on REAL ID-
compliant physical cards.
---------------------------------------------------------------------------
\18\ REAL ID Modernization Act, 134 Stat. 2304.
\19\ Sec. 1001 of the REAL ID Modernization Act, 134 Stat. 2304.
---------------------------------------------------------------------------
B. Rulemaking History
In April 2021, DHS issued an RFI announcing DHS's intent to
commence future rulemaking to set the minimum technical requirements
and security standards for mDLs to enable Federal agencies to accept
mDLs for official purposes. The RFI requested comments and information
to inform DHS's rulemaking.\20\ In response, DHS received 63 comments
\21\ through a twice-extended comment period of 180 days, which closed
on October 18, 2021.
---------------------------------------------------------------------------
\20\ 86 FR 20320 (Apr. 19, 2021).
\21\ The 63 total comments included three duplicates and one
confidential submission.
---------------------------------------------------------------------------
In August 2023, TSA published a Notice of Proposed Rulemaking
(NPRM) \22\ drawing on comments to the RFI, which are summarized at 88
FR 60056, 60071-72. The NPRM comment period closed on October 16, 2023,
and TSA received 31 comments. NPRM comments are discussed in detail in
Part IV, below.
---------------------------------------------------------------------------
\22\ 88 FR 60056.
---------------------------------------------------------------------------
C. mDL Overview
1. mDLs Generally
An mDL is generally recognized as the digital representation of an
individual's identity information contained on a State-issued physical
driver's license or identification card.\23\ An mDL may be stored on a
diverse range of portable or mobile electronic devices, such as
smartphones, smartwatches, and storage devices containing memory. Like
a physical card, mDL data originates from identity information about an
individual that is maintained in the database of a State driver's
licensing agency. An mDL has potential benefits for all stakeholders.
For Federal agencies, mDLs may provide security and efficiency
enhancements compared to physical cards, because mDLs rely on digital
security features that are immune to many vulnerabilities of physical
security features. For individuals, mDLs may provide a more secure,
convenient, privacy-enhancing, and ``touchless'' method of identity
verification compared to physical IDs.
---------------------------------------------------------------------------
\23\ A technical description of mDLs as envisioned by the
American Association of Motor Vehicle Administrators may be found at
https://www.aamva.org/Mobile-Drivers-License/ (last visited July 17,
2024).
---------------------------------------------------------------------------
Unlike physical cards that employ physical security features to
deter fraud and tampering, mDLs combat fraud through the use of digital
security features that are not recognizable through human inspection,
such as asymmetric cryptography/public key infrastructure (PKI). As
discussed in the NPRM,\24\ asymmetric cryptography generates a pair of
encryption ``keys'' to encrypt and decrypt protected data. One key, a
``public key,'' is distributed publicly, while the other key, a
``private key,'' is held by the State driver's licensing agency (e.g.,
a Department of Motor Vehicles). When the driver's licensing agency
issues an mDL to an individual, the agency uses its private key to
digitally ``sign'' the mDL data. A Federal agency accepting an mDL
validates the integrity of the mDL data by obtaining the State driver's
licensing agency's public key to verify the digital signature. Private
keys and digital signatures are elements of data encryption that
protect against unauthorized access, tampering, and fraud. Generally,
mDL-based identity verification under REAL ID involves a triad of
secure communications between a State driver's licensing agency, an mDL
holder, and a Federal agency. Standardized communication interfaces are
necessary to enable Federal agencies to exchange information with all
U.S. States and territories that issue mDLs. Please see the NPRM for a
more detailed discussion.\25\
---------------------------------------------------------------------------
\24\ 88 FR at 60060.
\25\ 88 FR at 60060-61.
---------------------------------------------------------------------------
In contrast to physical driver's licenses that are read and
verified visually through human inspection of physical security
features, an mDL is read and verified electronically using a device
known simply as a ``reader. Any Federal agency that accepts mDLs for
official purposes must use readers to validate an mDL holder's identity
data from their mobile device and establish trust that the mDL is
secure by using private-public key data encryption.\26\ An mDL reader
compliant with this requirement can take multiple forms, such as an app
installed on a mobile device, or a dedicated device. Although reader
development is evolving, some companies already offer reader apps for
free, and TSA therefore expects readers will be offered in a wide range
capabilities and associated price points.\27\
---------------------------------------------------------------------------
\26\ Non-Federal agencies and other entities who choose to
accept mDLs for uses beyond the scope of REAL ID should also
recognize the need for a reader to ensure the validity of the mDL.
Any verifying entity can validate in the same manner as a Federal
agency if they implement the standardized communication interface
requirements specified in this final rule, which would require
investment to develop the necessary IT infrastructure and related
processes.
\27\ Readers for mDLs have specific requirements and at this
time are not interchangeable with readers for other types of Federal
cards, such as the Transportation Worker Identification Credential
(TWIC). Although TSA is evaluating some mDLs at select airport
security checkpoints, cost estimates for readers used in the
evaluations are not available because those readers are non-
commercially available prototypes designed specifically for
integration into TSA-specific IT infrastructure that few, if any,
other Federal agencies use. In addition, mDL readers are evolving
and entities who accept mDLs would participate voluntarily.
Accordingly, associated reader costs are not quantified at this time
but TSA intends to gain a greater understanding of any costs to
procure reader equipment as the technology continues to evolve.
---------------------------------------------------------------------------
[[Page 85344]]
2. State mDL Issuance and TSA Testing
As noted above, mDL issuance is proliferating rapidly among States,
with at least half of all States believed to be preparing for or
issuing mDLs.\28\ Although detailed mDL adoption statistics are
unavailable, anecdotal information and media reports indicates that
mDLs are rapidly gaining public acceptance. For example, Maryland
commented that it has issued more than 200,000 mDLs to residents
following a pilot in 2017 and more recent expansion in 2022 and
2023.\29\ Iowa commented that in the 3 months since it began offering
its mDL app, it has been downloaded by more than 7,000 users.\30\
---------------------------------------------------------------------------
\28\ See, e.g., AAMVA, Driver and Vehicle Services Data Map,
https://www.aamva.org/jurisdiction-data-maps#anchorformdlmap (last
visited July 17, 2024); PYMNTS, States Embrace Mobile Driver's
Licenses to Fight Fraud Amid Privacy Scrutiny (Apr. 9, 2024),
https://www.pymnts.com/identity/2024/states-embrace-mobile-drivers-licenses-to-fight-fraud-amid-privacy-scrutiny/ (last visited July
17, 2024); Government Technology, Digital IDs Are Here, but Where
Are They Used and Accepted? (Mar. 12, 2024), https://www.govtech.com/biz/data/digital-ids-are-here-but-where-are-they-used-and-accepted (last visited July 17, 2024).
\29\ Comment by Maryland MVA, https://www.regulations.gov/comment/TSA-2023-0002-0032 (last visited July 17, 2024).
\30\ Comment by Iowa Department of Transportation, https://www.regulations.gov/comment/TSA-2023-0002-0023 (last visited July
17, 2024).
---------------------------------------------------------------------------
TSA understands that States are issuing mDLs using widely varying
technology solutions, raising concerns whether such technological
diversity provides the safeguards and interoperability necessary for
Federal acceptance. Since 2022, TSA has been collaborating with States
and industry to test the use of mDLs issued by participating States at
select TSA airport security checkpoints.\31\ As of the date of this
final rule, TSA is currently testing mDLs issued by 11 States (Arizona,
California, Colorado, Georgia, Hawaii, Iowa, Louisiana, Maryland, New
York, Ohio, Utah) at 27 airports.\32\
---------------------------------------------------------------------------
\31\ See NPRM, 88 FR at 60066-67.
\32\ See TSA, Facial Recognition and Digital Identity Solutions,
https://www.tsa.gov/digital-id (last visited Aug. 9, 2024).
---------------------------------------------------------------------------
D. Industry Standards and Government Guidelines for mDLs
The nascence of mDLs and absence of standardized mDL-specific
requirements provide an opportunity for industry and government to
develop standards and guidelines to close this void. TSA is aware of
multiple such documents, published and under development, from both
Federal and non-government sources. As discussed in Part III.C.8,
below, this final rule amends Sec. 37.4 by IBR'g into part 37 19
standards and guidelines that form the basis of many of the
requirements in this final rule. TSA understands that these standards
and guidelines discussed are the most comprehensive and relevant
references governing mDLs today. TSA also acknowledges that many
additional standards and guidelines are in development and may provide
additional standardized mechanisms for mDLs.\33\
---------------------------------------------------------------------------
\33\ See NPRM, 88 FR at 60063-66, for a discussion of these
standards.
---------------------------------------------------------------------------
III. General Discussion of the Rulemaking
A. Changes Between NPRM and Final Rule
After carefully considering all comments received to the NPRM (see
detailed discussion of comments and TSA's responses in Part IV, below),
TSA finalizes the NPRM with several revisions in response to public
comments. Table 1 summarizes the changes made in the final rule
compared to the NPRM.
Table 1--Summary of Changes Between the NPRM and the Final Rule
------------------------------------------------------------------------
Reason for the
Section Final rule change
------------------------------------------------------------------------
37.3........................ Adds definition for Technical change to
``Provisioning.''. add definition of a
key term to improve
clarity.
37.4........................ Revises points of Technical changes to
contact for the improve access to
public to contact IBR materials.
TSA; provides
additional means to
access certain
standards that are
IBR'd in this rule.
37.4(c)(1).................. Corrects title of Technical
``Cybersecurity correction.
Incident &
Vulnerability
Response
Playbooks'' to
``Federal
Government
Cybersecurity
Incident &
Vulnerability
Response
Playbooks.''.
37.4(g)(4).................. Updates standard Technical change to
NIST FIPS PUB 197 reflect revisions
to NIST FIPS PUB to standard to
197-upd1 to reflect improve public
revised version of access. Revisions
standard. include editorial
improvements, but
no technical
changes to the
algorithm specified
in the earlier
version.
37.4(g)(7).................. Corrects website Technical change to
address to the correct a typo.
cited standard.
37.7(a)..................... Clarifies conditions Clarification
under which TSA regarding impact of
will issue a waiver. the waiver.
37.7(b)(3).................. Deleted............. Deleted proposed
language that would
have made a State
ineligible to apply
for a waiver if the
State issues mDLs
to individuals with
non-REAL ID
compliant physical
cards (in addition
to issuing mDLs to
other individuals
that have compliant
physical cards).
37.8(c)..................... Adds paragraph (c) Clarifies that when
to require Federal REAL ID enforcement
agencies accepting begins, Federal
mDLs to confirm, agencies may accept
consistent with the mDLs from States
deadlines set forth only if the
in Sec. 37.5, underlying physical
that the mDL data card is REAL ID
element compliant.
``DHS_compliance''
is encoded ``F,''
as required by Sec.
Sec.
37.10(a)(4)(ii) &
(a)(1)(vii).
37.8(d)..................... Renumbers Sec. Technical changes
37.8(c), as renumber provision
proposed in the from 37.8(c) to
NPRM, to Sec. 37.8(d), update
37.8(d) in light of agency name and
addition of new website address,
Sec. 37.8(c). and clarify the
Corrects website mechanics of
address from reporting.
dhs.gov to tsa.gov. Provides that
Adds requirement reports may contain
regarding sensitive security
protection of SSI. information (SSI)
\34\ and if so,
would be subject to
requirements of 49
CFR part 1520.
[[Page 85345]]
37.9(a)..................... Corrects agency name Technical changes
from DHS to TSA. update agency name
Corrects website and website
address from address.
dhs.gov to tsa.gov.
37.9(b)..................... Revises ``days'' to Clarifies that
``calendar days.''. ``days'' means
Corrects website calendar days, not
address from business days.
dhs.gov to tsa.gov. Technical change
updates agency
website address.
37.9(c)..................... Revises ``days'' to Clarifies that
``calendar days.''. ``days'' means
Corrects website calendar days, not
address from business days.
dhs.gov to tsa.gov. Technical change
updates agency
website address.
37.9(e)(2).................. Revises ``days'' to Clarifies that
``calendar days.''. ``days'' means
Corrects website calendar days, not
address from business days.
dhs.gov to tsa.gov. Technical change
Provides a means for updates agency
States to contact website address.
TSA if the State is Provides a means for
unclear whether States to resolve
certain potential questions
modifications to regarding reporting
its mDL issuance requirements.
processes require
reporting.
37.9(e)(4)(ii).............. Revises ``days'' to Clarifies that
``calendar days.''. ``days'' means
calendar days, not
business days.
37.9(e)(5)(i)............... Corrects agency name Technical change
from DHS to TSA. updates agency
name.
37.9(e)(5)(ii).............. Revises ``days'' to Clarifies that
``calendar days.''. ``days'' means
calendar days, not
business days.
37.9(g)..................... Adds new paragraph SSI protection.
(g), which provides
that information
submitted in
response to
requirements to
apply for and
maintain a waiver
may contain SSI,
and if so, would be
subject to
requirements of 49
CFR part 1520.
37.10(a)(1)(vii)............ Replaces NPRM Proposed language
requirement that would have required
States must issue States to issue
mDLs only to mDLs only to
residents who have individuals to whom
been issued that State
physical cards that previously issued a
are valid, physical card that
unexpired, and REAL is valid,
ID-compliant with unexpired, and REAL
requirement that ID-compliant. This
States must would have denied
populate the States the
``DHS_compliance'' discretion to issue
data field to mDLs to holders of
correspond to the non-compliant
REAL ID-compliance physical cards.
status of the Revisions require
underlying physical States to issue
driver's license or mDLs in a manner
identification that reflects the
card, or as REAL ID compliance
required by the status of the
AAMVA Guidelines. underlying physical
card. This is
consistent with the
intent of the NPRM,
which was to enable
Federal agencies to
determine the REAL
ID-compliance
status of the
underlying physical
card, and accept
only compliant
cards when
enforcement begins.
37.10(a)(4)................. Corrects version Technical change
number of AAMVA corrects version
Mobile Driver's number of AAMVA
License (mDL) Guidelines.
Implementation Changes reflect
Guidelines (Jan. current version of
2023). NIST FIPS PUB 197
Updates NIST FIPS to ensure
PUB 197 to NIST continuing public
FIPS PUB 197-upd1 access. Revisions
to reflect revised to the standard
version of standard. include editorial
improvements, but
no technical
changes to the
algorithm specified
in the earlier
version.
37.10(b)(1)................. Clarifies that Provides States
``independent additional options
entity'' includes to select auditors.
State employees or Reduces burdens
contractors that without impact on
are independent of security or
the State's privacy.
driver's licensing
agency.
37.10(c).................... Corrects website Technical changes
address from update agency
dhs.gov to tsa.gov. website address,
Clarifies that TSA and clarify means
will publish in the of notifying and
Federal Register a publishing updates
notice advising of to TSA mDL Waiver
the availability of Application
updated TSA mDL Guidance.
Waiver Application
Guidance, which
itself will be
published at
www.tsa.gov/mDL/.
Appendix A, Throughout...... Corrections to Technical
titles of: corrections.
CISA Federal
Government
Cybersecurity
Incident &
Vulnerability
Response Playbooks.
DHS National Cyber
Incident Response
Plan.
NIST FIPS PUB 140-3.
NIST Framework for
Improving Critical
Infrastructure
Cybersecurity.
Appendix A, paragraph 1.1... Adds section numbers Technical changes
to certain clarify which parts
references. of cited reference
Deletes requirement require compliance,
to comply with NIST and remove an
SP 800-53B. unnecessary
requirement.
Appendix A, paragraph 2.2... Revises ``privileged Technical change
account or corrects
service'' in NPRM terminology.
to ``trusted
role.''.
Appendix A, paragraph 2.13.. Adds section numbers Technical change
to a certain clarifies which
reference. parts of cited
reference require
compliance.
Appendix A, paragraph 5.13.. Reduces requirements Provides States
for minimum number greater freedom to
of personnel to select products.
generate issuing Does not impact
authority security, privacy,
certificate or
authority (IACA) interoperability.
root certificate
keys from a minimum
of three to two
persons, consisting
of at least one
ceremony
administrator and
one qualified
witness.
[[Page 85346]]
Appendix A, paragraph 5.14.. Modifies Provides States
requirements for greater freedom to
minimum number of select products.
personnel to Does not impact
generate document security, privacy,
signer keys. Final or
rule requires interoperability.
either at least one
administrator and
one qualified
witness (other than
a person involved
in key generation),
or at least 2
administrators
using split
knowledge processes.
Appendix A, paragraph 6.3... Revises ``days'' to Clarifies that
``calendar days. ``days'' means
calendar days, not
business days.
Appendix A, paragraph 8.6... Modifies cyber Clarifies types of
incident reporting incidents that must
requirements to be reported,
incidents as updates agency
defined in the TSA website address,
Cybersecurity and adds SSI
Lexicon available protection.
at www.tsa.gov that
may harm state
certificate systems.
Corrects website
address from
dhs.gov to tsa.gov.
Adds SSI protection
requirements.
------------------------------------------------------------------------
B. Summary of Regulatory Provisions
---------------------------------------------------------------------------
\34\ SSI is information obtained or developed in the conduct of
security activities, the disclosure of which would constitute an
unwarranted invasion of privacy, reveal trade secrets or privileged
or confidential information, or be detrimental to the security of
transportation. The protection of SSI is governed by 49 CFR part
1520.
---------------------------------------------------------------------------
In addition to revising definitions applicable to the REAL ID Act
to incorporate mDLs, this rule amends 6 CFR part 37 to enable TSA to
grant a temporary waiver to States that TSA determines issue mDLs
consistent with specified requirements concerning security, privacy,
and interoperability. This rule enables Federal agencies, at their
discretion, to accept for REAL ID official purposes, mDLs issued by a
State that has been granted a waiver, provided that the underlying
physical card upon which the mDL was based is REAL ID-compliant. The
rule applies only to Federal agency acceptance of State-issued mDLs as
defined in this final rule for REAL ID official purposes, but not other
forms of digital identification, physical driver's licenses or physical
identification cards, or non-REAL ID purposes. Any temporary waiver
issued by TSA would be valid for a period of 3 years from the date of
issuance.
To obtain a waiver, Sec. 37.9(a) requires a State to submit an
application, supporting data, and other documentation to establish that
their mDLs meet the criteria specified in Sec. Sec. 37.10(a) and (b)
(discussed in Part III.C.4., below) concerning security, privacy, and
interoperability. If TSA determines, upon evaluation of a State's
application and supporting documents, that a State's mDL could be
securely accepted under the terms of a waiver, TSA may issue such State
a certificate of waiver. TSA intends to work with each State applying
for a waiver on a case-by-case basis to ensure that its mDLs meet the
minimum requirements necessary to obtain a waiver. This rulemaking
establishes the full process for a State to apply for and maintain a
waiver, including: instructions for submitting the application and
responding to subsequent communications from TSA as necessary; specific
information and documents that a State must provide with its
application; requirements concerning timing, issuance of decisions,
requests for reconsideration; and post-issuance reporting requirements
and other terms, conditions, and limitations. To assist States that are
considering applying for a waiver, TSA has developed guidelines,
entitled, ``Mobile Driver's License Waiver Application Guidance''
(hereinafter ``TSA Waiver Guidance'' or ``the Guidance''), which
provides non-binding recommendations of some ways that States can meet
the application requirements set forth in this rulemaking.\35\ This
final rule makes several technical and administrative changes to the
NPRM, as set forth in Table 1, above. These changes are as follows:
---------------------------------------------------------------------------
\35\ The specific measures and practices discussed in the TSA
Waiver Application Guidance are neither mandatory nor necessarily
the ``preferred solution'' for complying with the requirements in
this final rule. Rather, they are examples of measures and practices
that a State issuer of mDLs may choose to consider as part of its
overall strategy to issue mDLs. States have the ability to choose
and implement other measures to meet these requirements based on
factors appropriate to that State, so long as DHS determines that
the measures implemented provide the levels of security and data
integrity necessary for Federal acceptance of mDLs for official
purposes as defined in the REAL ID Act and 6 CFR part 37. As
provided in Sec. 37.10(c), TSA may periodically update the Guidance
as necessary to recommend mitigations of evolving threats to
security, privacy, or data integrity.
---------------------------------------------------------------------------
Corrections to agency name, website address, points of
contact for access and compliance with reporting requirements: See
Sec. Sec. 37.4, 37.8(d), 37.9(a)-(c), (e)(2) & (e)(5)(i), 37.10(c),
and Appendix A, paragraph 8.6.
Corrections to inadvertent omissions, typographical
errors, paragraph numbering, title/version number of publications: See
Sec. Sec. 37.3, 37.4, 37.4(c)(1), 37.8(d), 37.4(g)(4) & (7),
37.10(a)(4), Appendix A, paragraphs 1.1, 2.13, 2.2, 8.4, 8.5, 8.8.
Clarifying that ``days'' means ``calendar days'': See
Sec. Sec. 37.9(b), 37.9(c), 37.9(e)(2), (4)(i) & (5)(ii), and Appendix
A, paragraph 6.3.
C. Specific Provisions
This section describes the final regulatory provisions in this
rule, including the changes discussed above. Unless otherwise noted,
these provisions were described in the NPRM.
1. Definitions
The final rule adds new definitions to subpart A, Sec. 37.3,
consistent with those proposed in the NPRM. In particular, new
definitions for ``mobile driver's license'' and ``mobile identification
card'' are necessary because the current regulations predated the
emergence of mDL technology and, therefore, do not define these terms.
Additionally, the definitions reflect changes made by the REAL ID
Modernization Act, which amended the definitions of ``driver's
license'' and ``identification card'' to specifically include ``mobile
or digital driver's licenses'' and ``mobile or digital identification
cards.'' The definitions in this rule provide a more precise definition
of ``mobile driver's license'' and ``mobile identification card'' by
clarifying that those forms of identification require a mobile
electronic device to store the identification information, as well as
an electronic device to read that information. The rule also adds a new
definition of ``mDL'' that collectively refers to mobile versions of
both State-issued driver's licenses and State-issued identification
cards as defined in the REAL ID Act.
[[Page 85347]]
The final rule includes additional definitions to explain terms
used in the waiver application criteria set forth in Sec. Sec.
37.10(a)-(b) and Appendix A to subpart A of this part (Appendix A).
Generally, this rule defines terms that lack a common understanding or
that are common terms of art for information systems, and that require
an explanation to enable stakeholders to comply with the rule. The
definitions were informed by TSA's knowledge and experience, as well as
a publication by the National Institute of Standards and Technology
(NIST).\36\ For example, the rule adds definitions for ``digital
certificates'' and ``certificate systems,'' which are necessary
elements of risk controls for the IT systems that States use to issue
mDLs. In addition, this final rule adds a definition for ``certificate
policy,'' which forms the governance framework for States' certificate
systems. A State must develop, maintain, and execute a certificate
policy to comply with the requirements set forth in Appendix A. In
addition, ``Digital Signatures'' are mathematical algorithms that
States use to validate the authenticity and integrity of a message.
Each of these terms is fundamental to understanding the requirements
set forth in this rule.
---------------------------------------------------------------------------
\36\ See NIST, Computer Security Resource Center, https://csrc.nist.gov/glossary (last visited July 17, 2024).
---------------------------------------------------------------------------
The final rule adds a definition for ``provisioning'' which was not
proposed in the NPRM. See Sec. 37.3. As defined by this final rule,
``provisioning'' means the process by which a State transmits and
installs an mDL on an individual's mobile device. Although TSA did not
receive any comments seeking clarity or requesting the addition of this
or other definitions, TSA believes provisioning is a critical concept
that requires a definition in order to facilitate stakeholder
compliance.
2. TSA Issuance of Temporary Waiver and State Eligibility Criteria
The final rule adds to subpart A new Sec. 37.7, entitled
``Temporary waiver for mDLs; State eligibility.'' This waiver framework
temporarily allows Federal agencies to accept for official purposes
mDLs (which today are all non-compliant) issued by States with a
waiver, if the mDL is based on a REAL ID-compliant physical card, when
REAL ID enforcement begins on May 7, 2025 (see Sec. 37.8, discussed in
Part III.C.3., below). However, the waiver framework does not apply to
any other requirements in 6 CFR part 37 or physical cards. Section
37.7(a) authorizes TSA to issue a temporary certificate of waiver to
States that meet the waiver application criteria set forth in
Sec. Sec. 37.10(a) and (b). TSA's determination of whether a State
satisfies these requirements will be based on TSA's evaluation of the
information provided by the State in its application (see Part
III.C.4., below), as well as other information available to TSA.
Federal agencies are not required to accept mDLs, and retain discretion
to determine their own policies regarding identity verification.
Although NPRM Sec. 37.7(a) stated that a waiver would exempt a
State's mDLs from meeting the card-based compliance requirement of
Sec. 37.5(b), the final rule deletes this clause because a waiver
impacts Federal agency acceptance, not State issuance, of non-compliant
mDLs. Stated differently, a waiver allows Federal agencies to accept
non-compliant mDLs issued by States to whom TSA has granted a waiver.
As discussed above in this preamble, the waiver application criteria
set forth temporary security requirements commensurate with REAL ID
standards for physical cards, ensuring that mDLs meeting the criteria
are suitable for Federal acceptance. However, States cannot issue REAL
ID-compliant mDLs until TSA sets forth such requirements in the
subsequent Phase 2 rulemaking.
Section 37.7(b) sets forth criteria that a State must meet to be
eligible for consideration of a waiver. These criteria require that the
issuing State: (1) is in full compliance with all applicable REAL ID
requirements as defined in subpart E of this part, and (2) has
submitted an application, under Sec. Sec. 37.10(a) and (b)
demonstrating that the State issues mDLs that provide security,
privacy, and interoperability necessary for Federal acceptance.\37\ The
NPRM proposed paragraph (b)(3) of this section, which provided an
additional waiver eligibility criterion that a State must issue mDLs
only to individuals who have been issued REAL ID-compliant physical
cards. However, the final rule does not adopt this proposal given TSA's
evaluation of public comments (see Part IV.A.) that this provision
would have made a State ineligible for a waiver if the State issued
mDLs to both individuals with REAL ID-compliant physical cards and
individuals with non-compliant physical cards. The final rule similarly
amends Sec. 37.10(a)(1)(vii), as proposed by the NPRM, to remove a
provision that would have required States to issue an mDL only to a
resident who has been issued a valid, unexpired, and REAL ID-compliant
physical card that underlies the mDL. See Part III.C.4, below.
---------------------------------------------------------------------------
\37\ Sections 37.7(b)(1) & (2).
---------------------------------------------------------------------------
3. Requirements for Federal Agencies that Accept mDLs
The final rule adds to subpart A new Sec. 37.8, entitled
``Requirements for Federal agencies accepting mDLs issued by States
with temporary waiver.'' This section requires that any Federal agency
that elects to accept mDLs for REAL ID official purposes must meet four
requirements in new Sec. 37.8. First, under Sec. 37.8(a), a Federal
agency must confirm that the State holds a valid certificate of waiver.
Agencies would make this confirmation by verifying that the State's
name appears in a list of States to whom TSA has granted a waiver. TSA
will publish this list on the REAL ID website at www.tsa.gov/real-id/mDL (as provided in Sec. 37.9(b)(1)).
Second, Sec. 37.8(b) requires Federal agencies to use an mDL
reader to retrieve mDL data from an individual's mobile device and
validate that the data is authentic and unchanged following the
processes required by industry standard ISO/IEC 18013-5:2021(E).\38\
---------------------------------------------------------------------------
\38\ See NPRM, 88 FR at 60063-64, for a discussion of this
standard.
---------------------------------------------------------------------------
Third, under Sec. 37.8(c), Federal agencies may accept, consistent
with the deadlines set forth in Sec. 37.5, only those mDLs that are
issued based on an underlying physical card that is REAL ID compliant.
Agencies would make this determination by confirming that mDL data
element ``DHS_compliance'' has a value of ``F''. As discussed in Part
III.C.8.a., below, the data field ``DHS_compliance'' (defined in the
American Association of Motor Vehicle Administrators Mobile Driver's
License (mDL) Implementation Guidelines Version 1.2 (Jan. 2023) (AAMVA
Guidelines)) enables an mDL to convey the REAL ID compliance status of
the underlying physical card. TSA notes that Sec. 37.8(c) is a new
provision that was not included in the NPRM. TSA intended, in proposed
Sec. Sec. 37.7(b)(3) and 37.10(a)(1)(vii) of the NPRM, that Federal
agencies would accept only mDLs issued by States to whom TSA has issued
a waiver, and that are based on an underlying physical card that is
REAL ID-compliant. Final rule Sec. 37.8(c), together with revisions to
Sec. 37.10(a)(1)(vii) (see discussion in Part III.C.4., below),
achieves that intent.
Finally, under Sec. 37.8(d), if a Federal agency discovers that
acceptance of a State's mDL is likely to cause imminent or serious
threats to security, privacy, or data integrity, the agency must report
the threats to TSA at www.tsa.gov/real-id/mDL within 72 hours of such
[[Page 85348]]
discovery. Examples of reportable threats include cyber incidents and
other events that cause serious harm to a State's mDL issuance system.
Reports may contain SSI, and if so, would be subject to requirements of
49 CFR part 1520. Although the NPRM did not propose the SSI protection
provision, TSA evaluated comments to the NPRM (see Part IV.W., below)
seeking clarification on SSI protection for other information (State
waiver applications) and determined that SSI protection is warranted
for Federal agency reports under this Sec. 37.8(d), which has been
added in this final rule. TSA will consider whether such information
warrants suspension of that State's waiver under Sec. 37.9(e)(4)(i)(B)
(see discussion in Part III.C.6., below). If TSA elects not to issue a
suspension, Federal agencies would continue to exercise their own
discretion regarding continuing acceptance of mDLs.
4. Requirements for States Seeking To Apply for a Waiver
The final rule adds to subpart A new Sec. 37.9, which sets forth a
process for a State to request a temporary certificate of waiver
established in new Sec. 37.7. As provided in Sec. 37.9(a), a State
seeking a waiver must file a complete application as set forth in
Sec. Sec. 37.10(a) and (b), following instructions available at
www.tsa.gov/real-id/mDL. Sections 37.10(a) and (b) set forth all
information, documents, and data that a State must include in its
application for a waiver. If TSA determines that the means that a State
implements to comply with the requirements in Sec. Sec. 37.10(a) and
(b) provide the requisite levels of security, privacy, and data
integrity for Federal acceptance of mDLs for official purposes, TSA
would grant such State a waiver. This rule does not, however, prescribe
specific means (other than the requirements specified in Appendix A,
which is discussed further in Part III.C.4.iv, below) that a State must
implement. Instead, States would retain broad discretion to choose and
implement measures to meet these requirements based on factors
appropriate to that State.
(i) Application Requirements
As set forth in Sec. Sec. 37.10(a)(1) through (4), a State is
required to establish in its application how it issues mDLs under the
specified criteria for security, privacy, and interoperability suitable
for acceptance by Federal agencies, as follows:
Paragraph (a)(1) sets forth requirements for mDL
provisioning. Specific requirements include:
[cir] Encryption of mDL data and an mDL holder's Personally
Identifiable Information,
[cir] Escalated review of repeated failed provisioning attempts,
[cir] Authentication of the mDL applicant's mobile device,
[cir] Mobile device identification keys,
[cir] User identity verification controls,
[cir] Applicant presentation controls,
[cir] Encoding of the ``DHS_compliance'' data field. States must
populate this data field to correspond to the REAL ID compliance status
of the underlying physical driver's license or identification card that
a State has issued to an mDL holder. Specifically, ``DHS_compliance''
should be populated with ``F'' if the underlying card is REAL ID
compliant, or as required by American Association of Motor Vehicle
Administrator (AAMVA) Mobile Driver's License (mDL) Implementation
Guidelines v. 1.2, Section 3.2 (IBR'd; see Sec. 37.4), or ``N'' if the
underlying card is not REAL ID-compliant. Although Sec.
37.10(a)(1)(vii) of the NPRM proposed requiring that States issue an
mDL only to a resident who has been issued a valid, unexpired, and REAL
ID-compliant physical card that underlies the mDL, the final rule does
not adopt this provision, based on TSA's evaluation of public comments
(see Part IV.A.), that this provision would have made a State
ineligible to apply for a waiver if the State issued mDLs to both
individuals with REAL ID-compliant physical cards and individuals with
non-compliant physical cards,
[cir] Data record requirements, and
[cir] Records retention specifications.
Paragraph (a)(2) specifies requirements for managing state
certificate systems, which are set forth in Appendix A.
Paragraph (a)(3) requires a State to demonstrate how it
protects personally identifiable information of individuals during the
mDL provisioning process.
Paragraph (a)(4) requires a State to explain the means it
uses to:
[cir] Issue mDLs that are interoperable with requirements set forth
in standard ISO/IEC 18013-5:2021(E),
[cir] Comply with the ``AAMVA mDL data element set'' as defined in
the AAMVA Guidelines v. 1.2, Section 3.2,\39\ and
---------------------------------------------------------------------------
\39\ See NPRM, 88 FR at 60062-65, for a discussion of these
standards.
---------------------------------------------------------------------------
[cir] Use only those algorithms for encryption,\40\ secure hash
function,\41\ and digital signatures that are specified in ISO/IEC
18013-5:2021(E), and in NIST FIPS PUB 180-4, 186-5, 197-upd1, 198-1,
and 202.
---------------------------------------------------------------------------
\40\ Encryption refers to the process of cryptographically
transforming data into a form in a manner that conceals the data's
original meaning to prevent it from being read. Decryption is the
process of restoring encrypted data to its original state. IETF RFC
4949, internet Security Glossary, Version 2, Aug. 2007, https://datatracker.ietf.org/doc/html/rfc4949 (last visited July 17, 2024).
\41\ A function that processes an input value creating a fixed-
length output value using a method that is not reversible (i.e.,
given the output value of a function it is computationally
impractical to find the function's corresponding input value).
---------------------------------------------------------------------------
(ii) Audit Requirements
Section 37.10(b) requires a State to submit an audit report
prepared by an independent auditor verifying the accuracy of the
information provided by the State in response to Sec. 37.10(a), as
follows:
Paragraph (1) sets forth specific experience,
qualifications, and accreditations that an auditor must meet.
Paragraph (2) requires a State to provide information
demonstrating the absence of a potential conflict of interest of the
auditing entity.
The term ``independent'' does not exclude an entity that is
employed or contracted by a State, so long as that entity is
independent of (i.e., not an employee or contractor) the State's
driver's licensing agency. TSA provides this clarification at the
request of commenters (see Part IV.U., below).
(iii) Waiver Application Guidance
As set forth in Sec. 37.10(c), TSA has published Mobile Driver's
License Waiver Application Guidance on the REAL ID website at
www.tsa.gov/real-id/mDL to assist States in completing their
applications. The Guidance provides TSA's recommendations for some ways
that States can meet the requirements in Sec. 37.10(a)(1). The
Guidance does not establish legally enforceable requirements for States
applying for a waiver. Instead, the Guidance provides non-binding
examples of measures and practices that States may choose to consider
as part of their overall strategy to issue mDLs. States continue to
exercise discretion to select processes not included in the Guidance.
Given the rapidly-evolving cyber threat landscape, however, TSA may
periodically update the Guidance to provide additional information
regarding newly published standards or other sources, or recommend
mitigations of newly discovered risks to
[[Page 85349]]
the mDL ecosystem. TSA will publish a notice in the Federal Register
advising that updated Guidance is available, and TSA will publish the
updated Guidance on the REAL ID website at www.tsa.gov/real-id/mDL and
provide a copy to all States that have applied for or been issued a
certificate of waiver. Updates to the Guidance will not impact issued
waivers or pending applications. Although the NPRM proposed that TSA
would publish updated Guidance in the Federal Register, in addition to
TSA's website, the final rule modifies this requirement to provide that
the agency will publish in the Federal Register only a notice of
availability of updated guidance, but the Guidance itself will be
published on TSA's website. This change will enable TSA to more
expediently provide updated guidance to the public.
(iv) Appendix A: Requirements for State mDL Issuance Systems
Appendix A sets forth fundamental requirements to ensure the
security and integrity of State mDL issuance processes. More
specifically, these requirements concern the creation, issuance, use,
revocation, and destruction of the State's certificate systems and
cryptographic keys. Appendix A consists of requirements in eight
categories: (1) Certificate Authority Certificate Life Cycle Policy,
(2) Certificate Authority Access Management, (3) Facility, Management,
and Operational Controls, (4) Personnel Security Controls, (5)
Technical Security Controls, (6) Threat Detection, (7) Logging, and (8)
Incident Response and Recovery Plan. Adherence to these requirements,
described below, ensures that States issue mDLs in a standardized
manner with security and integrity to establish the trust necessary for
Federal acceptance for official purposes.
Certificate Authority Certificate Life Cycle Policy
requirements (Appendix A, paragraph 1) ensure that a State issuing an
mDL creates and manages a formal process which follows standardized
management and protections of digital certificates. These requirements
must be implemented in full compliance with the references cited in
Appendix A: CA/Browser Forum Baseline Requirements for the Issuance and
Management of Publicly-Trusted Certificates; CA/Browser Forum Network
and Certificate System Security Requirements; ISO/IEC 18013-5:2021(E),
Annex B; NIST Framework for Improving Critical Infrastructure
Cybersecurity; NIST SP 800-53 Rev. 5; and NIST SP 800-57.\42\
---------------------------------------------------------------------------
\42\ See NPRM, 88 FR at 60062-65, for a discussion of these
standards.
---------------------------------------------------------------------------
Certificate Authority Access Management requirements
(Appendix A, paragraph 2) set forth policies and processes for States
concerning, for example, restricting access to mDL issuance systems,
policies for multi-factor authentication, defining the scope and role
of personnel, and certificate system architecture which separates and
isolates certificate system functions to defined security zones. These
requirements must be implemented in full compliance with the references
cited in Appendix A: CA/Browser Forum Network and Certificate System
Security Requirements; NIST Framework for Improving Critical
Infrastructure Cybersecurity; NIST 800-53 Rev. 5; NIST SP 800-63-3; and
NIST SP 800-63B.\43\
---------------------------------------------------------------------------
\43\ See NPRM, 88 FR at 60062-65, for a discussion of these
standards.
---------------------------------------------------------------------------
Although NPRM Appendix A, paragraph 1.1, proposed requiring States
to comply with NIST SP 800-53B (among other references) as part of
States' development of a policy to govern their certificate systems,
the final rule does not adopt the proposal requiring compliance with
NIST SP 800-53B. Document NIST SP 800-53B, ``Control Baselines for
Information Systems and Organizations,'' defines minimum security and
privacy risk controls for Federal Government agencies to protect
information security systems. In addition, the publication provides
guidance, but not requirements, for other entities that implement NIST
SP 800-53 Rev. 5 in their own organizations. Although TSA did not
receive any public comments on NIST SP 800-53B, after re-evaluating the
usefulness of this document, TSA concludes that other provisions in the
final rule prescribe the necessary security and privacy requirements
for States issuing mDLs, and NIST SP 800-53B only serves as guidance
without providing security or privacy enhancements. Accordingly, the
inclusion of NIST SP 800-53B is unnecessary, and the final rule
therefore declines to adopt the NPRM's proposal.
Under the requirements concerning Facility, Management,
and Operational Controls (Appendix A, paragraph 3), States must provide
specified controls protecting facilities where certificate systems
reside from unauthorized access, environmental damage, physical
breaches, and risks from foreign ownership, control, or influence.
These requirements must be implemented in full compliance with the
references cited in Appendix A: NIST SP 800-53 Rev. 5.\44\
---------------------------------------------------------------------------
\44\ See NPRM, 88 FR at 60065, for a discussion of this
standard.
---------------------------------------------------------------------------
Personnel security controls (Appendix A, paragraph 4)
require States to establish policies to control insider threat risks to
certificate systems and facilities. Such policies must establish
screening criteria for personnel who access certificate systems, post-
employment access termination, updates to personnel security policy,
training, records retention schedules, among other policies. These
requirements must be implemented in full compliance with the references
cited in Appendix A: NIST SP 800-53 Rev. 5 and CA/Browser Forum
Baseline Requirements for the Issuance and Management of
Publicly[hyphen]Trusted Certificates.\45\
---------------------------------------------------------------------------
\45\ See NPRM, 88 FR at 60062-63 & 60065, for a discussion of
these standards.
---------------------------------------------------------------------------
Technical security controls (Appendix A, paragraph 5)
specify requirements to protect certificate system networks. In
addition, States are required to protect private cryptographic keys of
issuing authority root certificates using dedicated hardware security
modules (HSMs) of Level 3 or higher and document signer private
cryptographic keys in hardware security modules of Level 2 and higher.
Dedicated HSMs are used (1) solely for IACA root private key functions
and no other functions within the State's certificate system, including
document signer private key functions, and (2) exclusively to support a
single State. States are not permitted to share with any other State an
HSM that physically supports multiple States. Other controls are
specified regarding certificate system architecture and cryptographic
key generation processes. These requirements must be implemented in
full compliance with the references cited in Appendix A: CA/Browser
Forum Network and certificate system Security Requirements; CA/Browser
Forum Baseline Requirements for the Issuance and Management of
Publicly-Trusted Certificates; NIST Framework for Improving Critical
Infrastructure Cybersecurity; NIST SP 800-53 Rev. 5; NIST SP 800-57;
and NIST FIPS PUB 140-3.\46\
---------------------------------------------------------------------------
\46\ See NPRM, 88 FR at 60062-63 & 60065, for a discussion of
these standards.
---------------------------------------------------------------------------
Under requirements for threat detection (Appendix A,
paragraph 6), States must implement controls to monitor and log
evolving threats to various mDL issuance infrastructure, including
digital certificate, issuance, and support systems. These requirements
must be implemented in
[[Page 85350]]
full compliance with the references cited in Appendix A: CA/Browser
Forum Network and certificate system Security Requirements; NIST
Framework for Improving Critical Infrastructure Cybersecurity; and NIST
SP 800-53 Rev. 5.\47\
---------------------------------------------------------------------------
\47\ See NPRM, 88 FR at 60062-63 & 60065, for a discussion of
these standards.
---------------------------------------------------------------------------
Logging controls (Appendix A, paragraph 7) require States
to record various events concerning certificate systems, including the
management of cryptographic keys, and digital certificate lifecycle
events. The controls set forth detailed requirements concerning
specific types of events that must be logged, as well as timeframes for
maintaining such logs. These requirements must be implemented in full
compliance with the references cited in Appendix A: CA/Browser Forum
Baseline Requirements for the Issuance and Management of
Publicly[hyphen]Trusted Certificates; NIST Framework for Improving
Critical Infrastructure Cybersecurity; and NIST SP 800-53 Rev. 5.\48\
---------------------------------------------------------------------------
\48\ See NPRM, 88 FR at 60062-63 & 60065, for a discussion of
these standards.
---------------------------------------------------------------------------
Incident Response and Recovery Plan (Appendix A, paragraph
8) requires States to implement policies to respond to and recover from
security incidents. States must act on logged events, issue alerts to
relevant personnel, respond to alerts within a specified time period,
perform vulnerability scans, among other things. In particular, States
must report to TSA at www.tsa.gov/real-id/mDL within 72 hours of
discovering a reportable cybersecurity incident. In response to
comments to the NPRM seeking clarity on the reporting requirements (see
Part IV.V.5.c., below), the final rule adds a provision that reportable
incidents are those defined in the TSA Cybersecurity Lexicon at
www.tsa.gov that could compromise the integrity of a certificate
system. These requirements must be implemented in full compliance with
the references cited in Appendix A: CA/Browser Forum Network and
Certificate System Security Requirements; CISA Federal Government
Cybersecurity Incident & Vulnerability Response Playbooks; \49\ DHS
National Cyber Incident Response Plan; NIST SP 800-53 Rev. 5; and NIST
Framework for Improving Critical Infrastructure Cybersecurity.\50\
Information submitted in response to this section may contain SSI, and
if so, would be subject to requirements of 49 CFR part 1520. Although
the NPRM did not propose the SSI protection provision, TSA evaluated
comments to the NPRM (see Part IV.W., below) seeking clarification on
SSI protection for other information (State waiver applications) and
determined that SSI protection is warranted for State reports under
this Appendix paragraph 8, which has been added in this final rule.
---------------------------------------------------------------------------
\49\ The NPRM inadvertently omitted ``Federal Government'' from
the title of this publication.
\50\ See NPRM, 88 FR at 60062-63 & 60065, for a discussion of
these standards.
---------------------------------------------------------------------------
5. Decisions on Applications for Waiver
Section 37.9(b) establishes a timeline and process for TSA to issue
decisions on a waiver application. Under this paragraph, TSA endeavors
to provide States a decision on initial applications within 60 calendar
days, but not longer than 90 calendar days. TSA will provide three
types of written notice via email: approved, insufficient, or denied.
If TSA approves a State's application for a waiver, TSA will issue
a certificate of waiver to that State, and include the State in a list
of mDLs approved for Federal use, published by TSA on the REAL ID
website at www.tsa.gov/real-id/mDL.\51\ A certificate of waiver will
specify the date that the waiver becomes effective, the expiration
date, and any other terms and conditions with which a State must
comply, as provided under Sec. 37.9(d). A State seeking to renew its
certificate beyond the expiration date must reapply for a waiver, as
provided in Sec. 37.9(e)(6).
---------------------------------------------------------------------------
\51\ Section 37.9(b)(1).
---------------------------------------------------------------------------
If TSA determines that an application is insufficient, did not
respond to certain information required in Sec. Sec. 37.10(a) or (b),
or contains other deficiencies, TSA will provide an explanation of such
deficiencies and allow the State an opportunity address the
deficiencies within the timeframe specified in Sec. 37.9(b)(2). TSA
will permit States to submit multiple amended applications if
necessary, with the intent of working with States individually to
enable their mDLs to comply with the requirements of Sec. Sec.
37.10(a) and (b).
As provided in Sec. 37.9(b)(3), if TSA denies an application, TSA
will provide the specific grounds for the basis of the denial and
afford the State an opportunity to submit a new application or to seek
reconsideration of a denied application. Under Sec. 37.9(c)(1), States
will have 90 calendar days to file a request for reconsideration, and
TSA will provide its final determination within 60 calendar days.
Instructions for seeking reconsideration are provided by TSA on the
REAL ID website at www.tsa.gov/real-id/mDL. As provided in Sec.
37.9(c)(2), an adverse decision upon reconsideration would be
considered a final agency action. However, a State whose request for
reconsideration has been denied may submit a new application for a
waiver.
6. Limitations, Suspension, and Termination of Certificate of Waiver
Section 37.9(e) sets forth various terms regarding a certificate of
waiver. Specifically, under paragraph (e)(1) of this section, a
certificate of waiver is valid for a period of three years from the
date of issuance. This period was selected to align with the frequency
of States' recertification under Sec. 37.55(b).
Paragraph (e)(2) requires that a State must report to TSA if, after
it receives a waiver, it makes significant modifications to its mDL
issuance processes that differ in a material way from information that
the State provided in its application. If the State makes such
modifications, it is required to report such changes, at www.tsa.gov/real-id/mDL, 60 calendar days before implementing the changes. This
requirement is intended to apply to changes that may undermine the
bases on which TSA granted a waiver. The reporting requirement is not
intended to apply to routine, low-level changes, such as systems
maintenance and software updates and patches. States that are uncertain
about whether a change would trigger the reporting requirements should
contact TSA as directed at www.tsa.gov/real-id/mDL. The final rule
added this provision to contact TSA to provide greater certainty to
States, following TSA's evaluation of public comments seeking
clarification about the reporting requirements specified in the NPRM
(see Part IV.S., below).
Paragraph (e)(3) requires a State that is issued a waiver to comply
with all requirements specified in Sec. Sec. 37.51(a) and 37.9(d)(3).
Paragraph (e)(4) sets forth processes for suspension of
certificates of waiver. As provided in Sec. 37.9(e)(4)(i)(A), TSA may
suspend the validity of a certificate of waiver if TSA determines that
a State:
fails to comply with any terms and conditions (see Sec.
37.9(d)(3)) specified in the certificate of waiver;
fails to comply with reporting requirements (see Sec.
37.9(e)(2)); or
issues mDLs in a manner that is not consistent with the
information the State provided in its application for a waiver under
Sec. Sec. 37.10(a) and (b).
Before suspending a waiver for these reasons, TSA will provide such
State written notice via email that it intends to suspend its waiver,
along with an explanation of the reasons, information on how the State
may address the deficiencies, and a timeline for the State to respond
and for TSA to reply to the
[[Page 85351]]
State, as set forth in Sec. 37.9(e)(4)(ii). TSA may withdraw the
notice of suspension, request additional information, or issue a final
suspension. If TSA issues a final suspension of a State's certificate
of waiver, TSA will temporarily remove the name of that State from the
list, published at www.tsa.gov/real-id/mDL, of mDLs approved for
Federal acceptance for official purposes.\52\ TSA intends to work with
States to resolve the conditions that result in a final suspension, and
resume validity of that State's waiver. A State receiving a final
suspension may apply for a new certificate of waiver by submitting a
new application following the procedures in Sec. 37.9(a).
---------------------------------------------------------------------------
\52\ Section 37.9(e)(4)(iii).
---------------------------------------------------------------------------
TSA additionally may suspend a State's waiver at any time upon
discovery that Federal acceptance of a State's mDL is likely to cause
imminent or serious threats to the security, privacy, or data integrity
of any Federal agency, as set forth in Sec. 37.9(e)(4)(i)(B). These
are more exigent circumstances than those set forth in Sec.
37.9(e)(4)(i)(A). Examples of such triggering events include cyber-
attacks and other events that cause serious harm to a State's mDL
issuance systems. If a State discovers a reportable cybersecurity
incident, as defined in the TSA Cybersecurity Lexicon available at
www.tsa.gov, that it believes could compromise the integrity of its mDL
issuance systems, paragraph 8.6 of Appendix A requires States to
provide written notice to TSA as directed at www.tsa.gov/real-id/mDL,
of such incident within no more than 72 hours of discovery. If TSA
determines such suspension is necessary, TSA will provide written
notice via email to each State whose certificate of waiver is affected,
as soon as practicable after discovery of the triggering event,
providing an explanation for the suspension, as well as an estimated
timeframe for resumption of the validity of the certificate of waiver.
Under Sec. 37.9(e)(5)(i), TSA may terminate a certificate of
waiver for serious or egregious violations. More specifically, TSA may
terminate a waiver if TSA determines that a State:
does not comply with REAL ID requirements in Sec.
37.51(a);
is committing an egregious violation of any terms and
conditions (see Sec. 37.9(d)(3)) specified in the certificate of
waiver and is unwilling to cure such violation;
is committing an egregious violation of reporting
requirements (see Sec. 37.9(e)(2)) and is unwilling to cure such
violation; or
provided false information in its waiver application.
As required in Sec. 37.9(e)(5)(ii), before terminating a
certificate of waiver, TSA will provide written notice via email of
intent to terminate, including findings supporting the termination and
an opportunity for the State to present information. As specified, a
State would have 7 calendar days to respond to the notice, and TSA will
respond via email within 30 calendar days. TSA may withdraw the notice
of termination, request additional information, or issue a final
termination. Under Sec. 37.9(e)(5)(iii), if TSA issues a final
termination of a State's certificate of waiver, TSA will remove the
name of that State from the list of mDLs approved for Federal
acceptance for official purposes. A State whose certificate of waiver
has been terminated may apply for a new certificate of waiver by
submitting a new application.
Section 37.9(g) provides that information provided by States in
response to paragraphs (a), (b)(2), (c), (e)(2), (e)(4)(ii), and
(e)(5)(ii) of this section, which concern requirements on States to
apply for and maintain a waiver, may contain SSI and therefore must be
handled and protected in accordance with 49 CFR part 1520. Although the
NPRM did not propose Sec. 37.9(g), the final rule adds this provision
based on TSA's evaluation of comments to the NPRM (see Part IV.W.,
below) seeking clarification on SSI protection for information in State
waiver applications. TSA determined that a provision concerning SSI
protection is warranted not only for information in State waiver
applications, but also for other information provided by States in
response to Sec. Sec. 37.9(b)(2), (c), (e)(2), (e)(4)(ii), and
(e)(5)(ii), which has been added in this final rule.
7. Effect of Status of Waiver on REAL ID Compliance
Section 37.9(f) clarifies that the status of a State's issued
certificate of waiver, including the status of a pending application
for a waiver, has no bearing on TSA's determination of that State's
compliance or non-compliance with any other section of this part. A
certificate of waiver that TSA has issued to a State is not a
determination that the State is in compliance with any other section in
this part. Similarly, an application for a waiver that TSA has deemed
insufficient or denied, or a certificate of waiver TSA has suspended or
terminated, or that has expired, is not a determination that the State
is not in compliance with any other section in this part.
8. Incorporation by Reference
Sections 37.8(b) and 37.10(a) and Appendix A of this final rule
provide that States must comply with applicable sections of specified
industry standards and government guidelines. The Office of Federal
Register (OFR) has published regulations concerning IBR.\53\ These
regulations require that, for a final rule, agencies must discuss in
the preamble to the rule the way in which materials that the agency
IBRs are reasonably available to interested persons, and how interested
parties can obtain the materials. Additionally, the preamble to the
rule must summarize the material.\54\
---------------------------------------------------------------------------
\53\ 1 CFR part 51.
\54\ 1 CFR 51.5(b).
---------------------------------------------------------------------------
The final rule amends subpart A, Sec. 37.4, by revising the
introductory paragraph and adding new IBR material specified below. TSA
has worked to ensure that IBR materials are reasonably available to the
class of persons affected. All materials may be obtained from their
publisher, as discussed below, and certain materials as noted are
available in the Federal Docket Management System at https://www.regulations.gov, docket number TSA-2023-0002. In addition, all but
one of the IBR'd standards (ISO/IEC 18013-5:2021(E), discussed in Part
II.D., below) are available to the public for free at the hyperlinks
provided, and all are available for inspection on a read-only basis at
TSA. Please contact TSA at Transportation Security Administration,
Attn.: OS/ESVP/REAL ID Program, TSA Mail Stop 6051, 6595 Springfield
Center Dr., Springfield, VA 20598-6051, (866) 289-9673, or visit
www.tsa.gov. You may also contact the REAL ID Program Office at [email protected] or visit www.tsa.gov/REAL-ID/mDL.\55\
---------------------------------------------------------------------------
\55\ The National Archives and Records Administration (NARA)
maintains the official Federal copy of the IBR'd standards, but does
not provide or distribute copies. See www.archives.gov/federal-register/cfr/ibr-locations.htm (last visited Sept. 17, 2024).
---------------------------------------------------------------------------
The rule revises the introductory paragraph proposed in the NPRM to
clarify availability of IBR materials. Specifically, the final rule
replaces DHS with TSA as a location where IBR material is available for
inspection, and provides additional points of contact at TSA. TSA also
notes that certain material is available in the Federal Docket
Management System at https://regulations.gov, docket number TSA-2023-
0002. The final rule makes these revisions given TSA's evaluation of
public comments concerning access to IBR materials (see Part IV.K.,
below).
The final rule IBRs the following material:
[[Page 85352]]
a. American Association of Motor Vehicle Administrators
In September 2022, the American Association of Motor Vehicle
Administrators (AAMVA) published Mobile Driver's License (mDL)
Implementation Guidelines Version 1.2 (Jan. 2023) (AAMVA Guidelines),
American Association of Motor Vehicle Administrators, 4401 Wilson
Boulevard, Suite 700, Arlington, VA 22203, available at https://aamva.org/getmedia/b801da7b-5584-466c-8aeb-f230cef6dda5/mDL-Implementation-Guidelines-Version-1-2_final.pdf (last visited July 17,
2024). The AAMVA Guidelines are available to the public for free at the
link provided above. The AAMVA Guidelines adapt industry standard ISO/
IEC 18013-5:2021(E) (discussed in Part II.D.4., below), for State
driver's licensing agencies through the addition of more qualified
recommendations, as the ISO/IEC standard has been developed for
international purposes and may not meet all purposes and needs of
States and the Federal Government. For example, Part 3.2 of the AAMVA
Guidelines modify and expand the data elements specified in ISO/IEC
18013-5:2021(E), in order to enable the mDL to indicate the REAL ID
compliance status of the underlying physical card, as well as to ensure
interoperability necessary for Federal acceptance. AAMVA has added mDL
data fields ``DHS_compliance'' and ``DHS_temporary_lawful_status.''
These data fields provide the digital version of the requirements for
data fields for physical cards defined in 6 CFR 37.17(n) \56\ and 6 CFR
37.21(e),\57\ respectively. As discussed generally in Part III.C.4,
below, Sec. Sec. 37.10(a)(1) and (4) of this rule require a State to
explain, as part of its application for a waiver, how the State issues
mDLs that are compliant with specified requirements of the AAMVA
Guidelines.
---------------------------------------------------------------------------
\56\ Section 37.17(n) provides, ``The card shall bear a DHS-
approved security marking on each driver's license or identification
card that is issued reflecting the card's level of compliance as set
forth in Sec. 37.51 of this Rule.''
\57\ Section 37.21(e) provides, ``Temporary or limited-term
driver's licenses and identification cards must clearly indicate on
the face of the license and in the machine readable zone that the
license or card is a temporary or limited-term driver's license or
identification card.''
---------------------------------------------------------------------------
b. Certification Authority Browser Forum
The Certification Authority Browser Forum (CA/Browser Forum) is an
organization of vendors of hardware and software used in the production
and use of publicly trusted certificates. These certificates are used
by forum members, non-member vendors, and governments to establish the
security and trust mechanisms for public key infrastructure-enabled
systems. The CA/Browser Forum has published two sets of requirements
applicable for any implementers of PKI, including States that are
seeking to deploy certificate systems that must be publicly trusted and
used by third parties:
Baseline Requirements for the Issuance and Management of
Publicly-Trusted Certificates v. 1.8.6 (December 14, 2022), available
at https://cabforum.org/wp-content/uploads/CA-Browser-Forum-BR-1.8.6.pdf (last visited July 17, 2024), establishes a set of
fundamental controls for the management of publicly trusted certificate
authorities, including the controls and processes required for the
secure generation of digital signing keys; and
Network and Certificate System Security Requirements v.
1.7 (April 5, 2021), available at https://cabforum.org/wp-content/uploads/CA-Browser-Forum-Network-Security-Guidelines-v1.7.pdf (last
visited July 17, 2024), establishes a broad set of security controls
needed to securely manage a publicly trusted certificate authority and
key infrastructure management system.
CA/Browser Forum, 815 Eddy St, San Francisco, CA 94109, (415) 436-
9333. To issue mDLs that can be trusted by Federal agencies, each
issuing State must establish a certificate system, including a root
certification authority that is under control of the issuing State. TSA
believes the CA/Browser Forum requirements for publicly trusted
certificates have been proven to be an effective model for securing
online transactions. As discussed generally in Part III.C.4, below,
Appendix A, paragraphs 1, 2, and 4-8, require compliance with specified
requirements of the CA/Browser Forum Baseline Requirements and/or
Network and Certificate System Security Requirements.
c. DHS and Cybersecurity and Infrastructure Security Agency
DHS protects the nation from multiple threats, including
cybersecurity, aviation and border security, among others. The
Cybersecurity and Infrastructure Security Agency (CISA), a component of
DHS, is the operational lead for Federal cybersecurity and the national
coordinator for critical infrastructure security and resilience. DHS
and CISA have published two guidelines which are relevant to the
operations of States' mDL issuance systems:
DHS, National Cyber Incident Response Plan (Dec. 2016),
available at https://www.cisa.gov/uscert/sites/default/files/ncirp/National_Cyber_IncidentResponse_Plan.pdf (last visited July 17, 2024),
further standardizes the response process for cyber incidents including
the preparation, detection and analysis, containment, eradication and
recovery, and post-incident activities. Department of Homeland
Security, 2707 Martin Luther King Jr. Ave. SE, Washington, DC 20528;
(202) 282-8000; and
CISA, Federal Government Cybersecurity Incident &
Vulnerability Response Playbooks (Nov. 2021),\58\ available at https://www.cisa.gov/sites/default/files/publications/Federal_Government_Cybersecurity_Incident_and_Vulnerability_Response_Playbooks_508C.pdf (last visited July 17, 2024), was developed consistent
with the direction of Presidential Policy Directive 41 (PPD-41) to
establish how the U.S. responds to and recovers from significant cyber
incidents which pose a risk to critical infrastructure, including the
identity issuance infrastructure operated by U.S. States issuing mDLs.
---------------------------------------------------------------------------
\58\ The NPRM inadvertently omitted ``Federal Government'' from
the title of this publication.
---------------------------------------------------------------------------
Cybersecurity and Infrastructure Security Agency, Mail Stop 0380,
245 Murray Lane, Washington, DC 20528-0380, (888) 282-0870. These
guidelines, available for free at the links provided above and in the
Federal Docket Management System at https://www.regulations.gov, docket
number TSA-2023-0002, provide details on best practices for management
of systems during a cybersecurity incident, providing recommendations
on incident and vulnerability response. Management of cybersecurity
incidents and vulnerabilities is critical to maintenance of a State's
mDL issuance IT infrastructure. As discussed generally in Part III.C.4,
below, Appendix A, paragraph 8, requires compliance with specified
requirements of the DHS National Cyber Incident Response Plan and the
CISA Federal Government Cybersecurity Incident & Vulnerability Response
Playbooks.
d. International Organization for Standardization and International
Electrotechnical Commission
International standards-setting organizations, the International
Organization for Standardization (ISO) and the International
Electrotechnical Commission (IEC),\59\ are jointly drafted
[[Page 85353]]
international standards specific to mDLs.\60\ In September 2021, ISO
and IEC published ISO/IEC 18013, Part 5, entitled, ``Personal
identification--ISO-compliant driving licence.'' ISO/IEC 18013-
5:2021(E), Personal identification--ISO-compliant driving licence--Part
5: Mobile driving licence (mDL) application (Sept. 2021), International
Organization for Standardization, Chemin de Blandonnet 8, CP 401, 1214
Vernier, Geneva, Switzerland, +41 22 749 01 11, www.iso.org/contact-iso.html. This standard is available for inspection at TSA as discussed
above. In addition, TSA is working with the American National Standards
Institute (ANSI), a private organization not affiliated with DHS, to
add this standard to the ANSI IBR Standards Portal which provides free,
read-only access.\61\ TSA has participated in the development of these
standards as a non-voting member of the United States national body
member of the Joint Technical Committee.\62\
---------------------------------------------------------------------------
\59\ ISO is an independent, non-governmental international
organization with a membership of 164 national standards bodies. ISO
creates documents that provide requirements, specifications,
guidelines or characteristics that can be used consistently to
ensure that materials, products, processes and services are fit for
their purpose. The IEC publishes consensus-based international
standards and manages conformity assessment systems for electric and
electronic products, systems and services, collectively known as
``electrotechnology.'' ISO and IEC standards are voluntary and do
not include contractual, legal or statutory obligations. ISO and IEC
standards contain both mandatory requirements and optional
recommendations, and those who choose to implement the standards
must adopt the mandatory requirements.
\60\ ISO defines an International Standard as ``provid[ing]
rules, guidelines or characteristics for activities or for their
results, aimed at achieving the optimum degree of order in a given
context. It can take many forms. Apart from product standards, other
examples include: test methods, codes of practice, guideline
standards and management systems standards.'' www.iso.org/deliverables-all.html (last visited July 17, 2024).
\61\ ANSI, IBR Standards Portal, https://ibr.ansi.org/ (last
visited July 17, 2024).
\62\ A member of TSA serves as DHS's representative to the
Working Group.
---------------------------------------------------------------------------
Standard ISO/IEC 18013-5:2021(E) standardizes communications
interfaces between an mDL holder and an entity seeking to read an
individual's mDL for identify verification purposes, and between a
verifying entity and a State driver's licensing agency. This standard
also sets full operational and communication requirements for both mDLs
and mDL readers. Standard ISO/IEC 18013-5:2021(E) applies to
``attended'' mode verification, in which both the mDL holder and an
officer or agent of a verifying entity are physically present together
during the time of identity verification.\63\ TSA believes ISO/IEC
18013-5:2021(E) is critical to enabling the interoperability, security,
and privacy necessary for wide acceptance of mDLs by Federal agencies
for official purposes. Specifically, Sec. 37.8 of this rule requires
Federal agencies to validate an mDL as required by standard ISO/IEC
18013-5:2021(E), and Sec. 37.10(a)(4) requires a State to explain, as
part of its application for a waiver, how the State issues mDLs that
are interoperable with this standard to provide the security necessary
for Federal acceptance.
---------------------------------------------------------------------------
\63\ Part 7 of Series ISO/IEC 18013, entitled ``mDL add-on
function,'' is an upcoming technical specification that will
standardize interfaces for ``unattended'' mode verification, in
which the mDL holder and officer/agent of the verifying agency are
not physically present together, and the identity verification is
conducted remotely. Unattended identity verification is not
currently considered a REAL ID use case. ISO defines a ``Technical
Specification'' as ``address[ing] work still under technical
development, or where it is believed that there will be a future,
but not immediate, possibility of agreement on an International
Standard. A Technical Specification is published for immediate use,
but it also provides a means to obtain feedback. The aim is that it
will eventually be transformed and republished as an International
Standard.'' ISO, Deliverables, www.iso.org/deliverables-all.html
(last visited July 17, 2024).
---------------------------------------------------------------------------
e. National Institute for Standards and Technology
The National Institute of Standards and Technology (NIST), part of
the U.S. Department of Commerce, promotes U.S. innovation and
industrial competitiveness by advancing measurement science, standards,
and technology in ways that enhance economic security and quality of
life. As part of this mission, NIST produces measurements and standards
relied on by the U.S. agencies and industry.
i. Federal Information Processing Standards
NIST maintains the Federal Information Processing Standards (FIPS)
which relate to the specific protocols and algorithms necessary to
securely process data. This suite of standards includes:
NIST FIPS PUB 140-3, Security Requirements for
Cryptographic Modules (March 22, 2019), available at https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.140-3.pdf (last visited July
17, 2024), specifies the security requirements for cryptographic
modules that are used to secure the keys which are used in digitally
signing mDLs, and properly securing these keys is essential to creating
a publicly trusted certificate authority for mDL issuance;
NIST FIPS PUB 180-4, Secure Hash Standard (SHS) (August 4,
2015), available at https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf (last visited July 17, 2024), specifies the secure
hash standard, a cryptographic algorithm necessary to provide message
and data element integrity while using the transaction modes specified
in ISO/IEC 18013-5:2021(E) for mDL data transmission;
NIST FIPS PUB 186-5, Digital Signature Standard (DSS)
(February 3, 2023), available at https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-5.pdf (last visited July 17, 2024), specifies
digital signature standards used in ISO/IEC 18013-5:2021(E) standard to
provide data integrity for mDL data elements issued by states; and
NIST FIPS PUB 197-upd1, Advanced Encryption Standard (AES)
(May 9, 2023) available at https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197-upd1.pdf (last visited July 17, 2024), specifies the
Advanced Encryption Standard, which is a cryptographic algorithm used
to securely encrypt data messages used in the transmission of mDL data
in ISO/IEC 18013-5:2021(E).
Although the NPRM proposed to IBR the prior (2001) version, NIST
FIPS PUB 197, the final rule IBRs the current (May 2023) updated
version, NIST FIPS PUB 197-upd1, which NIST confirms makes editorial
improvements, but no technical changes to the version specified in the
NPRM.\64\ TSA has reviewed the updates and confirms they are formatting
and stylistic clarifications. Although the public had an opportunity to
comment, no such comments were received. Given the absence of public
comments, no substantive changes to the updated standard, and to ensure
continuing public access to this standard, the final rule IBRs the
updated version, NIST FIPS PUB 197-upd1, which is consistent with the
NPRM's proposal to IBR the previous version. TSA concludes that the
compliance impact on stakeholders of both versions of this standard is
identical.
---------------------------------------------------------------------------
\64\ See https://csrc.nist.gov/News/2023/nist-updates-fips-197-advanced-encryption-standard (last visited July 17, 2024); https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197-upd1.pdf (last visited
July 17, 2024) at 37; https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf (last visited July 17, 2024) at 1.
---------------------------------------------------------------------------
NIST FIPS PUB 198-1, The Keyed-Hash Message Authentication
Code (HMAC) (July 16, 2008) available at https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.198-1.pdf (last visited July 17, 2024),
specifies the keyed hash message authentication code which is an
essential cryptographic algorithm to create a properly interoperable
mDL using ISO/IEC 18013-5:2021(E); and
NIST FIPS PUB 202, SHA-3 Standard: Permutation-Based Hash
and Extendable-Output Functions (August 4, 2015) available at https://
[[Page 85354]]
nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf (last visited July 17,
2024), specifies the secure hash algorithm 3, a cryptographic algorithm
necessary to provide message and data element integrity in ISO/IEC
18013-5:2021(E) for mDL data transmission.
National Institute of Standards and Technology, U.S. Department of
Commerce, 100 Bureau Drive, Gaithersburg, MD 20899. This suite of FIPS
standards, available in the Federal Docket Management System at https://www.regulations.gov, docket number TSA-2023-0002, are critical to the
transactions required for mDLs, and any Federal systems which interact
with or are used to verify an mDL for REAL ID official purposes will be
required to use the algorithms and protocols defined. As discussed
generally in Part III.C.4, below, Sec. 37.10(a)(4) requires compliance
with specified requirements of NIST FIPS PUB 180-4, 186-5, 197-upd1,
198-1, and 202, and Appendix A, paragraph 5, requires compliance with
FIPS PUB 140-3.
ii. Security and Privacy Controls for Information Systems and
Organizations; Key Management
NIST has published several guidelines to protect the security and
privacy of information systems:
NIST SP 800-53 Rev. 5, Security and Privacy Controls for
Information Systems and Organizations (September 2020), available at
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdf (last visited July 17, 2024), specifies a broad set of
security and privacy controls which states must use to manage the
information systems involved in the issuance and management of mDLs;
NIST SP 800-57 Part 1, Rev. 5, Recommendation for Key
Management: Part 1--General (May 2020), available at https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf
(last visited July 17, 2024), provides general recommendations for
states managing cryptographic keys that are used to securely issue
mDLs;
NIST SP 800-57 Part 2, Rev. 1, Recommendation for Key
Management: Part 2--Best Practices for Key Management Organizations
(May 2019), available at https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt2r1.pdf (last visited July 17,
2024), provides best practices states must follow while managing
cryptographic keys; and
NIST SP 800-57 Part 3, Rev. 1, Recommendation for Key
Management, Part 3: Application-Specific Key Management Guidance
(January 2015) available at https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57Pt3r1.pdf (last visited July 17,
2024), provides for application specific controls for the management of
cryptographic keys.
National Institute of Standards and Technology, U.S. Department of
Commerce, 100 Bureau Drive, Gaithersburg, MD 20899. All of these
documents are available in the Federal Docket Management System at
https://www.regulations.gov, docket number TSA-2023-0002.
All four of these standards relate to the administration of a
certificate system including: access management; certificate life-cycle
policies; operational controls for facilities and personnel; technical
security controls; and vulnerability management such as threat
detection, incident response, and recovery planning. Due to the
sensitive nature of State certificate system processes and the
potential for significant harm to security if confidentiality,
integrity, or availability of the certificate systems is compromised,
the minimum risk controls specified in Appendix A require compliance
with the NIST SP 800-53 Rev. 5 ``high baseline'' as set forth in that
document, as well as compliance with the specific risk controls
described in Appendix A. In addition, and as discussed generally in
Part III.C.4, below: Appendix A, paragraphs 1-8, require compliance
with NIST SP 800-53 Rev. 5; paragraphs 1 and 5 require compliance with
NIST SP 800-57 Part 1, Rev. 5; paragraph 1 requires compliance with
NIST SP 800-57 Part 2 Rev. 1; and paragraph 1 requires compliance with
NIST SP 800-57 Part 3, Rev. 1.
iii. Digital Identity Guidelines
NIST has published NIST SP 800-63-3, which covers technical
requirements for Federal agencies implementing digital identity: NIST
Special Publication 800-63-3, Digital Identity Guidelines (June 2017),
National Institute of Standards and Technology, U.S. Department of
Commerce, 100 Bureau Drive, Gaithersburg, MD 20899, available at
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63-3.pdf (last visited July 17, 2024)and in the Federal Docket Management
System at https://www.regulations.gov, docket number TSA-2023-0002.
The Digital Identity Guidelines define technical requirements in
each of the areas of identity proofing, registration, user
authentication, and related issues. Because TSA is not aware of a
common industry standard for mDL provisioning that is appropriate for
official REAL ID purposes today, TSA views the Digital Identity
Guidelines as critical to informing waiver application requirements for
States regarding provisioning. As discussed generally in Part III.C.4,
below, under Sec. 37.10(a)(2) of the final rule, which requires
compliance with Appendix A, a State must explain, as part of its
application for a waiver, how the State issues mDLs that are compliant
with NIST SP 800-63-3 to provide the security for mDL IT infrastructure
necessary for Federal acceptance.
NIST has also published Special Publication 800-63B, Digital
Identity Guidelines: Authentication and Lifecycle Management (June
2017), National Institute of Standards and Technology, U.S. Department
of Commerce, 100 Bureau Drive, Gaithersburg, MD 20899, available at
https://nvlpubsnist.gov/nistpubs/specialpublications/nist.sp.800-63b.pdf (last visited July 17, 2024) and in the Federal Docket
Management System at https://www.regulations.gov, docket number TSA-
2023-0002. This document, which is a part of NIST SP 800-63-3, provides
technical requirements for Federal agencies implementing digital
identity services. The standard focuses on the authentication of
subjects interacting with government systems over open networks,
establishing that a given claimant is a subscriber who has been
previously authenticated and establishes three authenticator assurance
levels. As discussed generally in Part III.C.4, below, Sec.
37.10(a)(2) of this rule requires compliance with Appendix A, which
requires a State to explain, as part of its application for a waiver,
how the State manages its mDL issuance infrastructure using
authenticators at assurance levels provided in NIST SP 800-63B.
iv. Framework for Improving Critical Infrastructure Cybersecurity
NIST has published Framework for Improving Critical Infrastructure
Cybersecurity v. 1.1 (April 16, 2018), National Institute of Standards
and Technology, U.S. Department of Commerce, 100 Bureau Drive,
Gaithersburg, MD 20899, available at https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf (last visited July 17, 2024). This
document, available in the Federal Docket Management System at https://www.regulations.gov, docket number TSA-2023-0002, provides relevant
information for cybersecurity for States issuing mDLs. As discussed
generally in Part III.C.4, below, certain requirements from the NIST
Framework for Improving
[[Page 85355]]
Critical Infrastructure Cybersecurity have been adopted in Appendix A,
paragraphs 1, 2, and 5-8.
D. Impacted Stakeholders
This final rule applies to State driver's licensing agencies
issuing mDLs that seek a temporary waiver from TSA for its mDLs. The
waiver established by this rule enables Federal agencies to accept such
mDLs for official purposes, defined in the REAL ID Act as accessing
Federal facilities, entering nuclear power plants, boarding Federally
regulated commercial aircraft, and any other purposes that the
Secretary shall determine. Any Federal agency that chooses to accept
mDLs for official purposes must procure a reader in order to receive an
individual's identity data.
This final rule does not apply to:
States that do not seek a waiver for mDLs;
Non-State issuers of other forms of digital
identification; or
Federal agencies that elect not to accept mDLs.
A State seeking a waiver for Federal acceptance of its mDLs for
official purposes is required to file with TSA a complete application
and supporting documents.\65\ A State must demonstrate how its mDLs
meet the requirements for a waiver set forth in Sec. Sec. 37.10(a) and
(b) when completing the application.
---------------------------------------------------------------------------
\65\ Section 37.9(a).
---------------------------------------------------------------------------
E. Use Cases Affected by This Rule
This final rule applies only to Federal acceptance of mDLs for
official purposes, defined by the REAL ID regulations as accessing
Federal facilities, entering nuclear power plants, and boarding
Federally regulated commercial aircraft. Any other purpose is beyond
the scope of this rulemaking. For example, a waiver issued under this
rule does not apply to any of the following:
mDL acceptance by Federal agencies for non-REAL ID
official uses (e.g., applying for Federal benefits);
mDL acceptance by non-Federal agencies (e.g., State
agencies, businesses, private persons);
Commercial transactions; or
Physical driver's licenses or identification cards.
Nothing in this rule requires Federal agencies to accept mDLs, as
each Federal agency retains the discretion to determine its
identification policies. Additionally, nothing in this rule requires a
State to seek a waiver or issue mDLs.
F. Severability
TSA notes that these changes impact multiple provisions that are
not necessarily interrelated and can function independent of one
another. As such, TSA believes that some of the provisions of each new
part can function sensibly independent of other provisions. Therefore,
in the event that any provisions in this rulemaking action as finalized
are invalidated by a reviewing court, TSA intends remaining provisions
to remain in effect to the fullest extent possible.
IV. Discussion of Comments
TSA published the NPRM on August 30, 2023,\66\ and the deadline for
public comments was October 16, 2023. TSA received 31 comments,\67\
including some comments that were submitted shortly after the comment
period closed. TSA carefully considered every comment received as part
of the official record, including those that were submitted late.
Comments and TSA's responses are as summarized by topic below.
---------------------------------------------------------------------------
\66\ See 88 FR 60056.
\67\ The 31 total comments include one duplicate, one
correction, and one confidential submission.
---------------------------------------------------------------------------
A. Waiver Eligibility
Comments: Several State driver's licensing agencies, an
association, and some vendors expressed concerns that under Sec. Sec.
37.7(b)(3) and 37.10(a)(1)(vii) of the NPRM, TSA would issue waivers to
States that issued mDLs only to holders of REAL ID-compliant physical
cards, but a State that issues mDLs to two groups of individuals--both
holders of REAL ID-compliant AND non-compliant physical cards--would be
ineligible for a waiver because of issuance to the latter group. Stated
differently, a State's issuance of mDLs to holders of non-compliant
physical cards alone would remove the State's eligibility to apply for
a waiver.
Another commenter requested clarification regarding whether a State
may still apply for and receive a waiver after enforcement of the REAL
ID Act and regulations begins on May 7, 2025.
TSA Response: TSA agrees with commenters and is revising the final
rule to clarify that a State will not be excluded from eligibility to
apply for a waiver if a State issues mDLs to both REAL ID compliant and
non-compliant physical cardholders. The intended purpose of TSA's
requirement is for States to ensure that an individual's mDL matches
the compliance status of the underlying physical card, and for States
to issue an mDL in a manner that enables a verifying Federal agency to
confirm the underlying physical card's REAL ID compliance status.
Consistent with that intent, and to address commenters' concerns,
the final rule makes three changes to the NPRM. First, this final rule
deletes Sec. 37.7(b)(3), as proposed by the NPRM, which provided as a
criterion of waiver eligibility that a State must issue mDLs only to
individuals who have been issued REAL ID-compliant physical cards.
Second, the final rule deletes a similar requirement from Sec.
37.10(a)(1)(vii), as proposed by the NPRM, which provided that States
must issue an mDL only to a resident who has been issued a valid,
unexpired, and REAL ID-compliant physical card that underlies the mDL.
The final rule modifies this provision to require States to populate
this data field to correspond to the REAL ID compliance status of the
underlying physical driver's license or identification card that a
State has issued to an mDL holder. Specifically, Sec.
37.10(a)(1)(vii)(A) requires mDL data element ``DHS_compliance'' to be
populated with ``F'' if the underlying card is REAL ID-compliant, or as
required by the AAMVA Guidelines,\68\ Section 3.2. In addition, Sec.
37.10(a)(1)(vii)(B) requires mDL data element ``DHS_compliance'' to be
populated ``N'' if the underlying card is not REAL ID-compliant.
---------------------------------------------------------------------------
\68\ The AAMVA Guidelines require, among other things, that if
the `EDL_credential' element is present, the `DHS_compliance'
element shall have a value of ``F.''
---------------------------------------------------------------------------
Third, the final rule adds new Sec. 37.8(c), which requires
Federal agencies to confirm that the physical card underlying the mDL
is REAL ID-compliant, as Federal agencies will only be permitted to
accept mDLs if the underlying card is REAL ID-compliant. Federal
agencies would make that determination by reviewing data element
``DHS_compliance'' and confirming that it has been marked ``F.'' These
changes ensure--without compromising a State's waiver eligibility--that
an individual's mDL matches the compliance status of the physical card,
and that Federal agency will accept only those mDLs that are based on a
REAL ID-compliant underlying physical card.
Separately, in response to the commenter's question regarding
waiver applications after REAL ID enforcement begins on May 7, 2025,
TSA confirms that a State indeed may apply for and receive a waiver
after enforcement begins.
B. Conditions on Federal Agencies Accepting mDLs
Comments: An association requested clarification concerning
requirements
[[Page 85356]]
on Federal agencies that choose to accept mDLs. Specifically, the
commenter noted that the preamble provided that one of the ``conditions
for TSA acceptance'' is that TSA has determined the mDL issuing State
is REAL ID-compliant. The commenter sought clarification on the timing
of when this compliance determination is made, specifically, whether
this is a one-time determination, whether it is made at the time when
TSA is reviewing a State's application, or if the State's re-
certification schedule is applicable.
TSA Response: First, TSA notes that this rule does not set
conditions only for ``TSA Acceptance.'' Instead, the rule sets forth
requirements for all Federal agencies who choose to accept mDLs for
official purposes as defined in the REAL ID Act. Second, TSA clarifies
that determination of a State's REAL ID compliance status is not a
requirement for other Federal agencies to make. The only conditions on
Federal agencies who accept mDLs are set forth in Sec. 37.8, which
requires the agency to: (1) confirm the State holds a valid waiver by
reviewing the specified TSA website, (2) use an mDL reader to
communicate with and validate an individual's mDL, (3) confirm that the
underlying physical card is REAL ID-compliant, and (4) notify TSA
within 72 hours of the discovery of specified security, privacy, or
data integrity threats. A State's compliance status is an element of a
State's eligibility to apply for a waiver, as set forth in Sec.
37.7(b)(1), and TSA will make this determination when reviewing a
State's application. However, TSA acknowledges that the preamble to the
NPRM states that a Federal agency must make this compliance
determination. TSA has revised the preamble to this final rule to
reflect the intended requirements.
In response to comments, TSA also provides further clarification on
the timing of its determination of a State's compliance status. TSA
will make an initial determination of State compliance status at the
time of application, but this is not a one-time determination. States
have a continuing obligation, under 6 CFR 37.55(b), to maintain their
compliance status by recertifying compliance every 3 years, an
obligation which continues throughout the duration of the waiver. If
recertification occurs after a State is issued a waiver and TSA
determines the State is no longer in compliance, the waiver may be
subject to review pursuant to Sec. 37.9(e)(5).
C. Waiver Application Criteria
1. Personally Identifiable Information and Privacy
Comments: An association remarked that Sec. 37.10(a)(1)(i)
introduces additional requirements concerning individuals' Personally
Identifiable Information (PII) that are not related to mDL issuance and
exceed existing requirements in the regulations. The commenter advised
that the rule should not expand REAL ID requirements that are unrelated
to mDLs.
The association further noted that although privacy is an important
concept, it applies mostly to the agreement between an issuing State
and the mDL holder, and that the only applicability to verifying
Federal agencies is ensuring that the agency receives only the
information necessary for identity verification. The commenter
therefore recommended updating Sec. 37.10(a)(3) so that States are
only required to provision mDLs to digital wallets in a manner that
will release only the data requested by the verifier. Additional
privacy requirements, the commenter submitted, while important to
individuals and States, may not affect verifying agencies.
TSA Response: Sections 37.10(a)(1)(i) and (a)(3) of this rule
extend to mDLs PII protections that are analogous to those in the
existing regulations regarding physical cards. This rule is adding
mirroring PII provisions because mDLs involve a new data set and
additional elements that must be protected, which are not addressed in
the current regulations. Section 37.10(a)(1)(i) requires encryption of
PII, and Sec. 37.10(a)(3) requires an explanation of the means used to
protect PII during processing, storage, and destruction of mDL records
and provisioning records. Nothing in this final rule modifies or
imposes new requirements regarding physical cards. While TSA concurs
that there is a privacy interest between individuals and States,
verifying Federal agencies have an equally important privacy interest
in trusted mDL transactions.
2. Provisioning
Comments: An association contended that although the intended goal
of Sec. Sec. 37.10(a)(1)(iii)-(vi) is the step of ``binding,'' which
means ensuring that an mDL is provisioned to the correct mDL holder's
device, binding has no value to verifying Federal agencies, other than
copy protection, at the time of identity verification. The association
questions, therefore, the need for these requirements.
TSA Response: ``Binding,'' a critical step in mDL provisioning,
refers to the process where the issuing State binds, or pairs, the mDL
data to a specific device through the generation of the device key and
signing of the mobile security object. Binding is critically important
to all stakeholders involved in an mDL transaction, including verifying
Federal agencies, as they share a strong interest in a secure, trusted
mDL ecosystem in which identity data is protected during mDL
provisioning, provided only to the rightful holder of the data, bound
to that holder's device, and resists cloning to other devices unless
approved by the issuing State. Section 37.10(a)(1) sets forth
requirements for provisioning, and the requirements specified in Sec.
37.10(a)(1)(iii)-(vi) provide the requisite security and privacy
protections to achieve secure binding. The TSA Waiver Guidance also
sets forth recommendations for provisioning and binding. To clarify the
relationship between provisioning and binding, the final rule adds a
new definition to Sec. 37.3 for ``provisioning.''
3. AAMVA mDL Implementation Guidelines
Comments: AAMVA noted that Sec. 37.10(a)(4) refers to version 1.1
of the AAMVA Guidelines, conflicting with Sec. 37.4, which
incorporates by reference version 1.2 of this document.
TSA Response: TSA agrees that Sec. 37.10(a)(4) of the NPRM
inadvertently listed version 1.1, instead of version 1.2, of the AAMVA
Guidelines. TSA notes that the NPRM correctly cited version 1.2 in all
other instances \69\ where it referenced the AAMVA Guidelines, and only
made a typographical error to version ``1.1'' in a single instance, in
Sec. 37.10(a)(4). TSA did not receive any comments to the contrary.
Accordingly, the final rule has made a technical correction in Sec.
37.10(a)(4) to address this typographical error and correctly refer to
version 1.2.
---------------------------------------------------------------------------
\69\ See 88 FR 60056, 60062, 60068, 60071, 60085, & 60087 (Aug.
30, 2023).
---------------------------------------------------------------------------
4. Resident Address Data Element
Comments: AAMVA submitted that Sec. 37.10(a)(4)(i) of the NPRM
characterizes the ``resident_address'' data element as ``optional,''
despite that the AAMVA Guidelines define this data element as
mandatory.
TSA Response: TSA clarifies that the ``resident_address'' data
element required in Sec. 37.10(a)(4)(i) refers to the data element as
defined in the ISO/IEC 18013-5:2021(E) standard namespace
``org.iso.18013.5.1,'' not any data
[[Page 85357]]
elements defined in the AAMVA Guidelines. The use of the term
``optional'' in Sec. 37.10(a)(4)(i) reflects ISO/IEC's designation of
that data element as defined in ISO/IEC 18013-5:2021(E). For
clarification, despite ISO/IEC's designation of ``resident_address'' as
an ``optional'' data field in ISO/IEC 18013-5:2021(E), Sec.
37.10(a)(4)(i) of this final rule mandates inclusion of that data
field.
D. TSA Waiver Application Guidance
Comments: An association recommended that the TSA Waiver Guidance
should include references to the corresponding sections of the rule.
The association further recommended that the documents incorporated by
reference in Sec. 37.4 should be moved to the Guidance to facilitate
efficient updates as new standards are published. A State noted that
the Guidance was not available at the website specified in Sec.
37.10(c).
TSA Response: TSA agrees that the Guidance would be more helpful if
it references the applicable provisions in the final rule to which the
Guidance applies. The Guidance has been revised to specifically include
the corresponding regulatory provisions where possible. TSA appreciates
the commenter's perspective and this opportunity to provide clarity to
the public and stakeholders.
Regarding the recommendation to move the standards from Sec. 37.4
to the Guidance to reflect updated or newly-published standards, TSA
notes that the Guidance is non-binding and does not establish any
legally enforceable requirements. All security measures, practices, and
metrics set forth are simply illustrative, non-exclusive examples for
States to consider as part of their overall strategy to address the
requirements under Sec. 37.10(a). Any legally enforceable requirements
must be set forth in regulatory text. Moreover, as provided in Sec.
37.10(c), TSA may update this Guidance as necessary to provide
additional information or address evolving threats to security,
privacy, or data integrity.
TSA also clarifies that the Guidance was available during the
comment period at the public rulemaking docket at www.regulations.gov,
and continues to be available. The website specified in Sec. 37.10(c),
and throughout the rule, was under development at the time of the NPRM
but is now live.
E. General Concerns About mDLs
Comments: Some public interest organizations posited that public
demand for mDLs is ``non-existent'' and ``conjectural.'' However, some
States disagreed. One State commented that it has issued more than
200,000 mDLs to residents following a pilot in 2017 and more recent
expansion in 2022 and 2023. Another State commented that in the 3
months since it began offering its mDL app, it has been downloaded more
than 7,000 times. Other commenters questioned the claimed mDL benefits
concerning security, privacy, consumer protection, contact-free
hygiene, among others, with one commenter opining that any such
benefits would be realized only by those with the financial and
technical means to purchase mobile devices that meet the specifications
in the proposed rule. Some commenters further noted that mDLs would
increase the vulnerability of driver's licensing agency databases to
cyberattacks.
However, other commenters believe mDLs provide potential security
and privacy benefits. One industry vendor commented that the rule would
strengthen mDL integrity and security, which the commenter believes is
critical to mDL holders and verifying entities. The commenter
specifically noted that unlike physical cards, which require an
agency's verifying officer to have specialized knowledge of potentially
``hundreds'' of different card designs of 56 issuing jurisdictions, the
electronic safeguards built into mDLs obviate the need for such
knowledge. The commenter further opined that mDLs provide privacy
protections by empowering the mDL holder to control precisely what
information is shared and with whom.
TSA Response: TSA disagrees that public demand for mDLs is weak. As
discussed in Part II.C.2., above, TSA understands that more than half
of all 56 issuing jurisdictions are considering or issuing mDLs, and
this number continues to increase. Indeed, TSA notes that some States
submitted comments disagreeing about the purported lack of demand for
mDLs.
Regarding potential benefits of mDLs, TSA continues to believe that
mDLs provide potential benefits, including security, privacy,
efficiency, and contact-free hygiene, as discussed further in the
NPRM.\70\ TSA has directly observed some of these benefits through its
ongoing mDL testing at airport checkpoints (discussed in Part II.C.2,
above). In addition, as discussed above, some commenters agreed with
TSA's view that mDLs provide potential security and privacy benefits.
---------------------------------------------------------------------------
\70\ See 88 FR at 60062.
---------------------------------------------------------------------------
TSA disagrees that the rule effectively requires the purchase of
smartphones that are costly or technologically complex, which
commenters contend would limit potential mDL benefits only to those
with financial and technical means. The potential benefits of mDLs can
be realized using nearly any smartphone available today. The only
technical requirements for such devices, as a result of this final
rule, are a smartphone that employs Bluetooth Low Energy and has secure
hardware capability to protect the device key associated with the mDL.
These technologies are widely available on most smartphones.
With respect to concerns that mDLs introduce new cyber
vulnerabilities, TSA continues to believe that the minimum security
requirements set forth in this rule would minimize the potential for
harm resulting from such threats. As discussed in Part III.C.4.iii
above, cyber threats are diverse and evolving, and TSA intends to
address them by updating its Waiver Application Guidance as necessary.
Some commenters agreed that this rulemaking would improve mDL security
and the ability to resist cyber threats. An advocacy group shared that
some States and industry today are using non-standardized technological
approaches with wide substantive variances in security methodologies,
thereby making some mDLs susceptible to fraud and privacy intrusions.
The commenter noted that the proposed rule would overcome those
concerns by providing standardized approaches to protect security and
privacy.
F. Scope of Rulemaking and mDL Acceptance
Comments: An association opined that mDLs could provide benefits to
Federal agencies beyond the uses discussed in the proposed rule.
Specifically, the association noted that the Departments of State and
Transportation could accept mDLs to improve issuance of passports and
commercial driver's licenses, respectively. The commenter also sought
clarification on how mDL acceptance, and REAL ID broadly, will be
operationalized at TSA, both today and when enforcement of the REAL ID
Act begins.
One State recommended that the definition of mDLs in the proposed
rule be expanded to include Enhanced Driver's Licenses and Enhanced
Identification Cards (collectively ``Enhanced Driver's Licenses'' or
``EDLs'').
TSA Response: TSA reiterates that the final rule applies only to
Federal acceptance of mDLs for official purposes, defined by the REAL
ID Act regulations as accessing Federal facilities, entering nuclear
power plants,
[[Page 85358]]
and boarding Federally regulated commercial aircraft. Any other purpose
is beyond the scope of this rulemaking.
TSA further notes that each Federal agency that chooses to accept
mDLs for official purposes must build its infrastructure, train its
workforce, and operationalize mDL acceptance. Each Federal agency has
the discretion to determine its own policies concerning acceptable IDs
for access to their facilities, and for communicating this information
to the public. TSA advises that questions concerning individual Federal
agency identification policies and operational details should be
directed to the appropriate program offices of individual agencies.
Regarding EDLs, the definition of ``mDL'' does not require
modification because EDLs comply with REAL ID standards (despite that
they are not governed by the REAL ID Act).\71\ For that reason, this
rule makes clear that mDLs issued based on EDLs will be accepted by
Federal agencies under the waiver process. Indeed, the AAMVA Guidelines
(incorporated by reference; see Sec. 37.4) similarly treat EDLs as
synonymous with REAL ID-compliant driver's licenses, requiring that
States encode EDL-based mDLs as REAL ID-compliant. To confirm that
States properly encode an EDL as REAL ID-compliant, Sec.
37.10(a)(1)(vii)(A) of this final rule requires States to populate the
``DHS_compliance'' data element with ``F,'' indicating REAL ID-
compliant, as required by the AAMVA Guidelines (see Part IV.A., above).
This ensures that a Federal officer verifying an EDL-based mDL will
correctly identify the REAL ID compliance status of the underlying EDL.
TSA appreciates the commenter's perspective and this opportunity to
provide clarity to stakeholders.
---------------------------------------------------------------------------
\71\ EDLs are governed by the Western Hemisphere Travel
Initiative. As explained in the 2008 Final Rule, DHS worked closely
with States to ensure that EDLs would comply with REAL ID standards.
73 FR 5272, 5276 (Jan. 29, 2008). Some States mark EDLs as REAL ID
compliant on the front of the card.
---------------------------------------------------------------------------
G. Privacy
Comments: Several public interest organizations expressed concerns
that this rulemaking would establish a national digital ID that Federal
agencies could use in wide ranging circumstances and purposes. They
suggested that this type of ID could lead to sharing of data between
State driver's licensing agencies and Federal agencies, producing
serious harms to privacy and security, particularly for immigrant
communities. Immigrants, the commenters argue, could suffer because
many States are issuing non-compliant cards to them, and this rule
could influence States to share with Federal agencies information
provided in immigrant applications, potentially resulting in
deportation.
Other public interest organizations noted that the proposed rule
would facilitate tracking and surveillance because the rule requires
``installation of a government app on a mobile device of a certain
type.'' An organization further suggested that it be allowed to view
source code for these apps in order to learn their true intent.
Commenters recommended that the rule should not go forward without
additional privacy safeguards, noting that standard ISO/IEC 18013-
5:2021(E) is not sufficient.
TSA Response: In the REAL ID Act, Congress established minimum
standards for the issuance of State-issued driver's licenses and
identification cards acceptable for official Federal purposes. Neither
the Act nor implementing regulations, 6 CFR part 37, contemplate the
creation of a sole national identification card or Federal database of
driver's license information. Under the statute, the official purposes
for Federal agency acceptance of mDLs relate to identity verification,
and Congress neither created nor authorized a national identification
card. Each individual licensing jurisdiction continues to issue its own
unique licenses, maintain its own records, and control access to those
records and the circumstances under which access may be provided. In
addition, States continue to have full discretion to issue driver's
licenses that are non-REAL ID compliant, or to issue dual classes of
compliant and non-compliant cards, which some States are doing. States
also have full discretion to choose not to issue mDLs at all. The REAL
ID Act does not prevent compliant States from issuing driver's licenses
and identification cards where the identity of the applicant cannot be
assured or for whom lawful presence is not determined. This rule does
not intend to interfere with existing State laws that are designed to
protect driver's licensing agency data from being shared and used to
enforce Federal immigration laws.
Nothing in this final rule requires a Federal agency to accept
mDLs. Agencies that choose to do so will receive mDL user information
only with the individual's consent, and individuals will control access
and use of the mDL in their mobile devices. For example, in TSA mDL
testing at airport security checkpoints, passengers present their mDLs
to TSA, which uses an mDL reader to establish a secure communications
channel with the passenger's mobile device to receive the passenger's
mDL data. TSA's mDL readers are programmed to request access only to
the relevant data needed for identity verification, which TSA cannot
receive unless the passenger provides consent. Upon consent, the
passenger's mobile device releases the mDL data to TSA, which
automatically validates the authenticity of the information by
confirming the digital signature of the issuing State driver's
licensing agency (see discussion in Part II.C.1., above). TSA
emphasizes that it receives passenger data only from the passenger's
mobile device, and not from the issuing State driver's licensing
agency. Although TSA does communicate with a driver's licensing agency,
this is solely to receive the agency's private key for data validation
purposes--not identity verification. TSA further emphasizes that it
never communicates with driver's licensing agencies information
regarding the locations or instances of passengers' mDL use. The
passenger's PII is used in the same manner that biographic information
from physical IDs is used. The PII that is collected from the mDL,
along with the live photo taken by TSA, is overwritten when the next
passenger scan occurs or when TSA switches off its ID scanner,
whichever occurs first.
An mDL offers additional privacy and security benefits over
physical IDs. An mDL transmits only the necessary information requested
by TSA, rather than sharing all data elements found on a physical ID,
and requires user's consent. All mDL data is encrypted at rest, during
transfer, and during all transactions through secure channels. Nothing
in this rule mandates that individuals must install a ``government''
app or any type of app at all. Nothing in this rule requires
individuals to use a mobile device of any type, or to choose to receive
an mDL at all. TSA appreciates the opportunity to provide a detailed
explanation of the privacy protections conferred by mDLs. Additional
information can be found in DHS's Privacy Impact Assessment \72\
concerning privacy risks in the use of digital IDs in the identity
verification process at TSA airport security checkpoints.
---------------------------------------------------------------------------
\72\ See DHS, Privacy Impact Assessment for the Travel Document
Checker Automation--Digital Identity Technology Pilots, www.dhs.gov/sites/default/files/2022-01/privacy-pia-tsa051-digitalidentitytechnologypilots-january2022_0.pdf (last visited July
17, 2024).
---------------------------------------------------------------------------
H. Waiver Validity Period and Renewals
Comments: An industry vendor sought clarification on whether a
waiver is valid until revoked or for a defined period. An association
urged that the
[[Page 85359]]
validity period of a waiver should be long enough such that States are
not frequently submitting applications for renewals and awaiting
determinations, and that the period should cover both waiver
applications and State re-certifications. The association further
submitted that TSA should consider a grace period to allow a waiver to
remain valid for some period after the Phase 2 rule is effective. A
State sought clarification of requirements for renewing a waiver if the
subsequent Phase 2 rulemaking does not commence within 3 years of
publication of this final rule in order to assess the resources
required to prepare the renewal application. A vendor sought
clarification regarding whether a new audit report is required for
renewal applications if a State uses the same issuance vendors for both
the initial and renewal applications.
TSA Response: Under Sec. 37.9(e)(1), a waiver will be valid for
three years from date of issuance unless suspended or terminated under
Sec. Sec. 37.9(e)(4) or (5). As discussed in Part III.C.6., above,
this rule specifies a three-year waiver validity period because it
aligns with the frequency for States to re-certify compliance with
Sec. 37.55(b). TSA believes this period is sufficient given the
expedient timeframes specified in Sec. 37.9(b) for TSA to respond to
applications. As set forth therein, TSA will provide: an initial
decision on applications within 60-90 calendar days, replies to States
responses to notices of insufficiency within 30 calendar days, and
determinations on petitions for reconsideration within 60 calendar
days. These timeframes resist the commenter's concern about potentially
being trapped in an enduring cycle of submitting renewal applications
and waiting extensive period for TSA responses. Moreover, the three-
year waiver validity period equals the three-year frequency of States
to recertify compliance required by Sec. 37.55(b), as the commenter
notes.
Regarding the timing of the Phase 2 rulemaking and the need for a
grace period, Sec. 37.9(e)(6) specifies requirements for States that
seek to renew waivers beyond the validity period. Renewal provides a
mechanism for waivers to persist independent of the timing of future
rulemakings, which obviates the need for a grace period.
With respect to audit reports for renewal applications, TSA
confirms that States must submit an audit report for renewals,
regardless of a State's mDL issuance vendors or system changes.
Regarding the resources required for renewal applications, TSA assumes
such audit costs for subsequent waiver applications will remain the
same as the audit for the initial application, but TSA does estimate a
25 percent to 70 percent reduction in the renewal application cost
because the State would have gained experience and collected evidence
from the previously approved waiver application.\73\ The processes to
renew a waiver are identical to those set forth in Sec. 37.9 for
initial applications.
---------------------------------------------------------------------------
\73\ States with an established mDL program will incur a 45-hour
time burden to complete an mDL waiver reapplication, down from a 60-
hour time burden for the initial mDL waiver application (25 percent
reduction). States without an established program may experience a
70 percent reduction in the time to complete a waiver reapplication
compared to the initial mDL waiver application (from 140 hours to 45
hours). See Sec. 2.4.1 of the Regulatory Impact Analysis.
---------------------------------------------------------------------------
I. Vendor and Technology ``Lock-in'' Effects
Comments: Some public interest organizations commented that the
NPRM would promote a ``lock-in'' effect, in which certain technologies
and vendors would gain a durable competitive advantage that would be
difficult for competitors to overcome. In particular, the commenters
expressed concern that markets for digital wallets and mDL readers are
likely to be harmed because of the rule's reliance on standards such as
ISO/IEC 18013-5:2021(E), which the commenters believe create security,
privacy, and interoperability risks. According to the commenters,
digital wallets and other necessary mDL technology should be based on
open standards.
TSA Response: TSA is currently testing mDLs issued by seven States
who are partnering with multiple providers of digital wallets. One
provider, SpruceID, is based on an open-source toolkit for developing
decentralized IDs.\74\ Additional digital wallet providers are expected
to enter the market in the near-term, and States are expected to
partner with them and seek to test their mDLs with TSA. The rule
provides States broad discretion to select technology vendors of their
choice, and does not prescribe any specific type of technology. This
absence of prescriptive requirements is intentional, as it accommodates
innovation and organic demand from consumers to facilitate
technological diversity.
---------------------------------------------------------------------------
\74\ See generally SpruceID, https://spruceid.com/products/issuing-digital-ids (last visited July 17, 2024).
---------------------------------------------------------------------------
The final rule resists technology lock-in by providing minimum
standards for security, privacy, and interoperability, while remaining
technology-agnostic. The ISO/IEC 18013-5:2021(E) standard enables the
required interoperability for REAL ID use cases where mDL holders
present their mDLs in person to an mDL reader. Adhering to this
standard for interoperability does not harm the developers of digital
wallets or readers because the standard does not prohibit other
standards or technologies from working alongside the ISO/IEC 18013-
5:2021(E) standard. Indeed, California is pursuing this approach with
SpruceID. The California mDL digital wallet, built on the open-source
SpruceID toolkit, supports both ISO/IEC 18013-5:2021(E) requirements
and an alternative technology, known as TruAge[supreg], which allows
the mDL to be used in broader transactions, such as age-verified
purchases.\75\ TSA recognizes that in a broad sense, there may be a
false ``lock-in'' effect of certain types of mDLs, namely, those that
meet the waiver application criteria set forth in the rule. However,
this is not a true lock-in in the traditional sense of economic path
dependence, in which barriers prevent innovation and deployment of
equal or potentially superior alternatives. The rule requires States to
demonstrate that they issue mDLs that provide security, privacy, and
interoperability necessary for Federal acceptance for official
purposes, but also allows States and industry wide latitude to innovate
as necessary to meet the regulatory requirements.
---------------------------------------------------------------------------
\75\ See State of California Department of Motor Vehicles,
TruAge Age-Verified Purchasing, https://www.dmv.ca.gov/portal/ca-dmv-wallet/truage/ (last visited July 17, 2024).
---------------------------------------------------------------------------
As structured, this rule does not create dependencies on specific
vendors, systems, or technologies. Instead, the rule facilitates
development of more secure, privacy enhancing, and interoperable mDLs
using technology-agnostic solutions. Accordingly, this rule resists the
risk of true technology lock-in that otherwise may have occurred if
market participants select technologies, developed by first-movers,
that lack the protections necessary for Federal acceptance for official
purposes.
J. Pseudonymous Validation and On-Device Biometric Matching
Comments: An individual urged that it is critical to support
``pseudonymous validation'' under standard ETSI TR 119 476. In
addition, the commenter argued that mDL transactions should support
biometric matching on the mobile device itself to avoid sharing
biometric data. The commenter claimed these recommendations are
necessary to avoid becoming ``an autocratic state.''
TSA Response: ``Pseudonymous validation'' is the concept of using a
pseudonym or alias to identify an
[[Page 85360]]
individual without revealing that person's true identity. Although this
may provide valuable privacy protection in some uses, it also enables
an individual to operate under a consistent--but false--identity. This
is contrary to the REAL ID Act and regulations' purpose of improving
the security of State-issued identity cards.
On-device biometric sharing is the subject of standards ISO/IEC
23220-5 and ISO/IEC 23220-6, which are currently in development. TSA is
not aware of any currently published standards enabling the
establishment of trusted on-device biometric matching in the mDL
ecosystem, which makes it premature to require such functionality in
the final rule.
K. Access to Standards
Comments: A public interest organization contended that the NPRM
failed to provide adequate access to the 19 standards incorporated by
reference in the proposed rule. Specifically, the commenter noted that
under the NPRM, ``the only way'' for the public to gain access was to
email a request to the address specified in the rule. The commenter
noted that it sent multiple emails to this address, but never received
a response. The commenter also noted that the NPRM directed individuals
to visit ``DHS headquarters in Washington DC'' but did not provide a
specific address.
Other public interest organizations asserted that NPRM failed to
provide reasonable access to ISO/IEC 18013-5:2021(E) without a
substantial fee. A commenter noted that the ANSI link providing free
access to the standard was not helpful, and that attempts ``to even
load the standards on a modern computer failed completely.'' Further,
the commenter stated that ANSI required ``an unnecessarily onerous
process,'' which required signing up for an account and completing an
online license agreement form, and that access was on a view-only
basis.
TSA Response: TSA regrets that the commenter's multiple emails
seeking access were not answered. However, TSA notes that the NPRM
specified multiple mechanisms for the public to access the standards,
consistent with IBR requirements specified by the OFR.\76\ All but one
of the 19 standards incorporated by reference in Sec. 37.4 are
available to the public for free download, and the NPRM provided the
website addresses to access each of these documents. In addition, the
NPRM provided detailed information for the publisher of each of these
standards, including most, if not all, of the following: publisher
name, address, phone, email, and website. For the sole standard that is
not publicly available for free, ISO/IEC 18013-5:2021(E), the NPRM
facilitated free access via ANSI, a private organization with whom TSA
has no affiliation. The NPRM specifically noted that ANSI's policy
required individuals to complete an online license agreement form
asking for only name, professional affiliation, and email address. The
NPRM also stated that access would be available on a view-only basis,
and provided publisher information for individuals who sought a greater
level of access. TSA received many comments discussing the 19
standards, demonstrating that the NPRM provided sufficient notice
regarding access to these standards.
---------------------------------------------------------------------------
\76\ See 1 CFR 51.5(a); Office of Federal Register,
Incorporation by Reference Handbook (June 2023, rev'd Aug. 28,
2023), https://www.archives.gov/federal-register/write/handbook/ibr/
(last visited July 17, 2024) [hereinafter ``IBR Handbook''].
---------------------------------------------------------------------------
Although the NPRM provided sufficient notice to access the
standards, the final rule modifies access instructions in existing
Sec. 37.4 to clarify and provide additional means for access.
Specifically, the final rule replaces DHS with TSA as a location where
IBR material is available for inspection and provides additional points
of contact at TSA. The final rule also specifies that certain IBR
material is available in the Federal Docket Management System at
https://www.regulations.gov, docket number TSA-2023-0002.
L. Standards and Standards Development Generally
Comments: Several commenters sought clarification on how TSA would
update the final rule to reflect evolving industry standards and
government guidelines. Commenters suggested that instead of
incorporating by reference a specific version of a document, the rule
should require compliance with the ``most recent version.'' Some
commenters requested specificity regarding the process and timeframes
given to States to conform to any updated standards.
Other commenters questioned the validity of the standards-
development processes followed by ISO/IEC, AAMVA, and others.
Commenters asserted that these bodies are secretive, unaccountable to
the public, have onerous membership criteria, are influenced by foreign
authoritarian governments, among other deficiencies.
Some commenters asserted that the documents incorporated by
reference in Sec. 37.4 of the proposed rule were insufficient because
they provided only partial requirements to address security and
operational issues. Commenters also criticized some of the references
for their absence of protections to address: emerging threats from
quantum computing, evolving risks from digital identification, outdated
encryption algorithms, and digital wallet design, user experience,
among other deficiencies.
TSA Response: Under applicable legal requirements, Federal agencies
must seek approval from the OFR for a specific version, edition, or
date of a publication that an agency seeks to IBR in a final rule.\77\
Revisions or updates to a publication already IBR'd in a final rule
require re-approval from the OFR, and rules therefore do not update
``dynamically'' to reflect future versions.\78\ Therefore, the rule
cannot exclude publication version or date information, or update
dynamically to reflect future versions. States will be expected to
comply with the standards as published in the final rule. TSA actively
monitors evolving standards and guidelines, and may consider whether to
IBR those publications (pending review of the final documents) through
subsequent rulemaking.
---------------------------------------------------------------------------
\77\ See 1 CFR 51.5(b) & 51.9; IBR Handbook, https://www.archives.gov/federal-register/write/handbook/ibr/.
\78\ See IBR Handbook, https://www.archives.gov/federal-register/write/handbook/ibr/.
---------------------------------------------------------------------------
Regarding criticisms of standards-development bodies and their
deliberations generally, the standards development process for
international technology standards, particularly those intended to be
interoperable globally, is developed by membership-based bodies
comprised of interested parties representing participants from
international governmental entities, educational organizations,
research groups, non-profit organizations, commercial entities, and the
public at large. Each standards-development organization sets its own
criteria for membership, fees, standards development processes, and
publication structure.
With respect to the criticism that the chosen standards and
guidelines provide insufficient protections and lack future-proofing to
address unknown threats, TSA notes that due to the nature of innovation
and evolving technology, and legal constraints of Federal rulemaking,
it is not possible to develop ``future-proofed'' regulations. TSA
acknowledged in the NPRM that this is a nascent market experiencing
rapid innovation, and that many key standards and guidelines are
currently being developed. Although imperfect, the chosen standards
reflect industry
[[Page 85361]]
state-of-the-art ahead of publication of emerging standards that likely
will support the subsequent Phase 2 rulemaking. TSA made a risk-based
determination that the 19 standards provide the key security, privacy,
and interoperability requirements necessary for trusted Federal
acceptance, and are commensurate with existing REAL ID standards for
physical cards. The two-phased rulemaking approach is intended to
address the near-term need for established security, privacy, and
interoperability requirements, while accommodating the medium-term
evolution of technology and standardization.
With respect to comments regarding specific deficiencies in some of
the chosen standards, TSA offers the following responses. TSA
acknowledges that ISO/IEC 18013-5:2021(E) was developed broadly for
international consumption and does not fully address the needs for REAL
ID use cases in the U.S. The waiver application criteria set forth in
Sec. 37.10(a), therefore, adapt ISO/IEC 18013-5:2021(E) for REAL ID
use cases by supplementing this standard with requirements from other
references as set forth in this rule. For example, Sec. Sec.
37.10(a)(1) and (a)(3) address the provisioning and privacy
requirements not covered by ISO/IEC 18013-5:2021(E). Other issues
relevant to mDL transactions that are not addressed in ISO/IEC 18013-
5:2021(E), such as device user experience and digital wallet design are
beyond the scope of this rule and intentionally omitted.
M. TSA's Identity Verification Policies
Comments: A public interest organization raised questions regarding
TSA's identity verification policies at the screening checkpoint.
TSA Response: This rulemaking is focused on allowing Federal
agencies to accept mDLs for Federal official purposes as defined by the
REAL ID Act. Issues regarding TSA's identify verification processes
unrelated to mDLs are beyond the scope of this rulemaking.:
N. Paperwork Reduction Act
Comments: A public interest organization argued that every mDL
transaction with a Federal agency is a collection of information
subject to the Paperwork Reduction Act (PRA), and that no exemptions
apply. The organization further contended that because neither TSA nor
any other Federal agency has sought approval from the Office of
Management and Budget (OMB) for these collections, any use of mDLs
violates the PRA. Without an approved information collection, the
commenter noted that it is not able to determine the costs or purposes
of this information collection.
TSA Response: TSA disagrees with the commenter's assertion that
every mDL transaction with a Federal agency is a collection of
information subject to the PRA because a request for identify
verification is not the ``soliciting . . . of facts or opinions . . .
calling for . . . answers to identical questions.'' 44 U.S.C. 3502(3)
(defining ``collection of information''); cf. 5 CFR 1320.3(h)(1)
(excepting from the definition information affirmations or
certifications that ``entail no burden other than that necessary to
identify the respondent''). This final rule establishes a process for
States to apply to TSA for a temporary waiver that enables Federal
agencies to accept mDLs issued by those States when REAL ID enforcement
begins on May 7, 2025. This rule does not, however, require any mDL
transactions with a Federal agency or set requirements for the use of
mDL information. Therefore, this comment is beyond the scope of this
rulemaking.
O. Legal Authority
Comments: A public interest organization questioned the legality of
DHS's delegation of authority to TSA to administer the REAL ID program
because the public was deprived of an opportunity to comment on it. The
commenter further argued that it is improper for TSA, a transportation-
focused agency, to regulate use of mDLs by other Federal agencies for
non-transportation uses.
Other public interest organizations posited that neither the REAL
ID Act, nor subsequent amendments in the REAL ID Modernization Act,
authorize issuance of the waiver as set forth in the NPRM. The
commenters argued that DHS is statutorily authorized only to prescribe
standards, certify State compliance, and extend time to facilitate
compliance, and the implementing regulations prevent DHS from waiving
any mandatory minimum standards.
TSA Response: Generally, Federal agencies' delegations of duties
and authority are exempt from notice-and-comment requirements of the
Administrative Procedure Act because they are matters of ``agency
management'' and ``rules of agency organization, procedure or
practice.'' \79\ Matters involving internal agency organization,
procedure, practice, and delegations of duties and authority are
directed primarily towards improving the efficiency and effectiveness
of agency operations, and therefore are not required to be posted for
public comment. DHS's delegation of authority to TSA to administer the
REAL ID program falls within this exemption, obviating the need for
public comment.
---------------------------------------------------------------------------
\79\ 5 U.S.C. 553(a)(2), (b)(A).
---------------------------------------------------------------------------
TSA further clarifies that the REAL ID Act, as amended, authorizes
the Secretary to promulgate regulations to implement the requirements
under the REAL ID Act.\80\ And the REAL ID Modernization Act amended
the definitions of ``driver's license'' and ``identification card'' to
specifically include mDLs that have been issued in accordance with
regulations prescribed by the Secretary of Homeland Security.\81\ TSA
is adopting the waiver process established in this final rule pursuant
to its authority to implement the requirements of the REAL ID Act as
amended, and the final rule is consistent with all statutory
requirements.'' The waiver application criteria specify issuance-
related security and privacy requirements that are commensurate with
requirements for physical cards. The final rule further provides that
these are temporary requirements that will be superseded by a
subsequent rulemaking setting forth more comprehensive requirements
after emerging industry standards are published over the next few
years.
---------------------------------------------------------------------------
\80\ Sec. 205 of the REAL ID Act.
\81\ Sec. 1001 of the REAL ID Modernization Act, 134 Stat. 2304.
---------------------------------------------------------------------------
P. Economic Impact Analysis
1. Alternatives
Comments: Several commenters, including a State, associations, and
an individual, commented on various aspects of the assessment regarding
the costs and benefits of available regulatory alternatives.\82\ Some
commenters recommended that TSA should accept Alternatives 1, 3, or 4
compared to the proposed rule. The commenter recommending acceptance of
Alternative 1 stated the proposed rule does not address the market
failures associated with a lack of common standards, such as increased
complexity of mDL use across States, and may result in larger costs in
the long run when formal mDL standards are finalized. The commenter
supporting Alternative 3 recommended that TSA promulgate comprehensive
mDL regulations that enable States to develop and issue REAL ID-
compliant mDLs, as well as a process for Federal agencies to accept
them. The commenter recommending acceptance of Alternative 4 stated it
would eliminate the time and expense required to
[[Page 85362]]
prepare and submit a waiver application and audit report, and another
commenter sought clarification on how the scope of Alternative 4
differs from the proposed rule.
---------------------------------------------------------------------------
\82\ See NPRM, 88 FR at 60079-80.
---------------------------------------------------------------------------
TSA Response: Regarding Alternative 1, TSA reiterates that this
rule establishes requirements for States to issue mDLs that provide
specified levels of security, privacy, and interoperability, which
provides guidance and direction for State mDL issuance systems and
reduces the complexity of mDL use across different jurisdictions. The
mDL waiver application criteria would likely form the foundation of the
more comprehensive requirements in the Phase 2 rulemaking. While States
may have to incur cost to alter their mDL programs when more
comprehensive requirements are issued, they are less likely to have to
make significant changes and incur larger costs under this rule than
under Alternative 1.
The final rule provides benefits to States and mDL users. The
waiver process will allow the continued use of mDLs for official
purposes when REAL ID enforcement begins on May 7, 2025. An mDL is more
secure than a physical card, affords users privacy controls over the
information transmitted to the relying party, and enables contact-free
transactions. TSA does not believe the waiver process delays
development of industry standards and Federal guidelines. Many such
standards and guidelines are in development that would inform
requirements in the Phase 2 rulemaking, and this final rule will
facilitate, not impede, this process. For these reasons, TSA recommends
the final rule over Alternative 1.
Regarding Alternative 3, TSA believes it is premature to promulgate
comprehensive mDL regulations, given that several important industry
standards and Federal guidelines are in development and would likely
inform future requirements in the Phase 2 rulemaking, such as
requirements related to mDL provisioning. Until the subsequent
rulemaking is published, this final rule sets requirements based on
current, available industry standards and guidelines that serve as a
basis for, and bridge towards, more comprehensive requirements.
Alternative 4 would establish interim minimum requirements, similar
to the waiver application criteria, for States to issue REAL ID
compliant mDLs instead of a wavier process that enables Federal
agencies to accept mDLs from States that meet the waiver criteria. TSA
clarifies that Alternative 4 would largely convert the waiver
application criteria to requirements for the issuance of REAL ID-
compliant mDLs. If States could meet those requirements, under
Alternative 4, States' mDLs would be deemed REAL ID compliant. In
contrast, the final rule, through the waiver process, enables Federal
agencies to accept for official purposes States' mDLs that meet the
waiver criteria.
As discussed further in Part VI.A.4., below, TSA rejects this
alternative because it effectively would codify standards that may
become obsolete in the near future, thereby implying a degree of
certainty that TSA believes is premature given emerging standards that
are still in development. Although Alternative 4 eliminates the waiver
process, TSA would continue to require a mechanism to validate that a
State's mDLs complies with the established standards under Alternative
4. Thus, States would still need to provide information to TSA similar
to the waiver process, including audit reports, to demonstrate
compliance with the requirements. TSA believes the time and expense to
provide such information under Alternative 4 would be similar to the
waiver process under the final rule, and a waiver process provides more
flexibility and allows States and TSA to gain insight and experience in
the mDL environment.
2. Familiarization and Training Costs
Comments: A vendor recommended inclusion in Table 2 of the NPRM
(Total Costs of the Rule to States) of States' Familiarization Cost in
years 2-5 to reflect evolving standards, and a similar inclusion in
Table 3 (Total Cost of the Rule to DHS) for DHS, but did not provide
any cost estimates.\83\ The vendor further recommended inclusion of
States' training or continuing education costs in Table 2, which the
vendor believes should be similar to DHS's training costs set forth in
Table 3 ($5 million over 10 years). The commenter also requested
clarification of the definition of training costs in Table 3, and
whether it includes State training related to certificate systems and
record maintenance.
---------------------------------------------------------------------------
\83\ See NPRM, 88 FR at 60074-76.
---------------------------------------------------------------------------
An association posited that the economic analysis did not address
TSA's costs, training requirements, and process changes to adapt to an
mDL system.
TSA Response: TSA does not believe a State's familiarization or
training cost estimates require modification. The familiarization cost
estimate represents the cost and time burden for States to review the
final rule. All State driver's licensing agencies would incur this cost
in the first year after the publication of the rule. Although
familiarization costs do not include time spent reviewing new
standards, the NPRM does discuss, qualitatively, potential State costs
to monitor and study mDL technology as it evolves including standards
development and other relevant factors. TSA did not receive any cost
estimates related to reviewing new standards.
The training costs in Table 3 relate to costs TSA would incur to
train Transportation Security Officers (TSOs) to verify mDLs for
identification purposes at airport security checkpoints. As such,
States would not incur similar costs of roughly $5 million for such
training. TSA is unclear as to the type of or specific training or
continuing education the commenter refers and what may be needed in the
future. However, for clarification, any such training and
certifications have been added to the qualitative discussion of
potential additional State costs (section 3.1.5 of the RIA).
TSA believes the costs related to training and process changes to
adapt to an mDL system are accounted for and quantified where
available. TSA quantifies the costs for TSOs to undertake training to
verify mDLs for identification purposes at the security checkpoint, and
for additional clarity, TSA has also added the cost to TSA to provide
such training for TSOs. TSA also quantifies the costs related to the
equipment that must be acquired to integrate the use of mDLs for
identity verification in section 2.6 of the RIA. In addition, TSA added
a qualitative discussion in the economic analysis (section 3.2.5)
regarding costs TSA may incur related to process changes to adapt to an
mDL system, such as changes to standard operating procedures and
informational campaigns.
3. Estimated Time To Complete Waiver Applications; Estimated Costs for
mDL Readers
Comments: An industry vendor recommended increasing the estimated
time to complete waiver applications from 20 hours, as set forth in the
NPRM, to 80 hours, and increasing the estimated cost for mDL readers by
35 percent, for both DHS and other Relying Parties.
TSA Response: TSA clarifies that the total time burden to complete
a waiver application does not require modification because the estimate
includes two components: (1) the time to complete the application and
provide the information required under Sec. 37.10(a), and (2) the time
to gather all supporting documentation. TSA estimates completing the
application
[[Page 85363]]
will require an average of 20 hours. Separately, the time burden
estimate for gathering supporting documentation can range from 40 to
120 hours. TSA estimates States with existing mDL solutions (15 States)
will require a total of 40 hours, while States considering mDLs but
lacking mDL solutions (25 States) will require a total 120 hours for
their initial waiver application submission. Thus, TSA estimates an
average time burden of 110 hours to complete a waiver application, by
adding the time to complete application materials (20 hours) and a
weighted average time to gather supporting documentation (90
hours).\84\ TSA also estimates States will incur an average time burden
of 47.5 hours to complete a waiver resubmission, which is separate from
the initial waiver application. See Section 2.4 of the Regulatory
Impact Analysis (RIA) for additional details.
---------------------------------------------------------------------------
\84\ Weighted average time to gathering supporting documentation
of 90 hours = ((15 States x 40 hours) + (25 States x 120 hours)) /
(15 States + 25 States).
---------------------------------------------------------------------------
The cost of mDL readers is uncertain given evolving technology, and
could vary up or down by 35 percent compared to TSA's current estimate.
For example, within TSA specifically, TSA may integrate mDL readers in
existing infrastructure, and TSA's costs are different than other
relying parties (other Federal agencies that choose to accept mDLs for
official purposes). For TSA mDL reader costs, TSA structures its
estimate around internal data on actual procurement to quantify the
cost of its mDL reader equipment, which also includes the cost of
quarterly updates. Given the uncertainty of mDL reader costs, the final
rule expands the range of possible reader costs for relying parties up
and down by the comment suggested 35 percent of the TSA internal
estimate which results in a range of about $260 to $540 with a midpoint
of $400. While TSA does not change its primary estimate based on the
estimated cost of a smartphone which is assumed to be used in
combination with an application to serve as the mDL reader, it does
recognize that such costs could range from $2.1 million to $4.4 million
over 10 years.\85\
---------------------------------------------------------------------------
\85\ DHS multiplies the total number of mDL readers relying
parties will procure over 10 years of 8,174.9 (Table 2-11: Relying
Party mDL Reader Procurement in the Final Regulatory Impact
Analysis) by a low mDL reader cost of $261.30 and high mDL reader
cost of $542.70.
---------------------------------------------------------------------------
4. Cost-Benefit Analysis Generally
Comments: A public interest organization suggested that the cost-
benefit analysis was hastily prepared and speculative.
TSA Response: TSA recognizes mDLs are an emerging market with
uncertain costs and benefits. Nonetheless, TSA quantifies costs where
it is able to with the best available data along with assumptions,
proxies, and subject matter expert estimates, and TSA discusses
potential additional costs qualitatively where TSA was unable to
quantify the costs. TSA observes that the commenter did not offer
specific recommendations to improve estimates of future costs, urging
only that TSA should delay this rulemaking in light of the uncertainty.
However, TSA believes there may be additional costs to stakeholders by
delaying the rule. For example, mDL users would not be able to use mDLs
for official purposes when full enforcement of REAL ID begins on May 7,
2025, which would delay or deny realization of the security, privacy,
convenience, and contact-free hygiene benefits mDLs. States and
industry would risk continued investments based on non-standardized
processes that lack the security, privacy, and interoperability
necessary for Federal acceptance for official purposes. Federal
agencies would be delayed in realizing the security and privacy
benefits conferred by mDLs compared to physical cards. In addition,
through continued and increased mDL usage enabled by this final rule,
TSA will gain insight and data that could better inform costs and
benefits of the Phase 2 rulemaking.
Q. Communicating Status of Waiver; System Disruptions
Comments: Some commenters sought clarification on how the status of
a waiver, specifically, suspensions and terminations, would be
communicated to Federal agencies. Another commenter asked whether TSA
would provide support mechanisms to communicate information about
system disruptions that could impact mDL acceptance by Federal
agencies.
TSA Response: As provided in Sec. Sec. 37.9(b)(1), (e)(4)(iii),
and (e)(5)(iii), TSA will publish, at www.tsa.gov/real-id/mDL, a list
of States that hold valid waivers, including updates to note any final
suspensions and terminations. As required by Sec. 37.8, any Federal
agency that elects to accept, for REAL ID official purposes, mDLs
issued by States with a waiver must regularly review the specified
website to confirm that a State holds a valid waiver. Suspensions and
terminations will occur only for the violations specified in Sec.
37.9(e), which TSA anticipates will be rare instances.
Regarding support mechanisms for system outages and other
disruptions to mDL acceptance, each Federal agency that elects to
accept mDLs for official purposes will be responsible for maintaining
and supporting its mDL acceptance infrastructure. With respect to
Federal agency access to the State mDL waiver list at www.tsa.gov/real-id/mDL, DHS and TSA IT systems already provide the necessary level of
support to reduce the risk of widespread impacts from a temporary
system outage. To further reduce risk of potential disruptions, TSA
strongly encourages all mDL holders to carry their physical REAL ID
cards in addition to their mDLs.
R. Impact of Waiver on States Currently Testing mDLs With TSA
Comments: A State that is currently testing mDLs with TSA sought
clarification regarding the extent to which the waiver application
criteria align with or differ from terms in the TSA-State testing
agreement. The State sought this comparison to assess the amount of
additional resources that the State may require to meet the waiver
criteria.
TSA Response: Due to confidentiality provisions in TSA's contracts
with States, TSA cannot publicly disclose the terms of such agreements
or compare any differences with the waiver application criteria.
However, to assist any States who have entered into such agreements
with TSA, the agency encourages such States to contact TSA for further
discussions. All States are subject to the requirements of this rule to
obtain a waiver, and TSA intends to work with States that are testing
mDLs with TSA to help ensure a smooth transition.
Regarding concerns about the time and resources necessary to
successfully apply for a waiver, TSA estimates the 10-year cost to all
States seeking a waiver is approximately $814 million. On a per-State
basis, TSA estimates the average cost to complete a waiver application
is approximately $40,000 (this includes the cost to complete the
initial application and resubmission; see Table 2-8 in the RIA), and
the average cost to comply with the application criteria $3.13 million
in the initial year of a State's application (as discussed in Section
2.5 of the RIA).
S. Notice for Changes to mDL Issuance Processes
Comments: A State requested clarification regarding whether Sec.
37.9(e)(2) requires States to provide 60 calendar days' advance notice
before adding a new digital wallet provider.
TSA Response: In some circumstances, the addition of a new digital
wallet provider may trigger the
[[Page 85364]]
requirement under Sec. 37.9(e)(2) to provide notice to TSA, depending
on the extent of the changes required to the State's mDL issuance
processes. This is especially true as more standards are developed in
the area of mDL provisioning. Although States are responsible for
assessing if any changes are significant and trigger the reporting
requirements, TSA recognizes that it is not possible to define precise
circumstances that require, or do not require, reporting. To assist
States in determining whether changes in their specific circumstances
warrant notification under Sec. 37.9(e)(2), the final rule revises
this section by adding the following sentence at the end: ``If a State
is uncertain whether its particular changes require reporting, the
State should contact TSA as directed at www.tsa.gov/real-id/mDL.'' TSA
will collaborate with States to facilitate a determination of whether
reporting is required. TSA appreciates this opportunity to provide
clarity and reduce potential burdens on the entities directly regulated
by this final rule.
T. Clarification Regarding ``Days''
Comments: A vendor requested clarification whether Sec. 37.9(b) of
the NPRM, under which TSA would provide decisions on waiver
applications ``within 60 days'' and ``in no event longer than 90
days,'' means ``calendar days'' or ``business days.''
TSA Response: TSA clarifies that all references in this rulemaking
to ``days'' means calendar days, not business days. The final rule
revises the following NPRM provisions to implement this clarification:
Sec. Sec. 37.9(b), (c) & (e), and Appendix A, paragraph 6.3.
U. Audit Requirements
1. Questionable Necessity; Excessive Costs; Alternatives to
Independent Auditor
Comments: An association recommended that the requirement for an
independent, third-party audit was unnecessary and should be optional,
not mandatory, and further suggested that an audit could be a
substantiating element together with any self-certification that a
State already presents to TSA under REAL ID requirements. Another
commenter posited that an audit (and the waiver application process) is
extraneous for States that have invested in mDLs and entered into
testing agreements with TSA. Several States and an association
expressed concerns about the costs of, and need for, an independent
evaluator, noting the timing of budgetary requests and varying ability
among States to afford the costs.
Some commenters recommended alternatives to independent auditors,
including internal State-conducted audits, an audit conducted in
conformity with the AAMVA Digital Trust Service (DTS), and processes in
lieu of audits entirely. Another commenter recommended specifying
detailed criteria, based on a set of established industry requirements
and/or guidelines, along with relevant Root Program or industry
policies, against which auditors would perform an assessment.
TSA Response: TSA clarifies that the term ``independent entity'' in
Sec. 37.10(b)(1) is intended to include entities that are employed or
contracted by a State and independent of the State's driver's licensing
agency. This final rule revises the proposed Sec. 37.10(b)(1) to
include this clarification.
TSA disagrees that an independent audit is unnecessary or of
questionable importance. The purpose of the audit is to validate the
accuracy of the information that a State provides to TSA in support of
its application for a waiver. This validation ensures TSA has correct
information to efficiently evaluate the sufficiency of a State's
application. TSA believes an independent auditor that meets the
requirements of Sec. 37.10(b) can provide a defensible level of
accuracy that cannot be achieved via other means, such as a self-
certification.
TSA also disagrees that costs for independent audits will be
excessive. As discussed in section 2.4.1 of the RIA, TSA estimates the
audit cost range is between $5,000 and $60,000 on a per-State basis.
TSA disagrees that an audit conducted in conformity with
requirements for a State to participate in AAMVA's DTS is an acceptable
alternative to the audit requirements specified in this rule. The
requirements imposed on States to participate in the AAMVA DTS are not
identical to the requirements imposed in this rule. In particular, the
AAMVA DTS requirements lack the specific cybersecurity risk control
requirements addressed in Sec. 37.10(a)(2) to establish public trust
in States' mDL issuance systems. Finally, establishing specific audit
criteria may be the subject of the upcoming Phase 2 rulemaking that
will set forth detailed requirements that would enable States to issue
mDLs that comply with the REAL ID Act.
2. Auditor Qualifications
Comments: One association recommended that the rule should allow an
auditor with credentials that are more closely aligned to certification
of systems management, ethics, and business practice. Alternatively,
the commenter recommended that instead of requiring any specific
license, the rule should only require that the name of the auditor be
listed.
TSA Response: Regarding auditor qualifications, the requirement in
Sec. 37.10(b) that auditor must hold a Certified Public Accountant
(CPA) license provides the necessary duty of care to report accurately
and truthfully in the State in which the audit occurs, and TSA has not
identified any suitable alternatives. TSA understands that auditors
experienced in certification of systems management, ethics, and
business practice are not an equivalent substitute to auditors who are
CPAs, who possess additional qualifications as specified through their
Certified Information Technology Professional credential. Similarly,
merely listing the name of the auditor is not sufficient. The
certification requirements in Sec. 37.10(b) are common in auditing
technical and information systems and provide proof of expertise.
V. Appendix A to Subpart A: mDL Issuance Requirements
1. Compliance With Full Reference or Specific Provisions
Comments: An association noted that some Appendix A provisions
require full compliance with the cited references instead of specific
parts of those references. For illustration, the association provided
some non-exhaustive examples, including the CA/Browser Forum's Baseline
Requirements for the Issuance and Management of Publicly-Trusted
Certificates and Network and Certificate System Security Requirements.
The association and another commenter requested specifying pertinent
parts of the cited references that are applicable to compliance with
requirements in this rule.
TSA Response: TSA agrees that the agency can provide paragraph or
section numbers for some of the references cited in Appendix A to aid
in understanding which parts of the references require compliance. TSA
made the following technical corrections in the final rule:
In Appendix A, paragraph 1.1, the CA/Browser Forum
Baseline Requirements for the Issuance and Management of Publicly-
Trusted Certificates were qualified with the addition of the following
identifiers: sections 2, 4.3, 4.9, 5, and 6. TSA also qualified ISO/IEC
18013-5:2021(E) with the addition of Annex B to provide guidance on
requirements for a certificate policy and to clarify its
[[Page 85365]]
applicability. Compliance with ISO/IEC 18013-5:2021(E) Annex B is
already required by Sec. 37.10(a)(4), and inclusion here reduces
burden by providing States greater specificity on certificate profiles
to include in their mDL certificate policy. For NIST SP 800-57, Part 1,
Rev. 5, the final rule adds qualifications for sections 3 and 5-8. For
NIST SP 800-57, Part 3, Rev. 1, the final rule adds qualifications for
sections 2-4 and 8-9.
In Appendix A, paragraph 2.13, the final rule adds a
qualification to section 4.2 of NIST SP 800-63B to provide further
clarity on the specific requirements for AAL2 authenticators.
Regarding the CA/Browser Forum Network and Certificate System
Security Requirements document, the final rule requires full compliance
with this document because these requirements define a minimum set of
security controls to establish publicly trusted certificate systems.
This model has proven successful as the basis for securing the
certificate systems used to secure the global internet.
2. Paragraph 2.2: Changing Authentication Keys and Passwords
Comments: An association commented that the terms ``privileged
account'' and ``service account'' in this paragraph are undefined.
TSA Response: The terms ``privileged account'' and ``service
account'' fall under the definition of ``trusted role'' in Sec. 37.3.
Accordingly, the final rule has revised proposed Appendix A, paragraph
2.2, to replace ``privileged account'' and ``service account'' with
``trusted role.'' TSA appreciates the feedback and the opportunity to
provide this clarification.
3. Paragraphs 2.11-2.14: Multifactor Authentication
Comments: An association requested clarification as to whether the
Multifactor Authentication (MFA) required by paragraphs 2.11-2.14 of
Appendix A is PKI-based or crypto-based phishing-resistant MFA.
TSA Response: Appendix A, paragraphs 2.11-2.14, do not require PKI-
based or crypto-based phishing resistant MFA. While phishing resistant
cryptographic authenticators are a best practice to achieve the highest
level of assurance for multi-factor authentication, for the purposes of
demonstrating compliance with Appendix A requirements in paragraphs
2.11-2.14, MFA is achievable through a combination of technologies and
methods covered by NIST SP 800-63B section 4.2. TSA believes this
approach optimally balances mitigation of risks associated with access
to certificate systems with costs of implementation.
4. Paragraph 3: Facility, Management, and Operational Controls
Comments: An industry vendor questioned whether the requirements in
paragraph 3 of Appendix A mean that only U.S. citizens or lawful
permanent residents are qualified to be authorized personnel who can
access such systems. The commenter sought further clarification on
whether the specified controls apply to ``as a service'' offerings on
www.GovCloud.com.
TSA Response: TSA clarifies that Appendix A, paragraph 3.3, does
not require that only U.S. citizens or lawful permanent residents can
serve as personnel authorized to access state certificate systems. This
provision requires States to specify the controls for employees,
contractors, and delegated third parties, including any cloud service
providers, necessary to prevent risks posed by foreign ownership,
control, or influence. Regarding applicability to other cloud-based
services, this provision also requires States to specify the security
controls for all ``as-a-service'' providers, who are considered to be
delegated third parties.
5. Paragraph 4: Personnel Security
a. Background Checks
Comments: A commenter sought clarification regarding whether this
section requires a Federal fingerprint background check, State
fingerprint background check, or other non-fingerprint based background
check.
TSA Response: Appendix A, paragraph 4, does not specify any
particular types of screening procedures. Instead, States are
responsible for specifying screening procedures for employees,
contractors, and delegated third parties in trusted roles. Title 6 CFR
37.45 specifies requirements for background checks and applies to
covered employees, and this final rule does not alter those
requirements.
b. Paragraph 4.1: Coordination Among States; Applicable Laws
Comments: A commenter sought clarification regarding how
``coordination among State entities'' applies to a policy to control
security risks from insider threats. The commenter sought further
clarification of the requirement in this paragraph that a State's
policy must comply with ``all applicable laws, executive orders,
directives, regulations, policies, standards, and guidelines.''
TSA Response: TSA clarifies that under Appendix A, paragraph 4.1,
the term ``State entities'' refers to the agencies and offices that
comprise the State's governmental operations. Coordination among State
entities is intrastate for the purposes of State-run insider threat
programs, not interstate coordination among different States. TSA
believes that States are likely familiar, from decades of experience
issuing physical driver's licenses under the requirements of Sec.
37.45, as well as familiarity with other State-specific information and
security laws, with the applicable legal requirements governing
policies to address risks from insider threats, many of which are
State-specific.
c. Timeframe To Disable System Access; Cybersecurity Incident Reporting
Comments: A State commented that Appendix A, paragraph 4.5, which
requires a State to disable an employee's system access within 4 hours
of the employee's termination, conflicts with Appendix A, paragraph
8.6, which requires States to provide notice to TSA within 72 hours
after discovery of a cyber incident. The State recommends that time
periods in both sections be amended to 24 hours, urging that disabling
an employee's system access within 4 hours of termination is overly
aggressive in situations where termination is amicable, such as
retirements or transfers.
TSA Response: TSA maintains that a 4-hour requirement to disable
system access, as set forth in Appendix A, paragraph 4.5, is essential
in all termination situations. A coordinated and prompt surrender of
logical and physical access for all departing employees is a critical
component of a program to address insider threats. It is highly
unlikely that a State would allow employees to have physical access to
buildings or other infrastructure after termination. Disabling access
to logical systems is as critical as requiring the surrender of keys
and media providing physical access. When an employee is terminated for
misconduct or other exigent circumstances that could compromise
security, timely denial of system access is critical. Although amicable
termination situations may present fewer security risks, States have
sufficient time, in these circumstances, to pre-plan for the prompt
disabling of system access before the employee's final day, similar to
how States pre-plan the recovery of any physical keys or key cards for
building access.
TSA further maintains that the proposed requirement for States to
report cybersecurity incidents within 72
[[Page 85366]]
hours of discovery, as set forth in Appendix A, paragraph 8.6, is
appropriate, and TSA therefore declines the recommendation to shorten
the timeframe to 24 hours. While TSA has established in other contexts
outside of this rulemaking a shorter timeframe for reporting by certain
transportation owners or operators, that timeframe reflects the
potential impact of cybersecurity incidents that could jeopardize the
safety of individuals and property. In that context, early reporting is
critical to ensure the ongoing availability of critical operational
capabilities. Here, in contrast, the requirement for reports to be made
within no more than 72 hours is appropriate given TSA's assessment of
the operational impact of a cybersecurity incident on a State's mDL
issuance infrastructure. In addition, the 72-hour requirement is
consistent with the timeframe required for the rulemaking by CISA under
the Cyber Incident Reporting for Critical Infrastructure Act of
2022.\86\ The 72-hour reporting requirement supports the policy
objective of regulatory harmonization, to the greatest extent possible.
---------------------------------------------------------------------------
\86\ Public Law 117-103, Div. Y (2022) (as codified at 6 U.S.C.
681-681g).
---------------------------------------------------------------------------
In light of the comments, TSA also seeks to provide greater clarity
regarding the types of incidents that must be reported, and the
mechanics of reporting. Accordingly, this final rule makes several
clarifying edits to Appendix A, paragraph 8.6. First, the final rule
modifies the requirement for reporting ``a significant cyber incident
or breach'' to ``any reportable cybersecurity incident, as defined in
the TSA Cybersecurity Lexicon available at www.tsa.gov.'' This
modification provides greater certainty and assurance regarding events
that would trigger reporting. Second, the final rule modifies the
requirement for reporting ``within 72 hours'' to ``within no more than
72 hours'' to encourage more timely reporting, as recommended by a
commenter. Third, the final rule modifies the requirement that
regulated entities ``provide written notice to TSA'' at the specified
website, to requiring that ``[r]eports must be made as directed'' at
that website, which clarifies that the website will include information
concerning the format or content of the report. Finally, the final rule
adds a provision that reports may contain SSI, and if so, would be
subject to requirements of 49 CFR part 1520. TSA made similar edits to
a requirement concerning Federal agency reporting, Sec. 37.8(d), to
add that reports must be made to TSA ``as directed'' at the specified
website, and that reports may be subject to the requirements of 49 CFR
part 1520 if they contain SSI. The SSI protection provisions were not
proposed in the NPRM and were added in response to public comments,
discussed below in Part IV.W., below.
d. Paragraph 4.7: Training for Personnel Performing Certificate Systems
Duties
Comments: A commenter sought clarification on whether training item
2 in paragraph 4.7 of Appendix A, which concerns authentication and
vetting, applies to States that issue certificates to other entities as
described in the CA/Browser Forum Baseline Requirements for the
Issuance and Management of Publicly-Trusted Certificates. The commenter
believes that this training is not applicable because in the mDL
context, States do not issue document signer certificates to anyone
beyond the State.
TSA Response: TSA appreciates the commenter's perspective, but
notes that the training required under Appendix A, paragraph 4.7, is
essential for State personnel in executing their duties regarding
certificate systems. Although it is correct that States do not issue
document signer certificates to other States, States issue document
signer certificates to support their own mDLs, namely, to sign and
establish public trust. In particular, training on authentication and
vetting processes for employees, contractors, and other delegated third
parties is a critical component of a well-developed insider threat
program because each employee will be aware of the processes for
employment and will be aided in identifying potential suspicious
activity.
6. Paragraph 5.4: Hardware Security Modules (HSMs)
Comments: A commenter sought clarification as to whether the term
``dedicated hardware security modules'' in paragraph 5.4 of Appendix A
requires HSMs to be dedicated to root certificate private keys and/or
dedicated only to the issuing State. The commenter also asked whether
this requirement excludes the use of an HSM that physically supports
multiple States, but is partitioned into segments controlled by
individual States.
TSA Response: Under Appendix A, paragraph 5.4, the term
``dedicated'' means that a State must use one HSM solely for IACA root
private key functions and no other functions within the State's
certificate system. TSA clarifies that Appendix A, paragraph 5.6,
requires a State to use a separate HSM for document signer private key
functions, but this HSM does not have to be ``dedicated'' solely to
that function and may be used to support additional functions within
the State's certificate system. TSA further clarifies that Appendix A,
paragraphs 5.4 and 5.6, require ``sole control'' (as defined in Sec.
37.3) of an HSM, which does not permit multiple States to share a
single HSM, but States are permitted to use multi-tenant cloud-based
HSMs, where each tenant-State is separated with logical and physical
controls.
In an effort to further enable the availability of cloud HSMs, TSA
is revising related NPRM Appendix A, paragraphs 5.13 and 5.14, which
are related to Appendix A, paragraphs 5.4 and 5.6. Paragraphs 5.13 and
5.14 set forth requirements to generate IACA root certificate key
pairs, and document signer key pairs, respectively. NPRM Appendix A,
paragraph 5.13 proposed requiring two administrators (hereinafter
``multi-administrator split knowledge key generation'') and one witness
to perform this function, and paragraph 5.14 proposed requiring at
least two administrators. However, TSA understands that although States
have strong competitive procurement options for local HSMs that support
multi-administrator split knowledge key generation, suitable options
for multi-tenant cloud HSMs may not exist for many States. States that
are unable to procure such devices potentially would have been forced
by the NPRM requirement to purchase local HSMs, which are not only
costlier than cloud HSMs, but potentially less secure for States that
lack HSM management capabilities. TSA understands that generally,
security provided by cloud HSM services exceeds the capabilities that
most States can afford to provide for local HSMs. After carefully
considering a number of factors, including potential security and
privacy risks, TSA believes that proposed Appendix A, paragraphs 5.13
and 5.14, imposed unnecessarily restrictive requirements concerning the
minimum personnel required to perform multi-administrator split
knowledge key generation. Accordingly, the final rule declines to adopt
those proposals, and revises the requirement in the proposed Appendix
A, paragraph 5.13, to reduce the number of administrators required to
generate IACA root key pairs from two to one. The final rule similarly
revises the proposed Appendix A, paragraph 5.14, to allow for the
generation of document signer key pairs using one administrator and one
witness as an alternate to using two administrators with split
knowledge key
[[Page 85367]]
generation. TSA believes this reduction in personnel maximizes States'
competitive procurement options, reflects current industry state-of-
the-art, reduces burdens on regulated stakeholders, and does not
compromise security, privacy, or interoperability.
7. Certificate Policies and Practices
Comments: A vendor noted that standard ISO/IEC 18013-5:2021(E)
defines profiles for online certificate status protocol (OCSP) and
certificate revocation list (CRL), but the standard does not mandate
their implementation. The vendor recommended that the rule should
specify which of the methods is required, including implementation
requirements for certificate type. According to the vendor, it is
important to immediately revoke a certificate when the issuing State's
private key shows signs of compromise.
The vendor also recommended that the rule should require States to
maintain a Certificate Practice Statement (CPS), in addition to the
requirement in the NPRM to maintain a certificate policy. A CPS, the
vendor explained, should follow a format specified by standard IETF RFC
3647 format, which covers certificate issuance, revocation, and
renewal.
TSA Response: Although both OCSP and CRL are methods for validating
the revocation status of a certificate, OCSP is out-of-scope for the
IACA root and document signer certificates for mDLs, as that protocol
is not part of a certificate validation process because mDLs must work
in an offline environment. In addition, standard ISO/IEC 18013-
5:2021(E) specifies that CRL is mandatory, not optional, and the
standard fully defines the profiles and implementation requirements.
Section 37.10(a)(2) of this rule requires States to explain the means
used for revocation of their certificate systems in compliance with
applicable requirements of Appendix A. Paragraphs 1, 5, and 8 of the
Appendix set forth requirements applicable to certificate revocation.
As discussed in Part IV.V.1, above, the final rule revised Appendix A,
paragraph 1.1, as proposed in the NPRM, by adding specific provisions
of the cited references with which States must comply. This addition
provides greater clarity to States regarding requirements for a
certificate policy.
Regarding the recommendation to require States to maintain a CPS
following standard IETF RFC 3647,\87\ paragraph 1.1 of Appendix A of
this final rule already specifies that requirement. The provision
requires a State to adopt certificate policies that meet the
requirements in CA/Browser Forum Baseline Requirements for the Issuance
and Management of Publicly[hyphen]Trusted Certificates section 2. In
addition, the provision requires a State to develop a CPS based on
requirements set forth in standard IETF RFC 3647.
---------------------------------------------------------------------------
\87\ Internet Engineering Task Force, Internet X.509 Public Key
Infrastructure Certificate Policy and Certification Practices
Framework, Nov. 2003, www.rfc-editor.org/rfc/rfc3647.html (last
visited July 17, 2024).
---------------------------------------------------------------------------
8. mDL Lifecycle Management
Comments: A commenter recommended that the rule implement
requirements on States to manage the lifecycle of issued mDLs. Examples
of such lifecycle management practices include validity periods,
refresh periods, push-based updates, harmonized expiration dates of mDL
and physical cards, and limitations on the numbers of devices to which
a given mDL can be provisioned.
TSA Response: Because mDL issuance and Federal agency experience
are still in their infancies, together with an absence of standardized
mechanisms to implement certain lifecycle management tasks and minimal
data to support specific requirements, TSA believes it is premature to
prescribe requirements that the commenter recommends. Imposing such
requirements now, while technologies are unsettled and evolving, risks
upsetting this rule's equilibrium between security and privacy on the
one hand, and innovation on the other. TSA also notes that mDL
lifecycle management is addressed in the AAMVA mDL Implementation
Guidelines.
W. Protection of Sensitive Security Information in Waiver Applications
Comments: A commenter sought clarification on procedures for
protecting any SSI that may be included in waiver applications.
TSA Response: TSA has comprehensively re-evaluated the need to
protect SSI that may be included in response to requirements throughout
this rule. TSA believes that SSI protection is warranted not only for
information included in waiver applications, but also in response to
other requirements in this rule (Sec. Sec. 37.9(b)(2), (c), (e)(2),
(e)(4)(ii) & (e)(5)(ii), and Appendix A, paragraph 8.6). Accordingly,
this final rule revises NPRM Sec. 37.9 to add new paragraph (g), which
provides that information provided in response to Sec. Sec. 37.9(a),
(b)(2), (c), (e)(2), (e)(4)(ii), and (e)(5)(ii), and Appendix A,
paragraph 8.6, may contain SSI and therefore must be handled and
protected in accordance with 49 CFR part 1520.
V. Consultation With States and the Department of Transportation
Under section 205 of the REAL ID Act, issuance of REAL ID
regulations must be done in consultation with the Secretary of
Transportation and the States. During the development of this final
rule, DHS and TSA consulted with the Department of Transportation and
other Federal agencies with an interest in this rulemaking via regular
meetings. DHS and TSA also consulted with State officials through
meetings with their representatives to AAMVA.
VI. Regulatory Analyses
A. Economic Impact Analyses
1. Regulatory Impact Analysis Summary
Changes to Federal regulations must undergo several economic
analyses. First, E.O. 12866 (Regulatory Planning and Review),\88\ as
affirmed by E.O. 13563 (Improving Regulation and Regulatory
Review),\89\ and as amended by E.O. 14094 (Modernizing Regulatory
Review),\90\ directs Federal agencies to propose or adopt a regulation
only upon a reasoned determination that the benefits of the intended
regulation justify its costs. Second, the Regulatory Flexibility Act of
1980 (RFA) \91\ requires agencies to consider the economic impact of
regulatory changes on small entities. Third, the Trade Agreement Act of
1979 \92\ prohibits agencies from setting standards that create
unnecessary obstacles to the foreign commerce of the United States.
Fourth, the Unfunded Mandates Reform Act of 1995 \93\ (UMRA) requires
agencies to prepare a written assessment of the costs, benefits, and
other effects of proposed or final rules that include a Federal mandate
likely to result in the expenditure by State, local, or tribal
governments, in the aggregate, or by the private sector, of $100
million or more (adjusted for inflation) in any one year.
---------------------------------------------------------------------------
\88\ 58 FR 51735 (Oct. 4, 1993).
\89\ 76 FR 3821 (Jan. 21, 2011).
\90\ 88 FR 21879 (Apr. 11, 2023).
\91\ Public Law 96-354, 94 Stat. 1164 (Sept. 19, 1980) (codified
at 5 U.S.C. 601 et seq., as amended by the Small Business Regulatory
Enforcement Fairness Act of 1996 (SBREFA)).
\92\ Public Law 96-39, 93 Stat. 144 (July 26, 1979) (codified at
19 U.S.C. 2531-2533).
\93\ Public Law 104-4, 109 Stat. 66 (Mar. 22, 1995) (codified at
2 U.S.C. 1181-1538).
---------------------------------------------------------------------------
2. Assessments Required by E.O. 12866 and E.O. 13563
Executive Order 12866 (Regulatory Planning and Review), as affirmed
by Executive Order 13563 (Improving Regulation and Regulatory Review)
and
[[Page 85368]]
amended by Executive Order 14094 (Modernizing Regulatory Review),
directs agencies to assess the costs and benefits of available
regulatory alternatives and, if regulation is necessary, to select
regulatory approaches that maximize net benefits (including potential
economic, environmental, public health and safety effects, distributive
impacts, and equity). Executive Order 13563 emphasizes the importance
of quantifying costs and benefits, reducing costs, harmonizing rules,
and promoting flexibility.
The OMB has designated this rule a ``significant regulatory
action'' as defined under section 3(f) of E.O. 12866, as amended by
Executive Order 14094. Accordingly, OMB has reviewed this rule.
In conducting these analyses, TSA has made the following
determinations:
(a) While TSA attempts to quantify costs where available, TSA
primarily discusses the costs and benefits of this rulemaking in
qualitative terms. At present, mDLs are part of an emerging and
evolving industry with an elevated level of uncertainty surrounding
costs and benefits. Nonetheless, TSA anticipates the final rule will
not result in an effect on the economy of $200 million or more in any
year of the analysis. The rulemaking will not adversely affect the
economy, interfere with actions taken or planned by other agencies, or
generally alter the budgetary impact of any entitlements.
(b) In accordance with the RFA, and pursuant to 5 U.S.C. 605(b),
TSA certifies that the rule will not have a significant economic impact
on a substantial number of small entities, including small governmental
jurisdictions. The rule will only directly regulate the 50 States, the
District of Columbia, and the five U.S. territories who voluntarily
participate in the mDL waiver process, who under the RFA are not
considered small entities.
(c) TSA has determined that the final rule imposes no significant
barriers to international trade as defined by the Trade Agreement Act
of 1979; and
(d) TSA has determined that the final rule does not impose an
unfunded mandate on State, local, or tribal governments, such that a
written statement will be required under the UMRA, as its annual effect
on the economy does not exceed the $100 million threshold (adjusted for
inflation) in any year of the analysis.
TSA has prepared an analysis of its estimated costs and benefits,
summarized in the following paragraphs, and in the OMB Circular A-4
Accounting Statement. When estimating the cost of a rulemaking,
agencies typically estimate future expected costs imposed by a
regulation over a period of analysis. For this final rule's period of
analysis, TSA uses a 10-year period of analysis to estimate costs.
This final rule establishes a temporary waiver process that permits
Federal agencies to accept mDLs, on an interim basis, for official
purposes, as defined in the REAL ID Act, when full enforcement of the
REAL ID Act and regulations begins on May 7, 2025. Federal agencies
that opt to accept mDLs for official purposes must also procure an mDL
reader in order to validate the identity of the mDL holder. As part of
the application process for the mDL waiver, States are required to
submit to TSA an application, including supporting data, and other
documentation necessary to establish that their mDLs meet specified
criteria concerning security, privacy, and interoperability. When REAL
ID Act and regulations enforcement begins on May 7, 2025, Federal
agencies will be prohibited from accepting non-compliant driver's
licenses and identification cards, including both physical cards and
mDLs, for official purposes.
In the following paragraph TSA summarizes the estimated costs of
the rule on the affected parties: States, TSA, mDL users, and relying
parties (Federal agencies that voluntarily choose to accept mDLs for
official purposes). TSA has also identified other non-quantified
impacts to affected parties. As Table 2 displays, TSA estimates the 10-
year total cost of the rule to be $829.8 million undiscounted, $698.1
million discounted at 3 percent, and $563.9 million discounted at 7
percent. The total cost to States comprises approximately 98 percent of
the total quantified costs of the rule.
Table 2--Total Cost of the Rule by Entity
[$ Thousands]
--------------------------------------------------------------------------------------------------------------------------------------------------------
States cost TSA cost Relying party Total rule cost
-------------------------------- cost -----------------------------------------------
---------------- d = a + b + c
Year -----------------------------------------------
a b c Discounted at Discounted at
Undiscounted 3% 7%
--------------------------------------------------------------------------------------------------------------------------------------------------------
1....................................................... $42,876 $1,595 $79 $44,551 $43,253 $41,636
2....................................................... 62,791 1,715 919 65,424 61,669 57,144
3....................................................... 71,352 1,209 537 73,098 66,895 59,670
4....................................................... 83,182 1,102 381 84,665 75,224 64,591
5....................................................... 94,460 864 375 95,699 82,551 68,232
6....................................................... 91,467 695 1,160 93,323 78,156 62,185
7....................................................... 91,881 727 742 93,351 75,903 58,134
8....................................................... 91,743 730 558 93,031 73,440 54,145
9....................................................... 91,467 719 531 92,717 71,060 50,432
10...................................................... 91,881 774 1,289 93,944 69,903 47,757
-----------------------------------------------------------------------------------------------
Total................................................. 813,102 10,128 6,573 829,803 698,054 563,925
-----------------------------------------------------------------------------------------------
Annualized............................................ .............. .............. .............. .............. 81,833 80,290
--------------------------------------------------------------------------------------------------------------------------------------------------------
Note: Totals may not add due to rounding.
States incur costs to familiarize themselves with the requirements
of the rule, purchase access to an industry standard, submit their mDL
waiver application, submit an mDL waiver reapplication, and comply with
waiver application criteria requirements. As displayed in Table 3, the
10-year cost to States is $813.1 million undiscounted,
[[Page 85369]]
$683.7 million discounted at 3 percent, and $552.0 million discounted
at 7 percent.
Table 3--Total Cost of the Rule to States
[$ Thousands]
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Familiarization Standards Waiver Reapplication Escalated Infrastructure Total cost to states
cost cost application cost review cost security cost -----------------------------------------------
------------------------------ cost --------------------------------------------- g = a + b + c + d + e + f
Year ---------------- -----------------------------------------------
a b d e f Discounted at Discounted at
c Undiscounted 3% 7%
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
1.................................................... $63.3 $1.9 $592.1 $0 $7.2 $42,212 $42,876 $41,628 $40,071
2.................................................... 0 1.3 394.7 0 12.0 62,383 62,791 59,186 54,844
3.................................................... 0 0.6 197.4 0 14.4 71,140 71,352 65,297 58,244
4.................................................... 0 0.6 197.4 413.9 16.8 82,553 83,182 73,906 63,459
5.................................................... 0 0.6 197.4 275.9 19.2 93,967 94,460 81,482 67,349
6.................................................... 0 0 0 138.0 19.2 91,310 91,467 76,603 60,949
7.................................................... 0 0 0 551.8 19.2 91,310 91,881 74,708 57,219
8.................................................... 0 0 0 413.9 19.2 91,310 91,743 72,423 53,395
9.................................................... 0 0 0 138.0 19.2 91,310 91,467 70,102 49,752
10................................................... 0 0 0 551.8 19.2 91,310 91,881 68,368 46,708
------------------------------------------------------------------------------------------------------------------------------------------
Total.............................................. 63.3 5.0 1,578.9 2,483.2 165.2 808,807 813,102 683,704 551,991
------------------------------------------------------------------------------------------------------------------------------------------
Annualized......................................... ............... ........... .............. .............. ........... .............. .............. 80,151 78,591
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Note: Totals may not add due to rounding.
TSA incurs costs associated with reviewing mDL waiver applications
and mDL waiver renewals, purchasing access to industry standards,
procuring mDL readers, and mDL training. As displayed in Table 4, the
10-year cost to TSA is $0.131 million undiscounted, $8.87 million
discounted at 3 percent, and $7.56 million discounted at 7 percent.
Table 4--Total Cost of the Rule to TSA ($ Thousands)
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Standards Application Reapplication mDL reader mDL training Total cost to TSA
cost review cost review cost cost cost -----------------------------------------------
-------------------------------------------------------------------------------- f = a + b + c + d + e
Year -----------------------------------------------
a b c d e Discounted at Discounted at
Undiscounted 3% 7%
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
1............................................................... $0.4 $74.3 $0 $1,418.8 $101.5 $1,595.0 $1,548.5 $1,490.6
2............................................................... 0 49.5 0 699.8 965.4 1,714.7 1,616.3 1,497.7
3............................................................... 0 24.8 0 547.9 636.2 1,208.9 1,106.4 986.9
4............................................................... 0 24.8 39.9 440.6 596.4 1,101.8 978.9 840.5
5............................................................... 0 24.8 26.6 240.6 571.7 863.7 745.0 615.8
6............................................................... 0 0.0 13.3 199.4 482.0 694.7 581.8 462.9
7............................................................... 0 0.0 53.2 200.9 473.3 727.5 591.5 453.0
8............................................................... 0 0.0 39.9 202.3 487.4 729.7 576.0 424.7
9............................................................... 0 0.0 13.3 203.8 501.4 718.5 550.7 390.8
10.............................................................. 0 0.0 53.2 205.2 515.5 773.9 575.9 393.4
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Total....................................................... 0.4 198.2 239.6 4,359.4 5,330.8 10,128.4 8,870.9 7,556.4
-------------------------------------------------------------------------------------------------------------------------------
Annualized.............................................. .............. .............. .............. .............. .............. .............. 1,039.9 1,075.9
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Note: Totals may not add due to rounding.
Relying parties represent Federal agencies that elect to accept
mDLs for official purposes. Per the final rule, relying parties are
required to use an mDL reader to retrieve and validate mDL data. As a
result, relying parties will incur costs to procure mDL readers should
they voluntarily choose to accept mDLs for official purposes. TSA is
also considered a relying party, but due to the particular impact to
TSA related to the requirement for REAL ID related to boarding
Federally regulated commercial aircraft, those impacts are discussed
separately. As displayed in Table 5, the 10-year cost to relying
parties is $6.58 million undiscounted, $5.48 million discounted at 3
percent, and $4.38 million discounted at 7 percent.
Table 5--Total Cost of the Rule to Relying Parties ($ Thousands)
----------------------------------------------------------------------------------------------------------------
mDL reader Total cost to relying parties
cost -----------------------------------------------
---------------- b = a
79Year -----------------------------------------------
a Discounted at Discounted at
Undiscounted 3% 7%
----------------------------------------------------------------------------------------------------------------
1............................................... $79.3 $79.3 $76.9 $74.1
2............................................... 918.8 918.8 866.0 802.5
[[Page 85370]]
3............................................... 537.4 537.4 491.8 438.7
4............................................... 381.3 381.3 338.8 290.9
5............................................... 375.0 375.0 323.5 267.4
6............................................... 1,160.4 1,160.4 971.9 773.3
7............................................... 741.8 741.8 603.1 461.9
8............................................... 558.3 558.3 440.7 324.9
9............................................... 531.2 531.2 407.1 288.9
10.............................................. 1,289.1 1,289.1 959.2 655.3
---------------------------------------------------------------
Total....................................... 6,572.6 6,572.6 5,479.1 4,377.9
---------------------------------------------------------------
Annualized.............................. .............. .............. 642.3 623.3
----------------------------------------------------------------------------------------------------------------
Note: Totals may not add due to rounding.
TSA has also identified other non-quantified impacts to the
affected entities. States may incur costs to: monitor and study mDL
technology as it evolves; resolve the underlying issues that could lead
to a suspension or termination of an mDL waiver; report serious threats
to security, privacy, or data integrity; report material changes to mDL
issuance processes; remove conflicts of interest with independent
auditor; and request reconsideration of a denied mDL waiver
application. TSA may incur costs to: investigate circumstances that
could lead to suspension or termination of a State's mDL waiver;
provide notice to States, relying parties, and the public related to
mDL waiver suspensions or terminations; develop an information
technology (IT) solution that maintains an up-to-date list of States
with valid mDL waivers; develop materials related to the process
changes to adapt to mDL systems; and resolve a request for
reconsideration of a denied mDL waiver application. mDL users may incur
costs with additional application requirements to obtain an mDL.
Relying parties may incur costs to resolve any security or privacy
issue with the mDL reader; report serious threats to security, privacy,
or data integrity; verifying the list of States with valid mDL waivers;
train personnel to verify mDLs; and update the public on identification
policies.
TSA believes that States implementing an mDL, absent the
rulemaking, would still comply with the AAMVA Guidelines. Many of the
requirements of the waiver application criteria are already contained
within the AAMVA Guidelines. This includes waiver application criteria
concerning: data encryption; authentication; device identification
keys; user identity verification; applicant presentation; REAL ID
compliant physical card; data record; records retention; privacy; and
interoperability. Only the waiver application criteria related to
escalated review and infrastructure security/issuance are not contained
with the AAMVA Guidelines. Operating under the assumption that States
interested in mDLs would comply with the AAMVA Guidelines, TSA assumes
the application criteria that overlap with the AAMVA Guidelines would
otherwise be incurred and thus not included as a cost of the rule.
This final rule establishes waiver application criteria that serves
as interim requirements regarding security, privacy, and
interoperability for those States choosing to issue mDLs that can be
accepted for official purposes. The waiver application criteria may
help guide States in their development of mDL technologies which will
provide a shared standard that could potentially improve efficiency
while also promoting higher security, privacy, and interoperability
safeguards.
The application criteria set requirements establishing security and
privacy protections to safeguard an mDL holder's identity data. They
also set interoperability requirements to ensure secure transactions
with Federal agencies. States, via their mDL waiver application, must
establish that their mDLs meet the application criteria thus helping to
ensure adequate security and privacy protections are in place. Absent
the rule, individual States may choose insufficient security and
privacy safeguards for mDL technologies that fail to meet the intended
security purposes of REAL ID and the privacy needs of users.
An mDL may provide additional security benefits by offering a more
secure verification of an individual's identity and authentication of
an individual's credential compared to physical cards. In general, mDLs
use a cryptographic protocol that ensures the mDL was obtained through
a trusted authority, such as a State's Department of Motor
Vehicles.\94\ This same protocol may prevent the alteration of mDLs and
reduce the threat of counterfeit credentials.\95\ An mDL also offers
increased protection of personal identifiers by preventing over-
collection of information. An mDL may enable the ability to share only
those attributes necessary to validate the user identity with the
relying party.\96\ When using a physical card, the user has no ability
to limit the information that is shared, regardless of the amount of
information required for verification.
---------------------------------------------------------------------------
\94\ Global News Wire, Secure Technology Alliance's Mobile
Driver's License Workshop Showcases mDLs Role in the Future of
Identification, Dec. 14, 2021, https://www.globenewswire.com/en/news-release/2021/12/14/2351757/22743/en/Secure-Technology-Alliance-s-Mobile-Driver-s-License-Workshop-Showcases-mDLs-Role-in-The-Future-of-Identification.html (last visited July 17, 2024).
\95\ Id.
\96\ Biometric Update, Mobile ID can bring both convenience and
citizen privacy, July 15, 2021, https://www.biometricupdate.com/202107/mobile-id-can-bring-both-convenience-and-citizen-privacy
(last visited July 17, 2024).
---------------------------------------------------------------------------
The waiver application criteria can help guide State development
and investment in mDLs. The waiver application criteria will foster a
level of standardization that would potentially reduce complexity by
limiting individual State nuances while also ensuring interoperability
across States and with the Federal Government. This increased
interoperability reduces implementation costs by limiting the need for
different protocols or
[[Page 85371]]
mechanisms to accept mDLs from individual States.
Identification of waiver application criteria that can be used
across States will result in efficiency gains through multiple States
pursuing similar objectives, goals, and solutions. Establishing
application criteria early in the technology development process has
the potential to align development activities across disparate efforts.
Early guidance might also reduce re-work or modifications required in
future regulations thus saving time and resources redesigning systems
and functionality to adhere to subsequent Federal guidelines.
Furthermore, the waiver application criteria may potentially
encourage investment in mDLs and the pooling of resources to develop
mDL technology capabilities across States and address common concerns
or issues. Such collaboration, or unity of effort, can help spread
research and development risk and reduce inefficiencies that may arise
from States working independently. Greater clarity over mDL
regulations, with the rule part of an incremental, multi-phased
rulemaking approach, may spur new entrants (States and technology
companies) into the mDL ecosystem.
The rule allows Federal agencies to continue to accept mDLs for
official purposes when REAL ID enforcement begins. This will avoid the
sudden halting of mDL acceptance when REAL ID enforcement begins which
will reverse trends in providing for a more customer-friendly screening
experience. The experience and insight learned through the mDL waiver
process could also be used to inform future standards and rulemaking.
3. OMB A-4 Statement
The OMB A-4 Accounting Statement presents annualized costs and
qualitative benefits of the rule.
Table 6--OMB A-4 Accounting Statement
[$ Millions, 2022 dollars]
--------------------------------------------------------------------------------------------------------------------------------------------------------
Estimates Units
------------------------------------------------------------------------------------------------
Category Primary Discount rate Notes
estimate Low estimate High estimate Year dollar % Period covered
--------------------------------------------------------------------------------------------------------------------------------------------------------
Benefits:
Annualized Monetized ($ N/A N/A N/A N/A 7 N/A Not quantified.
millions/year).
N/A N/A N/A N/A 3 N/A
Annualized Quantified......... N/A N/A N/A N/A 7 N/A Not quantified.
N/A N/A N/A N/A 3 N/A
---------------------------------------------------------------------------------------------------------------------
Qualitative................... The rule will produce benefits by reducing uncertainty in the mDL technology environment by helping to foster a
minimum level of security, privacy and interoperability, and reduce potential costs through the alignment of
development activities across disparate efforts.
--------------------------------------------------------------------------------------------------------------------------------------------------------
Costs:
Annualized Monetized ($ $80.29 N/A N/A 2022 7 10 years NPRM Regulatory
millions/year). Impact Analysis
(RIA).
$81.83 N/A N/A 2022 3 10 years
Annualized Quantified......... N/A N/A N/A N/A 7 N/A Not quantified.
N/A N/A N/A N/A 3 N/A
---------------------------------------------------------------------------------------------------------------------
Qualitative................... States may incur incremental costs to: monitor and study mDL technology as it evolves; resolve the underlying issues
that could lead to a suspension or termination of an mDL waiver; report serious threats to security, privacy, or
data integrity; report material changes to mDL issuance processes; remove conflicts of interest with an independent
auditor; and request reconsideration of a denied mDL waiver application. TSA may incur costs to: investigate
circumstances that could lead to suspension or termination of a State's mDL waiver; provide notice to States,
relying parties, and the public related to mDL waiver suspensions or terminations; develop an IT solution that
maintains an up-to-date list of States with valid mDL waivers; develop materials related to the process changes to
adapt to mDL systems; and resolve a request for reconsideration of a denied mDL waiver application. An mDL user may
incur costs with additional application requirements to obtain an mDL. Relying parties may incur costs to resolve
any security or privacy issue with the mDL reader; report serious threats to security, privacy, or data integrity;
verifying the list of States with valid mDL waivers; train personnel to verify mDLs; and update the public on
identification policies.
--------------------------------------------------------------------------------------------------------------------------------------------------------
Transfers:
--------------------------------------------------------------------------------------------------------------------------------------------------------
From/To....................... From: N/A To: N/A
--------------------------------------------------------------------------------------------------------------------------------------------------------
States may pass on costs associated with mDLs and the final rule to the public.
--------------------------------------------------------------------------------------------------------------------------------------------------------
Effects On:
State, Local, and/or Tribal
Government: The final rule
will result in States
incurring 552.0 million
discounted at 7 percent.
Small Business: None.......... NPRM
Regulatory
Flexibility
Analysis
(RFA).
Wages: None...................
Growth: Not measured..........
--------------------------------------------------------------------------------------------------------------------------------------------------------
4. Alternatives Considered
In addition to the rule, or the ``preferred alternative,'' TSA also
considered four alternative regulatory options.
The first alternative (Alternative 1) represents the status quo, or
no change relative to the creation of an mDL waiver. This represents a
scenario without a rulemaking or a waiver process to enable mDL
acceptance for official Federal purposes. Under this alternative,
States would continue to develop mDLs in a less structured manner while
waiting for relevant guiding standards to be published which would
likely result in dissimilar
[[Page 85372]]
mDL implementation and technology characteristics. This alternative was
not selected because it does not address the market failures associated
with a lack of common standards, such as increased complexity of mDL
use across States, and may result in larger costs in the long run when
formal mDL standards are finalized.
The second alternative (Alternative 2) features the same
requirements of the rule, including an mDL waiver process, but would
allow Federal agencies to accept mDLs issued by certain States whose
mDLs TSA has deemed to be ``low-risk,'' and therefore presumptively
eligible to be granted a waiver. TSA would identify mDLs from States
who have fulfilled the rule's minimum requirements prior to applying
for the waiver and have sufficiently demonstrated (e.g., via TSA
initiative or recent evaluation by a trusted party) to TSA that their
mDL systems present adequate interoperability and low security and
privacy risk. The presumptive eligibility provision would allow Federal
agencies to immediately (or conditionally) accept those ``low-risk''
mDLs for official purposes pending final approval of the respective
State mDL waiver applications. However, TSA rejects this alternative
because TSA believes the emerging technology underlying mDLs is
insufficiently established to accept the security, privacy, and
interoperability of States' mDL systems without an evaluation by TSA or
another trusted party. In addition, a similar presumptive eligibility
process is not available for other aspects of REAL ID and such an
action would not reduce the burden on States to comply with any
framework TSA develops.
Under the third alternative (Alternative 3), TSA would establish
more comprehensive requirements than those in the rule to ensure mDLs
comply with the REAL ID Act. States would be required to adopt the more
comprehensive requirements to issue valid mDLs that can be accepted for
official purposes. These technical requirements could include specific
standards related to mDL issuance, provisioning, verification, readers,
privacy, and other security measures. TSA rejects this alternative
because promulgating more comprehensive requirements for mDLs is
premature, as both industry standards and technology used by States are
still evolving. Restrictive requirements could stifle innovation by
forcing all stakeholders to pivot toward compliance. This could impede
TSA from identifying and implementing a more efficient regulatory
approach in the future.
Finally, under the fourth alternative (Alternative 4), instead of a
waiver process, TSA would first establish minimum requirements for
issuing REAL ID compliant mDLs before TSA later sets more comprehensive
requirements as additional guidance and standards become available in
the mid- and long-term. The interim minimum requirements would consist
of similar requirements for security, privacy, and interoperability,
based on 19 industry and government standards and guidelines, described
in the rule regarding waiver applications. Alternative 4 effectively
would codify standards that may become obsolete in the near future, as
existing standards are revised, emerging standards publish, and new
cyber threats proliferate. TSA rejects this alternative because
establishing minimum requirements that may become obsolete in the near
future may limit the ability for TSA to revise standards quickly and
would increase the security and privacy risks of accepting mDLs. In
addition, this alternative implies a degree of certainty that TSA
believes is premature given emerging standards that are still in
development. Also, costs under Alternative 4 would roughly be similar
to costs under the rule, as both options would require audits and other
compliance costs.
5. Regulatory Flexibility Act Assessment
The Regulatory Flexibility Act (RFA) of 1980, as amended,\97\ was
enacted by Congress to ensure that small entities (small businesses,
small not-for-profit organizations, and small governmental
jurisdictions) will not be unnecessarily or disproportionately burdened
by Federal regulations. Section 605 of the RFA allows an agency to
certify a rule in lieu of preparing an analysis if the regulations are
not expected to have a significant economic impact on a substantial
number of small entities.
---------------------------------------------------------------------------
\97\ Public Law 96-354, 94 Stat. 1164 (Sept. 19, 1980) (codified
at 5 U.S.C. 601 et seq., as amended by the Small Business Regulatory
Enforcement Fairness Act of 1996 (SBREFA)).
---------------------------------------------------------------------------
In accordance with the RFA, pursuant to 5 U.S.C. 605(b), TSA
certifies that the rule will not have a significant economic impact on
a substantial number of small entities. The rule will directly impact
States that voluntarily choose to apply for a waiver that will permit
mDLs issued by those States to be accepted for official Federal
purposes.
6. International Trade Impact Assessment
The Trade Agreement Act of 1979 prohibits Federal agencies from
establishing any standards or engaging in related activities that
create unnecessary obstacles to the foreign commerce of the United
States. The Trade Agreement Act does not consider legitimate domestic
objectives, such as essential security, as unnecessary obstacles. The
statute also requires that international standards be considered and,
where appropriate, that they be the basis for U.S. standards. TSA has
assessed the potential effect of this rule and has determined this rule
will not have an adverse impact on international trade.
7. Unfunded Mandates Reform Act Assessment
Title II of the Unfunded Mandates Reform Act of 1995 (UMRA), Public
Law 104-4, establishes requirements for Federal agencies to assess the
effects of their regulatory actions on State, local, and tribal
governments and the private sector. Under section 202 of the UMRA, TSA
generally must prepare a written Statement, including a cost-benefit
analysis, for and final rules with ``Federal mandates'' that may result
in expenditures by State, local, and tribal governments in the
aggregate or by the private sector of $100 million or more (adjusted
for inflation) in any one year.
Before TSA promulgates a rule for which a written statement is
required, section 205 of the UMRA generally requires TSA to identify
and consider a reasonable number of regulatory alternatives and adopt
the least costly, most cost-effective, or least burdensome alternative
that achieves the objectives of the rulemaking. The provisions of
section 205 do not apply when they are inconsistent with applicable
law. Moreover, section 205 allows TSA to adopt an alternative other
than the least costly, most cost-effective, or least burdensome
alternative if the final rule provides an explanation why that
alternative was not adopted. Before TSA establishes any regulatory
requirements that may significantly or uniquely affect small
governments, including tribal governments, it must develop under
section 203 of the UMRA a small government agency plan. The plan must
provide for notifying potentially affected small governments, enabling
officials of affected small governments to have meaningful and timely
input in the development of TSA regulatory proposals with significant
Federal intergovernmental mandates, and informing, educating, and
advising small governments on compliance with the regulatory
requirements.
When adjusted for inflation, the threshold for expenditures becomes
$177.1 million in 2022 dollars. TSA has
[[Page 85373]]
determined that this rule does not contain a Federal mandate as it is
voluntary. Furthermore, estimated expenditures for State, local, and
tribal governments do not exceed that amount in the aggregate in any
one year.
B. Paperwork Reduction Act
The Paperwork Reduction Act of 1995 (PRA) (44 U.S.C. 3501 et seq.)
requires that TSA consider the impact of paperwork and other
information collection burdens imposed on the public. Under the
provisions of PRA section 3507(d), TSA must obtain approval from the
Office of Management and Budget (OMB) for each collection of
information it conducts, sponsors, or requires through regulations.
This rule calls for a collection of information under the PRA.
Accordingly, TSA has submitted to OMB for review the information
collections that follow below and is pending approval. See 5 CFR
1320.11(a). TSA has published a separate notice in the Federal Register
soliciting comment on the PRA collection included in this final rule.
As defined in 5 CFR 1320.3(c), ``collection of information'' includes
reporting, recordkeeping, monitoring, posting, labeling, and other
similar actions. This section provides the description of the
information collection and of those who must collect the information as
well as an estimate of the total annual time burden. TSA cannot request
submission of waiver applications under this rule until OMB has
approved the information collection.
The rule establishes a process for States to apply to TSA for a
temporary waiver. Such a request is voluntary but will require the
submission of an mDL waiver application, resubmission of an mDL waiver
application deemed insufficient or denied, and reapplication for an mDL
waiver when the term of the mDL waiver expires. All of these items are
considered new information collections.
TSA uses the current State of mDL implementation to inform its
estimate on how many State entities will request an mDL waiver during
the period of analysis.\98\ All 50 States, the District of Columbia,
and five territories (collectively referred to as ``States'' hereafter)
are eligible to apply for an mDL waiver as discussed in the rule.
However, TSA assumes that not all States will apply for the mDL waiver.
TSA assumes 15 States will apply for an mDL waiver in Year 1 of the
analysis, 10 States in Year 2, and five States in Year 3.\99\
---------------------------------------------------------------------------
\98\ As of December 2023, 10 States currently provide mDLs.
Roughly 18 States have taken steps towards mDL implementation,
including six States participating in the TSA mDL testing without a
current mDL solution.
\99\ Each State would submit one mDL waiver application.
---------------------------------------------------------------------------
Following the State submission of its mDL waiver application, TSA
determines if the application is approved, insufficient, or denied.
States are allowed to amend an insufficient or denied mDL waiver
application and resubmit to TSA review.
TSA assumes that all submissions will initially be deemed
insufficient due to the mDL waiver criteria being new and with mDLs an
emerging technology. Nonetheless, TSA intends to work individually with
interested States to meet the mDL criteria to maximize the likelihood
of receiving a waiver. Based on these assumptions, TSA estimates all
initial mDL waiver applications will be deemed insufficient and that 90
percent of States will resubmit their mDL waiver applications.\100\
---------------------------------------------------------------------------
\100\ DHS assumes that 10 percent of applications deemed
insufficient would no longer pursue an mDL waiver due to the level
of effort involved to become sufficient and wait until the mDL
environment is more fully developed.
---------------------------------------------------------------------------
A State's mDL waivers will be valid for three years. Therefore,
States granted an mDL waiver in Year 1 will need to reapply in Year 4
which is beyond the scope of this particular information collection.
TSA technology subject matter experts estimate that the mDL waiver
application will take, on average, 20 hours to complete. TSA also
estimates that mDL waiver resubmissions will take 25 percent of the
initial mDL waiver application time which equates to 5 hours.\101\
Finally, TSA estimates that mDL waiver reapplications will take 75
percent of the initial mDL waiver application time which equates to 15
hours. \102\
---------------------------------------------------------------------------
\101\ mDL Waiver Resubmission burden = 20 hours [initial mDL
waiver application burden] x 0.25 = 5 hours.
\102\ mDL Waiver Renewal burden = 20 hours [initial mDL waiver
application burden] x (1-0.25) = 15 hours.
---------------------------------------------------------------------------
These hour burden estimates are combined with the number of
collection activities to calculate the total and average time burden
associated with the rule. TSA estimates the rule's total three-year
burden for mDL waiver applications, mDL waiver resubmissions, and mDL
waiver reapplications is 57 responses and 735 hours. TSA estimates an
average yearly burden of 19 responses and 245 hours. Details of the
calculation can be found in Table 7.
Table 7--PRA Information Collection Responses and Burden Hours
--------------------------------------------------------------------------------------------------------------------------------------------------------
Number of responses
---------------------------------------------------------------------------------------
Collection activity Time per Total hours Average annual
Year 1 Year 2 Year 3 Total Average annual response hours
responses responses (hours)
d = a + b + c e = d/3 f g = d * f h = g/3
--------------------------------------------------------------------------------------------------------------------------------------------------------
mDL Waiver Application........... 15.0 10.0 5.0 30.0 10.0 20 600 200
mDL Waiver Resubmission.......... 13.5 9.0 4.5 27.0 9.0 5 135 45
mDL Waiver Reapplication......... 0 0 0 0 0 15 0 0
----------------------------------------------------------------------------------------------------------------------
Total........................ 28.5 19.0 9.5 57.0 19.0 .............. 735 245
--------------------------------------------------------------------------------------------------------------------------------------------------------
[[Page 85374]]
In addition, States will incur costs associated with audits of
their mDL infrastructure. TSA estimates an average cost of $26,974 per
submission. States will incur this cost for the initial mDL waiver
application and mDL waiver reapplication. As there are no
reapplications anticipated for this information collection request, TSA
multiplies the annual average number of mDL waiver applications from
Table 7 above (10) and the audit cost of $26,974 for a total mDL waiver
application cost of $269,742.
C. Federalism (E.O. 13132)
A rule has implications for federalism under E.O. 13132 of August
6, 1999 (Federalism) if it has a substantial direct effect on State or
local governments and would either preempt State law or impose a
substantial direct cost of compliance on them. TSA analyzed this rule
under this order and determined that although this rule affects the
States, it does not preempt State law or impose substantial direct
compliance costs.
This final rule establishes a process for States to request a
temporary waiver that enables Federal agencies to accept mDLs issued by
those States when REAL ID enforcement begins on May 7, 2025. The rule
does not, however, require States to apply for a waiver, and does not
impact States who elect not to do so.
States that elect to apply for a waiver under this rule must submit
an application, supporting data, and other documentation to establish
that its mDLs meet the specified criteria concerning security, privacy,
and interoperability. TSA intends to work with each State a case-by-
case basis to ensure that its mDLs meet the minimum requirements
necessary to obtain a waiver. This rule does not impact the broad
policymaking discretion that States currently exercise regarding other
aspects of driver's license issuance.
DHS recognizes that States seeking a waiver will incur compliance
costs for which Federal funds are generally not available. However, TSA
emphasizes again that this rule does not require States to apply for a
waiver, and TSA is promulgating this rule in response to States'
concerns regarding mDL acceptance when REAL ID enforcement begins. To
minimize States' costs, this rule affords States the maximum possible
discretion consistent with the purposes of the REAL ID Act and
regulations. Although the rule prescribes baseline requirements, it
allows States broad discretion to implement technology decisions,
tailored to each State's unique situation, that meet the requirements.
TSA therefore has determined that the rule is consistent with
Executive Order 13132 and does not have these implications for
federalism.
D. Customer Service (E.O. 14058)
E.O. 14058 of December 13, 2021 (Transforming Federal Customer
Experience and Service Delivery to Rebuild Trust in Government), is
focused on enhancing the of technology ``to modernize Government and
implement services that are simple to use, accessible, equitable,
protective, transparent, and responsive for all people of the United
States.'' The Secretary of Homeland Security has specifically committed
to testing the use of innovative technologies at airport security
checkpoints to reduce passenger wait times. This rule supports this
commitment. Using mDLs to establish identity at airport security
checkpoints is intended to provide the public with increased
convenience, security, privacy, and health benefits from ``contact-
free'' identity verification. In 2022, DHS and TSA began a
collaboration with States and industry to test the use of mDLs issued
by participating States at select TSA airport security checkpoints (see
Part II.B.2., above). As of the date of this final rule, TSA is
currently testing mDLs issued by 11 States (Arizona, California,
Colorado, Georgia, Hawaii, Iowa, Louisiana, Maryland, New York, Ohio,
Utah) at 27 airports.\103\
---------------------------------------------------------------------------
\103\ TSA, Facial Recognition and Digital Identity Solutions,
https://www.tsa.gov/digital-id (last visited July 17, 2024).
---------------------------------------------------------------------------
E. Energy Impact Analysis (E.O. 13211)
TSA analyzed this rule under E.O. 13211 of May 18, 2001 (Actions
Concerning Regulations That Significantly Affected Energy Supply,
Distribution or Use), and determined that it is not a ``significant
energy action'' under that E.O. and is not likely to have a significant
adverse effect on the supply, distribution, or use of energy.
Therefore, this rulemaking does not require a Statement of Energy
Effects.
F. Environmental Analysis
DHS and its components review actions to determine whether the
National Environmental Policy Act \104\ (NEPA) applies to them and, if
so, what degree of analysis is required. DHS Directive 023-01, Rev. 01
(Directive) and Instruction Manual 023-01-001-01,\105\ Rev. 01
(Instruction Manual) establish the procedures that DHS and its
components use to comply with NEPA and the Council on Environmental
Quality (CEQ) regulations \106\ for implementing NEPA. The CEQ
regulations allow Federal agencies to establish in their NEPA
implementing procedures categories of actions (``categorical
exclusions'') which experience has shown normally do not individually
or cumulatively have a significant effect on the human environment and,
therefore, do not require an Environmental Assessment (EA) or
Environmental Impact Statement (EIS).\107\
---------------------------------------------------------------------------
\104\ See Public Law 91-190, 42 U.S.C. 4321- 4347.
\105\ See DHS, Implementing the National Environmental Policy
Act, DHS Directive 023-01, Rev 01 (Oct. 31, 2014), and DHS
Instruction Manual 023-01-001-01, Rev. 01 (Nov. 6, 2014),
https://www.dhs.gov/publication/directive-023-01-rev-01-and-instruction-manual-023-01-001-01-rev-01-and-catex (last visited July
17, 2024).
\106\ 40 CFR parts 1500 through 1508.
\107\ See 40 CFR 1501.4(a).
---------------------------------------------------------------------------
Under DHS NEPA implementing procedures, for an action to be
categorically excluded, it must satisfy each of the following three
conditions: (1) the entire action clearly fits within one or more of
the categorical exclusions; (2) the action is not a piece of a larger
action; and (3) no extraordinary circumstances exist that create the
potential for a significant environmental effect.\108\
---------------------------------------------------------------------------
\108\ See Instruction Manual, section V.B.2 (a-c).
---------------------------------------------------------------------------
As discussed throughout this preamble, this final rule amends
existing REAL ID regulations to add definitions and establish a process
enabling States to apply to TSA for a temporary waiver, which would
allow Federal agencies to accept, for official purposes when REAL ID
enforcement begins in May 2025, mDLs issued by States to whom TSA has
issued a waiver. These requirements interpret or amend an existing
regulation without changing its environmental effect.
TSA therefore has determined that this final rule clearly fits
within by categorical exclusion number A3 in Appendix A of the
Instruction Manual. Categorical exclusion A3 applies to promulgation of
rules, issuance of rulings or interpretations, and the development and
publication of policies, orders, directives, notices, procedures,
manuals, advisory circulars, and other guidance documents of the
following nature: (a) Those of a strictly administrative or procedural
nature; (b) those that implement, without substantive change, statutory
or regulatory requirements; (c) those that implement, without
substantive change, procedures, manuals, and other guidance documents;
(d) those that interpret or amend an existing regulation without
changing its
[[Page 85375]]
environmental effect; (e) technical guidance on safety and security
matters; or (f) guidance for the preparation of security plans.
This final rule is not a piece of a larger action. Under section
V.B(2)(b) of the Instruction Manual, and as informed by the scoping
requirements of 40 CFR 1501.9(e), actions must be considered in the
same review if the actions are connected, meaning that an action may
trigger another action, an action cannot or will not proceed unless
another action is taken, or an action depends on a larger action for
its justification. While TSA anticipates future rulemaking efforts to
further amend REAL ID regulations and create requirements enabling
States to issue REAL ID-compliant mDLs, any subsequent final rule, as
well as this final rule, are each stand-alone regulatory actions. Thus,
this final rule is not connected to any other action for purposes of
the NEPA categorical exclusion analysis.
In accordance with the Instruction Manual's NEPA implementing
procedures, TSA has completed an evaluation of this rule to determine
whether it involves one or more of the ten identified extraordinary
circumstances that present the potential for significant environmental
impacts. TSA concludes from its analysis that no extraordinary
circumstances are present requiring further environmental analysis and
documentation. Therefore, this action is categorically excluded and no
further NEPA analysis is required.
List of Subjects in 6 CFR part 37
Document security, Driver's licenses, Identification cards,
Incorporation by reference, Licensing and registration, Motor vehicle
administrations, Motor vehicle. safety, Motor vehicles, Personally
identifiable information, Physical security, Privacy, Reporting and
recordkeeping requirements, Security measures.
Regulatory Amendments
For the reasons set forth in the preamble, the Department of
Homeland Security amends 6 CFR part 37 to read as follows:
PART 37--REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS
0
1. The authority citation for part 37 continues to read as follows:
Authority: 49 U.S.C. 30301 note; 6 U.S.C. 111, 112.
Subpart A--General
0
2. Amend Sec. 37.3 by adding the definitions for ``Administration'',
``Certificate authority'', ``Certificate management system'',
``Certificate policy'', ``Certificate system'', ``Critical security
event'', ``Delegated third party'', ``Delegated third party system'',
``Denial of service'', ``Digital certificates'', ``Digital
signatures'', ``Distributed denial of service'', ``Execution
environment'', ``Front end system'', ``Hardware security module'',
``High security zone'', ``Identity proofing'', ``Identity
verification'', ``Internal support system'', ``Issuing authority'',
``Issuing authority certificate authority'', ``Issuing system'',
``mDL'', ``Mobile driver's license'', ``Mobile identification card'',
``Multi-Factor authentication'', ``Online certificate status
protocol'', ``Penetration test'', ``Provisioning'', ``Public key
infrastructure'', ``Rich execution environment'', ``Root certificate
authority'', ``Root certificate authority system'', ``Secure element'',
``Secure hardware'', ``Secure key storage device'', ``Secure zone'',
``Security support system'', ``Sole control'', ``State root
certificate'', ``System'', ``Trusted execution environment'', ``Trusted
role'', ``Virtual local area network'', ``Vulnerability'',
``Vulnerability scanning'', and ``Zone'' in alphabetical order to read
as follows:
Sec. 37.3 Definitions.
* * * * *
Administration means management actions performed on Certificate
Systems by a person in a Trusted Role.
* * * * *
Certificate authority means an issuer of digital certificates that
are used to certify the identity of parties in a digital transaction.
Certificate Management System means a system used by a State or
delegated third party to process, approve issuance of, or store digital
certificates or digital certificate status information, including the
database, database server, and storage.
Certificate policy means the set of rules and documents that forms
a State's governance framework in which digital certificates,
certificate systems, and cryptographic keys are created, issued,
managed, and used.
Certificate system means the system used by a State or delegated
third party to provide services related to public key infrastructure
for digital identities.
Critical security event means detection of an event, a set of
circumstances, or anomalous activity that could lead to a circumvention
of a zone's security controls or a compromise of a certificate system's
integrity, including excessive login attempts, attempts to access
prohibited resources, Denial of service or Distributed denial of
service attacks, attacker reconnaissance, excessive traffic at unusual
hours, signs of unauthorized access, system intrusion, or an actual
compromise of component integrity.
* * * * *
Delegated third party means a natural person or legal entity that
is not the state and that operates any part of a certificate system
under the State's legal authority.
Delegated third party system means any part of a certificate system
used by a delegated third party while performing the functions
delegated to it by the State.
Denial of service means the prevention of authorized access to
resources or the delaying of time-critical operations.
* * * * *
Digital certificates identify the parties involved in an electronic
transaction, and contain information necessary to validate Digital
signatures.
* * * * *
Digital signatures are mathematical algorithms used to validate the
authenticity and integrity of a message.
Distributed denial of service means a denial of service attack
where numerous hosts perform the attack.
* * * * *
Execution environment means a place within a device processer where
active application's code is processed.
* * * * *
Front end system means a system with a public IP address, including
a web server, mail server, DNS server, jump host, or authentication
server.
* * * * *
Hardware security module means a physical computing device that
safeguards and manages cryptographic keys and provides cryptographic
processing.
High security zone means a physical location where a State's or
Delegated third party's private key or cryptographic hardware is
located.
* * * * *
Identity proofing refers to a series of steps that the State
executes to prove the identity of a person.
Identity verification is the confirmation that identity data
belongs to its purported holder.
* * * * *
Internal support system means a system which operates on a State's
internal network and communicates with the certificate system to
provide business services related to mDL management.
[[Page 85376]]
Issuing authority means the State that issues a mobile driver's
license or mobile identification card.
Issuing authority certificate authority means a certificate
authority operated by or on behalf of an issuing authority or a State's
root certificate authority.
Issuing system means a system used to sign mDLs, digital
certificates, mobile security objects, or validity status information.
* * * * *
mDL means mobile driver's license and mobile identification cards,
collectively.
Mobile driver's license means a driver's license that is stored on
a mobile electronic device and read electronically.
Mobile identification card means an identification card, issued by
a State, that is stored on a mobile electronic device and read
electronically.
Multi-Factor authentication means an authentication mechanism
consisting of two or more of the following independent categories of
credentials (i.e., factors) to verify the user's identity for a login
or other transaction: something you know (knowledge factor), something
you have (possession factor), and something you are (inherence factor).
* * * * *
Online certificate status protocol means an online protocol used to
determine the status of a digital certificate.
* * * * *
Penetration test means a process that identifies and attempts to
exploit vulnerabilities in systems through the active use of known
attack techniques, including the combination of different types of
exploits, with a goal of breaking through layers of defenses and
reporting on unpatched vulnerabilities and system weaknesses.
* * * * *
Provisioning means the process by which a State transmits and
installs an mDL on an individual's mobile device.
Public key infrastructure means a structure where a certificate
authority uses digital certificates for issuing, renewing, and revoking
digital credentials.
* * * * *
Rich execution environment, also known as a ``normal execution
environment,'' means the area inside a device processor that runs an
operating system.
Root certificate authority means the State certificate authority
whose public encryption key establishes the basis of trust for all
other digital certificates issued by a State.
Root certificate authority system means a system used to create a
State's root certificate or to generate, store, or sign with the
private key associated with a State root certificate.
* * * * *
Secure element means a tamper-resistant secure hardware component
which is used in a device to provide the security, confidentiality, and
multiple application environment required to support various business
models.
Secure hardware means hardware provided on a mobile device for key
management and trusted computation such as a secure element (SE) or
trusted execution environment.
Secure key storage device means a device certified as meeting the
specified FIPS PUB 140-3 Level 2 overall, Level 3 physical, or Common
Criteria (EAL 4+).
Secure zone means an area (physical or logical) protected by
physical and logical controls that appropriately protect the
confidentiality, integrity, and availability of certificate systems.
Security support system means a system used to provide security
support functions, which may include authentication, network boundary
control, audit logging, audit log reduction and analysis, vulnerability
scanning, and intrusion detection (host-based intrusion detection,
network-based intrusion detection).
* * * * *
Sole control means a condition in which logical and physical
controls are in place to ensure the administration of a certificate
system can only be performed by a State or delegated third party.
* * * * *
State root certificate means a public digital certificate of a root
certificate authority operated by or on behalf of a State.
System means one or more pieces of equipment or software that
stores, transforms, or communicates data.
* * * * *
Trusted execution environment means an execution environment that
runs alongside but isolated from a rich execution environment and has
the security capabilities necessary to protect designated applications.
Trusted role means an employee or contractor of a State or
delegated third party who has authorized access to or control over a
secure zone or high security zone.
* * * * *
Virtual local area network means a broadcast domain that is
partitioned and isolated within a network.
Vulnerability means a weakness in an information system, system
security procedures, internal controls, or implementation that could be
exploited or triggered by a threat source.
Vulnerability scanning means a technique used to identify host
attributes and associated vulnerabilities.
Zone means a subset of certificate systems created by the logical
or physical partitioning of systems from other certificate systems.
0
3. Revise Sec. 37.4 to read as follows:
Sec. 37.4 Incorporation by reference.
Certain material is incorporated by reference into this part with
the approval of the Director of the Federal Register under 5 U.S.C.
552(a) and 1 CFR part 51. All approved incorporation by reference (IBR)
material is available for inspection at the Transportation Security
Administration (TSA) and at the National Archives and Records
Administration (NARA). Please contact TSA at Transportation Security
Administration, Attn.: OS/ESVP/REAL ID Program, TSA Mail Stop 6051,
6595 Springfield Center Dr., Springfield, VA 20598-6051, (866) 289-
9673, or visit www.tsa.gov. You may also contact the REAL ID Program
Office at [email protected] or visit www.tsa.gov/REAL-ID/
mDL. For information on the availability of this material at NARA,
visit www.archives.gov/federal-register/cfr/ibr-locations.html or email
[email protected]. The material may also be obtained from the
following sources:
(a) American Association of Motor Vehicle Administrators (AAMVA)
4301 Wilson Boulevard, Suite 400, Arlington, VA 22203; phone: (703)
522-4200; website: www.aamva.org.
(1) 2005 AAMVA Driver's License/Identification Card Design
Specifications, Annex A, section A.7.7.2., March 2005 (AAMVA
Specifications); IBR approved for Sec. 37.17.
(2) Mobile Driver's License (mDL) Implementation Guidelines,
Version 1.2January 2023; IBR approved for Sec. 37.10(a). (Available at
https://aamva.org/getmedia/b801da7b-5584-466c-8aeb-f230cef6dda5/mDL-Implementation-Guidelines-Version-1-2_final.pdf.)
(b) Certification Authority Browser Forum (CA/Browser Forum), 815
Eddy St., San Francisco, CA 94109; phone: (415) 436-9333; email:
[email protected]; website: www.cabforum.org.
(1) Baseline Requirements for the Issuance and Management of
Publicly[hyphen]Trusted Certificates, Version
[[Page 85377]]
1.8.6, December 14, 2022; IBR approved for appendix A to this subpart.
(Available at https://cabforum.org/wp-content/uploads/CA-Browser-Forum-BR-1.8.6.pdf.)
(2) Network and Certificate System Security Requirements, Version
1.7, April 5, 2021; IBR approved for appendix A to this subpart.
(Available at https://cabforum.org/wp-content/uploads/CA-Browser-Forum-Network-Security-Guidelines-v1.7.pdf.)
(c) Cybersecurity and Infrastructure Security Agency, Mail Stop
0380, Department of Homeland Security, 245 Murray Lane, Washington, DC
20528-0380; phone: (888) 282-0870; email: [email protected]; website:
www.cisa.gov.
(1) Federal Government Cybersecurity Incident & Vulnerability
Response Playbooks, November 2021; IBR approved for appendix A to this
subpart. (Available at www.cisa.gov/sites/default/files/publications/Federal_Government_Cybersecurity_Incident_and_Vulnerability_Response_Playbooks_508C.pdf.)
(2) [Reserved]
(d) Department of Homeland Security, 2707 Martin Luther King Jr.
Ave. SE, Washington, DC 20528; phone: (202) 282-8000; website:
www.dhs.gov.
(1) National Cyber Incident Response Plan, December 2016; IBR
approved for appendix A to this subpart. (Available at www.cisa.gov/uscert/sites/default/files/ncirp/National_Cyber_Incident_Response_Plan.pdf.)
(2) [Reserved]
(e) International Civil Aviation Organization (ICAO), ICAO,
Document Sales Unit, 999 University Street, Montreal, Quebec, Canada
H3C 5H7; phone: (514) 954-8219; email: [email protected]; website:
www.icao.int.
(1) ICAO 9303, ``Machine Readable Travel Documents,'' Volume 1,
part 1, Sixth Edition, 2006; IBR approved for Sec. 37.17.
(2) [Reserved]
(f) International Organization for Standardization, Chemin de
Blandonnet 8, CP 401, 1214 Vernier, Geneva, Switzerland; phone: +41 22
749 01 11; email: [email protected]; website: www.iso.org/contact-iso.html. (Also available by contacting ANSI at ANSI, 25 West
43rd Street, 4th Floor, New York, New York 10036 website:
www.ansi.org.)
(1) ISO/IEC 19794-5:2005(E) Information technology--Biometric Data
Interchange Formats--Part 5: Face Image Data, dated June 2005; IBR
approved for Sec. 37.17.
(2) ISO/IEC 15438:2006(E) Information Technology--Automatic
identification and data capture techniques--PDF417 symbology
specification, dated June 2006; IBR approved for Sec. 37.19.
(3) ISO/IEC 18013-5:2021(E), Personal identification--ISO-compliant
driving license--Part 5: Mobile driving license (mDL) application,
First Edition, September 2021; IBR approved for Sec. Sec. 37.8(b);
37.10(a); and appendix A to this subpart.
(g) National Institute of Standards and Technology, 100 Bureau
Drive, Gaithersburg, MD 20899; phone: (301) 975-2000; website:
www.nist.gov.
(1) FIPS PUB 140-3, Federal Information Processing Standard
Publication: Security Requirements for Cryptographic Modules, March 22,
2019; IBR approved for appendix A to this subpart. (Available at
https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.140-3.pdf.)
(2) FIPS PUB 180-4, Federal Information Processing Standard
Publication: Secure Hash Standard (SHS), August 2015; IBR approved for
Sec. 37.10(a). (Available at https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf.)
(3) FIPS PUB 186-5, Federal Information Processing Standard
Publication: Digital Signature Standard (DSS), February 3, 2023; IBR
approved for Sec. 37.10(a). (Available at https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-5.pdf.)
(4) FIPS PUB 197-upd1, Federal Information Processing Standard
Publication: Advanced Encryption Standard (AES), May 9, 2023; IBR
approved for Sec. 37.10(a). (Available at https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf.)
(5) FIPS PUB 198-1, Federal Information Processing Standard
Publication: The Keyed-Hash Message Authentication Code (HMAC), July
2008; IBR approved for Sec. 37.10(a). (Available at https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.198-1.pdf.)
(6) FIPS PUB 202, Federal Information Processing Standard
Publication: SHA-3 Standard: Permutation-Based Hash and Extendable-
Output Functions, August 2015; IBR approved for Sec. 37.10(a).
(Available at https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf.)
(7) NIST SP 800-53 Rev.5, NIST Special Publication: Security and
Privacy Controls for Information Systems and Organizations, Revision 5,
September 2020 (including updates as of December. 10, 2020); IBR
approved for appendix A to this subpart. (Available at https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdf.)
(8) NIST SP 800-57 Part 1 Rev.5, NIST Special Publication:
Recommendation for Key Management: Part 1--General, Revision 5, May
2020; IBR approved for appendix A to this subpart. (Available at
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf.)
(9) NIST SP 800-57 Part 2 Rev.1, NIST Special Publication:
Recommendation for Key Management: Part 2--Best Practices for Key
Management Organization, Revision 1, May 2019; IBR approved for
appendix A to this subpart. (Available at https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt2r1.pdf.)
(10) NIST SP 800-57 Part 3 Rev.1, NIST Recommendation for Key
Management: Part 3: Application-Specific Key Management Guidance,
Revision 1, January 2015; IBR approved for appendix A to this subpart.
(Available at https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57Pt3r1.pdf.)
(11) NIST SP 800-63-3, NIST Special Publication: Digital Identity
Guidelines, June 2017; IBR approved for appendix A to this subpart.
(Available at https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63-3.pdf.)
(12) NIST SP 800-63B, NIST Special Publication: Digital Identity
Guidelines Authentication and Lifecycle Management, June 2017
(including updates as of December. 1, 2017); IBR approved for appendix
A to this subpart. (Available at https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63b.pdf.)
(13) NIST Framework for Improving Critical Infrastructure
Cybersecurity, Version 1.1, April 16, 2018); IBR approved for appendix
A to this subpart. (Available at https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf.)
4. Add Sec. Sec. 37.7 through 37.10 to read as follows:
Sec.
37.7 Temporary waiver for mDLs; State eligibility.
37.8 Requirements for Federal agencies accepting mDLs issued by
States with temporary waiver.
37.9 Applications for temporary waiver for mDLs.
37.10 Application criteria for issuance of temporary waiver for
mDLs; audit report; waiver application guidance.
Sec. 37.7 Temporary waiver for mDLs; State eligibility.
(a) Generally. TSA may issue a temporary certificate of waiver to a
State
[[Page 85378]]
that meets the requirements of Sec. Sec. 37.10(a) and (b).
(b) State eligibility. A State may be eligible for a waiver only
if, after considering all information provided by a State under
Sec. Sec. 37.10(a) and (b), TSA determines that--
(1) The State is in full compliance with all applicable REAL ID
requirements as defined in subpart E of this part; and
(2) Information provided by the State under Sec. Sec. 37.10(a) and
(b) sufficiently demonstrates that the State's mDL provides the
security, privacy, and interoperability necessary for acceptance by
Federal agencies.
Sec. 37.8 Requirements for Federal agencies accepting mDLs issued by
States with temporary waiver.
Notwithstanding Sec. 37.5(b), Federal agencies may accept an mDL
for REAL ID official purposes issued by a State that has a valid
certificate of waiver issued by TSA under Sec. 37.7(a). A Federal
agency that elects to accept mDLs under this section must--
(a) Confirm the State holds a valid certificate of waiver
consistent with Sec. 37.7(a) by verifying that the State appears in a
list of mDLs approved for Federal use, available as provided in Sec.
37.9(b)(1);
(b) Use an mDL reader to retrieve and validate mDL data as required
by standard ISO/IEC 18013-5:2021(E) (incorporated by reference; see
Sec. 37.4);
(c) In accordance with the deadlines set forth in Sec. 37.5,
verify that the data element ``DHS_compliance'' is marked ``F'', as
required by Sec. Sec. 37.10(a)(4)(ii) and (a)(1)(vii); and
(d) Upon discovery that acceptance of a State's mDL is likely to
cause imminent or serious threats to the security, privacy, or data
integrity, the agency's senior official responsible for REAL ID
compliance, or equivalent function, must report such discovery to TSA
as directed at www.tsa.gov/real-id/mDL within 72 hours of such
discovery. Information provided in response to this paragraph may
contain SSI, and if so, must be handled and protected in accordance
with 49 CFR part 1520.
Sec. 37.9 Applications for temporary waiver for mDLs.
(a) Application process. Each State requesting a temporary waiver
must file with TSA a complete application as set forth in Sec. Sec.
37.10(a) and (b). Application filing instructions may be obtained from
TSA at www.tsa.gov/real-id/mDL.
(b) Decisions. TSA will provide written notice via email to States
within 60 calendar days, to the extent practicable, but in no event
longer than 90 calendar days, indicating that TSA has made one of the
following decisions:
(1) Approved. Upon approval of an application for a temporary
waiver, TSA will issue a certificate of waiver to the State, and
publish the State's name in a list of mDLs approved for Federal use at
www.tsa.gov/real-id/mDL.
(2) Insufficient. Upon determination that an application for a
temporary waiver is incomplete or otherwise deficient, TSA will provide
the State an explanation of deficiencies, and an opportunity to address
any deficiencies and submit an amended application. States will have 60
calendar days to respond to the notice, and TSA will respond via email
within 30 calendar days.
(3) Denied. Upon determination that an application for a waiver
fails to meet criteria specified in Sec. Sec. 37.10(a) and (b), TSA
will provide the State specific grounds on which the denial is based,
and provide the State an opportunity to seek reconsideration as
provided in paragraph (c) of this section.
(c) Reconsideration--(1) How to File Request. States will have 90
calendar days to file a request for reconsideration of a denied
application. The State must explain what corrective action it intends
to implement to correct any defects cited in the denial or,
alternatively, explain why the denial is incorrect. Instructions on how
to file a request for reconsideration for denied applications may be
obtained from TSA at www.tsa.gov/real-id/mDL. TSA will notify States of
its final determination within 60 calendar days of receipt of a State's
request for reconsideration.
(2) Final agency action. An adverse decision upon reconsideration
is a final agency action. A State whose request for reconsideration has
been denied may submit a new application at any time following the
process set forth in paragraph (a) of this section.
(d) Terms and conditions. A certificate of waiver will specify--
(1) The effective date of the waiver;
(2) The expiration date of the waiver; and
(3) Any additional terms or conditions as necessary.
(e) Limitations; suspension; termination--(1) Validity period. A
certificate of waiver is valid for a period of 3 years from the date of
issuance.
(2) Reporting requirements. If a State, after it has been granted a
certificate of waiver, makes any significant additions, deletions, or
modifications to its mDL issuance processes, other than routine systems
maintenance and software updates, that differ materially from the
information the State provided in response to Sec. Sec. 37.10(a) and
(b) under which the waiver was granted, the State must provide written
notice of such changes to TSA at www.tsa.gov/real-id/mDL 60 calendar
days before implementing such additions, deletions, or modifications.
If a State is uncertain whether its particular changes require
reporting, the State may contact TSA as directed at www.tsa.gov/real-id/mDL.
(3) Compliance. A State that is issued a certificate of waiver
under this section must comply with all applicable REAL ID requirements
in Sec. 37.51(a), and with all terms and conditions specified in
paragraph (d)(3) of this section.
(4) Suspension. (i) TSA may suspend the validity of a certificate
of waiver for any of the following reasons:
(A) Failure to comply. TSA determines that a State has failed to
comply with paragraph (d)(3) or (e)(2) of this section, or has issued
mDLs in a manner not consistent with the information provided under
Sec. Sec. 37.10(a) or (b); or
(B) Threats to security, privacy, and data integrity. TSA reserves
the right to suspend a certificate of waiver at any time upon discovery
that Federal acceptance of a State's mDL is likely to cause imminent or
serious threats to the security, privacy, or data integrity of any
Federal agency. In such instances, TSA will provide written notice via
email to each affected State as soon as practicable after discovery of
the triggering event, including reasons for suspension, an explanation
of any corrective actions a State must take to resume validity of its
certificate of waiver.
(ii) Before suspending a certificate of waiver under paragraph
(e)(4)(i)(A) of this section, TSA will provide to such State written
notice via email of intent to suspend, including an explanation of
deficiencies and instructions on how the State may cure such
deficiencies. States will have 30 calendar days to respond to the
notice, and TSA will respond via email within 30 calendar days. TSA's
response would include one of the following: withdrawal of the notice,
a request for additional information, or a final suspension.
(iii) If TSA issues a final suspension, TSA will temporarily remove
the State from the list of mDLs approved for Federal acceptance for
official purposes. TSA will continue to work with a State to whom TSA
has issued a final suspension to resume validity of its existing
certificate of waiver. A State that has been issued a final suspension
may seek a new certificate of waiver by submitting a new application
following the process set forth in paragraph (a) of this section.
[[Page 85379]]
(5) Termination. (i) TSA may terminate a certificate of waiver at
an earlier date than specified in paragraph (d)(2) of this section if
TSA determines that a State--
(A) Does not comply with applicable REAL ID requirements in Sec.
37.51(a);
(B) Is committing an egregious violation of requirements specified
under paragraph (d)(3) or (e)(2) of this section that the State is
unwilling to cure; or
(C) Provided false information in support of its waiver
application.
(ii) Before terminating a certificate of waiver, TSA will provide
the State written notice via email of intent to terminate, including
findings on which the intended termination is based, together with a
notice of opportunity to present additional information. States must
respond to the notice within 7 calendar days, and TSA will reply via
email within 30 calendar days. TSA's response would include one of the
following: withdrawal of the notice, a request for additional
information, or a final termination.
(iii) If TSA issues a final termination, TSA will remove the State
from the list of mDLs approved for Federal acceptance for official
purposes. A State whose certificate of waiver has been terminated may
seek a new waiver by submitting a new application following the process
set forth in paragraph (a) of this section.
(6) Reapplication. A State seeking extension of a certificate of
waiver after expiration of its validity period must file a new
application under paragraph (a) of this section.
(f) Effect of status of certificate of waiver. (1) Issuance of a
certificate of waiver is not a determination of compliance with any
other section in this part.
(2) An application for certificate of waiver that TSA has deemed
insufficient or denied, or a certificate of waiver that TSA has deemed
suspended, terminated, or expired, is not a determination of non-
compliance with any other section in this part.
(g) SSI. Information provided in response to paragraphs (a),
(b)(2), (c), (e)(2), (e)(4)(ii), and (e)(5)(ii) of this section may
contain SSI, and if so, must be handled and protected in accordance
with 49 CFR part 1520.
Sec. 37.10 Application criteria for issuance of temporary waiver for
mDLs; audit report; waiver application guidance.
(a) Application criteria. A State requesting a certificate of
waiver must establish in its application that the mDLs for which the
State seeks a waiver are issued with controls sufficient to resist
compromise and fraud attempts, provide privacy protections sufficient
to safeguard an mDL holder's identity data, and provide
interoperability for secure acceptance by Federal agencies under the
terms of a certificate of waiver. To demonstrate compliance with such
requirements, a State must provide information, documents, and/or data
sufficient to explain the means, which includes processes,
methodologies, or policies, that the State has implemented to comply
with requirements in this paragraph (a).
(1) Provisioning. For both remote and in-person provisioning, a
State must explain the means it uses to address or perform the
following--
(i) Data encryption. Securely encrypt mDL data and an mDL holder's
Personally Identifiable Information when such data is transferred
during provisioning, and when stored on the State's system(s) and on
mDL holders' mobile devices.
(ii) Escalated review. Review repeated failed attempts at
provisioning, resolve such failures, and establish criteria to
determine when the State will deny provisioning an mDL to a particular
mDL applicant.
(iii) Authentication. Confirm that an mDL applicant has control
over the mobile device to which an mDL is being provisioned at the time
of provisioning.
(iv) Device identification keys. Confirm that the mDL applicant
possesses the mDL device private key bound to the mDL during
provisioning.
(v) User identity verification. Prevent an individual from falsely
matching with the licensing agency's records, including portrait
images, of other individuals.
(vi) Applicant presentation. Prevent physical and digital
presentation attacks by detecting the liveness of an individual and any
alterations to the individual's appearance during remote and in-person
provisioning.
(vii) DHS_compliance data element. Set the value of data element
``DHS_compliance'', as required by paragraph (a)(4)(ii) of this
section, to correspond to the REAL ID compliance status of the
underlying physical driver's license or identification card that a
State has issued to an mDL holder as follows--
(A) ``F'' if the underlying card is REAL ID-compliant, or as
otherwise required by AAMVA Mobile Driver's License (mDL)
Implementation Guidelines, Section 3.2 (incorporated by reference; see
Sec. 37.4); or
(B) ``N'' if the underlying card is not REAL ID-compliant.
(viii) Data record. Issue mDLs using data, including portrait
image, of an individual that matches corresponding data in the database
of the issuing State's driver's licensing agency for that individual.
(ix) Records retention. Manage mDL records and related records,
consistent with requirements set forth in AAMVA Mobile Driver's License
(mDL) Implementation Guidelines (incorporated by reference; see Sec.
37.4).
(2) Issuance. A State must explain the means it uses to manage the
creation, issuance, use, revocation, and destruction of the State's
certificate systems and keys in full compliance with the requirements
set forth in appendix A to this subpart.
(3) Privacy. A State must explain the means it uses to protect
Personally Identifiable Information during processing, storage, and
destruction of mDL records and provisioning records.
(4) Interoperability. A State must explain the means it uses to
issue mDLs that are interoperable with ISO/IEC 18013-5:2021(E) and the
``AAMVA mDL data element set'' defined in the AAMVA Mobile Driver's
License (mDL) Implementation Guidelines (incorporated by reference; see
Sec. 37.4) as follows:
(i) A State must issue mDLs using the data model defined in ISO/IEC
18103-5:2021(E) section 7 (incorporated by reference; see Sec. 37.4),
using the document type ``org.iso.18013.5.1.mDL'', and using the name
space ``org.iso.18013.5.1''. States must include the following mDL data
elements defined as mandatory in ISO/IEC 18103-5:2021(E) Table 5:
``family_name'', ``given_name'', ``birth_date'', ``issue_date'',
``expiry_date'', ``issuing_authority'', ``document_number'',
``portrait'', and must include the following mDL data elements defined
as optional in Table 5: ``sex'', ``resident_address'',
``portrait_capture_date'', ``signature_usual_mark''.
(ii) States must use the AAMVA mDL data element set defined in
AAMVA Mobile Driver's License (mDL) Implementation Guidelines, Section
3.2 (incorporated by reference; see Sec. 37.4), using the namespace
``org.iso.18013.5.1.aamva'' and must include the following data
elements in accordance with the AAMVA mDL Implementation Guidelines:
``DHS_compliance'', and ``DHS_temporary_lawful_status''.
(iii) States must use only encryption algorithms, secure hashing
algorithms, and digital signing algorithms as defined by ISO/IEC 18103-
5:2021(E), section 9 and Annex B (incorporated by reference; see Sec.
37.4), and which are included in the following NIST Federal Information
Processing Standards (FIPS): NIST FIPS PUB 180-4, NIST
[[Page 85380]]
FIPS PUB 186-5, NIST FIPS PUB 197-upd1, NIST FIPS PUB 198-1, and NIST
FIPS PUB 202 (incorporated by reference; see Sec. 37.4).
(b) Audit report. States must include with their applications a
report of an audit that verifies the information provided under
paragraph (a) of this section.
(1) The audit must be conducted by a recognized independent entity,
which may be an entity that is employed or contracted by a State and
independent of the State's driver's licensing agency,--
(i) Holding an active Certified Public Accountant license in the
issuing State;
(ii) Experienced with information systems security audits;
(iii) Accredited by the issuing State; and
(iv) Holding a current and active American Institute of Certified
Public Accountants (AICPA) Certified Information Technology
Professional (CITP) credential or ISACA (F/K/A Information Systems
Audit and Control Association) Certified Information System Auditor
(CISA) certification.
(2) States must include information about the entity conducting the
audit that identifies--
(i) Any potential conflicts of interest; and
(ii) Mitigation measures or other divestiture actions taken to
avoid conflicts of interest.
(c) Waiver application guidance--(1) Generally. TSA will publish
``Mobile Driver's License Waiver Application Guidance'' to facilitate
States' understanding of the requirements set forth in paragraph (a) of
this section. The non-binding Guidance will include recommendations and
examples of possible implementations for illustrative purposes only.
TSA will publish the Guidance on the REAL ID website at www.tsa.gov/real-id/mDL.
(2) Updates. TSA may periodically update its Waiver Application
Guidance as necessary to provide additional information or
recommendations to mitigate evolving threats to security, privacy, or
data integrity. TSA will publish a notification in the Federal Register
advising that updated Guidance is available, and TSA will publish the
updated Guidance at www.tsa.gov/real-id/mDL and provide a copy to all
States that have applied for or been issued a certificate or waiver.
0
5. Add appendix A to subpart A to read as follows:
Appendix A to Subpart A of Part 37--Mobile Driver's License Issuance
Infrastructure Requirements
A State that issues mDLs for acceptance by Federal agencies for
official purposes as specified in the REAL ID Act must implement the
requirements set forth in this appendix A in full compliance with
the cited references. All references identified in this appendix A
are incorporated by reference, see Sec. 37.4. If a State utilizes
the services of a delegated third party, the State must ensure the
delegated third party complies with all applicable requirements of
this appendix A for the services provided.
------------------------------------------------------------------------
Paragraph Requirement
------------------------------------------------------------------------
1: Certificate Authority Certificate Life-Cycle Policy
------------------------------------------------------------------------
1.1.......................... Maintain a certificate policy, which
forms the State's certificate system
governance framework. If certificate
systems are managed at a facility not
controlled by the State, the State must
require any delegated third party to
comply with the State's certificate
policy. These requirements must be
implemented in full compliance with the
following references:
CA/Browser Forum Baseline
Requirements for the Issuance and
Management of Publicly-Trusted
Certificates, Sections 2, 4.3, 4.9,
5, 6, as applicable;
ISO/IEC 18013-5:2021(E),
Annex B;
CA/Browser Forum Network and
Certificate System Security
Requirements;
NIST SP 800-57 Part 1, Rev.
5, Sections 3, 5, 6, 7, 8;
NIST SP 800-57 Part 2, Rev.
1;
NIST SP 800-57 Part 3, Rev.
1, Sections 2, 3, 4, 8, 9;
NIST 800-53 Rev. 5, AC-1, AT-
1, AU-1, CA-1, CM-1, CP-1, IA-1, IR-
1, MA-1, MP-1, PE-1, PL-1, PL-2, PL-
8, PL-10, PM-1, PS-1, PT-1, RA-1, SA-
1, SC-1, SI-1, and SR-1.
1.2.......................... Perform management and maintenance
processes which includes baseline
configurations, documentation, approval,
and review of changes to certificate
systems, issuing systems, certificate
management systems, security support
systems, and front end and internal
support systems. These requirements must
be implemented in full compliance with
the following references:
CA/Browser Forum Network and
Certificate System Security
Requirements;
NIST Framework for Improving
Critical Infrastructure Cybersecurity
PR.IP-3; and
NIST SP 800-53 Rev. 5, CM-1,
CM-2, CM-3, CM-4, CM-5, CM-6, CM-8,
CM-9, CM-10, CM-11, CM-12, MA-2, MA-
3, MA-4, MA-5, MA-6, PE-16, PE-17, PE-
18, PL-10, PL-11, RA-7, SA-2, SA-3,
SA-4, SA-5, SA-8, SA-9, SA-10, SA-11,
SA-15, SA-17, SA-22, SC-18, SI-6, SI-
7, SR-2, SR-5.
1.3.......................... Apply recommended security patches, to
certificate systems within six months of
the security patch's availability,
unless the State documents that the
security patch would introduce
additional vulnerabilities or
instabilities that outweigh the benefits
of applying the security patch. These
requirements must be implemented in full
compliance with the following
references:
CA/Browser Forum Network and
Certificate System Security
Requirements;
NIST Framework for Improving
Critical Infrastructure Cybersecurity
ID.RA-1, PR.IP-12; and
NIST SP 800-53 Rev. 5, SI-2,
SI-3.
------------------------------------------------------------------------
2: Certificate Authority Access Management
------------------------------------------------------------------------
2.1.......................... Grant administration access to
certificate systems only to persons
acting in trusted roles, and require
their accountability for the certificate
system's security, in full compliance
with the following references:
CA/Browser Forum Network and
Certificate System Security
Requirements;
NIST Framework for Improving
Critical Infrastructure Cybersecurity
PR.AC-4; and
NIST SP 800-53 Rev. 5, AC-1,
AC-2, AC-3, AC-5, AC-6, AC-8, AC-21,
AC-22, AC-24, CA-6, PS-6.
2.2.......................... Change authentication keys and passwords
for any trusted role account on a
certificate system whenever a person's
authorization to administratively access
that account on the certificate system
is changed or revoked, in full
compliance with the following
references:
CA/Browser Forum Network and
Certificate System Security
Requirements;
NIST Framework for Improving
Critical Infrastructure Cybersecurity
PR.AC-1; and
NIST SP 800-53 Rev. 5, AC-1,
AC-2, AC-3, AC-6, IA-1, IA-2, PS-4,
PS-5.
[[Page 85381]]
2.3.......................... Follow a documented procedure for
appointing individuals to trusted roles
and assigning responsibilities to them,
in full compliance with the following
references:
CA/Browser Forum Network and
Certificate System Security
Requirements;
NIST Framework for Improving
Critical Infrastructure Cybersecurity
PR.AC-1; and
NIST SP 800-53 Rev. 5, AC-1,
AC-2, AC-3, AC-5, AC-6, IA-1, IA-2.
2.4.......................... Document the responsibilities and tasks
assigned to trusted roles and implement
``separation of duties'' for such
trusted roles based on the security-
related concerns of the functions to be
performed, in full compliance with the
following references:
CA/Browser Forum Network and
Certificate System Security
Requirements;
NIST Framework for Improving
Critical Infrastructure
Cybersecurity--PR.AC-4; and
NIST SP 800-53 Rev. 5, AC-1,
AC-2, AC-5, AC-6, MP-2, PS-9.
2.5.......................... Restrict access to secure zones and high
security zones to only individuals
assigned to trusted roles, in full
compliance with the following
references:
CA/Browser Forum Network and
Certificate System Security
Requirements;
NIST Framework for Improving
Critical Infrastructure Cybersecurity
PR.AC; and
NIST SP 800-53 Rev. 5, AC-1,
AC-2, AC-3, AC-5, AC-6, MP-2, PS-1,
PS-6.
2.6.......................... Restrict individuals assigned to trusted
roles from acting beyond the scope of
such role when performing administrative
tasks assigned to that role, in full
compliance with the following
references:
CA/Browser Forum Network and
Certificate System Security
Requirements;
NIST Framework for Improving
Critical Infrastructure Cybersecurity
PR.AC-1, PR.AC-4, PR.AC-6, PR.AT-2;
and
NIST SP 800-53 Rev. 5, AT-2,
AT-3, PM-13, PM-14.
2.7.......................... Require employees and contractors to
observe the principle of ``least
privilege'' when accessing or
configuring access privileges on
certificate systems, in full compliance
with the following references:
CA/Browser Forum Network and
Certificate System Security
Requirements;
NIST Framework for Improving
Critical Infrastructure Cybersecurity
PR.AC-4, PR.AC-2; and
NIST SP 800-53 Rev. 5, AC-1,
AC-2, AC-3, AC-5, AC-6, PE-1, PE-3,
PL-4.
2.8.......................... Require that individuals assigned to
trusted roles use a unique credential
created by or assigned to them in order
to authenticate to certificate systems,
in full compliance with the following
references:
CA/Browser Forum Network and
Certificate System Security
Requirements;
NIST Framework for Improving
Critical Infrastructure Cybersecurity
PR.AC-1, PR.AC-6, PR.AC-4, PR.AC-7;
and
NIST SP 800-53 Rev. 5, AC-1,
IA-1, IA-2, IA-3, IA-5, IA-8, IA-12.
2.9.......................... Lockout account access to certificate
systems after a maximum of five failed
access attempts, provided that this
security measure:
1. Is supported by the certificate
system;
2. Cannot be leveraged for a denial-of-
service attack; and
3. Does not weaken the security of
this authentication control.
These requirements must be implemented in
full compliance with the following
references:
CA/Browser Forum Network and
Certificate System Security
Requirements;
NIST Framework for Improving
Critical Infrastructure Cybersecurity
PR.AC-7; and
NIST SP 800-53 Rev. 5, AC-7.
2.10......................... Implement controls that disable all
privileged access of an individual to
certificate systems within 4 hours of
termination of the individual's
employment or contracting relationship
with the State or Delegated Third Party,
in full compliance with the following
references:
CA/Browser Forum Network and
Certificate System Security
Requirements;
NIST Framework for Improving
Critical Infrastructure Cybersecurity
PR.AC-7; and
NIST SP 800-53 Rev. 5, AC-1,
AC-2, PS-1, PS-4, PS-7.
2.11......................... Implement multi-factor authentication or
multi-party authentication for
administrator access to issuing systems
and certificate management systems, in
full compliance with the following
references:
CA/Browser Forum Network and
Certificate System Security
Requirements;
NIST Framework for Improving
Critical Infrastructure Cybersecurity-
PR.AC-6, PR.AC-7; and
NIST SP 800-53 Rev. 5, AC-14,
IA-1, IA-2, IA-3, IA-5, IA-8, IA-11.
2.12......................... Implement multi-factor authentication for
all trusted role accounts on certificate
systems, including those approving the
issuance of a Certificate and delegated
third parties, that are accessible from
outside a secure zone or high security
zone, in full compliance with the
following references:
CA/Browser Forum Network and
Certificate System Security
Requirements;
NIST Framework for Improving
Critical Infrastructure Cybersecurity
PR.AC-7; and
NIST SP 800-53 Rev. 5, AC-17,
AC-18, AC-19, AC-20, IA-1, IA-2, IA-
3, IA-4, IA-5, IA-6, IA-8.
2.13......................... If multi-factor authentication is used,
implement only multi-factor
authentication that achieves an
Authenticator Assurance Level equivalent
to AAL2 or higher, in full compliance
with the following references:
NIST SP 800-63-3, Sections
4.3, 6.2;
NIST SP 800-63B, Section 4.2;
NIST Framework for Improving
Critical Infrastructure Cybersecurity
PR.AC-7; and
NIST SP 800-53 Rev. 5, IA-5,
IA-7.
2.14......................... If multi-factor authentication is not
possible, implement a password policy
for trusted role accounts in full
compliance with NIST SP 800-63B, Section
5.1.1.2, Memorized Secret Verifiers, and
implement supplementary risk controls
based on a system risk assessment.
2.15......................... Require trusted roles to log out of or
lock workstations when no longer in use,
in full compliance with the following
references:
CA/Browser Forum Network and
Certificate System Security
Requirements; and
NIST SP 800-53 Rev. 5, AC-11,
AC-12.
2.16......................... Configure workstations with inactivity
time-outs that log the user off or lock
the workstation after a set time of
inactivity without input from the user.
A workstation may remain active and
unattended if the workstation is
otherwise secured and running
administrative tasks that would be
interrupted by an inactivity time-out or
system lock. These requirements must be
implemented in full compliance with the
following references:
CA/Browser Forum Network and
Certificate System Security
Requirements; and
NIST SP 800-53 Rev. 5, AC-11,
AC-12.
[[Page 85382]]
2.17......................... Review all system accounts at least every
three months and deactivate any accounts
that are no longer necessary for
operations, in full compliance with the
following references:
CA/Browser Forum Network and
Certificate System Security
Requirements;
NIST Framework for Improving
Critical Infrastructure Cybersecurity
PR.AC-1; and
NIST SP 800-53 Rev. 5, AC-2.
2.18......................... Restrict remote administration or access
to a State issuing system, certificate
management system, or security support
system, including access to cloud
environments, except when:
1. The remote connection originates
from a device owned or controlled by
the State or delegated third party;
2. The remote connection is through a
temporary, non-persistent encrypted
channel that is supported by Multi-
Factor Authentication; and
3. The remote connection is made to a
designated intermediary device--
a. located within the State's network
or secured Virtual Local Area Network
(VLAN),
b. secured in accordance with the
requirements of this Appendix, and
c. that mediates the remote connection
to the issuing system.
These Requirements must be implemented in
full compliance with the following
references:
CA/Browser Forum Network and
Certificate System Security
Requirements;
NIST Framework for Improving
Critical Infrastructure Cybersecurity
PR.AC-3, PR.AC-7; and
NIST SP 800-53 Rev. 5, AC-17,
AC-19, AC-20, IA-3, IA-4, IA-6.
------------------------------------------------------------------------
3: Facility, Management, and Operational Controls
------------------------------------------------------------------------
3.1.......................... Restrict physical access authorizations
at facilities where certificate systems
reside, including facilities controlled
by a delegated third party, by:
1. Verifying individual access
authorizations before granting access
to the facility;
2. Controlling ingress and egress to
the facility using appropriate
security controls;
3. Controlling access to areas within
the facility designated as publicly
accessible;
4. Escorting visitors, logging visitor
entrance and exit from facilities,
and limiting visitor activities
within facilities to minimize risks
to certificate systems;
5. Securing physical keys,
combinations, and other physical
access devices;
6. Maintaining an inventory of
physical keys, combinations, and
physical access devices; conduct
review of this inventory at least
annually; and
7. Changing combinations and keys
every three years or when physical
keys are lost, combinations are
compromised, or when individuals
possessing the physical keys or
combinations are transferred or
terminated.
These requirements must be implemented in
full compliance with the following
reference:
NIST SP 800-53 Rev. 5, PE-2,
PE-3, PE-4, PE-5, PE-8.
3.2.......................... Implement controls to protect certificate
system operations and facilities where
certificate systems reside from
environmental damage and/or physical
breaches, including facilities
controlled by a delegated third party,
in full compliance with the following
reference:
NIST SP 800-53 Rev. 5, CP-2,
CP-4, CP-6, CP-7, CP-8, CP-9, CP-10,
PE-2, PE-9, PE-10, PE-11, PE-12, PE-
13, PE-14, PE-15, PE-21.
3.3.......................... If certificate systems are managed at a
facility not controlled by the State,
implement controls to prevent risks to
such facilities presented by foreign
ownership, control, or influence, in
full compliance with the following
reference:
NIST SP 800-53 Rev. 5, SR-2,
SR-3, SR-4, SR-6.
3.4.......................... Implement controls to prevent supply
chain risks for certificate systems
including:
1. Employing acquisition strategies,
tools, and methods to mitigate risks;
2. Establishing agreements and
procedures with entities involved in
the supply chain of certificate
systems;
3. Implementing an inspection and
tamper protection program for
certificate systems components;
4. Developing and implementing
component authenticity policies and
procedures; and
5. Developing and implementing
policies and procedures for the
secure disposal of certificate
systems components.
These requirements must be implemented in
full compliance with the following
reference:
NIST SP 800-53 Rev. 5, SR-5,
SR-8, SR-9, SR-10, SR-11, SR-12.
------------------------------------------------------------------------
4: Personnel Security Controls
------------------------------------------------------------------------
4.1.......................... Implement and disseminate to personnel
with access to certificate systems and
facilities, including facilities
controlled by a delegated third party, a
policy to control insider threat
security risks that:
1. Addresses the purpose, scope,
roles, responsibilities, management
commitment, coordination among State
entities, and compliance;
2. Complies with all applicable laws,
executive orders, directives,
regulations, policies, standards, and
guidelines; and
3. Designates an official in a trusted
role to manage the development,
documentation, and dissemination of
the policy and procedures.
These requirements must be implemented in
full compliance with the following
reference:
NIST SP 800-53 Rev. 5, MA-5,
PS-1, PS-8.
4.2.......................... Assign a risk designation to all
organizational positions with access to
certificate systems and facilities, in
full compliance with the following
reference:
NIST SP 800-53 Rev. 5, PS-2,
PS-9.
4.3.......................... Establish screening criteria for
personnel filling organization positions
with access to certificate system and
facilities, in full compliance with the
following reference:
NIST SP 800-53 Rev. 5, PS-2,
PS-3, SA-21.
4.4.......................... Screen individual personnel in
organizational positions with access to
certificate systems and facilities, in
full compliance with the following
reference:
NIST SP 800-53 Rev. 5, PS-3.
4.5.......................... Upon termination of individual
employment, State or delegated third
party must:
1. Disable system access within 4
hours;
[[Page 85383]]
2. Terminate or revoke any
authenticators and credentials
associated with the individual;
3. Conduct exit interviews that
include--
a. Notifying terminated individuals of
applicable, legally binding post-
employment requirements for the
protection of organizational
information, and
b. Requiring terminated individuals to
sign an acknowledgment of post-
employment requirements as part of
the organizational termination
process;
4. Retrieve all security-related
organizational system-related
property; and
5. Retain access to organizational
information and systems formerly
controlled by terminated individual.
These requirements must be implemented in
full compliance with the following
reference:
NIST SP 800-53 Rev. 5, PS-4.
4.6.......................... Review and update personnel security
policy, procedures, and position risk
designations at least once every 12
months, in full compliance with the
following reference:
NIST SP 800-53 Rev. 5, PS-1,
PS-2.
4.7.......................... Provide training to all personnel
performing certificate system duties, on
the following topics:
1. Fundamental principles of Public
Key Infrastructure;
2. Authentication and vetting policies
and procedures, including the State's
certificate policy;
3. Common threats to certificate
system processes, including phishing
and other social engineering tactics;
4. Role specific technical functions
related to the administration of
certificate systems; and
5. The requirements of this Appendix.
These requirements must be implemented in
full compliance with the following
references:
CA/Browser Forum Baseline
Requirements for the Issuance and
Management of Publicly-Trusted
Certificates, Section 5.3.3; and
NIST SP 800-53 Rev. 5, CP-3,
IR-2, SA-16.
4.8.......................... Maintain records of training as required
by paragraph 4.7 of this Appendix, in
full compliance with the following
references:
CA/Browser Forum Baseline
Requirements for the Issuance and
Management of Publicly-Trusted
Certificates, Sections 5.3.3, 5.4.1;
and
NIST SP 800-53 Rev. 5, AT-4.
4.9.......................... Implement policies and processes to
prevent any delegated third party
personnel managing certificate systems
at a facility not controlled by a State
from being subject to risks presented by
foreign control or influence, in full
compliance with the following reference:
NIST SP 800-53 Rev. 5, SR-3,
SR-4, SR-6.
------------------------------------------------------------------------
5: Technical Security Controls
------------------------------------------------------------------------
5.1.......................... Segment certificate systems into networks
based on their functional or logical
relationship, such as separate physical
networks or VLANs, in full compliance
with the following references:
CA/Browser Forum Network and
Certificate System Security
Requirements;
NIST Framework for Improving
Critical Infrastructure Cybersecurity
PR.AC-5; and
NIST SP 800-53 Rev. 5, AC-4,
AC-10, CA-3, CA-9, MP-3, MP-4, RA-2,
RA-9, SC-2, SC-3, SC-4, SC-8.
5.2.......................... Apply equivalent security controls to all
systems co-located in the same network
(including VLANs) with a certificate
system, in full compliance with the
following references:
CA/Browser Forum Network and
Certificate System Security
Requirements;
NIST Framework for Improving
Critical Infrastructure Cybersecurity
PR.AC-5; and
NIST SP 800-53 Rev. 5, MP-5,
MP-6, MP-7, RA-2, SC-7, SC-10, SC-39.
5.3.......................... Maintain State root certificate authority
systems in a high security zone and in
an offline state or air-gapped from all
other network operations. If operated in
a cloud environment, State root
certificate authority systems must use a
dedicated VLAN with the sole purpose of
Issuing Authority Certificate Authority
(IACA) root certificate functions and be
in an offline state when not in use for
IACA root certificate functions. These
requirements must be implemented in full
compliance with the following
references:
CA/Browser Forum Network and
Certificate System Security
Requirements; and
NIST SP 800-53 Rev. 5, SC-32.
5.4.......................... Protect IACA root certificate private
keys using dedicated hardware security
modules (HSMs), either managed on-
premises or provided through cloud
platforms, that are under sole control
of the State or delegated third party.
These requirements must be implemented
in full compliance with the following
references:
NIST SP 800-57 Part 1, Rev.
5;
NIST FIPS PUB 140-3; and
NIST SP 800-53 Rev. 5, SC-12,
SC-13.
5.5.......................... Protect certificate systems private keys
using NIST FIPS PUB 140-3 Level 3 or
Level 4 certified HSMs, in full
compliance with the following
references:
NIST FIPS PUB 140-3; and
NIST SP 800-53 Rev. 5, SC-12,
SC-13.
5.6.......................... Protect document signer private keys
using HSMs, either managed on-premises
or provided through cloud platforms,
that are under sole control of the State
or delegated third party. These
requirements must be implemented in full
compliance with the following
references:
NIST SP 800-57 Part 1, Rev.
5;
NIST FIPS PUB 140-3; and
NIST SP 800-53 Rev. 5, SC-12,
SC-13.
5.7.......................... Protect certificate systems document
signer keys using NIST FIPS PUB 140-3
Level 2, Level 3, or Level 4 certified
HSMs, in full compliance with the
following references:
NIST FIPS PUB 140-3; and
NIST SP 800-53 Rev. 5, SC-12,
SC-13.
5.8.......................... Maintain and protect issuing systems,
certificate management systems, and
security support systems in at least a
secure zone, in full compliance with the
following references:
CA/Browser Forum Network and
Certificate System Security
Requirements; and
[[Page 85384]]
NIST SP 800-53 Rev. 5, SC-15,
SC-20, SC-21, SC-22, SC-24, SC-28, SI-
16.
5.9.......................... Implement and configure: security support
systems that protect systems and
communications between systems inside
secure zones and high security zones,
and communications with non-certificate
systems outside those zones (including
those with organizational business units
that do not provide PKI-related
services) and those on public networks.
These requirements must be implemented
in full compliance with the following
references:
CA/Browser Forum Network and
Certificate System Security
Requirements; and
NIST SP 800-53 Rev. 5, SC-15,
SC-20, SC-21, SC-22, SC-24, SC-28, SI-
16.
5.10......................... Configure each network boundary control
(firewall, switch, router, gateway, or
other network control device or system)
with rules that support only the
services, protocols, ports, and
communications that the State has
identified as necessary to its
operations. These requirements must be
implemented in full compliance with the
following references:
CA/Browser Forum Network and
Certificate System Security
Requirements; and
NIST SP 800-53 Rev. 5, AC-4,
SI-3, SI-8, SC-7, SC-10, SC-23, CM-7.
5.11......................... Configure issuing systems, certificate
management systems, security support
systems, and front end and internal
support systems by removing or disabling
all accounts, applications, services,
protocols, and ports that are not used
in the State's or delegated third
party's operations and restricting use
of such systems to only those that are
approved by the State or delegated third
party. These requirements must be
implemented in full compliance with the
following references:
CA/Browser Forum Network and
Certificate System Security
Requirements;
NIST Framework for Improving
Critical Infrastructure Cybersecurity
PR.PT-3; and
NIST SP 800-53 Rev. 5, CM-7.
5.12......................... Implement multi-factor authentication on
each component of the certificate system
that supports multi-factor
authentication, in full compliance with
the following references:
CA/Browser Forum Network and
Certificate System Security
Requirements;
NIST Framework for Improving
Critical Infrastructure Cybersecurity
PR.AC-7; and
NIST SP 800-53 Rev. 5, IA-2.
5.13......................... Generate IACA root certificate key pairs
with a documented and auditable multi-
party key ceremony, performing at least
the following steps:
1. Prepare and follow a key generation
script;
2. Require a qualified person who is
in a trusted role and not a
participant in the key generation to
serve as a live witness of the full
process of generating the IACA root
certificate key pair, or record a
video in lieu of a live witness;
3. Require the qualified witness to
issue a report confirming that the
State followed its key ceremony
during its key and certificate
generation process, and confirming
that controls were used to protect
the integrity and confidentiality of
the key pair;
4. Generate the IACA root certificate
key pair in a physically secured
environment as described in the
State's certificate policy and/or
certification practice statement;
5. Generate the IACA root certificate
key pair using personnel in trusted
roles under the principles of
multiple person control and split
knowledge. IACA root certificate key
pair generation requires a minimum of
two persons, consisting of at least
one key generation ceremony
administrator and one qualified
witness);
6. Log the IACA root certificate key
pair generation activities, sign the
witness report (and video file, if
applicable), with a document signing
key which has been signed by the IACA
root certificate private key, and
include signed files and document
signing public certificate with the
IACA root certificate key pair
generation log files; and
7. Implement controls to confirm that
the IACA root certificate private key
was generated and protected in
conformance with the procedures
described in the State's certificate
policy and/or certification practice
statement and the State's key
generation script. These requirements
must be implemented in full
compliance with the following
reference:
CA/Browser Forum Baseline
Requirements for the Issuance and
Management of Publicly-Trusted
Certificates, Section 6.1.1.1.
5.14......................... Generate document signer key pairs with a
documented and auditable multi-party key
ceremony, performing at least the
following steps:
1. Prepare and follow a key generation
script;
2. Generate the document signer key
pairs in a physically secured
environment as described in the
State's certificate policy and/or
certification practice statement;
3. Generate the document signer key
pairs using only personnel in trusted
roles under the principles of
multiple person control and split
knowledge. document signer key pair
generation requires a, minimum of two
persons, consisting of at least one
key generation ceremony administrator
and at least one qualified witness or
at least two key generation ceremony
administrators when split knowledge
generation is in place;
4. If a witness observes the key
generation, require a qualified
person who is in a trusted role and
not a participant in the key
generation to serve as a live witness
of the full process of generating the
document signer key pair; and
5. Require the qualified witness to
issue a report confirming that the
State followed its key ceremony
during its key and certificate
generation process and confirming
that controls were used to rotect the
integrity and confidentiality of the
key pair;
6. Log the document signer key pairs
generation activities and signed
witness report, if applicable; and
7. Implement controls to confirm that
the document signer private key was
generated and protected in
conformance with the procedures
described in the State's certificate
policy and/or certification practice
statement and the State's key
generation script. These requirements
must be implemented in full
compliance with the following
reference:
CA/Browser Forum Baseline
Requirements for the Issuance and
Management of Publicly-Trusted
Certificates, Section 6.1.1.1.
------------------------------------------------------------------------
6: Threat Detection
------------------------------------------------------------------------
6.1.......................... Implement a System under the control of
State or delegated third party trusted
roles that continuously monitors,
detects, and alerts personnel to any
modification to certificate systems,
issuing systems, certificate management
systems, security support systems, and
front-end/internal-support systems,
unless the modification has been
authorized through a change management
process. The State or delegated third
party must respond to the alert and
initiate a plan of action within at most
24 hours. These requirements must be
implemented in full compliance with the
following references:
CA/Browser Forum Network and
Certificate System Security
Requirements;
[[Page 85385]]
NIST Framework for Improving
Critical Infrastructure Cybersecurity
DE.CM-7; and
NIST SP 800-53 Rev. 5, CA-7,
CM-3, SI-5.
6.2.......................... Identify any certificate systems under
the control of State or delegated third
party trusted roles that are capable of
monitoring and logging system activity,
and enable those systems to log and
continuously monitor the events
specified in paragraph 7 of this
Appendix. These requirements must be
implemented in full compliance with the
following references:
CA/Browser Forum Network and
Certificate System Security
Requirements; and
NIST SP 800-53 Rev. 5, AU-12.
6.3.......................... Monitor the integrity of the logging
processes for application and system
logs using either continuous automated
monitoring and alerting, or human
review, to confirm that logging and log-
integrity functions meet the
requirements set forth in paragraph 7 of
this Appendix. Alternatively, if a human
review is utilized and the system is
online, the process must be performed at
least once every 31 calendar days. These
requirements must be implemented in full
compliance with the following
references:
CA/Browser Forum Network and
Certificate System Security
Requirements; and
NIST SP 800-53 Rev. 5, AU-1,
AU-6, AU-5, AU-9, AU-12.
------------------------------------------------------------------------
7: Logging
------------------------------------------------------------------------
7.1.......................... Log records must include the following
elements:
1. Date and time of record;
2. Identity of the person or non-
person entity making the journal
record; and
3. Description of the record.
These requirements must be implemented in
full compliance with the following
references:
CA/Browser Forum Baseline
Requirements for the Issuance and
Management of Publicly-Trusted
Certificates Section 5.4.1;
NIST Framework for Improving
Critical Infrastructure Cybersecurity
PR.PT-1; and
NIST SP 800-53 Rev. 5, AU-2,
AU-3, AU-8.
7.2.......................... Log at least certificate system and key
lifecycle events for IACA root
certificates, document signer
certificates, and other intermediate
certificates, including:
1. Key generation, backup, storage,
recovery, archival, and destruction;
2. Certificate requests, renewal, and
re-key requests, and revocation;
3. Approval and rejection of
certificate requests;
4. Cryptographic device lifecycle
management events;
5. Generation of Certificate
Revocation Lists and OCSP entries;
6. Introduction of new Certificate
Profiles and retirement of existing
Certificate Profiles;
7. Issuance of certificates; and
8. All verification activities
required in paragraph 2 of this
Appendix and the State's
Certification System Policy.
These requirements must be implemented in
full compliance with the following
references:
CA/Browser Forum Baseline
Requirements for the Issuance and
Management of Publicly-Trusted
Certificates Section 5.4.1;
NIST Framework for Improving
Critical Infrastructure Cybersecurity
PR.PT-1; and
NIST SP 800-53 Rev. 5, AU-1,
AU-2, AU-3, AU-4, AU-7, AU-10, SC-17.
7.3.......................... Log certificate system Security events,
including:
1. Successful and unsuccessful PKI
system access attempts;
2. PKI and security system actions
performed;
3. Security profile changes;
4. Installation, update and removal of
software on a certificate system;
5. System crashes, hardware failures,
and other anomalies;
6. Firewall and router activities; and
7. Entries to and exits from the IACA
facility if managed on-premises.
These requirements must be implemented in
full compliance with the following
references:
CA/Browser Forum Baseline
Requirements for the Issuance and
Management of Publicly-Trusted
Certificates Section 5.4.1; and
NIST SP 800-53 Rev. 5, AU-2,
AU-3, AU-4, AU-7, AU-10, CM-3, PE-6,
SI-11, SI-12.
7.4.......................... Maintain certificate system logs for a
period not less than 36 months, in full
compliance with the following
references:
CA/Browser Forum Baseline
Requirements for the Issuance and
Management of Publicly-Trusted
Certificates Section 5.4.3; and
NIST SP 800-53 Rev. 5, AU-4,
AU-10, AU-11.
7.5.......................... Maintain IACA root certificate and key
lifecycle management event logs for a
period of not less than 24 months after
the destruction of the IACA root
certificate private key, in full
compliance with the following
references:
CA/Browser Forum Baseline
Requirements for the Issuance and
Management of Publicly-Trusted
Certificates Section 5.4.3;
NIST Framework for Improving
Critical Infrastructure Cybersecurity
PR.PT-1; and
NIST SP 800-53 Rev. 5, AU-2,
AU-4, AU-10, AU-11.
------------------------------------------------------------------------
8: Incident Response & Recovery Plan
------------------------------------------------------------------------
8.1.......................... Implement automated mechanisms under the
control of State or delegated third
party trusted roles to process logged
system activity and alert personnel,
using notices provided to multiple
destinations, of possible critical
security events. These requirements must
be implemented in full compliance with
the following references:
CA/Browser Forum Network and
Certificate System Security
Requirements;
DHS National Cyber Incident
Response Plan;
NIST Framework for Improving
Critical Infrastructure Cybersecurity
RS.CO-5, RS.AN-5; and
NIST SP 800-53 Rev. 5, AU-1,
AU-2, AU-6, IR-5, SI-4, SI-5.
[[Page 85386]]
8.2.......................... Require trusted role personnel to follow
up on alerts of possible critical
security events, in full compliance with
the following references:
CA/Browser Forum Network and
Certificate System Security
Requirements;
DHS National Cyber Incident
Response Plan; and
NIST SP 800-53 Rev. 5, AC-5,
AC-6, IR-1, IR-4, IR-7, SI-4, SI-5.
8.3.......................... If continuous automated monitoring and
alerting is utilized, respond to the
alert and initiate a plan of action
within 24 hours, in full compliance with
the following references:
CA/Browser Forum Network and
Certificate System Security
Requirements;
DHS National Cyber Incident
Response Plan; and
NIST SP 800-53 Rev. 5, IR-1,
PM-14, SI-4.
8.4.......................... Implement intrusion detection and
prevention controls under the management
of State or delegated third party
individuals in trusted roles to protect
certificate systems against common
network and system threats, in full
compliance with the following
references:
CA/Browser Forum Network and
Certificate System Security
Requirements;
CISA Federal Government
Cybersecurity Incident &
Vulnerability Response Playbooks;
DHS National Cyber Incident
Response Plan;
NIST Framework for Improving
Critical Infrastructure Cybersecurity
DE.AE-2, DE.AE-3; DE.DP-1; and
NIST SP 800-53 Rev. 5, IR-1,
IR-4, IR-7, IR-8, SI-4, SI-5.
8.5.......................... Document and follow a vulnerability
correction process that addresses the
identification, review, response, and
remediation of vulnerabilities, in full
compliance with the following
references:
CA/Browser Forum Network and
Certificate System Security
Requirements;
CISA Federal Government
Cybersecurity Incident &
Vulnerability Response Playbooks;
DHS National Cyber Incident
Response Plan;
NIST Framework for Improving
Critical Infrastructure Cybersecurity
PR.IP-9; and
NIST SP 800-53 Rev. 5, CA-5,
CP-2, CP-4, CP-6, CP-7, CP-8, CP-9,
CP-10, SI-1, SI-2, SI-10.
8.6.......................... Notify TSA of any reportable
cybersecurity incident, as defined in
the TSA Cybersecurity Lexicon available
at www.tsa.gov, that may compromise the
integrity of the certificate systems
within no more than 72 hours of the
discovery of the incident. Reports must
be made as directed at www.tsa.gov/real-id/mDL id/mDL. These requirements must be
implemented in full compliance with the
following references:
DHS National Cyber Incident
Response Plan; and
NIST SP 800-53 Rev. 5, IR-6.
Information provided in response to this
paragraph may contain SSI, and if so,
must be handled and protected in
accordance with 49 CFR part 1520.
8.7.......................... Undergo a vulnerability scan on public
and private IP addresses identified by
the State or delegated third party as
the State's or delegated third party's
certificate systems at least every three
months, and after performing any
significant system or network changes.
These requirements must be implemented
in full compliance with the following
references:
CA/Browser Forum Network and
Certificate System Security
Requirements;
DHS National Cyber Incident
Response Plan; and
NIST SP 800-53 Rev. 5, CM-1,
CM-4, IR-3, RA-1, RA-5.
8.8.......................... Undergo a penetration test on the State's
and each delegated third party's
certificate systems at least every 12
months, and after performing any
significant infrastructure or
application upgrades or modifications.
These requirements must be implemented
in full compliance with the following
references:
CA/Browser Forum Network and
Certificate System Security
Requirements;
DHS National Cyber Incident
Response Plan;
NIST Framework for Improving
Critical Infrastructure Cybersecurity
PR.IP-7; and
NIST SP 800-53 Rev. 5, CA-2,
CA-8, CM-4, RA-3.
8.9.......................... Record evidence that each vulnerability
scan and penetration test was performed
by a person or entity with the requisite
skills, tools, proficiency, code of
ethics, and independence.
8.10......................... Review State and/or delegated third party
incident response & recovery plan at
least once during every 12 months to
address cybersecurity threats and
vulnerabilities, in full compliance with
the following references:
CA/Browser Forum Network and
Certificate System Security
Requirements;
DHS National Cyber Incident
Response Plan; and
NIST SP 800-53 Rev. 5, CP-2,
IR-1, IR-2, SC-5.
------------------------------------------------------------------------
Dated: October 10, 2024.
David P. Pekoske,
Administrator.
[FR Doc. 2024-23881 Filed 10-24-24; 8:45 am]
BILLING CODE 9110-05-P