<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Questions about authentication requirements as defined by FIPS 140-2 in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Questions-about-authentication-requirements-as-defined-by-FIPS/m-p/47866#M3314</link>
    <description>&lt;P&gt;&lt;SPAN&gt;I think the following is a good idea.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;gt; In this case it is the proxy account or the group that is being authenticated rather than the individual user account.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you,&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/723530429"&gt;@Baechle&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 13 Oct 2021 08:59:15 GMT</pubDate>
    <dc:creator>Masahiro</dc:creator>
    <dc:date>2021-10-13T08:59:15Z</dc:date>
    <item>
      <title>Questions about authentication requirements as defined by FIPS 140-2</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Questions-about-authentication-requirements-as-defined-by-FIPS/m-p/47713#M3291</link>
      <description>&lt;DIV class="p-rich_text_section"&gt;FIPS 140-2 defines the authentication requirements for cryptographic modules as follows.&lt;/DIV&gt;&lt;DIV class="p-rich_text_section"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;BLOCKQUOTE&gt;Security Level 2 requires, at a minimum,&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;role-based authentication&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;in which a cryptographic module authenticates the authorization of an operator to assume a specific role and perform a corresponding set of services.&lt;/BLOCKQUOTE&gt;&lt;DIV class="p-rich_text_section"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;BLOCKQUOTE&gt;Security Level 3 requires&lt;STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;identity-based authentication&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;mechanisms, enhancing the security provided by the role-based authentication mechanisms specified for Security Level 2.&lt;/BLOCKQUOTE&gt;&lt;DIV class="p-rich_text_section"&gt;The bold parts above are defined as follows.&lt;/DIV&gt;&lt;DIV class="p-rich_text_section"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;BLOCKQUOTE&gt;&lt;STRONG&gt;Role-Based Authentication:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;If role-based authentication mechanisms are supported by a cryptographic module, the module shall require that one or more roles either be implicitly or explicitly selected by the operator and shall authenticate the assumption of the selected role (or set of roles). The cryptographic module is not required to authenticate the individual identity of the operator. The selection of roles and the authentication of the assumption of selected roles may be combined. If a cryptographic module permits an operator to change roles, then the module shall authenticate the assumption of any role that was not previously authenticated.&lt;/BLOCKQUOTE&gt;&lt;DIV class="p-rich_text_section"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;BLOCKQUOTE&gt;&lt;STRONG&gt;Identity-Based Authentication:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;If identity-based authentication mechanisms are supported by a cryptographic module, the module shall require that the operator be individually identified, shall require that one or more roles either be implicitly or explicitly selected by the operator, and shall authenticate the identity of the operator and the authorization of the operator to assume the selected role (or set of roles). The authentication of the identity of the operator, selection of roles, and the authorization of the assumption of the selected roles may be combined. If a cryptographic module permits an operator to change roles, then the module shall verify the authorization of the identified operator to assume any role that was not previously authorized.&lt;/BLOCKQUOTE&gt;&lt;DIV class="p-rich_text_section"&gt;Based on the above, I have questions.&lt;/DIV&gt;&lt;DIV class="p-rich_text_section"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;OL class="p-rich_text_list p-rich_text_list__ordered"&gt;&lt;LI&gt;&lt;P&gt;What is authentication in a cryptographic module? For example, the authentication required to access the management console of a home Wi-Fi router?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;SPAN&gt;At Security Level 2, role-based authentication is required. On the other hand, Security Level 3 requires identity-based authentication, which is a higher level of security than Level 2. It is also stated that identity-based authentication is a security enhancement to Level 2 role-based authentication. Since I understand that only when there is an identity can a role be assigned to it, it seems to me that the requirements for authentication in Level 3 are lower than those in Level 2. What do you think?&lt;/SPAN&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;SPAN&gt;What specific examples can you think of that fall under Security Levels 1 - 4? Would a home Wi-Fi router management console or BitLocker be L1? I couldn't think of L2 or L4.&lt;/SPAN&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:59:50 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Questions-about-authentication-requirements-as-defined-by-FIPS/m-p/47713#M3291</guid>
      <dc:creator>Masahiro</dc:creator>
      <dc:date>2023-10-09T09:59:50Z</dc:date>
    </item>
    <item>
      <title>Re: Questions about authentication requirements as defined by FIPS 140-2</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Questions-about-authentication-requirements-as-defined-by-FIPS/m-p/47715#M3292</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1459503571"&gt;@Masahiro&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;FIPS 140-2 is applicable to HSM (Hardware&amp;nbsp;security module) or&amp;nbsp;TPM (Trusted Platform Module). the module that certified your &lt;SPAN&gt;cryptographic process/storage&lt;/SPAN&gt; device in order to store and process the &lt;SPAN&gt;cryptographic module and&amp;nbsp;crypto keys.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;your 3&amp;nbsp;questions&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;1) a&amp;nbsp;simple example&amp;nbsp;will be use an x.509 client&amp;nbsp;certificate&amp;nbsp;for&amp;nbsp;authentication.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2) Identity base, you can look at this&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://hsm.utimaco.com/solutions/applications/authentication/" target="_blank"&gt;https://hsm.utimaco.com/solutions/applications/authentication/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;3) I have given the examples.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 02 Oct 2021 14:18:25 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Questions-about-authentication-requirements-as-defined-by-FIPS/m-p/47715#M3292</guid>
      <dc:creator>csjohnng</dc:creator>
      <dc:date>2021-10-02T14:18:25Z</dc:date>
    </item>
    <item>
      <title>Re: Questions about authentication requirements as defined by FIPS 140-2</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Questions-about-authentication-requirements-as-defined-by-FIPS/m-p/47720#M3293</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1424597851"&gt;@csjohnng&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you, John.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Did you mean some cryptographic module authenticates operators with X.509 and it is an example of identity-based authentication?&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRIKE&gt;I think that "Strong authentication using Hardware Security Modules", as you gave me as an example, is not an example to authenticate users operating cryptographic modules, but it is an example to authenticate users with hardware security modules. I realize that FIPS 140 requires authenticating users who operate cryptographic modules with role-based or identity-based. Am I misunderstanding?&lt;/STRIKE&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You mean HSM is one of cryptographic module and it authenticates users who operate it, right?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 03 Oct 2021 09:42:00 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Questions-about-authentication-requirements-as-defined-by-FIPS/m-p/47720#M3293</guid>
      <dc:creator>Masahiro</dc:creator>
      <dc:date>2021-10-03T09:42:00Z</dc:date>
    </item>
    <item>
      <title>Re: Questions about authentication requirements as defined by FIPS 140-2</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Questions-about-authentication-requirements-as-defined-by-FIPS/m-p/47723#M3294</link>
      <description>&lt;P&gt;Yes.&lt;/P&gt;&lt;P&gt;x.509 client certification is also a mean of authentication but it's not "strong". Properly you can consider it's something you have&amp;nbsp;&lt;/P&gt;&lt;P&gt;A strong identity base authentication should have ( more than 1)&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;“Something you know”&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;“Something you have”,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;"Something&amp;nbsp;you are"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;and "something you do" as pattern (something you&amp;nbsp;do is a bit new)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Yes, Typical HSM vendor will aim to certify for different level of FIPS 140-2.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Good example is AWS's HSM , not to promote the vendor service but interesting for people to look at, you can find the other HSM vendor like Microsoft,&amp;nbsp;utimaco ,&amp;nbsp;Thales as well&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://aws.amazon.com/blogs/security/aws-key-management-service-now-offers-fips-140-2-validated-cryptographic-modules-enabling-easier-adoption-of-the-service-for-regulated-workloads/" target="_blank"&gt;https://aws.amazon.com/blogs/security/aws-key-management-service-now-offers-fips-140-2-validated-cryptographic-modules-enabling-easier-adoption-of-the-service-for-regulated-workloads/&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://docs.aws.amazon.com/cloudhsm/latest/userguide/fips-validation.html" target="_blank"&gt;https://docs.aws.amazon.com/cloudhsm/latest/userguide/fips-validation.html&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;in the process of searching of the information , I also find AWS is trying to certify FIPS 140-2 end points as well. And this is a bit new to me, interesting.&lt;/P&gt;&lt;P&gt;&lt;A href="https://aws.amazon.com/compliance/fips/" target="_blank"&gt;https://aws.amazon.com/compliance/fips/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 03 Oct 2021 12:29:42 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Questions-about-authentication-requirements-as-defined-by-FIPS/m-p/47723#M3294</guid>
      <dc:creator>csjohnng</dc:creator>
      <dc:date>2021-10-03T12:29:42Z</dc:date>
    </item>
    <item>
      <title>Re: Questions about authentication requirements as defined by FIPS 140-2</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Questions-about-authentication-requirements-as-defined-by-FIPS/m-p/47744#M3295</link>
      <description>&lt;P&gt;Thank your for giving me some references. They made me understand more.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Oct 2021 11:24:50 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Questions-about-authentication-requirements-as-defined-by-FIPS/m-p/47744#M3295</guid>
      <dc:creator>Masahiro</dc:creator>
      <dc:date>2021-10-05T11:24:50Z</dc:date>
    </item>
    <item>
      <title>Re: Questions about authentication requirements as defined by FIPS 140-2</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Questions-about-authentication-requirements-as-defined-by-FIPS/m-p/47748#M3296</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1459503571"&gt;@Masahiro&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No problem. In the process of answering your question, I also learn something new.&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Oct 2021 13:18:21 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Questions-about-authentication-requirements-as-defined-by-FIPS/m-p/47748#M3296</guid>
      <dc:creator>csjohnng</dc:creator>
      <dc:date>2021-10-05T13:18:21Z</dc:date>
    </item>
    <item>
      <title>Re: Questions about authentication requirements as defined by FIPS 140-2</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Questions-about-authentication-requirements-as-defined-by-FIPS/m-p/47817#M3302</link>
      <description>Roles can be set up a few different ways. One of the most popular is through the use of groups, another is through the use of SUDO or other system accounts that a role (group of users) is authorized to act as. In this case it is the proxy account or the group that is being authenticated rather than the individual user account.&lt;BR /&gt;&lt;BR /&gt;Sincerely,&lt;BR /&gt;&lt;BR /&gt;Eric Baechle&lt;BR /&gt;CISSP-ISSEP</description>
      <pubDate>Sun, 10 Oct 2021 15:51:36 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Questions-about-authentication-requirements-as-defined-by-FIPS/m-p/47817#M3302</guid>
      <dc:creator>Baechle</dc:creator>
      <dc:date>2021-10-10T15:51:36Z</dc:date>
    </item>
    <item>
      <title>Re: Questions about authentication requirements as defined by FIPS 140-2</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Questions-about-authentication-requirements-as-defined-by-FIPS/m-p/47866#M3314</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I think the following is a good idea.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;gt; In this case it is the proxy account or the group that is being authenticated rather than the individual user account.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you,&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/723530429"&gt;@Baechle&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Oct 2021 08:59:15 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Questions-about-authentication-requirements-as-defined-by-FIPS/m-p/47866#M3314</guid>
      <dc:creator>Masahiro</dc:creator>
      <dc:date>2021-10-13T08:59:15Z</dc:date>
    </item>
  </channel>
</rss>

