Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

White Paper

Best Practices for Privileged User PIV Authentication

Date Published: April 21, 2016

Author(s)

Computer Security Division, Applied Cybersecurity Division,

Abstract

Keywords

Derived PIV Credential; identification; multi-factor authentication; Personal Identity Verification (PIV); PIV Card; privileged access; privileged user; Cybersecurity Strategy and Implementation Plan (CSIP); authentication
Control Families

Access Control; Identification and Authentication; System and Communications Protection;