Under active development Content is continuously updated and improved

IA-2(12)Identification and Authentication (organizational Users) | Acceptance of PIV Credentials

IL4 Mod
IL4 High
IL5
IL6

>Control Description

Accept and electronically verify Personal Identity Verification-compliant credentials.

>DoD Impact Level Requirements

Additional Requirements and Guidance

IA-2 (12) Guidance: Include Common Access Card (CAC), i.e., the DoD technical implementation of PIV/FIPS 201/HSPD-12.

>Discussion

Acceptance of Personal Identity Verification (PIV)-compliant credentials applies to organizations implementing logical access control and physical access control systems. PIV-compliant credentials are those credentials issued by federal agencies that conform to FIPS Publication 201 and supporting guidance documents. The adequacy and reliability of PIV card issuers are authorized using SP 800-79-2.

Acceptance of PIV-compliant credentials includes derived PIV credentials, the use of which is addressed in SP 800-166. The DOD Common Access Card (CAC) is an example of a PIV credential.

>Programmatic Queries

Beta

Related Services

AWS IAM
Certificate Manager
Direct Connect

CLI Commands

Import PIV certificate
aws iam upload-signing-certificate --user-name USERNAME --certificate-body file://piv-cert.pem
List certificates
aws iam list-signing-certificates --user-name USERNAME
Enable PIV-based access
aws iam put-user-policy --user-name USERNAME --policy-name PIV-Login --policy-document file://piv-policy.json

>Assessment Interview Topics

Questions assessors commonly ask

Process & Governance:

  • What formal policies and procedures govern the implementation of IA-2(12) (Acceptance Of Piv Credentials)?
  • Who are the designated roles responsible for implementing, maintaining, and monitoring IA-2(12)?
  • How frequently is the IA-2(12) policy reviewed and updated, and what triggers policy changes?
  • What governance structure ensures IA-2(12) requirements are consistently applied across all systems?

Technical Implementation:

  • Describe the specific technical mechanisms or controls used to enforce IA-2(12) requirements.
  • What automated tools, systems, or technologies are deployed to implement IA-2(12)?
  • How is IA-2(12) integrated into your system architecture and overall security posture?
  • What configuration settings, parameters, or technical specifications enforce IA-2(12) requirements?

Evidence & Documentation:

  • What documentation demonstrates the complete implementation of IA-2(12)?
  • What audit logs, records, reports, or monitoring data validate IA-2(12) compliance?
  • Can you provide evidence of periodic reviews, assessments, or testing of IA-2(12) effectiveness?
  • What artifacts would you present during a FedRAMP assessment to demonstrate IA-2(12) compliance?

Ask AI

Configure your API key to use AI features.