myctrl.tools
Compare

IA-5(17)Presentation Attack Detection For Biometric Authenticators

>Control Description

Employ presentation attack detection mechanisms for biometric-based authentication.

>Supplemental Guidance

Biometric characteristics do not constitute secrets. Such characteristics can be obtained by online web accesses, taking a picture of someone with a camera phone to obtain facial images with or without their knowledge, lifting from objects that someone has touched (e.g., a latent fingerprint), or capturing a high-resolution image (e.g., an iris pattern). Presentation attack detection technologies including liveness detection, can mitigate the risk of these types of attacks by making it difficult to produce artifacts intended to defeat the biometric sensor.

>Related Controls

>Assessment Interview Topics

Questions assessors commonly ask

Process & Governance:

  • What formal policies and procedures govern the implementation of IA-5(17) (Presentation Attack Detection For Biometric Authenticators)?
  • Who are the designated roles responsible for implementing, maintaining, and monitoring IA-5(17)?
  • How frequently is the IA-5(17) policy reviewed and updated, and what triggers policy changes?
  • What governance structure ensures IA-5(17) requirements are consistently applied across all systems?

Technical Implementation:

  • Describe the specific technical mechanisms or controls used to enforce IA-5(17) requirements.
  • What automated tools, systems, or technologies are deployed to implement IA-5(17)?
  • How is IA-5(17) integrated into your system architecture and overall security posture?
  • What configuration settings, parameters, or technical specifications enforce IA-5(17) requirements?

Evidence & Documentation:

  • What documentation demonstrates the complete implementation of IA-5(17)?
  • What audit logs, records, reports, or monitoring data validate IA-5(17) compliance?
  • Can you provide evidence of periodic reviews, assessments, or testing of IA-5(17) effectiveness?
  • What artifacts would you present during a FedRAMP assessment to demonstrate IA-5(17) compliance?

Ask AI

Configure your API key to use AI features.