Authenticator assurance levels
The National Institute of Standards and Technology (NIST) develops technical requirements for US federal agencies implementing identity solutions. NIST SP 800-63B has the technical guidelines for digital authentication implementation, using an authenticator assurance levels (AALs) framework. AALs characterize the authentication strength of a digital identity. You can also learn about authenticator lifecycle management, including revocation.
The standard includes AAL requirements for the following categories:
Permitted authenticator types
Federal Information Processing Standards 140 (FIPS 140) verification level. FIPS 140 requirements are satisfied by FIPS 140-2, or newer revisions.
Man-in-the-middle (MitM) resistance
Verifier-impersonation resistance (phishing resistance)
Records retention policy
NIST AALs in your environment
In general, AAL1 isn't recommended because it accepts password-only solutions, the most easily compromised authentication. For more information, see the blog post, Your Pa$$word doesn't matter.
While NIST doesn't require verifier impersonation (credential phishing) resistance until AAL3, we advise you to address this threat at all levels. You can select authenticators that provide verifier impersonation resistance, such as requiring devices are joined to Azure Active Directory (Azure AD) or hybrid Azure AD. If you're using Office 365, you can use Office 365 Advanced Threat Protection, and its anti-phishing policies.
As you evaluate the needed NIST AAL for your organization, consider whether your entire organization must meet NIST standards. If there are specific user groups and resources that can be segregated, you can apply NIST AAL configurations to those user groups and resources.
We recommend you meet at least AAL2. If necessary, meet AAL3 for business reasons, industry standards, or compliance requirements.
Security controls, privacy controls, records retention policy
From the Joint Authorization Board, Azure and Azure Government have provisional authority to operate (P-ATO) at the NIST SP 800-53 High Impact level. This FedRAMP accreditation authorizes Azure and Azure Government to process highly sensitive data.
Azure and Azure Government certifications satisfy the security controls, privacy controls, and records retention policy requirements for AAL1, AAL2, and AAL3.
The FedRAMP audit of Azure and Azure Government included the information security management system for infrastructure, development, operations, management, and support of in-scope services. When a P-ATO is granted, a cloud service provider requires an authorization (an ATO) from government agencies it works with. Government agencies, or organizations, can use the Azure P-ATO in their security authorization process, and use it as the basis for issuing an agency ATO that meets FedRAMP requirements.
Azure supports multiple services at FedRAMP High Impact. FedRAMP High in the Azure public cloud meets the needs of US government customers, however agencies with more stringent requirements use Azure Government. Azure Government safeguards include heightened personnel screening. In Azure Government, Microsoft lists available Azure public services, up to the FedRAMP High boundary, and services for the current year.
In addition, Microsoft is committed to protecting and managing customer data with clearly stated records retention policies. Microsoft has a large compliance portfolio. To see more, go to Microsoft compliance offerings.