Highest assurance multi-factor authentication for Federal Government
In accordance with Homeland Security Presidential Directive 12 (HSPD 12), YubiKeys provide high assurance authentication without compromise to help you go passwordless, and modernize multi-factor authentication and smart card deployments.
Deploy federal compliant, high assurance multi-factor authentication
Government employees and contractors are likely to be targeted by hackers and nation-states, so authentication solutions need to be resistant to phishing and account takeovers, and comply with federal regulations.
The Yubikey is one of only three DoD CIO government approved alternate authenticators that meet DoD’s rigorous cybersecurity requirements. YubiKeys offer the best available security against phishing attacks and account takeovers and are FIPS 140-2 validated to meet the highest authentication assurance level 3 requirements (AAL3) of NIST SP800-63B guidelines. YubiKeys are also WebAuthn, FIDO, FIDO2, DFARS/NIST SP 800-171 and CMMC compliant, and approved for use in DOD Non-Classified and Secret Classified Environments.
Ensure strong security for non PIV/non CAC eligible users
Short term contract workers that aren’t eligible for a Personal Identity Verification (PIV) credential or a Common Access Card (CAC) also require secure access to government services and systems. Some users may even require a token that works by itself without additional smart card hardware or software needs.
The YubiKey FIPS Series is PIV compatible and offers Smart Card, OTP, FIDO authentication methods and is the only hardware authenticator to meet DoD contractor security requirements.
Deploy highest assurance authentication for mobile derived PIV and BYOD/BYOAD
Mobile derived PIV authentication can result in the need for multiple devices and authentication solutions, and in case of BYOD/BYOAD, puts agencies on point to reimburse employees for mobile costs leading to additional expenses.
YubiKeys accommodate derived PIV/CAC requirements, eliminating device-based authentication and minimizing BYOD/BYOAD reimbursement costs. A single security key can be used to securely authenticate users to applications and services across multiple government issued or personal devices such as laptops, desktops, tablets, and mobiles, making it a cost-effective solution.
Modernize authentication for privileged users
New and varied threat vectors put privileged users like key government officials, and security, network and database admins at great risk. The majority of security breaches involve misuse of privileged credentials. This creates ready access to sensitive information like defense plans, budgets, strategic planning docs, PII/PHI which can cripple the government.
YubiKeys bridge legacy MFA to modern protocols such as FIDO2 and WebAuthn. The YubiKey’s hardware design enables the authentication secret to be stored on a separate secure chip built into the YubiKey, so it cannot be copied or stolen. This offers the highest security for authenticating privileged users.
Secure user access to closed/air gap networks
Air gap networks are closed off from the outside, making it difficult to authenticate users using data sent over a network. Passwords aren’t the most secure authentication method, and smart cards need additional readers which can be expensive and add to security concerns of the air gap network.
YubiKeys don’t need any network connectivity, cellular connection or batteries to work. YubiKeys ensure that air gap networks stay secured against breaches by providing a multi-factor authentication solution that works well in network isolated and mobile restricted environments. With a YubiKey, users can be authenticated without transfer of information across a Cross Domain Solution (CDS).
Deliver the best user experience
SMS, one time passwords and mobile authenticators are cumbersome to use and hinder productivity. They are also easily breached via man-in-the-middle phishing attacks. The top two data breach attack vectors today are phishing attacks and stolen credentials (source: Verizon 2019 Data Breach Investigation Report).
YubiKeys offer the best of both worlds – the best available security against phishing attacks and account takeovers, as well as the best user experience. To authenticate, users simply tap/touch their security key. YubiKeys also don’t require batteries, have no breakable screens, don’t need a cellular connection, and are water-resistant and crush-proof.
Meets Federal Government Compliance Requirements
Manufactured securely in the United States using stringent processes and secure supply chain for trustworthy components, Yubico solutions are fully vetted and approved for sale throughout the public sector, both domestically and abroad.
- YubiKeys are:
- FIPS 140-2 certified (Certificate #3517) Overall Level 2, Physical Security Level 3
- Validated to NIST SP 800-63-3 Authenticator Assurance Level (AAL) 3 requirements
- DOD Cybersecurity Maturity Model Certification (CMMC) Level III compliant
- Support for DFARS/NIST SP 800-171
- WebAuthn/FIDO/FIDO2 compliant
- Approved for use in DOD Non-Classified and Secret Classified Environments
- YubiKeys are available for procurement through multiple convenient channels
- Engage with the YubiKey Public Sector team for strategic implementations
- Address: Yubico Inc. 530 Lytton Ave #301, Palo Alto, CA 94301-1541
- Purchase via GSA or SEWP V contract
- RockITek = GSA Contract # 47QTCA19D0085
- Immix = GSA Contract # GS-35F-0511T / SEWP V NNG15SC16B (Category A, Group A) & NNG15SC39B (Category B, Group D)
- DUNS: 046832835
- CAGE Code: 6UUE2
Go Passwordless with Microsoft Accounts with the YubiKey
Go Beyond Passwordless with WebAuthn
Webinar: YubiKey smart card mode for computer login