PIV-based PAC systems are considered to be the most secure available due to their use of certificates and the PKI underpinning them. PKI is the infrastructure needed to create, manage, and distribute digital certificates in a manner which provides ongoing confidence in the security and confidentiality of business solutions leveraging the capability.
Separate Keys for Each Token
The increased security of PIV tokens ensures that if one PIV token is compromised, other PIV tokens are not at risk. This increased level of complexity is one of the many reasons PIV tokens are a key component of the most secure PAC systems in the market.
PIV Tokens as MFA for Logical Access
Extends Biometrics
Additional Uses or PIV Tokens
- PACs Access: Physical access to an environment, such as passing through doors, gates, turnstiles, etc.
- LACs Access: Logical access to an IT system, such as logging in to an application or system.
- Digital Signing: Electronic, encrypted stamps of authentication on emails or electronic documents.
- Key Management: Securely storing and controlling important cryptographic keys, allowing encrypted storage on premises or in the cloud.
Replacing Compromised Keys
Proximity tokens express a number that a terminal reads and grants permission to, based upon whether the correct number has been expressed. Devices such as card sniffers can be utilised to capture the number the proximity card is emitting, which can be loaded onto different cards.
Basic smart tokens, which contain a single asymmetric key, express encrypted data to the terminal. This system is more secure than that of the proximity token but is still easy for threat actors to compromise.
A threat actor can capture the data sent from terminal to token and back, which can help in discovering how that data is being encrypted, allowing them to crack the system’s cipher. Once this cipher has been cracked, these actors can access all cards within the batch, as they will often use the same master key.
PIV PAC systems are difficult to compromise. A compromised PIV token can be identified and replaced without having to impact or update other keys in the batch. ‘Jellyfish’, Cogito Group’s comprehensive cybersecurity platform, can be used to either remotely remove the keys on a missing token, or clear and reissue keys on a retrieved token. This prevents organisations who have suffered a compromise from needing to replace their door readers, systems, software, or entire batches of PIV tokens.
Supports Select Individual Guest Access
Traditional access tokens do not leverage PKI to manage their credentials, instead utilising symmetric credentials. Symmetric credentials cannot be shared across organisational boundaries, as this would requiring sharing the credentials used by an organisation’s entire system, leading to a major compromise.
PIV PACs and Jellyfish
- Link PAC systems and LAC systems together.
- Register and provision PACs and LACs simultaneously.
- Adjust LACs access rights when PACs change.
- Adjust PACs access rights when LACs change.
- Deprovision LACs when PACs is deprovisioned.
- Deprovision PACs when LACs is deprovisioned.
- Make provisioning more efficient, using sources such as visitor management systems to give the data, name, and photo required secure provisioning.
- Utilise data to determine where people are located in shared buildings, or where an emergency evacuation has occurred.
- Utilise data in shared accommodation to determine where vacant desks may be available.
- Collaborate with other systems such as WIFI access points to create even more organisational benefits.
Converging PACs and LACs
Converged security management can more easily identify and address the vulnerability issues to actively plug those gaps in security.
Operational Benefits
Converged security eliminates the time-consuming need to manage multiple systems, reduces need for auditing, reduces user administration cycle time, and improves risk management productivity.
Financial Benefits
Consolidation of common technologies yields cost savings in productivity as tasks are automated. Convergence also removes the ongoing costs of multiple systems being actively managed and reduces recovery costs from security incidents.
Compliance Benefits
Converged security systems make reporting simpler, by automatically separating report creation, review and analysis.