Remote Supervised - Tamperproof, v3.0

The requirements for tamperproof hardware and networks when performing remote supervised identity proofing.

Assessment Steps (2)

1
Physical (Physical)
Does the CSP remote proofing terminal have sufficient physical protections to guard against or detect tampering for the environment in which it is located?
Artifact
Documentation
Provide policies, practices, or existing security audit reports indicating conformance.
2
Network (Network)
Does the CSP remote proofing terminal use mutually authenticated and protected channels for all communication?
Artifact
Documentation
Provide policies, practices, or existing security audit reports indicating conformance.

Conformance Criteria (2)

Physical
The CSP SHALL employ physical tamper detection and resistance features at its Remote proofing terminal appropriate for the environment in which it is located.
Citation
SP800-63A
Section 5.3.3.2 P6
Network
The CSP SHALL ensure that all communications between the Proofing Supervisor and the remote proofing terminal occur over mutually authenticated protected channels.
Citation
SP800-63A
Section 5.3.3.2 P7