Multifactor Authentication for E-Commerce

Download the Practice Guide

The NCCoE has released the draft version of NIST Cybersecurity Practice Guide SP 1800-17, Multifactor Authentication for E-Commerce. Use the button below to view this publication in its entirety or scroll down for links to a specific section.

Download PDF »

Current Status

The NCCoE recently released a draft of the NIST Special Publication (SP) 1800-17 Multifactor Authentication for E-Commerce and is requesting your feedback. The project's public comment period will close on October 22, 2018.

For ease of use, the guide is available in volumes:

Or download the complete guide.

Read the two-page fact sheet for a brief overview of this project.

If you have questions or suggestions, please email us at consumer-nccoe@nist.gov. To receive announcements about additional milestones, sign up for our email alerts.

Summary

E-commerce fraud increased by 30 percent in 2017, compared to 2016, as malicious actors shift from using stolen credit card data in stores at the checkout counter to using stolen credit card data for fraudulent online shopping. Because online retailers cannot utilize all of the benefits of improved credit card technology, they should consider implementing stronger authentication to reduce the risk of e-commerce fraud.

In collaboration with stakeholders in the retail sector, the NCCoE published a draft practice guide that explores risk-based scenarios that use multifactor authentication (MFA) to help reduce fraudulent online purchases. In the project’s example implementations, if certain risk elements (contextual data related to the transaction) are exceeded that could indicate an increased likelihood of fraudulent activity during the online shopping session, the purchaser will be prompted to present another distinct authentication factor—something the purchaser has—in addition to the username and password.

The NCCoE’s practice guide to Multifactor Authentication for E-Commerce can help your organization:

  • reduce online fraudulent purchases, including those resulting from the use of credential stuffing to take over accounts
  • show customers that the organization is committed to its security
  • protect your e-commerce systems
    • provide greater situational awareness
    • avoid system-administrator-account takeover through phishing
  • implement the example solutions by using our step-by-step guide

Questions? Comments? Reach us at consumer-nccoe@nist.gov.

Collaborating Vendors

Organizations participating in this project submitted their capabilities in response to an open call in the Federal Register for all sources of relevant security capabilities from academia and industry (vendors and integrators). The following respondents with relevant capabilities or product components (identified as “Technology Partners/Collaborators” herein) signed a Cooperative Research and Development Agreement to collaborate with NIST in a consortium to build this example solution.

RSA logo
Splunk logo
StrongKey logo
TokenOne logo
Yubico logo