Skip Top Navigation
  • Who We Are

    • Leadership
    • Financials
    • Government Relations
    • Judicial Officer
    • Legal
    • Our History
    • Postal Facts
  • What We're Doing

    • Strategic Planning
    • Current Initiatives
    • Securing The Mail
    • Sustainability
    • Corporate Social Responsibility
    • Government Services
    • Postal Customer Council
    • Service Performance Results
  • Newsroom

    • National News
    • Local News
    • Testimony & Speeches
    • Broadcast Downloads
    • Events Calendar
    • Photo Gallery
    • Service Alerts
  • Careers

    • Career Opportunities
    • Working at USPS
    • How to Apply
    • Profile Login
  • Doing Business with Us

    • Suppliers
    • Licensing
    • Rights & Permissions
    • Auctions
    • Public Key Infrastructure
The image is the profile of an eagle's head adjoining the words United States Postal Service to form the corporate signature, along with the text About
Link to "2-5 Configuration Management" Link to contents for "2 Security Requirements"      Link to "2-7 Incident Response"

2-6 Identification and Authentication

Identification and authentication guidelines are as follows:

  1. Identify system users, processes acting on behalf of users, and devices.
  2. Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational systems.
  3. Use multifactor authentication for local and network access to privileged accounts and for network access to non-privileged accounts.
  4. Employ replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts.
  5. Prevent reuse of identifiers for a defined period.
  6. Disable identifiers after a defined period of inactivity.
  7. Enforce a minimum password complexity and change of characters when passwords are created.
  8. Prohibit password reuse for a specified number of generations.
  9. Allow temporary password use for system logons with an immediate change to a permanent password.
  10. Store and transmit only cryptographically protected passwords.
  11. Obscure feedback of authentication information.



Link to "2-5 Configuration Management" Link to contents for "2 Security Requirements"      Link to "2-7 Incident Response"
  • LEGAL

    • Privacy Policy ›
    • Terms of Use ›
    • FOIA ›
    • No FEAR Act EEO Data ›
  • ON ABOUT.USPS.COM

    • Newsroom ›
    • USPS Service Alerts ›
    • Forms & Publications ›
    • Careers ›
    • Site Index ›
  • ON USPS.COM

    • USPS.com Home ›
    • Buy Stamps & Shop ›
    • Print a Label with Postage ›
    • Customer Service ›
    • Delivering Solutions to the Last Mile ›
  • OTHER USPS SITES

    • Business Customer Gateway ›
    • Postal Inspectors ›
    • Inspector General ›
    • Postal Explorer ›
Copyright© 2023 USPS. All Rights Reserved.