🚨 CMMC Phase One started November 10! Here's everything you need to know →

Comparing Replay-Resistant Authentication Methods (MFA, PKI, SRP) and How to Implement Them — NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - IA.L2-3.5.4

Practical guidance to meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 IA.L2-3.5.4 by implementing replay-resistant authentication (MFA, PKI, SRP) with step-by-step examples for small businesses.

April 11, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 control IA.L2-3.5.4 requires organizations to employ replay-resistant authentication for local and network access — in practical terms, this means selecting and implementing authentication methods that prevent an attacker from capturing and reusing credentials or tokens and demonstrating that capability in your compliance artifacts. This post compares three practical approaches (MFA variants, Public Key Infrastructure (PKI), and the Secure Remote Password protocol (SRP)), provides implementation steps, real-world small-business examples, and concrete compliance tips for meeting the control.

What "replay-resistant" means and quick comparison of options

Replay resistance means that an intercepted authentication artifact (password, OTP, token) cannot be reused by an attacker to gain access. Common replay-resistant patterns include challenge-response (mutual or server-side), asymmetric cryptography (certificates), and zero-knowledge/password-verifier protocols (e.g., SRP). High-level comparison: (1) FIDO2/WebAuthn (hardware-backed MFA) and certificate-based auth (PKI) are phishing- and replay-resistant; (2) SRP prevents password exposure and replay even if the server store is stolen because the server stores a verifier not the password; (3) simple TOTP/HOTP is time/window-based and can be replayed within that window and is more susceptible to phishing — suitable only with compensating controls. Map each choice to the IA.L2-3.5.4 requirement by documenting why it prevents replay and how it’s enforced in your environment.

Comparing methods: strengths, limitations, and when to pick each

Multi-factor authentication (MFA) family: hardware-backed U2F/FIDO2 keys (YubiKey, platform authenticators) and WebAuthn are the strongest commercial MFA: they perform cryptographic challenge-response, bind to origin (site), and resist phishing and replay. Push-based MFA (Okta/Azure push) is convenient but vulnerable to social engineering (prompt bombing) and can be less robust for strict replay resistance unless paired with device posture checks. TOTP hardware/software tokens (RFC 6238) work for many small businesses but are only time-window resistant — captured codes can be replayed within the window or phished. PKI (mutual TLS, client certs) uses asymmetric keys; if the private key is protected (smart card, TPM, HSM), replay is extremely difficult. SRP (Secure Remote Password, SRP-6a) is ideal when you need to authenticate users without sending passwords and want to avoid storing plaintext passwords or password-equivalent hashes; it’s useful for custom legacy applications where integrating an IdP or PKI is impractical. Choose based on: application type, user population, device management capability, and cost/complexity.

Implementing PKI (high-level steps and small-business example)

PKI implementation checklist: 1) Define scope (VPN, SSH, web client auth, RDP, Wi‑Fi EAP-TLS). 2) Choose CA model: offline root + issuing CA, or use a managed CA (Azure AD Certificate Services, Entrust, AWS Private CA). 3) Select algorithms: RSA >= 2048 or ECC P-256/P-384; use SHA-2 family. 4) Implement automated enrollment: SCEP/EST or MDM (Intune) for device certs. 5) Protect private keys: require TPM/secure enclave or smartcards; use HSM-backed CA keys. 6) Configure services for mutual auth: OpenVPN/NGINX/Apache with client certificate verification (ssl_client_certificate + ssl_verify_client on), OpenSSH certificate authority (trusted user/host certs), and RDP smart card or certificate-based login. 7) Plan lifecycle: CRL/OCSP, short-lived certs, and automated renewal. Small-business example: a defense subcontractor uses Azure AD + Intune to auto-enroll employee devices with client certs, requires client certs for VPN and SSO, and keeps an offline root CA with an AWS Private CA intermediate for issuance.

Implementing SRP (practical notes and libraries)

SRP (Secure Remote Password) is a zero-knowledge password proof that prevents password transmission and resists replay. Implementation steps: 1) Select SRP-6a implementation (verified libraries: OpenSSL with SRP support historically, Python pysrp, Node secure-remote-password, Java jSRP variants — validate current maintenance and CVEs). 2) On user registration, compute salt and verifier (v = g^x mod N where x = H(salt || password)) and store only salt and verifier. 3) During auth, server sends salt and public value (B); client computes proof (A, M1), server verifies M1 and responds with M2 — both sides derive a shared session key. 4) Enforce rate limiting, account lockout, and logging around SRP handshakes. 5) Consider running SRP inside TLS to protect metadata (recommended for defense-in-depth). Small-business scenario: a vendor with a legacy web app that cannot integrate enterprise IdP deploys SRP-based auth for CUI-accessing modules to avoid storing password-equivalent hashes and demonstrates replay resistance in their compliance evidence. Note: maintain libraries, patch often, and include unit tests for the SRP exchange.

Deployment checklist, compliance evidence, and best practices

Concrete deployment and compliance tips: document architecture diagrams showing where replay-resistant auth is enforced; maintain a policy that maps each system to chosen method (MFA/PKI/SRP) and why; collect configuration evidence: CA cert chain, OCSP/CRL URLs, MDM enrollment logs, IdP conditional access policies, MFA enrollment reports, and SRP server code review. Technical best practices: require TLS 1.2+ or TLS 1.3, prefer ECC keys where supported, use HSMs for CA private keys, implement OCSP stapling, set short certificate lifetimes, enable certificate pinning for client apps, require hardware-backed tokens (FIDO2) for high-risk accounts, and apply brute-force protections. For OAuth/OIDC apps, use PKCE to prevent authorization code replay for public clients. Train staff on phishing recognition and establish documented recovery and on‑boarding flows for lost tokens/certificates to avoid risky fallback (like allowing password-only login without justification).

Risks of not implementing replay-resistant authentication

Failure to implement replay-resistant authentication increases the likelihood of credential replay attacks, phished tokens, lateral movement after initial compromise, and exfiltration of Controlled Unclassified Information (CUI). Real-world consequences include contract loss, mandatory breach notifications, remediation costs, and failure in audit/CMMC assessments. Example incident: an engineer reuses a cloud service account protected only by TOTP and a cloned phone; an attacker replays a captured code and gains persistent access to project repos containing CUI, resulting in lost contracts and mandatory reporting. From a compliance standpoint, lack of documented replay-resistance — and absent evidence such as policy, configuration snapshots, and logs — will lead to findings against IA.L2-3.5.4.

Summary

To satisfy IA.L2-3.5.4, small businesses should adopt replay-resistant authentication tailored to their risk and environment: prioritize FIDO2/WebAuthn or PKI for highest assurance, use SRP for selective legacy use-cases where IdP or PKI isn’t feasible, and avoid relying solely on TOTP or push MFA without compensating controls. Implement with clear documentation, automated certificate/token lifecycle management, hardened cryptography settings (TLS 1.2+/ECC or adequate RSA), logging/monitoring, and recovery procedures. Collect and retain the configuration and operational evidence (policy, enrollment logs, CA artifacts, IdP/MFA reports) to demonstrate compliance in NIST/CMMC assessments.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes