🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Migrate from Password-Only to Replay-Resistant Authentication Across Your Network — NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - IA.L2-3.5.4 Migration Plan

Step-by-step migration plan to replace password-only access with replay-resistant authentication (FIDO2, client certificates, EAP-TLS) to meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 IA.L2-3.5.4 requirements.

April 02, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Password-only authentication is the most common root cause of credential compromise in small and mid-sized organizations; migrating to replay-resistant authentication is required by NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 Control IA.L2-3.5.4 and will materially reduce phishing, credential stuffing, and session replay attacks.

Why IA.L2-3.5.4 matters and what “replay-resistant” means

NIST and CMMC use the term "replay-resistant" to require authentication that cannot be successfully captured and reused by an attacker. Practically, that means moving away from single-factor passwords and simple OTP schemes that can be phished or intercepted, and adopting cryptographic, asymmetric, or challenge-response mechanisms such as FIDO2/WebAuthn, certificate-based client authentication (EAP-TLS, mTLS), and properly configured SSO/OIDC flows with PKCE and signed assertions. For compliance, document that you have replaced password-only access paths for network and privileged access with such mechanisms, and provide evidence in your assessment artifacts.

High-level migration plan (phases)

Phase 1 — Discovery & risk classification: inventory all authentication touchpoints (VPN, Wi‑Fi, SSO, Windows logon, SSH, service accounts, APIs). Classify by risk (admin, contractor, CUI access, general user). Identify legacy systems that only accept passwords. Produce a map of where passwords are currently the sole control and the impact of failure.

Phase 2 — Design & selection: choose replay-resistant mechanisms appropriate to each asset class. Small-business practical choices: cloud IdP (Azure AD, Okta, JumpCloud) with FIDO2 passwordless; VPN and Wi‑Fi with RADIUS + EAP-TLS; Windows domain with smart card or Windows Hello for Business (certificate or key-based); SSH with keypairs and/or certificates signed by an internal CA. Prefer public-key (asymmetric) solutions: FIDO2 (U2F/FIDO2 keys, platform authenticators), client TLS certificates (ECC P-256 or RSA 2048+), and PKI-managed SSH certificates.

Technical implementation details and examples

Example 1 — VPN and Wi‑Fi: deploy a RADIUS server (e.g., FreeRADIUS, Microsoft NPS, or cloud RADIUS) that enforces EAP-TLS and integrates with your CA. Issue client certificates via automated enrollment (SCEP/EST or ADCS enrollment) tied to user and device identity. Configure the VPN (OpenVPN, ASA, FortiGate, Palo Alto GlobalProtect) to require certificate authentication; disable password fallbacks. Ensure CA keys are protected (HSM or secure key storage), use 2048+ RSA or ECC P-256, and set short certificate validity (1 year or less) for user certs.

Example 2 — Desktop and cloud SSO: enable Azure AD Passwordless or FIDO2 via Okta/JumpCloud and require security keys or platform authenticators for accounts that access CUI or admin consoles. For Windows domain environments, configure Windows Hello for Business in certificate mode or smart card authentication via GPO: set "Interactive logon: Require smart card" for high-risk groups. For SSH, replace password auth with key-based auth and use a CA to sign short-lived SSH certs for user sessions (openssh-certificates), revoking passwords immediately for privileged accounts.

Migration tactics and rollout strategy for small businesses

Start with privileged accounts: pilot the new mechanism with admin and remote access accounts. Use phased rollouts by department and maintain a fallback break-glass procedure (offline admin key stored securely in safe/HSM). Communicate clear timelines, provide hardware tokens (YubiKey, Feitian) or instructions for platform authenticators, and implement self-service key recovery via Identity Provider workflows that include identity-proofing steps (video call verification + alternate validated email/phone). Keep service accounts on the migration radar—replace password-based service principals with certificate-based machine identities or OAuth client credentials and short-lived tokens.

Logging, monitoring, and evidence for compliance

Instrument authentication flows with logs: RADIUS logs (auth/deny), IdP logs (FIDO2 success/failure), CA issuance logs, and endpoint event logs. Forward to a SIEM (Splunk, Elastic, Microsoft Sentinel) and create alerts for authentication anomalies (multiple failed certificate requests, unexpected device enrollment, orphaned service certificates). For CMMC/NIST evidence, collect policy documents, deployment diagrams, certificate issuance records, enrollment rosters, and screenshots/config exports of IdP and RADIUS configs showing passwordless enforcement.

Key operational controls and best practices

Enforce least privilege, rotate and revoke credentials promptly, and set short validity for keys/tokens. Protect CA private keys with HSMs where feasible and keep audit trails. Require PIN or biometric unlocking for hardware authenticators. Avoid SMS OTP for CUI access — SMS is not considered replay-resistant due to interception risks. Where OTP is necessary for legacy systems, combine it with device-bound controls and plan for costed replacement. Document exceptions and a timeline to remediate them.

Risks of not implementing IA.L2-3.5.4

Remaining on password-only authentication keeps your organization vulnerable to credential theft (phishing, credential stuffing), replay attacks using captured OTPs, and lateral movement after initial compromise. Consequences include loss of CUI, failed CMMC assessments, contract loss, regulatory penalties, and long incident recovery times. For small businesses, a single compromised admin password can result in ransomware, data exfiltration, and business closure—so the compliance requirement is also a practical risk reduction strategy.

Summary: implement a documented, phased migration from passwords to replay-resistant authentication (FIDO2, EAP-TLS/mTLS, PKI-backed SSH), prioritize privileged and CUI-access paths, pilot with administrators, expand by department, instrument logging for compliance evidence, and decommission password-only flows. This approach meets IA.L2-3.5.4 expectations and materially raises your security posture while producing the artifacts required for NIST SP 800-171 / CMMC 2.0 Level 2 assessments.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes