IA-2(13): Out-of-band Authentication
IA-2(13) requires you to add out-of-band authentication for defined systems and transactions, meaning the user must confirm identity through a separate channel that an attacker on the primary channel cannot easily control. Operationalize it by selecting approved OOB methods, scoping where they are mandatory, integrating them into your IAM flows, and retaining config and test evidence. 1
Key takeaways:
- Define exactly where OOB is required (systems, roles, transactions) and make it non-optional in those flows.
- Prefer phishing-resistant OOB patterns where possible; document any weaker method as a time-bound exception.
- Keep evidence that proves enforcement: configs, conditional access policies, logs, and periodic tests.
Footnotes
The ia-2(13): out-of-band authentication requirement is an enhancement under NIST SP 800-53 Rev. 5 that pushes you past “MFA exists” and into “MFA is enforced through an independent channel for the right actions.” In practice, this control becomes relevant whenever compromise of the primary authentication path (device, session, network, or application) would let an attacker self-approve access.
Out-of-band (OOB) authentication is easiest to understand by example: a user initiates a high-risk login or transaction in a web app, then must approve the attempt on a separate, trusted channel such as a managed authenticator app or a hardware-backed push/verification flow. The separate channel reduces the chance that a single compromised endpoint or intercepted session can complete authentication end-to-end.
For a CCO or GRC lead, the fastest path is to treat IA-2(13) as a requirement-level control with (1) a scoping decision, (2) an approved OOB mechanism list, (3) technical enforcement in IAM, and (4) durable evidence. The NIST control text uses organization-defined parameters, so your documentation choices matter as much as your technical configuration. 1
Regulatory text
NIST excerpt (IA-2(13)): “Implement the following out-of-band authentication mechanisms under {{ insert: param, ia-02.13_odp.02 }}: {{ insert: param, ia-02.13_odp.01 }}.” 2
What this means for an operator
- NIST is explicitly telling you to implement out-of-band authentication, but the control is written with organization-defined parameters.
- You must define two things in your system security documentation:
- Where/when OOB is required (the “under [conditions]” parameter).
- Which OOB mechanisms are approved (the “following mechanisms” parameter).
- Auditors will focus on whether you made those definitions, enforced them technically, and can prove the enforcement with repeatable evidence. 2
Plain-English interpretation of the requirement
For the scoped set of systems and actions you define, you must require the user to authenticate through a second channel that is meaningfully independent from the primary channel used to initiate access. The independence is the point: if the primary channel is compromised, the attacker should not automatically control the OOB channel.
Common OOB patterns that typically satisfy intent (you still need to approve them explicitly in your parameter list):
- Authenticator app approval on a managed mobile device.
- Hardware-backed OOB confirmation (for example, security key–based approval where supported by your IAM).
- Voice call or SMS OTP can be OOB, but they are easier to attack than app- or hardware-based options; treat them as constrained exceptions when you cannot do better.
Who it applies to
Entity types
- Federal information systems
- Contractor systems handling federal data (for example, environments supporting federal contracts) 2
Operational context (where this shows up)
You should expect IA-2(13) to be tested in any of these contexts:
- Remote administrative access (privileged roles, break-glass workflows).
- Access to sensitive federal data repositories or mission systems.
- High-risk authentication events (new device, impossible travel, atypical location).
- High-impact transactions inside an application (changes to payment details, access policy changes, creation of new privileged identities).
What you actually need to do (step-by-step)
1) Write your organization-defined parameters (ODPs)
Create a short, explicit statement for each parameter in your control implementation record (SSP/control narrative or equivalent):
- ODP-A (conditions): “OOB authentication is required for: [list systems/apps], [user populations], and [events/transactions].”
- ODP-B (mechanisms): “Approved OOB mechanisms are: [mechanism list], with [priority order], and [disallowed mechanisms].” 2
Practical scoping rule: if you cannot defend the scope in one page, your scope is too complicated for clean audit evidence.
2) Choose approved OOB methods and document decision logic
Build a decision matrix that engineering can follow. Example:
| Scenario | Required OOB method | Allowed fallback | Notes |
|---|---|---|---|
| Privileged access to admin console | Authenticator app or hardware-backed method | Helpdesk-mediated temporary method | Fallback requires ticket + approval |
| Standard user high-risk login | Authenticator app | SMS/voice only as exception | Tie to conditional access risk signal |
| Transaction: change bank routing or API keys | OOB every time | No fallback without business owner approval | Treat as “step-up” inside app |
Keep the matrix simple enough that you can map each row to a conditional access policy or app control.
3) Implement technical enforcement in IAM and applications
Typical enforcement points:
- Identity provider conditional access: enforce OOB on targeted apps, roles, and risk events.
- Privileged access management (PAM): require OOB for privilege elevation and administrative sessions.
- Application-level step-up auth: for sensitive transactions after login (session exists, but action requires OOB).
Minimum expectation: the OOB prompt must be required, not user-selectable, for in-scope conditions.
4) Bind OOB to strong identity proofing and device hygiene
OOB only helps if the OOB channel is trustworthy.
- Ensure the authenticator registration process has controls (for example, prevents attacker self-enrollment).
- For managed devices, ensure MDM enrollment and device compliance gates are in place before allowing authenticator registration.
- Protect helpdesk identity verification because it often becomes the weakest “fallback OOB” path.
5) Build exception handling that doesn’t become the default
Define:
- Valid reasons for exception (accessibility, device constraints, mission constraints).
- Who can approve (system owner + security, not only line manager).
- Maximum exception duration and re-approval trigger (use a time-bound approach in your own policy).
- Compensating controls (more monitoring, restricted access paths, limited session duration).
Track exceptions like vulnerabilities: owner, rationale, compensating controls, and closure plan.
6) Operationalize monitoring and recurring control health checks
You need ongoing proof that OOB is still enforced after changes.
- Monitor IAM policy changes that could weaken OOB enforcement.
- Test authentication flows after app onboarding, SSO changes, and IAM rule updates.
- Run control health checks and log remediation to closure; this is a common diligence and audit expectation. 2
If you use Daydream to manage third-party and control operations, treat IA-2(13) as a control card with owners, trigger events (new app, role change, IAM policy update), and an evidence bundle checklist. That structure prevents “we turned it on once” controls that fail at audit time. 2
Required evidence and artifacts to retain
Store evidence in a single, audit-friendly folder structure mapped to IA-2(13). Minimum bundle:
- Control “control card” / runbook: objective, scope, owner, triggers, steps, exceptions. 2
- ODP definitions: your written “under [conditions]” and “approved mechanisms” statements. 2
- IAM configuration evidence: screenshots or exports of conditional access policies, authentication method policies, and group/role targeting.
- Application configs: step-up auth settings, transaction policy configs, PAM policy evidence (as applicable).
- Test scripts and results: evidence that in-scope flows force OOB (include negative tests showing access denied without OOB).
- Authentication logs: samples showing OOB challenges and outcomes (success/denied), with correlation to scoped apps/users.
- Exception register: requests, approvals, compensating controls, expiration, and closure proof.
- Change management tickets: for IAM/app policy changes impacting OOB.
Retention period should follow your broader security evidence retention standard; auditors usually care more that it is consistent and retrievable than the specific duration.
Common exam/audit questions and hangups
Expect these questions:
- “Show me where you defined the OOB conditions and mechanisms.” If the ODPs are scattered across emails, you will lose time. Keep them in the control narrative. 2
- “Prove it’s enforced for privileged access.” Bring conditional access targeting, PAM settings, and logs for admin sign-ins.
- “What happens if the user can’t complete OOB?” Auditors look for a controlled fallback, not an informal helpdesk bypass.
- “How do you know a change didn’t break enforcement?” Show a health-check cadence and evidence of periodic testing. 2
Frequent implementation mistakes (and how to avoid them)
- Mistake: Treating SMS OTP as the default OOB method everywhere.
Fix: Make stronger methods the default and force SMS/voice into exception paths with documented rationale. - Mistake: Scoping only “logins” and forgetting sensitive in-app actions.
Fix: Identify critical transactions and add step-up OOB inside the app for those actions. - Mistake: OOB exists but is not targeted correctly.
Fix: Validate group/role assignments and application targeting. Keep a test account in each scoped population. - Mistake: Helpdesk bypass becomes a shadow authentication method.
Fix: Add strict identity verification steps, approvals, and logging for any manual reset or temporary access method. - Mistake: No ownership and no recurring operation.
Fix: Assign a control owner, define trigger events, and run health checks with tracked remediation. 2
Enforcement context and risk implications
No public enforcement cases were provided in the source materials for this requirement, so you should treat enforcement risk as indirect: OOB weaknesses typically surface during incident response, customer diligence, and federal assessments as evidence of insufficient access control. The practical risk is account takeover on high-value identities (admins, service operators) and fraudulent high-impact transactions.
Practical execution plan (30/60/90-day)
Your plan should be phase-based in case dependencies shift, but you can still run it with clear milestones.
First 30 days (design + scope lock)
- Name an owner (IAM lead or security engineering) and a GRC owner for evidence.
- Define ODP conditions and approved mechanisms in writing. 2
- Inventory in-scope apps, roles, and sensitive transactions.
- Draft exception policy and build an exception register.
Days 31–60 (implementation + initial evidence)
- Configure conditional access / IAM policies to enforce OOB for in-scope conditions.
- Implement step-up OOB for critical in-app actions where needed.
- Create test scripts and run initial validation; collect logs and screenshots.
- Stand up monitoring for policy changes and privileged sign-in events.
Days 61–90 (operationalize + prove durability)
- Run a control health check after routine changes (app onboarding, role updates).
- Review and remediate any exceptions; confirm they expire or have compensating controls.
- Package an “audit-ready” evidence bundle and run an internal mock audit using the questions above.
- If you manage evidence in Daydream, standardize the IA-2(13) evidence bundle and automate reminders for health checks and exception renewals. 2
Frequently Asked Questions
What counts as “out-of-band” for IA-2(13)?
Out-of-band means the authentication approval happens through a separate channel from the one initiating access, and you define the accepted mechanisms. Document your approved OOB methods and where they must be used. 2
Does push notification approval in an authenticator app qualify?
It often can, if the authenticator channel is independent and you control enrollment and recovery. Record it explicitly in your approved mechanisms list and enforce it via IAM policies. 2
Is SMS OTP acceptable for IA-2(13)?
The control text lets you define mechanisms, so SMS can be included if you approve it. Many teams treat SMS as a constrained fallback because it is easier to attack than app- or hardware-based methods; document that decision and enforce it through exceptions.
Where should OOB be mandatory first?
Start with privileged access and high-impact actions: admin consoles, privilege elevation, and sensitive configuration or data access. Then expand to risk-based user logins and critical in-app transactions.
How do I prove OOB is enforced to an auditor?
Provide your scoped ODP definitions, IAM conditional access configurations, and log evidence showing OOB challenges for in-scope access attempts. Add test results that show access is blocked when OOB is not completed.
We have third parties accessing our systems; do they fall in scope?
If third parties access in-scope systems or perform in-scope actions, your OOB conditions should include them. Make the access path explicit (SSO, VPN, PAM) and require the same OOB enforcement or a documented exception with compensating controls.
Footnotes
Frequently Asked Questions
What counts as “out-of-band” for IA-2(13)?
Out-of-band means the authentication approval happens through a separate channel from the one initiating access, and you define the accepted mechanisms. Document your approved OOB methods and where they must be used. (Source: NIST SP 800-53 Rev. 5 OSCAL JSON)
Does push notification approval in an authenticator app qualify?
It often can, if the authenticator channel is independent and you control enrollment and recovery. Record it explicitly in your approved mechanisms list and enforce it via IAM policies. (Source: NIST SP 800-53 Rev. 5 OSCAL JSON)
Is SMS OTP acceptable for IA-2(13)?
The control text lets you define mechanisms, so SMS can be included if you approve it. Many teams treat SMS as a constrained fallback because it is easier to attack than app- or hardware-based methods; document that decision and enforce it through exceptions.
Where should OOB be mandatory first?
Start with privileged access and high-impact actions: admin consoles, privilege elevation, and sensitive configuration or data access. Then expand to risk-based user logins and critical in-app transactions.
How do I prove OOB is enforced to an auditor?
Provide your scoped ODP definitions, IAM conditional access configurations, and log evidence showing OOB challenges for in-scope access attempts. Add test results that show access is blocked when OOB is not completed.
We have third parties accessing our systems; do they fall in scope?
If third parties access in-scope systems or perform in-scope actions, your OOB conditions should include them. Make the access path explicit (SSO, VPN, PAM) and require the same OOB enforcement or a documented exception with compensating controls.
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream