Passkey deployment often intersects with compliance requirements. This page maps passkeys to the frameworks your organization is most likely dealing with.

This page is a starting point for conversations with your compliance or audit team - not a substitute for a qualified compliance audit. Framework requirements vary by version, scope, and interpretation. Confirm any specific control mappings with your auditor before acting on them.

NIST 800-63: Digital Identity Guidelines

NIST Special Publication 800-63-4 defines authenticator assurance levels (AALs) that directly apply to passkeys:

AAL1 (Single-factor)

  • Requires at least one authentication factor
  • Password alone satisfies this level
  • Passkeys exceed AAL1 by providing two factors in a single step

AAL2 (Multi-factor)

  • Requires two distinct factors
  • Password + SMS OTP satisfies this level (just barely)
  • Passkeys satisfy AAL2 - the device is “something you have” and the biometric or PIN is “something you are” or “something you know.” Two factors in a single action.
  • Both syncable and device-bound passkeys meet AAL2

AAL3 (Hardware-based multi-factor)

  • Requires a hardware-bound authenticator with verifiable attestation
  • Device-bound passkeys (FIDO2 security keys with attestation) satisfy AAL3
  • Syncable passkeys do not - the key can leave the originating hardware
  • This is the level that matters for privileged access in high-assurance environments

Practical implication

If your organization cites NIST 800-63:

  • Syncable passkeys meet AAL2 - appropriate for standard user access
  • FIDO2 security keys with attestation meet AAL3 - required for privileged or sensitive access
  • Configure AAGUID allowlists to enforce hardware-bound authenticators where AAL3 is needed

Zero Trust alignment

Passkeys fit directly into Zero Trust architecture principles. The key mappings:

“Verify explicitly” - passkeys provide cryptographic proof of identity at every sign-in, bound to the specific service origin. No cached credentials, no replayable tokens.

“Use least privilege access” - passkeys themselves don’t implement least privilege, but they enable it. Strong authentication is the foundation for Conditional Access policies that enforce least privilege based on role, device, and context.

“Assume breach” - passkeys limit the blast radius of a breach. A compromised password database doesn’t expose passkey credentials. A phishing campaign can’t harvest passkeys. The credential itself is resistant to the lateral movement that “assume breach” anticipates.

If your Zero Trust strategy references CISA’s Zero Trust Maturity Model, passkeys move the Identity pillar from “Traditional” or “Initial” toward “Advanced” or “Optimal” maturity.

Cyber insurance requirements

Cyber insurance underwriters increasingly require or incentivize MFA. The trend is moving beyond “do you have MFA?” toward “what kind of MFA?”

Common insurance questionnaire requirements:

Requirement Passkey compliance
“MFA for all remote access” Passkeys satisfy this (and exceed it)
“MFA for email access” Passkeys satisfy this
“MFA for privileged accounts” Passkeys satisfy this - FIDO2 keys for strongest posture
“Phishing-resistant MFA” Passkeys directly satisfy this (newer questionnaires)
“MFA for all users” Requires org-wide passkey deployment

Questionnaire wording varies widely. Pull your carrier’s current renewal questionnaire and map each control line-by-line against your passkey deployment state - don’t rely on generalizations.

Executive Order 14028 (US Federal)

If your organization is a US federal agency or contractor, EO 14028 and subsequent OMB guidance (M-22-09) require phishing-resistant MFA. Passkeys and FIDO2 security keys directly satisfy this requirement.

Key points:

  • Federal agencies must implement phishing-resistant MFA for all staff
  • FIDO2/WebAuthn is explicitly cited as an acceptable technology
  • Contractors handling federal data may face similar requirements through contract language

PCI DSS 4.0

PCI DSS 4.0.1 (the currently enforced version of the standard as of 2025) strengthens MFA requirements for access to cardholder data environments (requirement 8.4). Requirement 8.5 also addresses MFA strength.

  • MFA is required for all non-console administrative access and for all access into the CDE
  • The standard doesn’t explicitly require phishing-resistant MFA, but specific sub-requirements (anti-replay, requiring all factors to succeed, etc.) are harder to satisfy with SMS / push than with passkeys

Map your specific passkey implementation to the 8.4 and 8.5 sub-requirements with your QSA - don’t treat “we have passkeys” as automatic compliance.

SOC 2

SOC 2 doesn’t prescribe specific authentication technologies. The Trust Services Criteria (CC6.1 and CC6.2 for logical access) are written to let the auditor evaluate the control design and operating effectiveness your organization chooses.

What this means in practice: passkeys don’t automatically check a SOC 2 box, but they give the auditor strong evidence that your authentication controls meet the intent of CC6.1/CC6.2 (restricting access to authorized users with credentials that resist common attack techniques). Discuss specific control mappings with your SOC 2 auditor.

Building the compliance case

When presenting to compliance stakeholders:

  1. Map each framework requirement to a specific passkey capability (use the tables above)
  2. Distinguish AAL2 vs AAL3 - be clear about which user populations need device-bound keys
  3. Document the transition timeline - compliance often cares about when you’ll be fully deployed, not just that you started
  4. Show enforcement - enrollment alone isn’t compliance. Conditional Access enforcement is what makes it real.
  5. Address exceptions - document any legacy applications or user populations that can’t use passkeys yet, with remediation plans

Dig deeper

Where to go next

Report issue