Categories Topics
Description
Biometric Devices

Overview
Biometric devices are used to improve physical access controls to identify users, to include fingerprint scanner, hand geometry, retina patterns or facial recognition devices. Biometric devices are also are more resistant to couterfeiting.

Guidelines
Biometric devices are most commonly used to improve security for physical access, to include fingerprint scanning and hand geometry to enforce access to more secure or sensitive areas (e.g. mantrap to enter server room or data center).

Although biometric devices do improve security and may be most effective for controlling physical access to sensitive facilities (such as data centers), organizations should also consider impact to acceptability to users, reliability and accuracy. For instance, organizational costs will inevitably increase due to increased time for enrollment and management of biometric infrastructure.  Furthermore, biometric devices will increase the time it takes users to present a second form if identification, especially when devices inevitably fail to accurately authenticate a user's fingerprint or hand geometry. See Topic Access Control for additional guidelines.

Topic Category
Access Control
Physical (and Environmental) Security
 
News Articles
Why did CIA create a bogus software upgrade? To steal data from FBI, NSAwww.zdnet.com8/25/2017
'Ultrasecure' Samsung Galaxy S8 iris scanner can be easily tricked, say hackerswww.zdnet.com5/23/2017
Mastercard Launches Fingerprint-Based Biometric Cardwww.securityweek.com4/21/2017
McDonald's adding biometrics-based access management to its menu?www.scmagazine.com10/27/2016
Telstra explores blockchain, biometrics to secure smart home IoT deviceswww.zdnet.com9/22/2016
German minister seeks facial recognition at airports, train stationswww.theregister.co.uk8/22/2016
Microsoft wants to kill passwords with biometric authentication in Windows 10www.computerworld.com3/18/2015
Hacker recreates fingerprints with public photowww.cnbc.com12/29/2014
Intel looks to tame passwords with biometricswww.computerworld.com11/24/2014
Apple's advanced fingerprint technology is hacked; should you worry?www.zdnet.com9/23/2013
$14k and Counting for iPhone 5S Touch ID Hackthreatpost.com9/19/2013
Windows 8.1 to let you secure folders with your fingerprintnews.cnet.com6/4/2013
Motorola shows off tattoo and swallowable password hardwarewww.theregister.co.uk5/31/2013
Intel's McAfee brings biometric authentication to cloud storagewww.computerworld.com5/14/2013
Doctors 'used fake fingers' to clock in for colleagues at ERnews.cnet.com3/13/2013
White Papers
DISA Biometric Security Checklist for the Access Control STIGiase.disa.mil10/17/2007
Standards
NIST SP 800-73-4, Interfaces for Personal Identity VerificationNIST6/1/2015
NIST SP 800-76-2 Biometric Data Specification for Personal Identity VerificationNIST7/12/2013