Date Published: December 22, 2025
Comments Due: January 30, 2026 (public comment period is CLOSED)
Email Questions to:
[email protected]
Developed in coordination with CISA’s Joint Cyber Defense Collaborative and in response to Executive Order 14144, Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order 13694, NIST Interagency Report (IR) 8587 provides implementation guidance to help federal agencies and cloud service providers (CSPs) protect identity tokens and assertions from forgery, theft, and misuse.
Building on updates to NIST SP 800-53, the report outlines principles for CSPs and consuming agencies, details architectural considerations for identity providers and authorization servers, and recommends enhancements to key management, token verification, and lifecycle controls. The report also addresses threats demonstrated in recent high-profile attacks, emphasizes the importance of secure and configurable cloud services, and provides technical recommendations to safeguard single sign-on, federation, and application programming interface (API) access scenarios.
What kind of input is NIST seeking?
As an initial public draft, NIST IR 8587 is intended to gain critical feedback from stakeholders across government and industry. While comments are welcome and encouraged on all aspects of this document, NIST is particularly interested in the following five feedback areas:
The public comment period is open through January 30, 2026. Please submit your comments and share your feedback with us via email at [email protected].
None selected
Publication:
https://doi.org/10.6028/NIST.IR.8587.ipd
Download URL
Supplemental Material:
Video: Protecting Tokens and Assertions from Forgery, Theft, and Misuse
Document History:
12/22/25: IR 8587 (Draft)
access authorization, key management, security programs & operations
Technologies