Get your free and exclusive +30-page Authentication Analytics Whitepaper

Passkeys in the USA: Passkey Regulation in the US

How are passkeys regulated in the US? Learn about the latest executive order of the US government on cybeer security & advances in phishing-resistant MFA

alexander petrovski
Alex

Created: February 25, 2025

Updated: March 27, 2026

usa passkeys regulation
WhitepaperEnterprise Icon

+70-page Enterprise Passkey Whitepaper:
Learn how leaders get +80% passkey adoption. Trusted by Rakuten, Klarna & Oracle

Get free Whitepaper
Key Facts
  • The Executive Order on Strengthening Cybersecurity mandates US federal agencies adopt phishing-resistant MFA including WebAuthn and FIDO2, setting a compliance blueprint for private businesses.
  • The SignalGate incident in March 2025 exposed cleartext passwords of top officials including the National Security Adviser, Director of National Intelligence and Secretary of Defense.
  • Credential reuse poses a national security risk: official passwords from prior breaches circulate on dark web forums and can unlock government systems without any hacking.
  • Passkeys use asymmetric cryptography and domain-binding, eliminating shared secrets so leaked email addresses leave attackers with nothing to phish, intercept or steal.

1. Introduction#

In 2020, hackers cracked into President Donald Trump’s Twitter account using a shockingly simple password: “maga2020!”. If such a high-profile account could be breached so easily, what does that tell us about the state of cybersecurity in the United States?

In this blog post, we’ll explore:

  • Why current authentication methods, including traditional 2FA, fail in many of today’s threats
  • What the U.S. government is doing to strengthen cybersecurity, especially around identity management
  • How passkeys offer a future-proof, phishing-resistant solution for individuals and businesses

2. High-Profile Breaches Reveal Weak Authentication Practices#

Traditional authentication methods like passwords or even basic two-factor authentication (2FA), are no longer sufficient against modern cyber threats. Phishing, social engineering, and sophisticated nation-state attacks continue to bypass outdated security measures, placing individuals, businesses, and government agencies at significant risk.

2.1 Weak Passwords Continue to Plague High-Profile Accounts#

The Trump Twitter hack wasn’t an isolated incident. Numerous high-profile breaches highlight the persistent vulnerabilities in securing digital identities. From celebrity social media takeovers to corporate data theft, inadequate passwords and outdated authentication methods remain the leading contributors to security breaches.

The Trump Twitter incident perfectly illustrates how even prominent figures fall victim to guessable passwords like “maga2020!”. Despite countless warnings and best-practice guidelines, users continue to rely on familiar or weak passwords, making brute-force and dictionary attacks easier than ever and you cannot judge them for it.

Igor Gjorgjioski Testimonial

Igor Gjorgjioski

Head of Digital Channels & Platform Enablement, VicRoads

Corbado proved to be a trusted partner. Their hands-on, 24/7 support and on-site assistance enabled a seamless integration into VicRoads' complex systems, offering passkeys to 5 million users.

Passkeys that millions adopt, fast. Start with Corbado's Adoption Platform.

Start Free Trial

2.2 MFA Fatigue: When Security Measures Become a Burden#

While traditional 2FA was once considered a gold standard for account protection, it has developed weaknesses:

  • User Inconvenience: Added friction, such as receiving push notifications, SMS codes, or app-based prompts, can frustrate users. This leads many to disable or not activate MFA in the first place.
  • Exploited Loopholes: Attackers have adapted to MFA’s prevalence. Tactics like “MFA bombing” spam users with repeated push notifications until they accidentally grant access. SMS-based codes are also vulnerable to SIM swapping, enabling attackers to intercept one-time passwords.

2.3 Phishing & Social Engineering Remain an issue#

Even when 2FA is in place, phishing and social engineering often circumvent these safeguards:

  • Phished 2FA Codes: Cybercriminals have developed ways to capture 2FA tokens in real-time, effectively neutralising an additional security layer.
  • Human Error: Attackers can exploit users overwhelmed by frequent 2FA push notifications (e.g., through “MFA bombing”) by repeatedly sending approval requests, hoping the user eventually clicks “approve” out of frustration or confusion.

Together, these vulnerabilities demonstrate why more robust, phishing-resistant solutions are needed. Traditional passwords and legacy MFA systems simply aren’t equipped to handle modern, ever-evolving threats.

Slack Icon

Become part of our Passkeys Community for updates & support.

Join

3. The U.S. Government’s Push Toward Phishing-Resistant Authentication#

Recognizing escalating cyber risks, the U.S. government has intensified its focus on cybersecurity. A Executive Order on Strengthening Cybersecurity outlines the key initiatives.

3.1 Federal Response: Strengthening Cyber Defenses#

Two main points of the Executive Order stood out as they focus on the authentication domain:

  1. Securing Identity Management Systems: Emphasis on more robust user authentication for federal systems, pushing for phishing-resistant methods that offer more security than passwords or basic 2FA.
  2. Promoting Phishing-Resistant MFA: The Executive Order advocates for modern authentication protocols like WebAuthn and FIDO2, setting a new precedent for stronger security across both public and private sectors.

Despite these efforts, many organizations still rely on outdated authentication methods, leaving gaps that sophisticated attackers continue to exploit.

3.2 Passkeys: A Cornerstone of the Modern Authentication#

Passkeys align directly with the government’s emphasis on phishing-resistant MFA. By leveraging public-key cryptography and domain-binding, passkeys eliminate the need for shared secrets, thereby lowering the risk of compromise.

  • Zero Trust Architecture: This security model insists on strict identity verification for every access attempt. Passkeys fit seamlessly into this paradigm, offering an easy yet secure login process.
  • Advanced Identity and Access Management (IAM): As federal agencies modernize their IAM frameworks, passkeys offer a secure, scalable solution that meets the new standards for phishing resistance and robust authentication.

By driving these changes, the U.S. government is not only addressing current cybersecurity challenges but also accelerating the broader adoption of passkeys as the new benchmark for secure authentication.

3.3 What does the White House say on Passkeys?#

The new Trump administration has not yet made any official announcements regarding passkeys. However, given that Trump himself has been a victim of credential theft (see the introduction section) and that passkeys have the potential to save taxpayers money by reducing SMS OTP costs for government portal logins, we expect that Donald Trump and Elon Musk would be in favor of passkeys.

Notably, all of Elon Musk’s companies (e.g. Tesla, SpaceX, X) internally use YubiKeys, which are based on FIDO2 - the same protocol as passkeys. While it is not feasible to deploy hardware security keys (such as YubiKeys) to the entire U.S. population, passkeys could be deployed as they provide the same phishing-resistant benefits and are a viable solution for large-scale consumer adoption.

3.4 SignalGate and leaked Passwords from Top U.S. Government Officials#

In March 2025, the “SignalGate” incident sent shockwaves through the U.S. cybersecurity community. Initially reported as a vulnerability in the secure messaging platform Signal, the real scandal unraveled when German investigative journalists from DER SPIEGEL uncovered a cache of leaked passwords belonging to dozens of U.S. government officials, which are still in active roles and belong to Donald Trump's inner circle:

  • Mike Waltz (National Security Adviser)
  • Tulsi Gabbard (Director of National Intelligence)
  • Pete Hegseth (Secretary of Defense)

The credentials had been circulating on dark web forums for months (could be found though via commercial search engines), with cleartext passwords originating from previous breaches and reused across personal and professional accounts.

This incident highlights a long-standing security blind spot: credential reuse. Even when platforms like Signal are secure, compromised passwords used to register or log in still pose an enormous threat. Adversaries don’t need to hack the system - they just log in.

For the U.S. government, this represents a national security risk. Credentials tied to sensitive accounts (or even private accounts) - when reused, weak or leaked - can grant unauthorized access to encrypted communications, internal systems and even intelligence platforms. As cyberattacks from nation-state actors grow more sophisticated, password-based authentication becomes a liability. Especially, password reuse is a major threat. If government officials reuse the same password in their government accounts that they use for private accounts (which are way easier to get access to), this is a major concern.

Passkeys would have stopped this dead in its tracks. Unlike passwords, passkeys can’t be leaked, reused or phished. Even if attackers possess a government official’s email address, there is nothing to steal - no secret to capture, no token to intercept. With phishing-resistant authentication like passkeys, explosed credentials from top government officials wouldn’t just be less likely - they’d be technically impossible.

4. Passkeys: The Future-Proof Solution for Cybersecurity in the USA#

The surge in cyberattacks reveals a hidden truth: traditional authentication mechanisms are against today’s threats. Weak passwords, easily circumvented MFA methods, and increasingly sophisticated threats call for a solution that is both resilient and user-friendly.

Most current authentication hinges on shared secrets, passwords, PINs, and 2FA codes that can be stolen, phished, or intercepted. Even two-factor authentication has come under attack through techniques like SIM swapping and MFA fatigue. As long as credentials can be intercepted or tricked away from users, they remain a target.

Passkeys solve these issues by utilising asymmetric cryptography and domain-binding where attackers have nothing to phish, intercept, or steal resulting in both stronger security and a better user experience.

PasskeyAssessment Icon

Get a free passkey assessment in 15 minutes.

Book free consultation

4.1 Government-Backed Security Standards#

The U.S. government has recognized the urgency of cyber threats. Through the Executive Order on Strengthening Cybersecurity, federal agencies are mandated to adopt phishing-resistant MFA, including standards like WebAuthn and FIDO2. This move offers a clear blueprint for both federal entities and private businesses to follow.

Passkeys fully meet these requirements. They provide a phishing-resistant, future-ready method of authentication that not only satisfies existing mandates but also positions organizations to adapt to future regulations.

4.2 Why Businesses Should Act Now#

The cost of inaction is on the rise, with data breaches costing U.S. companies billions of dollars each year. Regulatory scrutiny is also intensifying; organizations that lag in adopting modern security measures risk facing both reputational and financial consequences.

By implementing passkeys, businesses:

  • Stay Ahead of Emerging Cyber Threats: Anticipate attackers’ next moves by using technologies that remove common attack vectors entirely.
  • Align with Federal Standards: The government’s push for phishing-resistant MFA signals impending changes in compliance requirements.
  • Enhance Trust and User Experience: Stronger security fosters customer confidence, and a frictionless login process can significantly improve user satisfaction.

In a time of continuous cyber threats, passkeys offer the resilient, user-friendly authentication method that both the government and industry experts have been seeking.

Substack Icon

Subscribe to our Passkeys Substack for the latest news.

Subscribe

5. Conclusion#

In this blog post, we analyzed that current authentication methods, including 2FA, fail in a modern threat landscape because of more and more complex attacks.

To counter that the U.S. government is pushing to secure identity management systems and promoting phishing-resistant MFA in accordance with WebAuthn and FIDO2 standards.

In accordance with this push of the US government, passkeys offer a great solution to counter phishing attacks and save costs on SMS OTPs. Moreover, while the likelihood of incidents involving wire fraud passkey, wire fraud passkeys, or passkey wire fraud remains relatively low, these concerns further emphasize the critical need to adopt robust, modern authentication methods.

Frequently Asked Questions#

How would passkeys have prevented the SignalGate credential leak in March 2025?#

The SignalGate credentials had been circulating on dark web forums from previous breaches and were reused across personal and professional accounts. Passkeys eliminate credential reuse attacks because each passkey is cryptographically bound to a specific domain and device, leaving attackers with no shared secret to steal or replay.

What is the Trump administration's current official position on passkeys?#

The Trump administration has not yet made any official announcements regarding passkeys. Trump himself was a victim of credential theft in 2020, and all of Elon Musk's companies including Tesla, SpaceX and X internally use FIDO2-based YubiKeys, suggesting alignment with phishing-resistant authentication standards is plausible.

How do passkeys support Zero Trust Architecture requirements for US federal agencies?#

Zero Trust Architecture requires strict identity verification for every access attempt with no implicit trust. Passkeys satisfy this model using public-key cryptography that verifies users without transmitting any shared secret, eliminating the attack vectors that phishing and MFA fatigue exploit in password-based systems.

Why does credential reuse among US government officials create a greater national security risk than for ordinary users?#

Government officials reusing passwords from personal accounts in professional systems create a two-step attack path: compromise the easier personal account first, then access government infrastructure. The SignalGate incident confirmed credentials belonging to Trump's inner circle were already available on dark web forums, requiring no direct hacking of government systems.

See what's really happening in your passkey rollout.

Explore the Console

Share this article


LinkedInTwitterFacebook