-
Notifications
You must be signed in to change notification settings - Fork 12
/
Copy pathsp800-63a.html
3501 lines (2278 loc) · 269 KB
/
sp800-63a.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="theme-color" media="(prefers-color-scheme: light)" content="white">
<meta name="theme-color" media="(prefers-color-scheme: dark)" content="black">
<link rel="canonical" href="/800-63-4/sp800-63a.html">
<!-- Google Analytics -->
<!--<script type="text/javascript" id="_fed_an_js_tag" src="http://www.nist.gov/js/federated-analytics.all.min.js?agency=NIST&subagency=mml&pua=UA-66610693-1&yt=true&exts=ppsx,pps,f90,sch,rtf,wrl,txz,m1v,xlsm,msi,xsd,f,tif,eps,mpg,xml,pl,xlt,c"></script> -->
<!-- DAP Analytics -->
<script type="text/javascript" id="_fed_an_ua_tag"
src="https://dap.digitalgov.gov/Universal-Federated-Analytics-Min.js?agency=DOC&subagency=NIST&pua=UA-66610693-1&yt=true&exts=ppsx,pps,f90,sch,rtf,wrl,txz,m1v,xlsm,msi,xsd,f,tif,eps,mpg,xml,pl,xlt,c"></script>
<link rel="stylesheet" href="https://pages.nist.gov/nist-header-footer/css/nist-combined.css">
<script src="https://code.jquery.com/jquery-3.6.2.min.js" type="text/javascript"></script>
<script src="https://pages.nist.gov/nist-header-footer/js/nist-header-footer.js" type="text/javascript" defer="defer"></script>
<script src="https://unpkg.com/simple-jekyll-search/dest/simple-jekyll-search.min.js"></script>
<!-- Custom CSS -->
<link rel="stylesheet" href="/800-63-4/static/font-awesome/css/font-awesome.min.css">
<link rel="stylesheet" href="/800-63-4/static/css/NISTStyle.css">
<link rel="stylesheet" href="/800-63-4/static/css/NISTPages.css">
<!-- HTML5 shim and Respond.js IE8 support of HTML5 elements and media queries -->
<!--[if lt IE 9]>
<script src="https://oss.maxcdn.com/libs/html5shiv/3.7.0/html5shiv.js"></script>
<script src="https://oss.maxcdn.com/libs/respond.js/1.4.2/respond.min.js"></script>
<![endif]-->
<title>NIST Special Publication 800-63A</title>
<meta property="og:title" content="NIST Special Publication 800-63A"/>
<meta name="description" content="NIST Special Publication 800-63A">
<meta property="og:description" content="NIST Special Publication 800-63A"/>
</head>
<body>
<nav class="navbar navbar-default navbar-fixed-left" role="navigation">
<ul class="nav navbar-nav">
<li id="search-box">
<input type="text" id="search-input" placeholder="Search..." onFocus="loadSearch()">
<ul id="results-container"></ul>
</li>
<li class="">
<a href="/800-63-4/">Home</a>
</li>
<li class="">
<a href="/800-63-4/sp800-63.html">SP 800-63</a>
</li>
<li class="active">
<a href="/800-63-4/sp800-63a.html">SP 800-63A</a>
<ul class="subnav">
<li class=""><a href="/800-63-4/sp800-63a.html#abstract">Abstract</a></li>
<li class=""><a href="/800-63-4/sp800-63a.html#reviewers">Reviewers</a></li>
<li class=""><a href="/800-63-4/sp800-63a.html#preface">Preface</a></li>
<li class=""><a href="/800-63-4/sp800-63a.html#introduction"><span class="section">1</span>Introduction</a></li>
<li class=""><a href="/800-63-4/sp800-63a.html#ipv-section"><span class="section">2</span>Proofing</a></li>
<li class=""><a href="/800-63-4/sp800-63a.html#ial-general"><span class="section">3</span>General IAL</a></li>
<li class=""><a href="/800-63-4/sp800-63a.html#ial-section"><span class="section">4</span>IAL</a></li>
<li class=""><a href="/800-63-4/sp800-63a.html#accounts"><span class="section">5</span>Accounts</a></li>
<li class=""><a href="/800-63-4/sp800-63a.html#security"><span class="section">6</span>Security</a></li>
<li class=""><a href="/800-63-4/sp800-63a.html#privacy-section-header"><span class="section">7</span>Privacy</a></li>
<li class=""><a href="/800-63-4/sp800-63a.html#usability"><span class="section">8</span>Usability</a></li>
<li class=""><a href="/800-63-4/sp800-63a.html#equity"><span class="section">9</span>Equity</a></li>
<li class=""><a href="/800-63-4/sp800-63a.html#references">References</a></li>
<li class=""><a href="/800-63-4/sp800-63a.html#EvidenceExamples"><span class="section">A</span>Evidence</a></li>
<li class=""><a href="/800-63-4/sp800-63a.html#abbr"><span class="section">B</span>Abbreviations</a></li>
<li class=""><a href="/800-63-4/sp800-63a.html#def-and-acr"><span class="section">C</span>Glossary</a></li>
<li class=""><a href="/800-63-4/sp800-63a.html#changelog"><span class="section">D</span>Change Log</a></li>
</ul>
</li>
<li class="">
<a href="/800-63-4/sp800-63b.html">SP 800-63B</a>
</li>
<li class="">
<a href="/800-63-4/sp800-63c.html">SP 800-63C</a>
</li>
</ul>
</nav>
<div class="page-switch">
View this document as: <b>a single page</b> | <a href="/800-63-4/sp800-63a/introduction/">multiple pages</a>.
</div>
<div class="container">
<div class="row">
<p>Wed, 28 Aug 2024 20:39:12 -0500</p>
<h1 id="abstract">
ABSTRACT <a href="#abstract" class="header-link"><i class="fa fa-link"></i></a>
</h1>
<p>This guideline focuses on the enrollment and verification of an identity for use in digital authentication. Central to this is a process known as identity proofing in which an applicant provides evidence to a credential service provider (CSP) reliably identifying themselves, thereby allowing the CSP to assert that identification at a useful identity assurance level. This document defines technical requirements for each of three identity assurance levels. The guidelines are not intended to constrain the development or use of standards outside of this purpose. This publication supersedes NIST Special Publication (SP) 800-63A.</p>
<h1 id="keywords">
Keywords <a href="#keywords" class="header-link"><i class="fa fa-link"></i></a>
</h1>
<p>authentication; credential service provider; electronic authentication; digital authentication; electronic credentials; digital credentials; identity proofing; federation.</p>
<h1 id="reviewers" class="no_toc">
Note to Reviewers <a href="#reviewers" class="header-link"><i class="fa fa-link"></i></a>
</h1>
<p>In December 2022, NIST released the Initial Public Draft (IPD) of SP 800-63, Revision 4. Over the course of a 119-day public comment period, the authors received exceptional feedback from a broad community of interested entities and individuals. The input from nearly 4,000 specific comments has helped advance the improvement of these Digital Identity Guidelines in a manner that supports NIST’s critical goals of providing foundational risk management processes and requirements that enable the implementation of secure, private, equitable, and accessible identity systems. Based on this initial wave of feedback, several substantive changes have been made across all of the volumes. These changes include but are not limited to the following:</p>
<ol>
<li>Updated text and context setting for risk management. Specifically, the authors have modified the process defined in the IPD to include a context-setting step of defining and understanding the online service that the organization is offering and intending to potentially protect with identity systems.</li>
<li>Added recommended continuous evaluation metrics. The continuous improvement section introduced by the IPD has been expanded to include a set of recommended metrics for holistically evaluating identity solution performance. These are recommended due to the complexities of data streams and variances in solution deployments.</li>
<li>Expanded fraud requirements and recommendations. Programmatic fraud management requirements for credential service providers and relying parties now address issues and challenges that may result from the implementation of fraud checks.</li>
<li>Restructured the identity proofing controls. There is a new taxonomy and structure for the requirements at each assurance level based on the means of providing the proofing: Remote Unattended, Remote Attended (e.g., video session), Onsite Unattended (e.g., kiosk), and Onsite Attended (e.g., in-person).</li>
<li>Integrated syncable authenticators. In April 2024, NIST published interim guidance for syncable authenticators. This guidance has been integrated into SP 800-63B as normative text and is provided for public feedback as part of the Revision 4 volume set.</li>
<li>Added user-controlled wallets to the federation model. Digital wallets and credentials (called “attribute bundles” in SP 800-63C) are seeing increased attention and adoption. At their core, they function like a federated IdP, generating signed assertions about a subject. Specific requirements for this presentation and the emerging context are presented in SP 800-63C-4.</li>
</ol>
<p>The rapid proliferation of online services over the past few years has heightened the need for reliable, equitable, secure, and privacy-protective digital identity solutions.
Revision 4 of NIST Special Publication SP 800-63, <em>Digital Identity Guidelines</em>, intends to respond to the changing digital landscape that has emerged since the last major revision of this suite was published in 2017, including the real-world implications of online risks. The guidelines present the process and technical requirements for meeting digital identity management assurance levels for identity proofing, authentication, and federation, including requirements for security and privacy as well as considerations for fostering equity and the usability of digital identity solutions and technology.</p>
<p>Based on the feedback provided in response to the June 2020 Pre-Draft Call for Comments, research into real-world implementations of the guidelines, market innovation, and the current threat environment, this draft seeks to:</p>
<ul>
<li>Address comments received in response to the IPD of Revision 4 of SP 800-63</li>
<li>Clarify the text to address the questions and issues raised in the public comments</li>
<li>Update all four volumes of SP 800-63 based on current technology and market developments, the changing digital identity threat landscape, and organizational needs for digital identity solutions to address online security, privacy, usability, and equity</li>
</ul>
<p>NIST is specifically interested in comments and recommendations on the following topics:</p>
<ol>
<li>
<p>Identity Proofing and Enrollment</p>
<ul>
<li>Is the updated structure of the requirements around defined types of proofing sufficiently clear? Are the types sufficiently described?</li>
<li>Are there additional fraud program requirements that need to be introduced as a common baseline for CSPs and other organizations?</li>
<li>Are the fraud requirements sufficiently described to allow for appropriate balancing of fraud, privacy, and usability trade-offs?</li>
<li>Are the added identity evidence validation and authenticity requirements and performance metrics realistic and achievable with existing technology capabilities?</li>
</ul>
</li>
<li>
<p>General</p>
<ul>
<li>What specific implementation guidance, reference architectures, metrics, or other supporting resources could enable more rapid adoption and implementation of this and future iterations of the Digital Identity Guidelines?</li>
<li>What applied research and measurement efforts would provide the greatest impacts on the identity market and advancement of these guidelines?</li>
</ul>
</li>
</ol>
<p>Reviewers are encouraged to comment and suggest changes to the text of all four draft volumes of the SP 800-63-4 suite. NIST requests that all comments be submitted by 11:59pm Eastern Time on October 7th, 2024. Please submit your comments to <a href="mailto:[email protected]">[email protected]</a>. NIST will review all comments and make them available on the <a href="https://www.nist.gov/identity-access-management">NIST Identity and Access Management website</a>. Commenters are encouraged to use the comment template provided on the NIST Computer Security Resource Center website for responses to these notes to reviewers and for specific comments on the text of the four-volume suite.</p>
<h1 id="preface">
Preface <a href="#preface" class="header-link"><i class="fa fa-link"></i></a>
</h1>
<p>The purpose of this document, and associated companion volumes <a href="/800-63-4/sp800-63/introduction/#introduction" latex-href="#ref-SP800-63">[SP800-63]</a>, <a href="/800-63-4/sp800-63b/introduction/#introduction" latex-href="#ref-SP800-63B">[SP800-63B]</a>, and <a href="/800-63-4/sp800-63c/introduction/#introduction" latex-href="#ref-SP800-63C">[SP800-63C]</a>, is to provide guidance to organizations for the processes and technologies for the management of digital identities at designated levels of assurance.</p>
<p>This document provides requirements for the identity proofing of individuals at each Identity Assurance Level (IAL) for the purposes of enrolling them into an identity service or providing them access to online resources. It applies to the identity proofing of individuals over a network or in person.</p>
<h1 id="introduction" data-section="1">
Introduction <a href="#introduction" class="header-link"><i class="fa fa-link"></i></a>
</h1>
<p><em>This section is informative.</em></p>
<p>One of the challenges of providing online services is being able to associate a set of activities with a single, known individual. While there are situations where this is not necessary, there are other situations where it is important to reliably establish an association with a real-life subject. Examples of this include accessing government services and executing financial transactions. There are also situations where association with a real-life subject is required by regulations (e.g., the financial industry’s ‘Customer Identification Program’ requirements) or to establish accountability for high-risk actions (e.g., changing the release rate of water from a dam).</p>
<p>This guidance defines identity proofing as the process of establishing, to some degree of assurance, a relationship between a subject accessing online services and a real-life person. This document provides guidance for Federal Agencies, third-party Credential Service Providers (CSP), and other organizations that provide or use identity proofing services.</p>
<h2 id="expected-outcomes-of-identity-proofing" data-section="1">
Expected Outcomes of Identity Proofing <a href="#expected-outcomes-of-identity-proofing" class="header-link"><i class="fa fa-link"></i></a>
</h2>
<p>The expected outcomes of identity proofing include:</p>
<ul>
<li><strong>Identity resolution</strong>: Determine that the claimed identity corresponds to a single, unique individual within the context of the population of users served by the CSP or online service.</li>
<li><strong>Evidence validation</strong>: Confirm that supplied evidence is genuine, authentic, and valid.</li>
<li><strong>Attribute validation</strong>: Confirm the accuracy of the core attributes. Core attributes are the minimum set required for identity proofing.</li>
<li><strong>Identity verification</strong>: Confirm that the claimant is the genuine owner of the presented evidence and attributes.</li>
<li><strong>Identity enrollment</strong>: Enroll the identity proofed applicant in the CSP’s identity service as a subscriber.</li>
<li><strong>Fraud mitigation</strong>: Detect, respond to, and prevent access to benefits, services, data, or assets using a fraudulent identity.</li>
</ul>
<p>Identity proofing services are expected to incorporate privacy-enhancing principles, such as data minimization, as well as employ good usability practices, to minimize the burden on applicants while still accomplishing the expected outcomes.</p>
<h2 id="identity-assurance-levels" data-section="1">
Identity Assurance Levels <a href="#identity-assurance-levels" class="header-link"><i class="fa fa-link"></i></a>
</h2>
<p>Assurance (confidence) in a subscriber’s identity is established using the processes associated with the defined Identity Assurance Levels (IAL). Each successive IAL builds on the requirements of lower IALs in order to achieve increased assurance.</p>
<p><strong>No identity proofing</strong>: There is no requirement to link the applicant to a specific, real-life person. Any attributes provided in conjunction with the subject’s activities are self-asserted or are treated as self-asserted. Evidence is not validated and attributes are neither validated nor verified.</p>
<p><strong>IAL1</strong>: The identity proofing process supports the real-world existence of the claimed identity and provides some assurance that the applicant is associated with that identity. Core attributes are obtained from identity evidence or self-asserted by the applicant. All core attributes (see <a href="/800-63-4/sp800-63a/proofing/#CoreAttributes">Sec. 2.2</a>) are validated against authoritative or credible sources and steps are taken to link the attributes to the person undergoing the identity proofing process. Identity proofing is performed using remote or onsite processes, with or without the attendance of a CSP representative (proofing agent or trusted referee). Upon the successful completion of identity proofing, the applicant is enrolled into a subscriber account and any authenticators, including subscriber-provided authenticators, can then be bound to the account. IAL1 is designed to limit highly scalable attacks, provide protection against synthetic identities, and provide protections against attacks using compromised PII.</p>
<p><strong>IAL2</strong>: IAL2 adds additional rigor to the identity proofing process by requiring the collection of additional evidence and a more rigorous process for validating the evidence and verifying the identity. In addition to those threats addressed by IAL1, IAL2 is designed to limit scaled and targeted attacks, provide protections against basic evidence falsification and evidence theft, and provide protections against basic social engineering tactics.</p>
<p><strong>IAL3</strong>: IAL3 adds the requirement for a trained CSP representative (proofing agent) to interact directly with the applicant, as part of an on-site attended identity proofing session, and the collection of at least one biometric. The successful on-site identity proofing session concludes with the enrollment of the applicant into a subscriber account and the delivery of one or more authenticators associated (bound) to that account. IAL3 is designed to limit more sophisticated attacks, provide protections against advanced evidence falsification, theft, and repudiation, and provide protection against more advanced social engineering tactics.</p>
<div latex-literal="true" class="language-plaintext highlighter-rouge"><div class="highlight"><pre class="highlight"><code>\clearpage
</code></pre></div></div>
<h2 id="notations" data-section="1">
Notations <a href="#notations" class="header-link"><i class="fa fa-link"></i></a>
</h2>
<p>This guideline uses the following typographical conventions in text:</p>
<ul>
<li>Specific terms in <strong>CAPITALS</strong> represent normative requirements. When these same terms are not in <strong>CAPITALS</strong>, the term does not represent a normative requirement.
<ul>
<li>The terms “<strong>SHALL</strong>” and “<strong>SHALL NOT</strong>” indicate requirements to be followed strictly in order to conform to the publication and from which no deviation is permitted.</li>
<li>The terms “<strong>SHOULD</strong>” and “<strong>SHOULD NOT</strong>” indicate that among several possibilities, one is recommended as particularly suitable without mentioning or excluding others, that a certain course of action is preferred but not necessarily required, or that (in the negative form) a certain possibility or course of action is discouraged but not prohibited.</li>
<li>The terms “<strong>MAY</strong>” and “<strong>NEED NOT</strong>” indicate a course of action permissible within the limits of the publication.</li>
<li>The terms “<strong>CAN</strong>” and “<strong>CANNOT</strong>” indicate a possibility and capability—whether material, physical, or causal—or, in the negative, the absence of that possibility or capability.</li>
</ul>
</li>
</ul>
<h2 id="document-structure" data-section="1">
Document Structure <a href="#document-structure" class="header-link"><i class="fa fa-link"></i></a>
</h2>
<p>This document is organized as follows. Each section is labeled as either normative (i.e., mandatory for compliance) or informative (i.e., not mandatory).</p>
<ul>
<li>Section 1 provides an introduction to the document. This section is <em>informative</em>.</li>
<li>Section 2 describes requirements for identity proofing. This section is <em>normative</em>.</li>
<li>Section 3 describes general requirements for IALs. This section is <em>normative</em>.</li>
<li>Section 4 describes requirements for specific IALs. This section is <em>normative</em>.</li>
<li>Section 5 describes subscriber accounts. This section is <em>normative</em>.</li>
<li>Section 6 provides security considerations. This section is <em>informative</em>.</li>
<li>Section 7 provides privacy considerations. This section is <em>informative</em>.</li>
<li>Section 8 provides usability considerations. This section is <em>informative</em>.</li>
<li>Section 9 provides equity considerations. This section is <em>informative</em>.</li>
<li>References contains a list of publications referred to from this document. This section is <em>informative</em>.</li>
<li>Appendix A provides a non-exhaustive list of types of identity evidence, grouped by strength. This appendix is <em>informative</em>.</li>
<li>Appendix B contains a selected list of abbreviations used in this document. This appendix is <em>informative</em>.</li>
<li>Appendix C contains a glossary of selected terms used in this document. This appendix is <em>informative</em>.</li>
<li>Appendix D contains a summarized list of changes in this document’s history. This appendix is <em>informative</em>.</li>
</ul>
<h1 id="ipv-section" data-section="2">
Identity Proofing Overview <a href="#ipv-section" class="header-link"><i class="fa fa-link"></i></a>
</h1>
<p><em>This section is normative.</em></p>
<p>This section provides an overview of the identity proofing and enrollment process, as well as requirements to support the resolution, validation, and verification of the identity claimed by an applicant. It also provides guidelines on additional aspects of the identity proofing process. These requirements are intended to ensure that the claimed identity exists in the real world and that the applicant is the individual associated with that identity.</p>
<p>Additionally, these guidelines provide for multiple methods by which resolution, validation, and verification can be accomplished, as well as providing the multiple types of identity evidence that support the identity proofing process. CSPs and organizations <strong>SHALL</strong> provide options when implementing their identity proofing services and processes to promote access for applicants with different means, capabilities, and technology access. These options <strong>SHOULD</strong> include accepting multiple types and combinations of identity evidence; supporting multiple data validation sources; enabling multiple methods for verifying identity; providing multiple channels for engagement (e.g., onsite, remote); and offering assistance mechanisms for applicants (e.g., applicant references).</p>
<p>CSPs <strong>SHALL</strong> evaluate the risks associated with each identity proofing option offered (e.g., identity proofing types, validation sources, assistance mechanisms) and implement mitigating fraud controls, as appropriate. At a minimum, CSPs <strong>SHALL</strong> design each option such that, in aggregate, the options provide comparable assurance.</p>
<h2 id="identity-proofing-and-enrollment" data-section="2">
Identity Proofing and Enrollment <a href="#identity-proofing-and-enrollment" class="header-link"><i class="fa fa-link"></i></a>
</h2>
<p>The objective of identity proofing is to ensure that, to a stated level of certainty, the applicant involved in the identity proofing process is who they claim to be. This document presents a three-step process for CSPs to identity proof applicants at designated assurance levels. The first step, identity resolution, consists of collecting appropriate identity evidence and attribute information to determine that the applicant is a unique identity in the population served by the CSP and is a real-life person. The second step, identity validation, validates the genuineness, accuracy, and validity of the evidence and attribute information collected in the first step. The third step, identity verification, confirms that the applicant presenting the identity evidence is the same individual to whom the validated evidence was issued and with whom the validated attributes are associated. In most cases, upon successfully identity proofing an applicant to the designated IAL, the CSP establishes a unique subscriber account for the applicant (now a subscriber in the identity service), which allows one or more authenticators to be bound to the proven identity in the account.</p>
<p>Identity proofing can be part of an organization’s business processes that support the determination of suitability or entitlement to a benefit or service. While these guidelines provide guidance for appropriate levels of identity assurance, suitability and eligibility determinations for benefits or services are distinct business process decisions from these identity proofing processes and are outside the scope of these guidelines.</p>
<h3 id="process-flow" data-section="2">
Process Flow <a href="#process-flow" class="header-link"><i class="fa fa-link"></i></a>
</h3>
<p><em>This subsection is informative.</em></p>
<p><a href="/800-63-4/sp800-63a/proofing/#fig-1">Figure 1</a> provides an illustrative example of the three-step identity proofing process.</p>
<p latex-ignore="true"><a href="/800-63-4/sp800-63a/proofing/#fig-1" name="fig-1">Fig. 1. Identity Proofing Process</a></p>
<p><img src="/800-63-4/sp800-63a/images/ProofingProcess.png" alt="Illustration of steps in identity proofing and enrollment" title="Identity Proofing Process" latex-src="ProofingProcess.pdf" latex-fig="1" latex-place="h" /></p>
<p>The following steps present a common workflow example for IAL2 remote identity proofing, which is intended to illustrate the workflow steps for this example. These steps are not intended to represent a normative processing workflow model.</p>
<ol>
<li>
<p><strong>Resolution</strong></p>
<ul>
<li>The CSP captures one or more pieces of identity evidence, such as a driver’s license, mobile driver’s license, or passport.</li>
<li>The CSP collects any additional attributes, as needed, from the applicant to supplement those contained on the presented identity evidence.</li>
</ul>
</li>
<li>
<p><strong>Validation</strong></p>
<ul>
<li>The CSP confirms the presented evidence is authentic, accurate, and valid (e.g., not revoked).</li>
<li>The CSP validates the attributes obtained in step 1 by checking them against authoritative or credible validation sources.</li>
</ul>
</li>
<li>
<p><strong>Verification</strong></p>
<ul>
<li>The CSP employs one of the IAL2 Verifcation Pathways to confirm the applicant is the genuine owner of the presented identity evidence.</li>
</ul>
<p><strong>Enrollment</strong></p>
<p>Upon the successful completion of the three identity proofing steps, a notification of proofing is sent to a validated address, and the applicant can be enrolled into a subscriber account with the CSP, as described in Section 5. A subscriber account includes at least one validated address (e.g., phone number, mailing address) that can be used to communicate with the subscriber about their account. Additionally, one or more authenticators are bound to the proven identity in the subscriber account.</p>
</li>
</ol>
<h3 id="ProofingRoles" data-section="2">
Identity Proofing Roles <a href="#ProofingRoles" class="header-link"><i class="fa fa-link"></i></a>
</h3>
<p>To support the delivery of identity proofing that meets the various needs of applicants and risk scenarios, different individuals would be expected to play different roles within the proofing process. To support the consistent implementation of these guidelines, the following identity proofing roles are defined:</p>
<ol>
<li><strong>Proofing Agent</strong> - An agent of the CSP who is trained to attend identity proofing sessions, either onsite or remotely, and make limited, risk-based decisions – such as visually inspecting identity evidence and making a determination that the evidence has not been altered.</li>
<li><strong>Trusted Referee</strong> - An agent of the CSP who is trained to make risk-based decisions regarding an applicant’s identity proofing case when that applicant is unable to meet expected requirements of a defined IAL proofing process. Unlike a Proofing Agent (although a trusted referee may also fulfill this role), the level of training is expected to be more substantial to include training to detect deception and signs of social engineering, in addition to the ability to support validation and verification through physical inspection of the evidence and visual comparison of the applicant to a reference facial image. Requirements for trusted referees are contained in <a href="/800-63-4/sp800-63a/ial-general/#TRs">Sec. 3.1.13.1</a>.
<blockquote>
<p><strong>Note:</strong> Trusted referees differ from proofing agents in that trusted referees receive additional training and resources to support exception handling scenarios, including when applicants do not possess the required identity evidence or the attributes on the evidence do not all match the claimed identity (e.g., due to a recent name or address change).</p>
</blockquote>
</li>
<li><strong>Applicant Reference</strong> - A representative of the applicant who can vouch for the identity of the applicant, specific attributes related to the applicant, or conditions relative to the context of the individual (e.g., emergency status, homelessness). This individual does not act on behalf of the applicant in the identity proofing process but is a resource that can be called on to support claims of identity. Requirements for applicant references are contained in <a href="/800-63-4/sp800-63a/ial-general/#ARs">Sec. 3.1.13.3</a>.</li>
<li><strong>Process Assistants</strong> - An individual who provides support for the proofing process but does not support decision making or risk-based evaluation (e.g., translation, transcription, or accessibility support). Process assistants may be provided by the CSP or the applicant.</li>
</ol>
<p>CSPs <strong>SHALL</strong> identify which of above roles are applicable to their identity service and <strong>SHALL</strong> provide training and support resources consistent with the requirements and expectations provided in <a href="/800-63-4/sp800-63a/ial-general/#ial-general">Sec. 3</a>.</p>
<h3 id="ProofingTypes" data-section="2">
Identity Proofing Types <a href="#ProofingTypes" class="header-link"><i class="fa fa-link"></i></a>
</h3>
<p>The ability to provide resolution, validation, and verification as part of an identity proofing process is delivered through a combination of technologies, communication channels, and identity proofing roles to support the diverse users, communities, and relying parties CSPs serve. The types of proofing can be categorized based on two specific factors – whether they are attended and where they take place.</p>
<ol>
<li><strong>Remote Unattended Identity Proofing</strong> – Identity proofing conducted where the resolution, validation, and verification processes are completely automated and interaction with a proofing agent is not required. The location and devices used in the proofing process are not controlled by the CSP.</li>
<li><strong>Remote Attended Identity Proofing</strong> – Identity proofing conducted where the applicant completes resolution, validation, and verification steps through a secure video session with a proofing agent. The location and devices used in the proofing process are not controlled by the CSP.</li>
<li><strong>Onsite Unattended Identity Proofing</strong> - Identity proofing conducted where an individual interacts with a controlled workstation or kiosk, but interaction with a proofing agent is not required. The process is fully automated, but at a physical location and on devices approved by the CSP.</li>
<li><strong>Onsite Attended Identity Proofing</strong> - Identity proofing conducted in a physical setting where the applicant completes the entire identity proofing process - to include resolution, validation, and verification – in the presence of a proofing agent. The proofing agent may be co-located with the user or interact with the user via a kiosk or device. The physical location and devices are all approved by the CSP.</li>
</ol>
<p>Requirements at each assurance level are structured to allow CSPs to implement different combinations of proofing types to meet the requirements of different assurance levels (as appropriate). CSPs that offer IAL1 & IAL2 services <strong>SHALL</strong> provide a Remote Unattended identity proofing process and <strong>SHALL</strong> offer at-least one attended identity proofing process option. CSPs that offer IAL1 & IAL2 services <strong>SHOULD</strong> support identity proofing processes that allow for the applicant to transition between proofing types in the event an applicant is unsuccessful with one type (e.g., allow an applicant who fails remote unattended to transition to remote attended).</p>
<h2 id="CoreAttributes" data-section="2">
Core Attributes <a href="#CoreAttributes" class="header-link"><i class="fa fa-link"></i></a>
</h2>
<p>The identity proofing process involves the presentation and validation of the minimum attributes necessary to accomplish identity proofing - this includes what is needed to complete resolution, validation, and verification. While the necessary core attributes for a given use case will change based on the nature of the community being served, the following attributes <strong>SHOULD</strong> be collected by CSPs to support the proofing process:</p>
<ul>
<li><strong>First Name</strong>: The applicant’s given name.</li>
<li><strong>Middle Name or Initial</strong>: The applicant’s middle name or initial if available.</li>
<li><strong>Last Name</strong>: The applicant’s last name or family name as appropriate.</li>
<li><strong>Government Identifier</strong>: A unique identifier which is associated with the applicant in government records (e.g., SSN, TIN, Driver’s License #).</li>
<li><strong>Physical Address</strong>: A physical address to which the applicant can receive communications related to the proofing process; or a <strong>Digital Address</strong>: A digital address (e.g., phone or email) to which the applicant can receive communications related to the proofing process.</li>
</ul>
<p>Additional attributes may be added to these as required by the CSP and RP. The CSP and RP <strong>SHALL</strong> document all core attributes in trust agreements and practice statements. Following a privacy risk assessment, a CSP <strong>MAY</strong> request additional attributes that are not required to complete identity proofing, but that may support other RP business processes. See <a href="/800-63-4/sp800-63a/ial-general/#PrivacyReqs">Sec. 3.1.3</a> for details on privacy requirements for requesting additional attributes.</p>
<h2 id="resolve" data-section="2">
Identity Resolution <a href="#resolve" class="header-link"><i class="fa fa-link"></i></a>
</h2>
<p>The goal of identity resolution is to use the smallest possible set of attributes to uniquely and accurately distinguish an individual within a given population or context. This step involves comparing an applicant’s collected attributes to those stored in records for users served by the CSP. While identity resolution is the starting point in the overall identity proofing process, to include the initial detection of potential fraud, it in no way represents a complete and successful identity proofing process.</p>
<h2 id="evidence-collection" data-section="2">
Identity Validation and Identity Evidence Collection <a href="#evidence-collection" class="header-link"><i class="fa fa-link"></i></a>
</h2>
<p>The goal of identity validation is to collect the most appropriate identity evidence from the applicant and determine that it is genuine (not altered or forged), accurate (the pertinent data is correct, current, and related to the applicant), and valid.</p>
<blockquote>
<p><strong>Note:</strong> This document uses the term “valid” rather than expired in recognition that evidence can remain a useful means to prove identity, even if it is expired or was issued outside a determined timeframe.</p>
</blockquote>
<p>Identity evidence collection supports the identity validation process and consists of two steps: 1) the presentation of identity evidence by the identity proofing applicant to the CSP and 2) the determination by the CSP that the presented evidence meets the applicable strength requirements.</p>
<h3 id="evidence-strength" data-section="2">
Evidence Strength Requirements <a href="#evidence-strength" class="header-link"><i class="fa fa-link"></i></a>
</h3>
<p>This section defines the requirements for identity evidence at each strength. The strength of a piece of identity evidence is determined by:</p>
<ol>
<li>The issuing rigor,</li>
<li>The ability to provide confidence in validation, including accuracy and authenticity checks, and</li>
<li>The ability to provide confidence in the verification of the applicant presenting the evidence.</li>
</ol>
<p><a href="/800-63-4/sp800-63a/evidence/#EvidenceExamples">Appendix A</a> of this document provides a non-exhaustive list of possible evidence types, grouped by strength.</p>
<h4 id="fair-evidence-requirements" data-section="2">
Fair Evidence Requirements <a href="#fair-evidence-requirements" class="header-link"><i class="fa fa-link"></i></a>
</h4>
<p>To be considered FAIR, identity evidence <strong>SHALL</strong> meet <em>all</em> the following requirements:</p>
<ol>
<li>The issuing source of the evidence confirmed the claimed identity through a process designed to enable it to form a belief that it knows the real-life identity of the person. For example, evidence issued by financial institutions that have customer identity verification obligations under the Customer Identification Program (CIP) Rule implementing Section 326 of the USA PATRIOT Act of 2001, or that have obligations to establish an Identity Theft Prevention Program under the Red Flags Rule and Guidelines, implemented under Sec. 114 of the Fair and Accurate Credit Transaction Act of 2003 (FACT Act).</li>
</ol>
<div latex-literal="true" class="language-plaintext highlighter-rouge"><div class="highlight"><pre class="highlight"><code>\clearpage
</code></pre></div></div>
<ol>
<li>It is likely that the evidence-issuing process would result in the delivery of the evidence to the person to whom it relates, such as delivery to a postal address.</li>
<li>The evidence contains the name of the claimed identity.</li>
<li>The evidence contains at least one reference number, a facial portrait, or sufficient attributes to uniquely identify the person to whom it relates.</li>
<li>The evidence contains physical (e.g., security printing, optically variable features, holograms) or digital security features that make it difficult to reproduce.</li>
<li>The information on the evidence is able to be validated by an authoritative or credible source.</li>
<li>The evidence is able to be verified through an approved method, as provided in <a href="/800-63-4/sp800-63a/proofing/#validation-methods">Sec. 2.4.2.2</a>.</li>
</ol>
<h4 id="strong-evidence-requirements" data-section="2">
Strong Evidence Requirements <a href="#strong-evidence-requirements" class="header-link"><i class="fa fa-link"></i></a>
</h4>
<p>In order to be considered STRONG, identity evidence <strong>SHALL</strong> meet <em>all</em> the following requirements:</p>
<ol>
<li>The issuing source of the evidence confirmed the claimed identity by following written procedures designed to enable it to have high confidence that it knows the real-life identity of the subject. Additionally, these procedures are subject to recurring oversight by regulatory or publicly accountable institutions, such as states, the federal government, and some regulated industries. Such procedures would include, but not be limited to, identity proofing at IAL2 or above.</li>
<li>It is likely that the evidence-issuing process would result in the delivery of the evidence to the person to whom it relates, such as delivery to a postal address.</li>
<li>The evidence contains the name of the claimed identity.</li>
<li>The evidence contains a reference number or other attributes that uniquely identify the person to whom it relates.</li>
<li>The evidence contains a facial portrait or other biometric characteristic of the person to whom it relates.</li>
<li>The evidence includes physical security features or digital security features that make it difficult to copy or reproduce.</li>
<li>The information on the evidence is able to be validated by an authoritative or credible source.</li>
<li>The evidence is able to be validated through an approved method, as provided in <a href="/800-63-4/sp800-63a/proofing/#validation-methods">Sec. 2.4.2.2</a>.</li>
</ol>
<h4 id="superior-evidence-requirements" data-section="2">
Superior Evidence Requirements <a href="#superior-evidence-requirements" class="header-link"><i class="fa fa-link"></i></a>
</h4>
<p>In order to be considered SUPERIOR, identity evidence <strong>SHALL</strong> meet <em>all</em> the following requirements:</p>
<ol>
<li>The issuing source of the evidence confirmed the claimed identity by following written procedures designed to enable it to have high confidence that the source knows the real-life identity of the subject. Additionally, these procedures are subject to recurring oversight by regulatory or publicly accountable institutions, such as states and the federal government, and some regulated industries. Such procedures would include, but not be limited to, identity proofing at IAL2 or above.</li>
<li>The identity evidence contains attributes and data objects that are cryptographically protected and can be validated through verification of a digital signature applied by the issuing source.</li>
<li>The issuing source had the subject participate in an attended enrollment and identity proofing process that confirmed their physical existence.</li>
<li>It is likely that the evidence-issuing process would result in the delivery of the evidence to the person to whom it relates, such as delivery to a postal address.</li>
<li>The evidence contains the name of the claimed identity.</li>
<li>The evidence contains at least one reference number that uniquely identifies the person to whom it relates.</li>
<li>The evidence contains a facial portrait or other biometric characteristic of the person to whom it relates.</li>
<li>If the evidence is physical, then evidence includes security features that make it difficult to copy or reproduce.</li>
<li>The evidence is able to be verified through an approved method, as provided in <a href="/800-63-4/sp800-63a/proofing/#validation-methods">Sec. 2.4.2.2</a>.</li>
</ol>
<h3 id="identity-evidence-and-attribute-validation" data-section="2">
Identity Evidence and Attribute Validation <a href="#identity-evidence-and-attribute-validation" class="header-link"><i class="fa fa-link"></i></a>
</h3>
<p>Identity evidence validation involves examining the presented evidence to confirm it is authentic (not forged or altered), accurate (the information on the evidence is correct), and valid (unexpired or within the CSP’s defined timeframe for issuance or expiration). Attribute validation involves confirming the accuracy of the core attributes, whether obtained from presented evidence or self-asserted. The following subsections provide the acceptable methods for evidence and attribute validation.</p>
<h4 id="validation" data-section="2">
Evidence Validation <a href="#validation" class="header-link"><i class="fa fa-link"></i></a>
</h4>
<p>The CSP <strong>SHALL</strong> validate the authenticity, accuracy, and validity of presented evidence by confirming:</p>
<ul>
<li>The evidence is in the correct format and includes complete information for the identity evidence type;</li>
<li>The evidence is not counterfeit and that it has not been tampered with;</li>
<li>Any security features; and</li>
<li>The information on the evidence is accurate.</li>
</ul>
<h4 id="validation-methods" data-section="2">
Evidence Validation Methods <a href="#validation-methods" class="header-link"><i class="fa fa-link"></i></a>
</h4>
<p>Acceptable methods for validating presented evidence include:</p>
<ul>
<li>Visual and tactile inspection by trained personnel for onsite identity proofing;</li>
<li>Visual inspection by trained personnel for remote identity proofing;</li>
<li>Automated document validation processes using appropriate technologies; and</li>
<li>Cryptographic verification of the source and integrity of digital evidence, or attribute data objects.</li>
</ul>
<h4 id="attribute-validation" data-section="2">
Attribute Validation <a href="#attribute-validation" class="header-link"><i class="fa fa-link"></i></a>
</h4>
<p>The CSP <strong>SHALL</strong> validate all core attributes, as described in <a href="/800-63-4/sp800-63a/proofing/#CoreAttributes">Sec. 2.2</a>, whether obtained from identity evidence or self-asserted by the applicant, with an authoritative or credible source, as in <a href="/800-63-4/sp800-63a/proofing/#ValidSources">Sec. 2.4.2.4</a>.</p>
<h4 id="ValidSources" data-section="2">
Validation Sources <a href="#ValidSources" class="header-link"><i class="fa fa-link"></i></a>
</h4>
<p>The CSP <strong>SHALL</strong> use authoritative or credible sources that meet the following criteria.</p>
<p>An authoritative source is the issuing source of identity evidence or attributes, or has direct access to the information maintained by issuing sources, such as state DMVs for driver’s license data and the Social Security Administration for Social Security Cards and Social Security Numbers. An authoritative source may also be one that provides or enables direct access to issuing sources of evidence or attributes, such as the American Association of Motor Vehicle Administrators’ Driver’s License Data Verification (DLDV) Service.</p>
<p>A credible source is an entity that can provide or validate the accuracy of identity evidence and attribute information. In addition to being subject to regulatory oversight (such as the Fair Credit Reporting Act (FCRA)), a credible source has access to attribute information that can be traced to an authoritative source, or maintains identity attribute information obtained from multiple sources that is correlated for accuracy, consistency, and currency. Examples of credible sources are credit bureaus that are subject to the FCRA.</p>
<h2 id="identity-verification" data-section="2">
Identity Verification <a href="#identity-verification" class="header-link"><i class="fa fa-link"></i></a>
</h2>
<p>The goal of identity verification is to establish, to a specified level of confidence, the linkage between the claimed validated identity and the real-life applicant engaged in the identity proofing process. In other words, verification provides assurance that the applicant presenting the evidence is the rightful owner of that evidence.</p>
<h3 id="verification" data-section="2">
Identity Verification Methods <a href="#verification" class="header-link"><i class="fa fa-link"></i></a>
</h3>
<p>The CSP <strong>SHALL</strong> verify the linkage of the claimed identity to the applicant engaged in the identity proofing process through one or more of the following methods. <a href="/800-63-4/sp800-63a/ial/#ial-section">Section 4</a> provides acceptable verification methods at each IAL.</p>
<ul>
<li><strong>Confirmation Code Verification.</strong> The individual is able to demonstrate control of a piece of identity evidence through the return of a confirmation code, consistent with the requirements specified in <a href="3_ialgen#ConfirmCodes">Sec. 3.1.8</a>.</li>
<li><strong>Authentication and Federation Protocols.</strong> The individual is able to demonstrate control of a digital account (e.g., online bank account) or signed digital assertion (e.g., verifiable credentials) through the use of authentication or federation protocols. This may be done in person, through presentation of the credential to a device or reader, but can also be done during remote identity proofing sessions.</li>
<li><strong>Micro Transaction.</strong> An individual is able to demonstrate control of a piece of evidence by returning a value based on a micro transaction made between the CSP and the issuing source of the evidence (e.g., bank account).</li>
<li><strong>Onsite-In-person (Attended) visual facial image comparison.</strong> The proofing agent and applicant interact for the identity proofing event. The proofing agent performs a visual comparison of the facial portrait presented on identity evidence to the face of the applicant engaged in the identity proofing event.</li>
<li><strong>Remote (Attended or Unattended) visual facial image comparison.</strong> The proofing agent performs a visual comparison of the facial portrait presented on identity evidence, or stored by the issuing source, to the facial image of the applicant engaged in the identity proofing event. The proofing agent may interact directly with the applicant during some or all of the identity proofing event (attended) or may conduct the comparison at a later time (unattended) using a captured video or photograph and the uploaded copy of the evidence. If the comparison is performed at a later time, steps are taken to ensure the captured video or photograph was taken from the live applicant present during the identity proofing event.</li>
<li><strong>Automated (Unattended) biometric comparison.</strong> Automated biometric comparison, such as facial recognition or other fully automated algorithm-driven biometric comparison, <strong>MAY</strong> be performed for onsite or remote identity proofing events. The facial image or other biometric characteristic (e.g., fingerprints, palm prints, iris and retina patterns, voiceprints, or vein patterns) on the identity evidence, or stored in authoritative records, is compared to the facial image in a photograph of the live applicant or other biometric live sample collected from the applicant during the identity proofing event.</li>
</ul>
<p>Knowledge-based verification (KBV) or knowledge-based authentication <strong>SHALL NOT</strong> be used for identity verification.</p>
<h1 id="ial-general" data-section="3">
Identity Proofing Requirements <a href="#ial-general" class="header-link"><i class="fa fa-link"></i></a>
</h1>
<p><em>This section is normative.</em></p>
<p>This section provides requirements for CSPs that operate identity proofing and enrollment services, including requirements for identity proofing at each of the IALs. This section also includes additional requirements for federal agencies regardless of whether they operate their own identity service or use an external CSP.</p>
<p>Sections <a href="/800-63-4/sp800-63a/ial/#IAL1">4.1</a>, <a href="/800-63-4/sp800-63a/ial/#IAL2">4.2</a>, and <a href="/800-63-4/sp800-63a/ial/#IAL3">4.3</a> provide the requirements and guidelines for identity proofing at a specific IAL. <a href="/800-63-4/sp800-63a/ial/#summary">Section 4.4</a> includes a summarized list of these requirements by IAL in <a href="/800-63-4/sp800-63a/ial-general/#table-1">Table 1</a>.</p>
<h2 id="genProofReqs" data-section="3">
General Requirements <a href="#genProofReqs" class="header-link"><i class="fa fa-link"></i></a>
</h2>
<p>The requirements in this section apply to all CSPs performing identity proofing at any IAL.</p>
<h3 id="DocRecReqs" data-section="3">
Identity Service Documentation and Records <a href="#DocRecReqs" class="header-link"><i class="fa fa-link"></i></a>
</h3>
<p>The CSP <strong>SHALL</strong> conduct its operations according to a practice statement that details all identity proofing processes as they are implemented to achieve the defined IAL. The practice statement <strong>SHALL</strong> include, at a minimum:</p>
<ol>
<li>A complete service description including the particular steps the CSP follows to identity proof applicants at each offered assurance level;</li>
<li>The CSP’s policy for providing notice to applicants about the types of identity proofing processes available, the evidence and attribute collection requirements for the specified IAL, the purpose of PII collection (per <a href="/800-63-4/sp800-63a/ial-general/#AddlPrivacy">Sec. 3.1.3.2</a>), and for the collection, use, and retention of biometrics (see <a href="/800-63-4/sp800-63a/ial-general/#ProofBios">Sec. 3.1.11</a>);</li>
<li>The CSP’s policy for ensuring the identity proofing process is concluded in a timely manner, once the applicant has met all of the requirements;</li>
<li>Types of identity evidence the CSP accepts to meet the evidence strength requirements;</li>
<li>The CSP’s policy and process for validating and verifying identity evidence, including training and qualification requirements for personnel who have validation and verification responsibilities, as well as specific technologies the CSP employs for evidence validation and verification;</li>
<li>Alternative processes for the CSP to complete identity proofing for an individual applicant who does not possess the required identity evidence to complete the identity proofing process<sup id="fnref:alternatives" role="doc-noteref"><a href="#fn:alternatives" class="footnote">1</a></sup>;</li>
<li>The attributes that the CSP considers to be core attributes, and the authoritative and credible sources it uses for validating those attributes. Core attributes include the minimum set of attributes that the CSP needs to perform identity resolution as well as any additional attributes that the CSP collects and validates for the purposes of identity proofing, fraud mitigation, complying with laws or legal process, or conveying to relying parties (RPs) through attribute assertions;</li>
<li>The CSP’s policy and process for addressing identity proofing errors;</li>
<li>The CSP’s policy and process for identifying and remediating suspected or confirmed fraudulent accounts, including communicating with RPs and affected individuals;</li>
<li>The CSP’s policy for managing and communicating service changes (e.g., changes in data sources, integrated vendors, or biometric algorithms) to RPs;</li>
<li>The CSP’s policy for any conditions that would require re-verification of the user (e.g., account recovery, account abandonment, regulatory “recertification” requirements);</li>
<li>The CSP’s policy for conducting privacy risk assessments, including the timing of its periodic reviews and specific conditions that will trigger an updated privacy risk assessment (see <a href="/800-63-4/sp800-63a/ial-general/#PrivRiskAssess">Sec. 3.1.3.1</a>);</li>
<li>The CSP’s policy for conducting assessments to determine potential equity impacts, including the timing of its periodic reviews and any specific conditions that will trigger an out-of-cycle review (see <a href="/800-63-4/sp800-63a/ial-general/#EquityReqs">Sec. 3.1.4</a>); and,</li>
<li>The CSP’s policy for the collection, purpose, retention, protection, and deletion of all personal and sensitive data, including the treatment of all personal information if the CSP ceases operation or merges or transfers operations to another CSP.</li>
</ol>
<blockquote>
<p><strong>Note:</strong> 800-63C references the use of trust agreements to define requirements between an IdP, CSP, and RP in a federated relationship. CSP practice statements <strong>MAY</strong> be included directly in these agreements.</p>
</blockquote>
<h3 id="FraudMgmt" data-section="3">
Fraud Management <a href="#FraudMgmt" class="header-link"><i class="fa fa-link"></i></a>
</h3>
<p>A critical aspect of the identity proofing process is to mitigate fraudulent attempts to gain access to benefits, services, data, or assets protected by identity management systems. Resolution, Validation, and Verification processes in many instances can mitigate many attacks. However, with the constantly changing threat environment, the layering of additional checks and controls can provide increased confidence in proofed identities and additional protections against attacks intended to defeat other controls. The ability to identify, detect, and resolve instances of potential fraud is a critical functionality for CSPs and RPs alike.</p>
<h4 id="csp-fraud-management" data-section="3">
CSP Fraud Management <a href="#csp-fraud-management" class="header-link"><i class="fa fa-link"></i></a>
</h4>
<ol>
<li>CSPs <strong>SHALL</strong> establish and maintain a fraud management program that provides fraud identification, detection, investigation, reporting, and resolution capabilities. The specific capabilities and details of this program <strong>SHALL</strong> be documented within their CSP practice statement.</li>
<li>CSPs <strong>SHALL</strong> conduct a Privacy Risk Assessment of all fraud checks and fraud mitigation technologies prior to implementation.</li>
<li>The CSP <strong>SHALL</strong> establish a self-reporting mechanism and investigation capability for subjects who believe they have been the victim of fraud or an attempt to compromise their involvement in the identity proofing processes.</li>
<li>The CSP <strong>SHALL</strong> take measures to prevent unsuccessful applicants from inferring the accuracy of any self-asserted information with that confirmed by authoritative or credible sources.
NOTE: This is often called “data washing” and can be prevented through a number of methods, depending on the interfaces deployed by a CSP. As such, these guidelines do not dictate specific mechanisms to prevent this practice.</li>
<li>CSPs <strong>SHALL</strong> implement the following fraud check for all identity proofing processes:
<ul>
<li><strong>Date of Death Check</strong> – Confirm with a credible, authoritative, or issuing source that the applicant is not deceased. Such checks can aid in preventing synthetic identity fraud, the use of stolen identity information, and exploitation by a close associate or relative.</li>
</ul>
</li>
<li>CSPs <strong>SHOULD</strong> implement - but are not limited to - the following fraud checks for their identity proofing processes based on their available identity proofing types, selected technologies, evidence, and user base:
<ul>
<li><strong>SIM Swap Detection</strong> – Confirm that the phone number used in an identity proofing process has not been recently ported to a new user or device. Such checks can provide an indication that a phone or device was compromised by a targeted attack.</li>
<li><strong>Device or Account Tenure Check</strong> – Evaluate the length of time a phone or other account has existed without substantial modifications or changes. Such checks can provide additional confidence in the reliability of a device or piece of evidence used in the identity proofing process.</li>
<li><strong>Transaction Analytics</strong> – Evaluate anticipated transaction characteristics – such as IP Addresses, geolocations, and transaction velocities – to identify anomalous behaviors or activities that can indicate a higher risk or a potentially fraudulent event. Such checks can provide protections against scaled and automated attacks, as well as give indications of specific attack patterns being executed on identity systems.</li>
<li><strong>Fraud Indicator Check</strong> – Evaluate records, such as reported, confirmed, or historical fraud events to determine if there is an elevated risk related to a specific applicant, applicant’s data, or device. Such checks can give an indication of identity theft or compromise. Where such information is collected, aggregated, or exchanged across commercial platforms and made available for use to RPs and other CSPs, users <strong>SHALL</strong> be made aware of this practice. This also applies to all websites that report user activity to Federal RPs.</li>
</ul>
</li>
<li>CSPs <strong>MAY</strong> employ knowledge-based verification (KBV) as part of its fraud management program.</li>
<li>CSPs <strong>SHOULD</strong> consider the recency of fraud-related data when factoring it into fraud prevention capabilities and decisions.</li>
<li>For attended proofing processes, CSPs <strong>SHALL</strong> train proofing agents to detect indicators of fraud and <strong>SHALL</strong> provide proofing agents and trusted referees with tools to flag suspected fraudulent events for further treatment and investigation.</li>
<li>CSPs <strong>SHALL</strong> continuously monitor the performance of their fraud checks and fraud mitigation technologies to identify and remediate issues related to disparate performance across their platforms or between the demographic groups served by their identity service.</li>
<li>CSPs <strong>SHALL</strong> establish a technical or process-based mechanism to communicate suspected and confirmed fraudulent events to RPs.</li>
<li>CSPs <strong>SHOULD</strong> implement shared signaling, as described in NIST SP 800-63C-4, to communicate fraud events in real time to RPs.</li>
<li>CSPs <strong>MAY</strong> implement fraud mitigation measures as compensating controls. When this is done, these <strong>SHALL</strong> be documented as deviations from the normative guidance of these guidelines and <strong>SHALL</strong> be conveyed to all RPs through a Digital Identity Acceptance Statement prior to integration.</li>