• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.001 ■ Spring 2024 ■ David Lanter
  • Homepage
  • Instructor
  • Syllabus
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Participation
    • Team Project
  • Harvard Coursepack

NIST SP 800 63-3 “Digital Identity Guidelines”

February 28, 2024 by David Lanter 15 Comments

Filed Under: 08 - Access Control Tagged With:

Reader Interactions

Comments

  1. Yannick Rugamba says

    March 10, 2024 at 8:21 pm

    In NIST SP 800 63 3 they discuss how identity assurance is divided into three categories. Identity Assurance Level (IAL) Authenticator Assurance Level (AAL) and Federation Assurance Level (FAL). This gives organizations the flexibility to choose the right assurance levels, for each area based on their services risk assessment, of being limited to a single LOA as, in previous editions.

    Log in to Reply
  2. Eyup Aslanbay says

    March 10, 2024 at 10:17 pm

    This chapter highlights the three elements of identity assurance: Identity Assurance Level , Authentication Assurance Level, and Federation Assurance Level. IAL concerns identity verification, AAL deals with the reliability of authentication, and FAL assesses assertion strength in federal contexts. The inclusion of visual aids and detailed descriptions, alongside a decision tree, proved useful in evaluating an organization’s tolerance for risk.

    Log in to Reply
  3. Bo Wang says

    March 10, 2024 at 10:27 pm

    NIST SP 800-63-3 “Digital Identity Guidelines” emphasizes the importance of separating identity proofing and authentication processes. Identity proofing is the initial verification of an individual’s identity, while authentication is the ongoing process of confirming that identity during access or transactions. This separation ensures a secure and reliable digital identity system.

    Log in to Reply
    • Ooreofeoluwa Koyejo says

      March 11, 2024 at 4:33 pm

      Identity proofing ensures the identities involve the verification of the identities stored to have guaranteed access to the applications/systems. The authentication process involves validating the identities for authorization (permissions) in the applications/systems.

      Log in to Reply
  4. Celinemary Turner says

    March 11, 2024 at 3:11 am

    NIST SP 800 63. These guidelines talk about MFA and how the authentication method should use at least 2 of the following:
    A. something you know.
    b. Something you have
    c. something you are.
    It also discusses the potential failures of identity proofing. These could be caused by accidentally providing access to the wrong person (e.g., a hacker successfully getting into a system by authenticating as someone else) or by excessive identity proofing, which occurs when more data is stored than necessary to authenticate someone.

    Log in to Reply
    • Ooreofeoluwa Koyejo says

      March 11, 2024 at 4:35 pm

      MFA aims at providing a defence-in-depth in the authentication process, security professionals need to ensure the different levels are different factors and not duplicating factors across each level of the MFA.

      Log in to Reply
    • Bo Wang says

      March 12, 2024 at 7:51 pm

      I agree with you that fingerprints and passwords should be used together.

      Log in to Reply
  5. Jon Stillwagon says

    March 11, 2024 at 2:11 pm

    NIST SP 800-63 digital identify risk management talks about proofing, proofing, an authenticator, and federal requirements. We want to avoid identity proofing errors, authentication errors, and federation errors because with these errors someone could take advantage of these errors to spoof someone’s identity to steal or damage company information. There is even an excessive amount of identity proofing which stores more information than what needs to be stored. Risk management goes through all of these and determines the extent each risk is mitigated by identity proofing, authentication, and federation processes.

    Log in to Reply
    • Ooreofeoluwa Koyejo says

      March 11, 2024 at 4:41 pm

      As expected in every technology, errors, flaws and false positives are generated and the function of security professionals is the continuous process of improving these errors towards achieving the acceptable risk defined and approved by management.

      Log in to Reply
    • Eyup Aslanbay says

      March 12, 2024 at 10:51 pm

      You highlight the key aspects of NIST SP 800-63 regarding digital identity risk management, emphasizing the importance of minimizing errors in identity proofing, authentication, and federation to protect against identity spoofing and data breaches. Good point for the potential risks of excessive identity proofing and underscores the role of risk management in evaluating and mitigating these risks.

      Log in to Reply
    • Edge Kroll says

      March 13, 2024 at 12:32 am

      Hi Jon,
      Your observation about the potential for identity-proofing errors to result in the storage of excessive information is particularly noteworthy. Striking the right balance between obtaining the necessary information for identity verification and minimizing the data stored is crucial. Over-collection of data not only poses privacy concerns but also increases the attack surface for potential cyber threats.

      Log in to Reply
  6. Ooreofeoluwa Koyejo says

    March 11, 2024 at 3:32 pm

    Digital identity is the unique representation of a subject engaged in an online transaction. The process used to verify a subject’s association with their real-world identity is called identity proofing. The party to be authenticated is called a claimant and the party verifying that identity is called a verifier.

    The digital identity model describes the enrollment and identity-proofing system which involves credential issuance, lifecycle management activities, and various states of an identity-proofing and authentication process.

    Log in to Reply
    • Yannick Rugamba says

      March 12, 2024 at 8:46 pm

      I noticed the focus on confirming identities stood out to me. It’s not about validating someones identity but also ensuring their online persona aligns with who they’re in real life. That verification step appears essential, for establishing trust.

      Log in to Reply
  7. Yannick Rugamba says

    March 12, 2024 at 8:45 pm

    I noticed the focus on confirming identities stood out to me. It’s not about validating someone’s identity but also ensuring their online persona aligns with who they’re in real life. That verification step appears essential, for establishing trust.

    Log in to Reply
    • Yannick Rugamba says

      March 12, 2024 at 8:47 pm

      Erratum, this is should a reply on Oore post,

      Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (1)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (4)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (5)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in