• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.001 ■ Spring 2024 ■ David Lanter
  • Homepage
  • Instructor
  • Syllabus
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Participation
    • Team Project
  • Harvard Coursepack

NIST SP 800 63A “Digital Identity Guidelines Enrollment and Identity Proofing”

February 28, 2024 by David Lanter 8 Comments

Filed Under: 08 - Access Control Tagged With:

Reader Interactions

Comments

  1. Yannick Rugamba says

    March 10, 2024 at 8:23 pm

    One crucial aspect highlighted in NIST SP 800 63A is the significance of minimizing the gathering of information (PII) when verifying ones identity. It stresses the need to only collect data required to confirm and authenticate the identity. This practice of minimizing data aims to safeguard users privacy by restricting the collection of information thereby lowering the chances of access or misuse of such data.

    Log in to Reply
  2. Eyup Aslanbay says

    March 10, 2024 at 10:20 pm

    The rise in digital services across various sectors has made Enrollment and Identity Proofing increasingly vital, especially with growing cases of impersonation and fraud. NIST 800-63A provides guidelines for individuals to authenticate their identities and enroll in identity systems, offering criteria for risk mitigation in both remote and in-person scenarios.

    Log in to Reply
  3. Bo Wang says

    March 10, 2024 at 10:28 pm

    NIST SP 800-63A, part of the “Digital Identity Guidelines,” outlines the requirements for enrollment and identity proofing. It emphasizes the need for varying levels of identity proofing (IALs) based on the risk associated with the service or application. Higher risk levels require more stringent proofing processes to ensure the identity being claimed is not fraudulent.

    Log in to Reply
    • Yannick Rugamba says

      March 12, 2024 at 8:59 pm

      I’m curious though how challenging is it for companies to figure out the IAL for their needs? It seems like getting that risk evaluation accurate could be quite tricky.
      When it comes to IALs I can picture the verification process becoming quite rigorous and possibly causing some resistance, from users… I suppose that’s the compromise, for security.
      It serves as a reminder that there isn’t a one size fits all solution. The guidelines allow for customization of the verification process based on the circumstances. Pretty fascinating stuff!

      Log in to Reply
  4. Celinemary Turner says

    March 11, 2024 at 3:13 am

    NIST SP 800-63A includes the enrollment and identity proofing process requirement before users access the system. There are three different identity levels. Identity Assurance Level 1 does not require linking the applicants to a specific real-life identity. Identity Assurance Level 2 requires users to prove their identity remotely or in person. Identity Assurance Level 3 takes a step further than Level 2 and requires the user to identify using one of the biometric authentication processes.

    Log in to Reply
  5. Jon Stillwagon says

    March 11, 2024 at 2:54 pm

    In NIST SP 800-63A Identity assurance level requirements objective for identity proofing is to make sure that whoever says who they are they need to have some level of certitude. Having some level of certitude will include a presentation, validation, and verification of the persons identity. There is a process for proofing ones identity which goes resolution first, validation second, and verification third. There is also three categories which are identity assurance level 1, 2, and 3 each level tells what to do and what not to do. For example a level 1 identity assurance shall not validate and verify attributes.

    Log in to Reply
    • Eyup Aslanbay says

      March 12, 2024 at 10:54 pm

      Yes, NIST SP 800-63A breaks down identity assurance into stages and levels, clearly highlighting the nuanced differences, especially the limitations at level 1, in the identity proofing process. It’s a good point.

      Log in to Reply
  6. Ooreofeoluwa Koyejo says

    March 11, 2024 at 4:07 pm

    There are two specific use cases for deriving identity:
    1. A claimant seeks to obtain a derived personal identity verification, bound to their identity record, for use only within the limits and authorizations of having a personal identity verification smartcard.
    2. An applicant seeks to establish a credential with a credential service provider with which the individual does not have a pre-existing relationship.

    There are two general categories of threats to the enrollment process: impersonation, and either compromise or malfeasance of the infrastructure provider.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (1)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (4)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (5)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in