Posted Jan 30
NIST 800-63A represents an important shift towards prioritizing stronger, phishing-resistant authenticatio...
The NIST 800-63 Digital Identity Guidelines serve as an essential framework for identity proofing, authentication and federated identities. These Guidelines create three IALs (Identity Assurance Levels), from IAL1 which doesn't require proofing to IAL3 which requires on-site physical verification.
TrustSwiftly can assist in meeting IAL3 with its flexible solution that offers remote identity proofing, facial image captures with liveness detection, and document authentication.
High-Assurance Process
OTP and SMS-based authentication can be vulnerable to sophisticated attacks; with IAL3 verification using a more robust process. In addition to document verification from authoritative sources, liveness detection by an agent authorized to do so may also be part of this step.
Agents would use devices with high pixel counts to mitigate risks of spoofing and secure connections to protect against malware threats. Once captured using Trust Swiftly with liveness detector, facial images would be compared with reference images and submitted for validation activities in accordance with STRONG evidence validation activities.
In-person IAL3 proofing helps decrease impersonation and fraud while increasing security and decreasing cyber liability. It can also help combat SIM swaps and MFA bypasses by securely linking biometrics with digital identities. Modern identity platforms fulfill NIST SP 800-63-4 by providing flexible modular frameworks of IAL, AAL and FAL that meet NIST SP 800-63-4 criteria, while providing Zero Trust Alignment through MFA hardware authenticators and strong federation.
Cryptographic Chain of Custody
Chain of Custody (CoC) is an essential element for the safe and reliable management of digital evidence. It involves documenting every step from collection, storage and transfer through transfer and destruction - including dates/times/party involved/action taken and any relevant comments. Furthermore, assigning responsible parties for each stage in its lifecycle helps increase accountability while decreasing internal mishandling risk.
An effective Chain of Custody (CoC) is integral to forensic investigations and legal proceedings, enabling investigators to track evidence back to its source and verify its integrity, which ultimately strengthens its reliability as evidence in court. Furthermore, such a CoC also helps organizations show compliance with various regulatory frameworks like GDPR or HIPAA.
Supervised Session
At its highest level of identity NIST IAL3 verification requires both physical and supervised remote interactions involving biometric comparison to evidence; similar to what DMVs require people do for many services like renewing driver's licenses or upgrading ID cards.
This process seeks to prevent large-scale attacks and targeted social engineering tactics such as fingerprinting, finger print scanning, facial capture, video manipulation and video tampering. Furthermore, enhanced processes must be put in place in order to validate and verify evidence and identities according to requirements outlined in 800-63B, Section 5.2.3.
Integrating this process with solutions such as HYPR Affirm enables organizations to meet both business and security objectives by strengthening IAL3 identity proofing via chat, video, liveness detection facial recognition technology, document authentication and step-up re-proofing based on risk. This lowers cyber liability insurance claims costs while simultaneously creating a stronger digital ecosystem that is less vulnerable and resilient.
Biometric Comparison
NIST 800-63A IAL3 Identity Proofing is the process of linking an online persona with real world identity. NIST digital identity guidelines stipulate that for Level III identity verification to pass muster, submitter must provide superior strength identity evidence as well as biometric comparison to prevent stand-in fraud and unauthorised access.
Biometric comparison allows a CSP to validate an enrollee's identity and confirm they were physically present during an in-person proofing session by comparing live capture of biometric characteristics against reference material in their ID&V evidence package.
TrustSwiftly, our FIDO-certified passwordless authentication IAL3 compliant solution, meets IAL3 requirements by strengthening the authentication journey with chat, video, facial recognition with liveness detection and document authentication, KYC/AML screenings and step-up re-proofing based on risk. In turn, this helps lower cyber liability insurance costs while simultaneously decreasing attack surface area from bad actors; providing cost-effective compliance solutions that meet NIST IAL3 and FedRAMP high compliance.
The NIST 800-63 Digital Identity Guidelines serve as an essential framework for identity proofing, authentication and federated identities. These Guidelines create three IALs (Identity Assurance Levels), from IAL1 which doesn't require proofing to IAL3 which requires on-site physical verification.
TrustSwiftly can assist in meeting IAL3 with its flexible solution that offers remote identity proofing, facial image captures with liveness detection, and document authentication.
High-Assurance Process
OTP and SMS-based authentication can be vulnerable to sophisticated attacks; with IAL3 verification using a more robust process. In addition to document verification from authoritative sources, liveness detection by an agent authorized to do so may also be part of this step.
Agents would use devices with high pixel counts to mitigate risks of spoofing and secure connections to protect against malware threats. Once captured using Trust Swiftly with liveness detector, facial images would be compared with reference images and submitted for validation activities in accordance with STRONG evidence validation activities.
In-person IAL3 proofing helps decrease impersonation and fraud while increasing security and decreasing cyber liability. It can also help combat SIM swaps and MFA bypasses by securely linking biometrics with digital identities. Modern identity platforms fulfill NIST SP 800-63-4 by providing flexible modular frameworks of IAL, AAL and FAL that meet NIST SP 800-63-4 criteria, while providing Zero Trust Alignment through MFA hardware authenticators and strong federation.
Cryptographic Chain of Custody
Chain of Custody (CoC) is an essential element for the safe and reliable management of digital evidence. It involves documenting every step from collection, storage and transfer through transfer and destruction - including dates/times/party involved/action taken and any relevant comments. Furthermore, assigning responsible parties for each stage in its lifecycle helps increase accountability while decreasing internal mishandling risk.
An effective Chain of Custody (CoC) is integral to forensic investigations and legal proceedings, enabling investigators to track evidence back to its source and verify its integrity, which ultimately strengthens its reliability as evidence in court. Furthermore, such a CoC also helps organizations show compliance with various regulatory frameworks like GDPR or HIPAA.
Supervised Session
At its highest level of identity NIST IAL3 verification requires both physical and supervised remote interactions involving biometric comparison to evidence; similar to what DMVs require people do for many services like renewing driver's licenses or upgrading ID cards.
This process seeks to prevent large-scale attacks and targeted social engineering tactics such as fingerprinting, finger print scanning, facial capture, video manipulation and video tampering. Furthermore, enhanced processes must be put in place in order to validate and verify evidence and identities according to requirements outlined in 800-63B, Section 5.2.3.
Integrating this process with solutions such as HYPR Affirm enables organizations to meet both business and security objectives by strengthening IAL3 identity proofing via chat, video, liveness detection facial recognition technology, document authentication and step-up re-proofing based on risk. This lowers cyber liability insurance claims costs while simultaneously creating a stronger digital ecosystem that is less vulnerable and resilient.
Biometric Comparison
NIST 800-63A IAL3 Identity Proofing is the process of linking an online persona with real world identity. NIST digital identity guidelines stipulate that for Level III identity verification to pass muster, submitter must provide superior strength identity evidence as well as biometric comparison to prevent stand-in fraud and unauthorised access.
Biometric comparison allows a CSP to validate an enrollee's identity and confirm they were physically present during an in-person proofing session by comparing live capture of biometric characteristics against reference material in their ID&V evidence package.
TrustSwiftly, our FIDO-certified passwordless authentication IAL3 compliant solution, meets IAL3 requirements by strengthening the authentication journey with chat, video, facial recognition with liveness detection and document authentication, KYC/AML screenings and step-up re-proofing based on risk. In turn, this helps lower cyber liability insurance costs while simultaneously decreasing attack surface area from bad actors; providing cost-effective compliance solutions that meet NIST IAL3 and FedRAMP high compliance.