Information technology — Security techniques — Identity proofing

ISO/IEC TS 29003:2018: ? gives guidelines for the identity proofing of a person; ? specifies levels of identity proofing, and requirements to achieve these levels. ISO/IEC TS 29003:2018 is applicable to identity management systems.

Technologies de l'information — Techniques de sécurité — Vérification de l'identité

General Information

Status
Published
Publication Date
14-Mar-2018
Current Stage
9020 - International Standard under periodical review
Start Date
15-Oct-2024
Completion Date
15-Oct-2024
Ref Project

Buy Standard

Technical specification
ISO/IEC TS 29003:2018 - Information technology -- Security techniques -- Identity proofing
English language
21 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (Sample)


TECHNICAL ISO/IEC TS
SPECIFICATION 29003
First edition
2018-03
Information technology — Security
techniques — Identity proofing
Technologies de l'information — Techniques de sécurité —
Vérification de l'identité
Reference number
©
ISO/IEC 2018
© ISO/IEC 2018
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting
on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address
below or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Fax: +41 22 749 09 47
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii © ISO/IEC 2018 – All rights reserved

Contents Page
Foreword .iv
Introduction .v
1 Scope . 1
2 Normative references . 1
3 Terms, definitions and abbreviated terms . 1
4 Identity proofing concepts . 3
4.1 Identity proofing . 3
4.2 Enrolment . 3
4.3 Proofing information . 3
4.4 Evidence of identity . 4
4.4.1 General. 4
4.4.2 Authoritative evidence. 5
4.4.3 Corroborative evidence . 5
4.5 Actors . 5
4.5.1 General. 5
4.5.2 Subject. 5
4.5.3 Proofing party . 5
4.5.4 Verifier . 5
4.6 Evidence of identity strength considerations . 6
4.7 Levels of identity proofing . 6
4.8 One identity per subject . 7
4.9 Deceased subjects. 8
5 Requirements for identity proofing . 8
5.1 Identity proofing policy . 8
5.2 Determining the level of identity proofing . 8
5.3 Identity is unique . 9
5.4 Existence of identity in evidence . 9
5.5 Identity is bound to a subject .10
Annex A (informative) Evidence of identity and binding examples .11
Annex B (informative) Contra-indications and fraud detection .17
Bibliography .21
© ISO/IEC 2018 – All rights reserved iii

Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are
members of ISO or IEC participate in the development of International Standards through technical
committees established by the respective organization to deal with particular fields of technical
activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international
organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the
work. In the field of information technology, ISO and IEC have established a joint technical committee,
ISO/IEC JTC 1.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular the different approval criteria needed for
the different types of document should be noted. This document was drafted in accordance with the
editorial rules of the ISO/IEC Directives, Part 2 (see www .iso .org/ directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject
of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent
rights. Details of any patent rights identified during the development of the document will be in the
Introduction and/or on the ISO list of patent declarations received (see www .iso .org/ patents).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation on the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO's adherence to the
World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT) see the following
URL: www .iso .org/ iso/ foreword .html.
This document was prepared by Technical Committee ISO/IEC JTC 1, Information technology,
Subcommittee SC 27, Security techniques.
iv © ISO/IEC 2018 – All rights reserved

Introduction
An International Standard for identity proofing of natural persons is required, to which other identity
management standards can refer.
A large and increasing number of industry and government organizations seek an international identity
proofing standard. This document enables interoperability and federated trust for the purposes of
digital economies and societies, and support international cyber assurance across supply chains and
global commons.
This document relates to: the ISO/IEC 24760 series which specifies a general framework for identity
management, including a life cycle for identity information; and ISO/IEC 29115, which specifies levels
of assurance for entity authentication. These standards focus primarily on the policy and technical
standards for the issuance and operation of identity management and access management systems,
which come after the process of enrolment. The use of these standards can benefit from a standard for
identity proofing of persons.
This document is intended to be used by any entity that performs identity proofing, such as described
in ISO/IEC 29115 and/or the ISO/IEC 24760 series.
© ISO/IEC 2018 – All rights reserved v

TECHNICAL SPECIFICATION ISO/IEC TS 29003:2018(E)
Information technology — Security techniques — Identity
proofing
1 Scope
This document:
— gives guidelines for the identity proofing of a person;
— specifies levels of identity proofing, and requirements to achieve these levels.
This document is applicable to identity management systems.
2 Normative references
There are no normative references in this document.
3 Terms, definitions and abbreviated terms
For the purposes of this document, the following terms and definitions apply.
ISO and IEC maintain terminological databases for use in standardization at the following addresses:
— ISO Online browsing platform: available at https:// www .iso .org/ obp
— IEC Electropedia: available at https:// www .electropedia .org/
3.1
application
process whereby information to be used for identity (3.9) proofing of a subject (3.15) is provided
3.2
authoritative evidence
evidence that holds identifying attribute(s) (3.8) that are managed by an authoritative party (3.3)
Note 1 to entry: This is one type of evidence of identity.
Note 2 to entry: Authoritative evidence for a particular identifying attribute can be only corroborative evidence
for another.
3.3
authoritative party
entity that has the recognized right to create or record, and has responsibility to directly manage, an
identifying attribute (3.8)
Note 1 to entry: Jurisdiction(s) and/or industry communities sometimes nominate a party as authoritative. It is
possible that such a party is subject to legal controls.
3.4
context
environment with defined boundary conditions in which subjects (3.15) exist and interact
[SOURCE: ITU-T X.1252 (4/2010), 6.20, modified — entities has been replaced by subjects.]
© ISO/IEC 2018 – All rights reserved 1

3.5
corroborative evidence
evidence that holds identifying attribute(s) (3.8) that are not managed by an authoritative party (3.3)
Note 1 to entry: It is possible that the identifying attributes in corroborative evidence are not as up-to-date or
accurate as those in authoritative evidence.
Note 2 to entry: This is one type of evidence of identity.
Note 3 to entry: Corroborative evidence for a particular identifying attribute can be authoritative evidence for
another.
3.6
credential
set of data presented as evidence of a claimed or asserted identity (3.9) and/or entitlements
[SOURCE: ISO/IEC 29115:2013, 3.8, modified — The Note has been deleted.]
3.7
evidence of identity
EOI
evidence that provides a degree of confidence that a subject (3.15) is represented by the identity (3.9)
being claimed
3.8
identifying attribute
attribute that contributes to uniquely identifying a subject (3.15) within a context
3.9
identity
set of attributes related to a person (3.12)
[SOURCE: ISO/IEC 24760-1:2011, 3.1.2, modified — “entity” has been replaced by “person” and the
Notes have been deleted.]
3.10
identity information
set of values of attributes optionally with any associated metadata in an identity (3.9)
[SOURCE: ISO/IEC 24760-1:2011, 3.2.4, modified — The Note has been deleted.]
3.11
level of identity proofing
LoIP
confidence achieved in the identity proofing
3.12
person
human being
3.13
proofing information
information collected for identity proofing
3.14
proofing party
entity that performs identity proofing of a subject (3.15)
3.15
subject
person (3.12) whose identity (3.9) is being proofed
2 © ISO/IEC 2018 – All rights reserved

3.16
supporting attribute
attribute that is used in identity proofing but not as an identifying attribute (3.8)
4 Identity proofing concepts
4.1 Identity proofing
Identity proofing is the process to verify identifying attribute(s) to be entered into an identity
management system and to establish that the identifying attributes pertain to the subject to be enrolled.
Deploying an identity proofing function should include:
— documenting the policy for identity proofing, the processes conducted and the designated team or
person in ch
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.