Information security, cybersecurity and privacy protection - A framework for identity management - Part 3: Practice

This document: - provides requirements and guidance for the management of identity information and for ensuring that an identity management system conforms to ISO/IEC 24760-1 and ISO/IEC 24760-2; - is applicable to any information system where information relating to identity is processed or stored; - is considered to be a horizontal document for the following reasons: - it applies concepts such as distinguishing the term “identity” from the term “identifier” on the implementation of systems for the management of identity information and on the requirements for the implementation and operation of a framework for identity management, - it provides an important contribution to assess identity management systems with regard to their privacy-friendliness and their ability to assure the relevant attributes of an identity, and consequently it provides a foundation and a common understanding for any other standard addressing identity, identity information, and identity management.

Sécurité de l'information, cybersécurité et protection de la vie privée — Cadre pour la gestion de l'identité — Partie 3: Mise en œuvre

La présente partie de l'ISO/IEC 24760 fournit des recommandations pour la gestion des informations d'identité et pour s'assurer qu'un système de gestion de l'identité est conforme à l'ISO/IEC 24760-1 et à l'ISO/IEC 24760-2. La présente partie de l'ISO/IEC 24760 est applicable à un système de gestion de l'identité dans lequel des identificateurs ou des DCP relatifs à des entités sont acquis, traités, stockés, transférés ou utilisés à des fins d'identification ou d'authentification d'entités et/ou à des fins de prise de décision à l'aide d'attributs d'entités. Les pratiques relatives à la gestion de l'identité peuvent également être traitées dans d'autres normes.

General Information

Status
Published
Publication Date
15-Sep-2025
Current Stage
6060 - International Standard published
Start Date
16-Sep-2025
Due Date
17-Jul-2026
Completion Date
16-Sep-2025

Relations

Effective Date
22-Jul-2023
Effective Date
22-Jul-2023

Overview - ISO/IEC 24760-3:2025 (Part 3: Practice)

ISO/IEC 24760-3:2025 is the practical part of the ISO/IEC 24760 identity management framework. It provides requirements and guidance for managing identity information and for ensuring an identity management system (IdMS) conforms to ISO/IEC 24760-1 (core concepts) and ISO/IEC 24760-2 (reference architecture and requirements). Applicable to any information system that processes or stores identity information, this second edition is published as a horizontal document to support consistent, privacy-friendly identity management across sectors.

Key technical topics and requirements

  • Risk assessment and mitigation: Guidance on assessing identity-related risk across the identity lifecycle, and defining assurance levels and confidentiality, integrity and availability requirements for identity information.
  • Assurance in identity information: Practices for identity proofing, issuance and management of credentials, and establishing identity profiles using identity templates.
  • Identifiers and identity information management: Distinctions between identity and identifier, categorization of identifiers (by entity type, linking nature, grouping, value creation) and practical controls for identifier lifecycle management.
  • Access and audit controls: Policies for accessing identity information, auditing identity information usage, and controlling identity-based access to resources.
  • Control objectives and controls: Contextual and architectural control components for establishing, operating and controlling an identity management system (including establishing identity information and managing its use).
  • Federation and privacy-enhancing practices (informative annexes): Guidance on federated identity management and on using attribute-based credentials to enhance privacy protection.

Practical applications - who uses this standard

ISO/IEC 24760-3 is designed for practitioners responsible for design, implementation and governance of identity systems:

  • Identity architects and system designers - to align IdMS architecture with identity lifecycle, identifiers and assurance requirements.
  • Security and privacy officers - to perform risk assessments, define assurance levels, and ensure privacy-friendly controls.
  • Identity providers, identity information authorities (IIA) and relying parties (RP) - to manage identity proofing, credential issuance and access decisions.
  • Auditors and regulators - to assess conformance, controls and privacy protections.
  • Software and service vendors - to develop IdMS components, federation services, and attribute-based credential solutions.

Related standards

This part is intended to work with and underpin:

  • ISO/IEC 24760-1 (Core concepts and terminology)
  • ISO/IEC 24760-2 (Reference architecture and requirements)
  • Privacy and identity-related standards such as ISO/IEC 29100, 29101, 29115, 29134, 29146, 29151.

Keywords: ISO/IEC 24760-3, identity management, identity information, identity management system, identity proofing, credentials, identifiers, privacy protection, assurance, risk assessment, federated identity.

Standard

ISO/IEC 24760-3:2025 - Information security, cybersecurity and privacy protection — A framework for identity management — Part 3: Practice Released:16. 09. 2025

English language
31 pages
sale 15% off
Preview
sale 15% off
Preview

Frequently Asked Questions

ISO/IEC 24760-3:2025 is a standard published by the International Organization for Standardization (ISO). Its full title is "Information security, cybersecurity and privacy protection - A framework for identity management - Part 3: Practice". This standard covers: This document: - provides requirements and guidance for the management of identity information and for ensuring that an identity management system conforms to ISO/IEC 24760-1 and ISO/IEC 24760-2; - is applicable to any information system where information relating to identity is processed or stored; - is considered to be a horizontal document for the following reasons: - it applies concepts such as distinguishing the term “identity” from the term “identifier” on the implementation of systems for the management of identity information and on the requirements for the implementation and operation of a framework for identity management, - it provides an important contribution to assess identity management systems with regard to their privacy-friendliness and their ability to assure the relevant attributes of an identity, and consequently it provides a foundation and a common understanding for any other standard addressing identity, identity information, and identity management.

This document: - provides requirements and guidance for the management of identity information and for ensuring that an identity management system conforms to ISO/IEC 24760-1 and ISO/IEC 24760-2; - is applicable to any information system where information relating to identity is processed or stored; - is considered to be a horizontal document for the following reasons: - it applies concepts such as distinguishing the term “identity” from the term “identifier” on the implementation of systems for the management of identity information and on the requirements for the implementation and operation of a framework for identity management, - it provides an important contribution to assess identity management systems with regard to their privacy-friendliness and their ability to assure the relevant attributes of an identity, and consequently it provides a foundation and a common understanding for any other standard addressing identity, identity information, and identity management.

ISO/IEC 24760-3:2025 is classified under the following ICS (International Classification for Standards) categories: 35.030 - IT Security. The ICS classification helps identify the subject area and facilitates finding related standards.

ISO/IEC 24760-3:2025 has the following relationships with other standards: It is inter standard links to ISO/IEC 24760-3:2016/Amd 1:2023, ISO/IEC 24760-3:2016. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.

You can purchase ISO/IEC 24760-3:2025 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of ISO standards.

Standards Content (Sample)


International
Standard
ISO/IEC 24760-3
Second edition
Information security, cybersecurity
2025-09
and privacy protection —
A framework for identity
management —
Part 3:
Practice
Sécurité de l'information, cybersécurité et protection de la vie
privée — Cadre pour la gestion de l'identité —
Partie 3: Mise en œuvre
Horizontal document
Reference number
© ISO/IEC 2025
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on
the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below
or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
© ISO/IEC 2025 – All rights reserved
ii
Contents Page
Foreword .iv
Introduction .v
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Abbreviated terms . 2
5 Mitigating identity related risk in managing identity information . 2
5.1 Overview .2
5.2 Risk assessment .3
5.3 Assurance in identity information .3
5.3.1 General .3
5.3.2 Identity proofing .3
5.3.3 Credentials .3
5.3.4 Identity profile .4
6 Identity information and identifiers . 4
6.1 Overview .4
6.2 Policy on accessing identity information .4
6.3 Identifiers .5
6.3.1 General .5
6.3.2 Categorization of identifier by the type of entity to which the identifier is linked .5
6.3.3 Categorization of identifier by the nature of linking .5
6.3.4 Categorization of identifier by the grouping of entities .6
6.3.5 Management of identifiers .6
6.3.6 Categorization of identifier by method of value creation .6
7 Auditing identity information usage . 7
8 Control objectives and controls . 7
8.1 General .7
8.2 Contextual components for control .8
8.2.1 Establishing an identity management system .8
8.2.2 Establishing identity information .10
8.2.3 Managing identity information .11
8.3 Architectural components for control . 12
8.3.1 Establishing an identity management system . 12
8.3.2 Controlling an identity management system . 13
Annex A (informative) Practice of managing identity information in a federation of identity
management systems .15
Annex B (informative) Identity management practice using attribute-based credentials to
enhance privacy protection .24
Bibliography .31

© ISO/IEC 2025 – All rights reserved
iii
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are
members of ISO or IEC participate in the development of International Standards through technical
committees established by the respective organization to deal with particular fields of technical activity.
ISO and IEC technical committees collaborate in fields of mutual interest. Other international organizations,
governmental and non-governmental, in liaison with ISO and IEC, also take part in the work.
The procedures used to develop this document and those intended for its further maintenance are described
in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for the different types
of document should be noted. This document was drafted in accordance with the editorial rules of the ISO/
IEC Directives, Part 2 (see www.iso.org/directives or www.iec.ch/members_experts/refdocs).
ISO and IEC draw attention to the possibility that the implementation of this document may involve the
use of (a) patent(s). ISO and IEC take no position concerning the evidence, validity or applicability of any
claimed patent rights in respect thereof. As of the date of publication of this document, ISO and IEC had not
received notice of (a) patent(s) which may be required to implement this document. However, implementers
are cautioned that this may not represent the latest information, which may be obtained from the patent
database available at www.iso.org/patents and https://patents.iec.ch. ISO and IEC shall not be held
responsible for identifying any or all such patent rights.
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and expressions
related to conformity assessment, as well as information about ISO's adherence to the World Trade
Organization (WTO) principles in the Technical Barriers to Trade (TBT) see www.iso.org/iso/foreword.html.
In the IEC, see www.iec.ch/understanding-standards.
This document was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology,
Subcommittee SC 27, Information security, cybersecurity and privacy protection.
This second edition cancels and replaces the first edition (ISO/IEC 24760-3:2016), which has been technically
revised. It also incorporates the Amendment ISO/IEC 24760-3:2016/Amd 1:2023.
The main changes are as follows:
— title has been updated;
— the document has been editorially revised.
A list of all parts in the ISO/IEC 24760 series can be found on the ISO website.
This document has been given the status of a horizontal document in accordance with the ISO/IEC
Directives, Part 1.
Any feedback or questions on this document should be directed to the user’s national standards
body. A complete listing of these bodies can be found at www.iso.org/members.html and
www.iec.ch/national-committees.

© ISO/IEC 2025 – All rights reserved
iv
Introduction
Data processing systems commonly gather a range of information on their users, be it a person, piece of
equipment, or piece of software connected to them, and make decisions based on the gathered information.
Such identity-based decisions can concern access to applications or other resources.
To address the need to efficiently and effectively implement systems that make identity-based decisions, the
ISO/IEC 24760 series specifies a framework for the issuance, administration, and use of data that serves to
characterize individuals, organizations or information technology components, which operate on behalf of
individuals or organizations.
For many organizations, the proper management of identity information is crucial for maintaining security
within organizational processes. For individuals, correct identity management is important for protecting
privacy.
The ISO/IEC 24760 series specifies fundamental concepts and operational structures for identity
management and provides a framework on which information systems can meet business, contractual,
regulatory, and legal obligations.
This document specifies practices for identity management. These practices cover assurance in controlling
identity information use, controlling the access to identity information and other resources based on identity
information, and controlling objectives that should be implemented when establishing and maintaining an
identity management system.
This document is intended to provide a foundation for the practices for identity management in other
international standards related to identity information processing including other parts of the ISO/IEC 24760
series, ISO/IEC 29100, ISO/IEC 29101, ISO/IEC 29115, and ISO/IEC 29146.

© ISO/IEC 2025 – All rights reserved
v
International Standard ISO/IEC 24760-3:2025(en)
Information security, cybersecurity and privacy protection —
A framework for identity management —
Part 3:
Practice
1 Scope
This document:
— provides requirements and guidance for the management of identity information and for ensuring that
an identity management system conforms to ISO/IEC 24760-1 and ISO/IEC 24760-2;
— is applicable to any information system where information relating to identity is processed or stored;
— is considered to be a horizontal document for the following reasons:
— it applies concepts such as distinguishing the term “identity” from the term “identifier” on the
implementation of systems for the management of identity information and on the requirements for
the implementation and operation of a framework for identity management,
— it provides an important contribution to assess identity management systems with regard to their
privacy-friendliness and their ability to assure the relevant attributes of an identity, and consequently
it provides a foundation and a common understanding for any other standard addressing identity,
identity information, and identity management.
2 Normative references
The following documents are referred to in the text in such a way that some or all of their content constitutes
requirements of this document. For dated references, only the edition cited applies. For undated references,
the latest edition of the referenced document (including any amendments) applies.
ISO/IEC 24760-1:2025, Information security, cybersecurity and privacy protection — A framework for identity
management — Part 1: Core concepts and terminology
ISO/IEC 24760-2, Information security, cybersecurity and privacy protection — A framework for identity
management — Part 2: Reference architecture and requirements
3 Terms and definitions
For the purposes of this document, the terms and definitions given in ISO/IEC 24760-1 and the following apply.
ISO and IEC maintain terminology databases for use in standardization at the following addresses:
— ISO Online browsing platform: available at https:// www .iso .org/ obp
— IEC Electropedia: available at https:// www .electropedia .org/
3.1
identity profile
identity containing attributes specified by an identity template

© ISO/IEC 2025 – All rights reserved
3.2
identity template
definition of a specific set of attributes
Note 1 to entry: Typically, the attributes in a profile are intended to support a particular technical or business purpose
as needed by relying parties.
3.3
identity theft
result of a successful false claim of identity
4 Abbreviated terms
For the purposes of this document, the following abbreviated terms apply.
ICT Information and communication technology
IIP Identity information provider
IIA Identity information authority
PII Personally identifiable information
RP Relying party
5 Mitigating identity related risk in managing identity information
5.1 Overview
This clause presents practices to address identity related risk when operating an identity management
system conforming to ISO/IEC 24760-1 and ISO/IEC 24760-2.
Figure 1 shows the operational scope of an identity management system. The arrows in the figure identify
processes that affect the recorded identity information. Details of these processes are presented in
ISO/IEC 24760-1:2025, Clause 7. These processes are the prime areas of concern in assessing risks in the
implementation of an identity management system.
NOTE ISO/IEC 24760-1:2025, Figure 1 shows that when an identity is registered, it can be in different stages:
unknown, established, active, suspended or archived. Authentication of an entity typically can only be successful if its
identity is active.
Figure 1 — Operational scope of an identity management system

© ISO/IEC 2025 – All rights reserved
5.2 Risk assessment
A function of an identity management system is managing identity as data; secure operation of this data
management system involves managing the risk of identity errors while protecting the confidentiality,
integrity and availability of identity information that is stored, processed and communicated. A risk
assessment should be conducted to determine the level of risk of the identity management system. The risk
management should take into account the lifecycle of identity and identity information that evolve over
time and can impact consumers of this information. The result provides information, which the identity
management system can use to determine the necessary risk management criteria and processes. The sort
of information the identity management system requires includes the level of assurance of identity required
and the requirements for confidentiality, integrity and availability of identity information.
ISO/IEC 24760-2 specifies tools to manage risks as policies, regulation, design and architecture. In some
contexts, involving consumers, protecting personally identifiable information and giving principals control
over the use of their personally identifiable information is paramount. ISO/IEC 29100, ISO/IEC 29101,
ISO/IEC 29134 and ISO/IEC 29151 specify requirements and provide guidance for the protection of privacy.
Identity information managed by an identity management system may also be managed by reference to
identity information providers in another domain. For example, identity proofing may be undertaken by a
service provider, which operates in a different domain to that of the identity management system.
When identity information is collected and stored, risk management measures shall be implemented by the
identity management service. These measures mitigate the risks identified by a risk assessment carried
out in the application domain by the relying party. Levels of assurance concerning identity information and
access services shall be determined and specified by the relying party according to assessed levels of risk.
5.3 Assurance in identity information
5.3.1 General
Confidence in identity information provided by an identity management system comes from processes that
ensure the validity of the information from its collection through its subsequent storage and maintenance by
the system. Assurance is typically quantified in terms of assurance levels with higher levels corresponding
to greater assurance. The level of assurance achieved depends on the quality of the identity information and
the rigour of the identity validation processes. Levels of assurance are described in ISO/IEC 29115.
5.3.2 Identity proofing
Identity proofing, i.e. validating identity information for enrolment of an entity in a domain, shall meet a
defined level of assurance. The level of assurance of identity proofing achievable depends on the type
and characteristics of information and, in some cases, the scope of this information, e.g. the number of
independent identity information providers used as sources of the information.
An increased level of assurance in identity verification may be achieved:
— with verification of additional credentials issued from multiple sources, and
— using a trusted external party that knows the entity to validate claimed identity information.
NOTE 1 ISO/IEC TS 29003 provides requirements for identity proofing.
NOTE 2 ISO/IEC 29115 specifies how to achieve different levels of assurance.
5.3.3 Credentials
An identity management system may issue multiple types of credential, differing in the level of assurance of
the identity information represented by the credential.

© ISO/IEC 2025 – All rights reserved
An identity management system issuing credentials with a high level of assurance supported by a
cryptographic mechanism should provide a service for relying parties to actively support the cryptographic
validation process.
An issuer of a credential in physical form shall implement an identity management system to process the
identity of the credential device in accordance with ISO/IEC 24760-1 and ISO/IEC 24760-2.
5.3.4 Identity profile
An identity management system may use one or more identity profiles for gathering, structuring, or
presenting identity information.
NOTE Although a profile can contain identity information, it is not intended for identification. Its purpose is to
provide identity information about an entity to system processes that need the information for their processes.
An entity may have multiple identity profiles, each containing a different set of attributes for the entity. For
instance, a language preference may be present in a profile for an access interface and not in a profile for
book interests.
An identity template may be established as an international or industry standard. The use of a standardized
identity template to record identity attributes would facilitate the usage of identity profiles across domains.
An identity profile may be used in access management to determine the required identity attributes for
being authorized for a role or privilege in accessing information. An identity profile may be used as a pre-
configured subset of identity information to be presented when interacting with a service.
An attribute in an identity profile may be associated with a level of assurance. Using an identity profile with
associated levels of assurance to present identity information shall imply that each item of information has
been validated at a minimum its associated level of assurance. An identity profile specifying requirements
for access to services or resources may be associated with a specific additional entity identifier that may
indicate the activities linked to the specific privileges.
6 Identity information and identifiers
6.1 Overview
Organizations should understand the information security concerns for their business and should provide
management support to meet the business needs including additional requirements.
In regard to identity management, organizations should understand their liabilities and ensure that
adequate controls are implemented to mitigate the risks and consequences of identity information leakage,
corruption and loss of availability when collecting, storing, using, transmitting and disposing of identity
information. Organizations should specify control objectives and controls to ensure that information
security requirements are met.
6.2 Policy on accessing identity information
The identity information pertaining to an entity should be managed to ensure the following:
— identity information remains accurate and up-to-date over time;
— only authorized entities have access to the identity information and are accountable for all uses and
changes in identity information, guaranteeing traceability of any processing of identity information by
any entity, whether a person, a process or a system;
— the organization fulfils its obligations with respect to regulations and contractual agreements;
— principals are protected against the risk of identity-related theft and other identity related crime.

© ISO/IEC 2025 – All rights reserved
NOTE Typically, an information security policy highlights the necessity to securely manage identity information.
The preservation and protection of any entities identity information is also required when dealing with third parties
as typically documented within the operational procedures.
6.3 Identifiers
6.3.1 General
An identifier allows distinguishing unambiguously one entity from another entity in a domain of applicability.
An entity may have multiple, different identifiers in the same domain. This can facilitate the representation
of the entity in some situations, e.g. hiding the entity’s identity when providing the entity’s identity
information for use in some processes or within some systems. An identifier created in one domain may be
reused intentionally in another domain provided the reused identifier continues to provide uniqueness of
identity within the other domain.
6.3.2 Categorization of identifier by the type of entity to which the identifier is linked
6.3.2.1 Person identifiers
A person identifier can include a full name, date of birth, place of birth, or various pseudonyms, such as a
number assigned by an authority as a reference, e.g. passport number, national identity number or identity-
card number.
The use of pseudonyms as identifiers is frequent for person identifiers (see 6.3.3.2).
NOTE A pseudonym can enhance the privacy of persons in an identity-authentication exchange with a relying
party, as a pseudonym can reveal less personally identifiable information than if a real name is used as an identifier.
6.3.2.2 Identifier assigned to a non-person entity
Non-person entities, e.g. devices or other information objects, can have their activities identified and
recorded as for persons.
Device identifiers allow distinction between devices in the domain in which they operate.
EXAMPLE 1 The International Mobile Equipment Identity (IMEI) is an identifier of the mobile telephone handset
in the domain of a mobile telephone services.
EXAMPLE 2 The GSM SIM card number (ICCID) is a unique device identifier in the domain of a mobile telephone
service. A SIM card also contains other identifiers including that of the user who registered the SIM card.
It can also be necessary to distinguish information object identifiers in their domains. One of their attributes
that compromise a combination of their attributes is usually used as identifier.
EXAMPLE 3 Process name, session name, path name, uniform resource names (URN), uniform resource identifier
(URI) are examples of information object identifiers.
EXAMPLE 4 URI is an example of identifier for a location, but the object at that location can change at any time.
6.3.3 Categorization of identifier by the nature of linking
6.3.3.1 Verinymous identifier
A verinymous identifier is an identifier, persistent in its domain of applicability that may be used within and
across domains and allows a relying party to obtain further identity information for the entity associated
with the identifier. Commonly observed verinimous identifiers includes email address, mobile phone
number, passport number, driving license number, social security number and the name-date of birth pair.
A verynimous identifier can allow identity information for entities known in different domains to be
correlated. While it is fine to correlate the identities if so desired by the person, unexpected correlation, e.g.

© ISO/IEC 2025 – All rights reserved
profiling, has a negative privacy impact. By the nature of the veronymous identifier, if information leakage
incident happens, it allows adversaries to perform such correlation and create threats, e.g. of generating any
privacy-related information that the principal did not intend to disclose.
6.3.3.2 Pseudonymous identifier
A pseudonymous identifier is an identifier, persistent in its domain that does not disclose additional identity
information. As long as no other identifying information is available in the domain, identities from different
domain cannot be correlated using a pseudonymous identifier. A pseudonymous identifier may be used to
prevent unwanted correlation of identity information for entities across domains.
NOTE The mere use of pseudonymous identifiers does not equate with identity data being pseudonymous.
Other attributes combined at one point in time or across multiple points in time can be enough to derive verinymous
identifiers.
6.3.3.3 Ephemeral identifier
An ephemeral identifier is an identifier that is used only for a short period of time and only within a single
domain. It may change for multiple uses to the same service or resource.
NOTE 1 If used correctly, an ephemeral identifier will make it very difficult for two visits by an entity to be
correlated.
NOTE 2 An ephemeral identifier is often used in the context of attribute-based access control where access to a
resource is granted if the entity has a particular attribute. For example, if the resource access is granted for a person
because they are a member of a particular group, the identity would be composed of an ephemeral identifier and a
group identifier. These would serve the access control purpose while minimizing the data disclosed or the possibility
of linking multiple accesses, while still differentiating each entity.
6.3.4 Categorization of identifier by the grouping of entities
6.3.4.1 Individual identifier
An individual identifier is an identifier that is associated with only one entity within a domain of applicability.
6.3.4.2 Group identifiers
Entities are sometimes grouped in a group entity when the need exists to execute activities in a group. A
distinct group identity will represent the group entity and group identifiers will help unambiguously
identifying the group entity and recording activities of the group entity in their domains. Group identifiers
serve the need for a person entity of performing activities in a group or on behalf of a group; they may
hide the action originator of an activity in a group. Additional techniques can therefore be required to
unambiguously identify a single entity as member of a group entity.
6.3.5 Management of identifiers
When updating identity information for a known entity, an identity management system may assign a new
identifier to the changed identity; it also may remove the association of the old identifier with the identity.
Changed identity information may be proactively communicated to subsystems that rely on it.
6.3.6 Categorization of identifier by method of value creation
6.3.6.1 As combination of attributes
A particular combination of attributes may have a unique value over all registered identities. Such a
combination of attribute values may serve as an identifier.
NOTE An identifier derived from a combination of attributes can be referred to as a “quasi-identifier”.

© ISO/IEC 2025 – All rights reserved
A combination of attributes of which the combined values are not unique over all registered identities may
be defined to function as a shared identifier for a group of entities.
The value of such an identifier intended or expected to be used outside the domain of origin should be
transformed into an identifier with a generated unique value by applying a cryptographic hash function to
the combined attribute values.
6.3.6.2 Generated with a unique value
An identifier may be generated to have a unique value for all registered identities.
NOTE 1 Typically, at registration one such identifier can be generated to be used as a reference identifier.
NOTE 2 A timestamp with sufficient granularity of time can be used as such an identifier for each subject that
simultaneously uses a service in a domain of applications.
6.3.6.3 Assigned from an externally generated unique value
A unique value generated by a third party as associated with a principal may be used as identifier in an
identity management system. Guarantees of the uniqueness of the values shall be obtained before deciding
to use such an identifier in the registered identities. Such an identifier may be used as reference identifier.
EXAMPLE An externally generated unique value can be the identifier of a state issued identification document,
e.g. the document number of a passport or driver licence, the identifier of a credential in physical form, including a
hardware token, or a citizen administration number.
NOTE 1 An external unique value can be referred to as an “authoritative identifier”, in particular where that
identifier can be used to refer to identity information held in the domain of origin of the external identifier value.
To improve privacy protection, the value of such an identifier should be transformed before being registered
into an identifier with generated unique value by applying a cryptographic hash function to the externally
provided value.
NOTE 2 In case the external identifier is transformed by applying a cryptographic hash function, it can still be used
in authentication. In that case, its use as authoritative identifier, e.g. to retrieve additional identity information from
the domain of origin of the external identifier, is only possible during authentication after the entity has presented
the original value. Typically, in this case, such additional identity information is intended to be included in the
authenticated identity, as possibly requested by a relying party.
7 Auditing identity information usage
An identity management system can support the auditing of processes where identity information is
accessed. Auditing shall record which information is accessed, the operator initiating the process and
any parties outside the system with which information may be shared or from which new information is
obtained. In case de-identification is applied when sharing information, auditing shall be performed in a way
to assert its correctness.
NOTE 1 Auditing is usually required by law and regulations. Auditing also facilitates business practices when data
are being shared between parties as part of their business operations.
NOTE 2 Requirements for auditing can include measures to protect personally identifiable information, to
maintaining required time-stamp accuracy and traceability (see the ISO/IEC 18014 series).
8 Control objectives and controls
8.1 General
This clause summarizes security objectives and associated controls to be verified when setting up or
reviewing an identity management system.

© ISO/IEC 2025 – All rights reserved
The controls presented in ISO/IEC 27002 are also relevant for this document.
Annex A specifies further practices for managing identity information in a federation of identity management
systems.
Annex B specifies further practices for using attribute-based credentials to enhance privacy protection.
8.2 Contextual components for control
8.2.1 Establishing an identity management system
8.2.1.1 Objective
The objective is to establish a management system to initiate and control the implementation of managing
identity information for entities.
8.2.1.2 Defining and documenting the domain of applicability
a) Control
The relying parties for which an entity, or a group of entities, is enabled to apply its identity and which may
use the identity for identification and for other purposes, shall be documented to be clearly understood both
by the operators and the entities involved.
b) Implementation guidance
Documentation that describes the boundaries of the domain of a system for identity management should
be made available to all interested parties. This documentation should specify the limits where the identity
information can be verified. Any potential extensions to other domains or groups of entities should also be
documented.
The documentation should clarify constraints, legally, or otherwise, and associated liabilities, on the control
of identity information in a domain.
c) Other information
A domain of an identity is well defined in relation to a particular set of attributes defining groups of entities.
An IT system within an organization that allows a group of entities to login is a sub-domain in that
organization.
8.2.1.3 Identifying identity information providers, identity information authorities, identity
management authorities, and regulatory bodies
a) Control
Identity information authorities for identity information managed by an identity management system shall
be specified for the domain of an identity management system.
Entities endorsing management and regulator responsibilities for the protection of identity information
shall also be identified.
b) Implementation guidance
Entities associated with an identity management system as the source of identity information (an IIP),
authoritative statement on available information (an IIA), the identity management authority, and any
relevant regulatory bodies, government or otherwise, should be clearly identified.
The operations performed by an identity information provider are to create, maintain and make accessible
identity information for entities known in a particular domain. The methods to access information or obtain
services provided by these operational entities should also be provided.

© ISO/IEC 2025 – All rights reserved
Any changes in availability and methods for access and to obtain services should be actively communicated
to interested parties.
c) Other information
An entity may combine the functions of identity information provider and identity information authority.
8.2.1.4 Identifying relying parties
a) Control
Relying parties shall be made known for the domain of the identity management system.
b) Implementation guidance
Relying parties have trust relationships with one or more identity information authorities. Relying parties
related with an identity information authority may be known at the design stage. Relying parties may change
over time, joining, or leaving a relationship with one or more identity information authorities in the domain.
c) Other information
A relying party is exposed to risk caused by incorrect or invalid identity information.
8.2.1.5 Maintaining an identity management system
a) Control
A process shall be described to ensure the maintenance of the important operational entities in an identity
management system.
b) Implementation guidance
Over time, domains of an identity management system may use different identity information authorities,
identity information providers and relying parties to support their interactions with entities. Domains may
also be created and terminated, or their conditions of applicability may change.
Important entities for use of an identity management system, e.g. IIA, IIP and RP, may also cease to exist
after being replaced, archived, or deleted. An identity management system should document policies and
processes that ensure the control of these important entities and should ensure that valuable information of
the identity management system is not lost.
8.2.1.6 Privacy assurance
a) Control
When human entities interact within an identity management system that manages identity information
of them, it shall have documented policies and have established controls that ensure the protection of their
privacy.
b) Implementation guidance
A basic objective of establishing an identity management system is to ensure the privacy of entities is
preserved at any time.
An identity management system shall document any sensitive information it processes about human entities
in accordance with ISO/IEC 24760-1.
c) Other information
Requirements for the handling of sensitive identity information are given in:
— ISO/IEC 29100, and
© ISO/IEC 2025 – All rights reserved
— ISO/IEC 29101.
8.2.2 Establishing identity information
8.2.2.1 Objective
The objective is to define, document and communicate identity information.
8.2.2.2 Identity representation
a) Control
References of an entity in an identity management system, which remains the same for the duration the
entity remains known in the domain(s) of the system, may be referred to as “reference identifier.” The
identity management system shall document controls for the identity management systems to guarantee
the unique distinguishability of any entity in any domain of the identity management system.
b) Implementation guidance
A reference identifier should persist at least for the existence of the entity in an identity management system
and may exist longer than the entity, e.g. for archiving purposes or authorities’ needs.
Identity management system documentation should describe the use and reuse of identifiers. A reference
identifier for an entity should not be reused while any identity information relating to that entity, including
archived information, is recorded on the system.
A reference identifier generator is a tool that may help to provide unique values for reference identifiers.
c) Other information
To facilitate maintaining the recorded information for a specific identity, the identity management system
can use a reference identifier generator to assign a unique record number to an identity being added.
8.2.2.3 Identity information
a) Control
The set of values of attributes required to compose identity information pertaining to an entity in domains
of an identity management system shall be fixed, validated by the verifiers, and communicated, as requested,
to relying parties.
b) Implementation guidance
Verification of the values of required attributes from an identity results in an authenticated identity for an entity.
The authentication process involves tests by a verifier of one or more identity attributes provided by an
entity to determine, with the required level of assurance, their correctness.
8.2.2.4 Distinguishing different types of entity
a) Control
The number of distinct entity types in the domains of an identity management system shall be recognized
and described with distinct attributes values composing their identity.
b) Implementation guidance
Items inside or outside an ICT system, such as a person, an organization, a device, a subsystem, or a group
of such items that has recognizably distinct existence in domains of an identity management system, are
distinct entity types that may be described with different attribute values.

© ISO/IEC 2025 – All rights reserved
Each entity type should be documented covering semantic and syntax with the list of required attribute
values for their identity being validated.
8.2.2.5 Authenticating an identity
a) Control
A process shall be documented that verifies the identity information for an entity.
b) Implementation guidance
An authentication process involves operations by a verifier that should establish that identity information
for an entity is correct, meeting the level of assurance required by the service to be rendered to the entity.
Verifiers may be the same as, or act on behalf of, the identity information authority for a particular domain.
8.2.3 Managing identity information
8.2.3.1 Objective
The objective is to ensure that identity information is maintained and protected in all domains of an identity
management system, from initial enrolment until archiving or deletion.
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...

Die ISO/IEC 24760-3:2025 ist ein entscheidendes Dokument im Bereich der Informationssicherheit, Cybersicherheit und des Datenschutzes, das einen Rahmen für das Identity Management bietet. Der Umfang dieser Norm ist sowohl breit als auch tief, da sie Anforderungen und Richtlinien für das Management von Identitätsinformationen bereitstellt und sicherstellt, dass ein Identitätsmanagementsystem den Normen ISO/IEC 24760-1 und ISO/IEC 24760-2 entspricht. Ein besonders starkes Merkmal dieser Norm ist ihre Anwendbarkeit auf alle Informationssysteme, in denen Informationen zu Identitäten verarbeitet oder gespeichert werden. Diese universelle Anwendbarkeit macht die Norm zu einem wertvollen Instrument für Organisationen jeder Größe und Branche, die sich mit der Verwaltung von Identitätsinformationen befassen. Darüber hinaus wird ISO/IEC 24760-3:2025 als horizontale Norm angesehen, da sie grundlegende Konzepte klar definiert, wie etwa die Unterscheidung zwischen „Identität“ und „Identifier“. Diese Klarheit ist entscheidend für die Implementierung effektiver Systeme zur Verwaltung von Identitätsinformationen. Ein weiterer Vorteil dieser Norm ist ihr Beitrag zur Bewertung von Identitätsmanagementsystemen hinsichtlich ihrer Datenschutzfreundlichkeit und ihrer Fähigkeit, relevante Attribute einer Identität zu gewährleisten. Dies bietet nicht nur einen praktischen Rahmen, sondern auch eine gemeinsame Basis für andere Normen, die sich mit Themen wie Identität, Identitätsinformationen und Identitätsmanagement befassen. Zusammenfassend lässt sich sagen, dass die ISO/IEC 24760-3:2025 durch ihre klaren Anforderungen, ihre weitreichende Anwendbarkeit und ihren Beitrag zur Verbesserung von Datenschutz und Identitätsmanagementsystemen von grundlegender Bedeutung ist.

ISO/IEC 24760-3:2025은 정보 보안, 사이버 보안, 개인 정보 보호를 위한 신원 관리 프레임워크의 세 번째 부분으로, 신원 정보 관리와 관련된 요구 사항 및 지침을 제공합니다. 이 표준의 범위는 신원 정보가 처리되거나 저장되는 모든 정보 시스템에 적용 가능하며, ISO/IEC 24760-1 및 ISO/IEC 24760-2와의 일치를 보장하는 신원 관리 시스템 운영에 대한 요구 사항을 명시합니다. 이 표준의 강점 중 하나는 '신원(identity)'과 '식별자(identifier)'의 용어 구별을 통해 신원 정보 관리 시스템 구현에 대한 명확한 방향성을 제시한다는 것입니다. 이러한 구별은 실질적인 시스템 구현 시 신원 관리 프레임워크의 요구 사항을 정의하는 데 중요한 기초를 제공합니다. 또한, ISO/IEC 24760-3:2025는 개인 정보 친화성과 신원의 관련 속성을 보장하는 능력에 대한 신원 관리 시스템 평가에 중요한 기여를 합니다. 이는 신원, 신원 정보, 신원 관리와 관련된 다른 표준들이 공통적으로 이해할 수 있는 기초를 제공합니다. 따라서, 본 표준은 정보 보안 및 사이버 보안 분야에서 신원 관리 시스템의 일관성을 높이고, 개인 정보 보호를 강화하는 데 필수적인 역할을 할 것으로 기대됩니다.

ISO/IEC 24760-3:2025 outlines a comprehensive framework for identity management, focusing specifically on the practical application of identity information management within information systems. The standard's scope is well-defined, offering both requirements and guidance to ensure that identity management systems align with ISO/IEC 24760-1 and ISO/IEC 24760-2, reinforcing its significance in establishing robust identity management practices. One of the strengths of ISO/IEC 24760-3:2025 is its horizontal applicability. It is designed to be relevant across various information systems that process or store identity-related information, making it versatile for organizations in diverse sectors. This broad applicability is vital as it addresses the critical need for a unified approach to identity management, transcending industry boundaries. The standard's emphasis on concepts such as differentiating “identity” from “identifier” is particularly noteworthy. This distinction aids in the effective implementation of identity management systems, ensuring stakeholders clearly understand the foundational elements of identity within their operational frameworks. Such clarity is essential for developing systems that adequately protect individual privacy while managing identity information competently. Furthermore, ISO/IEC 24760-3:2025 contributes significantly to assessing the privacy-friendliness of identity management systems. By providing a basis for evaluating the operational attributes of identities, it ensures that organizations can implement privacy-centric practices, which are increasingly critical in today’s data-driven landscape. This focus on privacy aligns with global trends in cybersecurity and data protection, enhancing the standard's relevance in contemporary identity management discussions. In addition, ISO/IEC 24760-3 serves as a foundational document for other standards related to identity, identity information, and identity management. Its comprehensive approach facilitates a common understanding among stakeholders, which is essential for ensuring interoperability and consistency across various identity management applications. As organizations continue to prioritize cybersecurity and privacy, the relevance of standards such as ISO/IEC 24760-3 will only grow, making it an indispensable reference in the field of information security and identity management.

Le document ISO/IEC 24760-3:2025 constitue une avancée significative dans le domaine de la sécurité de l'information, de la cybersécurité et de la protection de la vie privée, en fournissant un cadre pratique pour la gestion des identités. Son champ d'application est vaste, car il s'applique à tous les systèmes d'information où des informations relatives à l'identité sont traitées ou stockées, renforçant ainsi la pertinence de la norme dans divers contextes organisationnels. L'une des forces majeures de cette norme réside dans sa capacité à articuler clairement les exigences et les recommandations pour la gestion de l'information d'identité. En s'assurant que les systèmes de gestion des identités sont conformes aux normes ISO/IEC 24760-1 et ISO/IEC 24760-2, elle établit un cadre solide qui contribuera à garantir la sécurité et la confidentialité des informations sensibles. De plus, ISO/IEC 24760-3:2025 se distingue par son approche horizontale, offrant des concepts essentiels tels que la distinction entre "identité" et "identifiant". Cette clarification est cruciale pour l'implémentation efficace des systèmes de gestion des identités, car elle aide les organisations à comprendre et à répondre aux exigences spécifiques de mise en œuvre et d’exploitation de ces systèmes. Ce document contribue également de manière significative à l'évaluation des systèmes de gestion des identités en ce qui concerne leur respect de la vie privée et leur capacité à garantir les attributs pertinents d’une identité. En fournissant une base commune et une compréhension partagée des enjeux liés à l'identité, à l'information d'identité et à la gestion des identités, ISO/IEC 24760-3:2025 se positionne comme une référence indispensable pour les entreprises cherchant à renforcer leur posture de sécurité tout en respectant les réglementations en matière de protection des données. En conclusion, la norme ISO/IEC 24760-3:2025 est non seulement pertinente pour les défis actuels liés à la gestion de l'identité, mais elle représente également un pas en avant vers une meilleure intégration des pratiques de sécurité et de protection de la vie privée dans un environnement numérique en constante évolution.

ISO/IEC 24760-3:2025は、情報セキュリティ、サイバーセキュリティ、およびプライバシー保護に関する統合フレームワークの一環として、アイデンティティ管理に関する実践を定義した重要な文書です。この標準は、アイデンティティ情報の管理に関する要件とガイダンスを提供し、アイデンティティ管理システムがISO/IEC 24760-1およびISO/IEC 24760-2に準拠することを保証します。 この標準の適用範囲は非常に広範であり、アイデンティティに関連する情報が処理または保存される任意の情報システムに適用されます。これにより、多様な業界においてアイデンティティ管理の実施が効果的に行われる基盤が確立されます。 ISO/IEC 24760-3:2025の最大の強みの一つは、アイデンティティと識別子の違いを明確にし、アイデンティティ情報の管理システムの実装や運用に関する要件を明示しているところにあります。この明確な区別は、アイデンティティ管理システムの設計者や運用者にとって、より効果的なシステム構築を支援します。 さらに、プライバシーに優しいアイデンティティ管理システムを評価するための重要な貢献を果たしており、アイデンティティの関連属性を保証する能力の評価を行うための基礎を提供しています。このように、ISO/IEC 24760-3:2025は、アイデンティティ、アイデンティティ情報、およびアイデンティティ管理に関する他のあらゆる標準に対する共通の理解をもたらします。 この標準は、サイバーセキュリティとプライバシー保護の観点から、現代の情報システムにおいて求められる信頼性を高めるための理論的かつ実践的なフレームワークを提供し、関連のある全ての分野でのアイデンティティ管理の重要性を強調しています。