IT Security and Privacy — A framework for identity management — Part 1: Terminology and concepts — Amendment 1

Sécurité IT et confidentialité — Cadre pour la gestion de l'identité — Partie 1: Terminologie et concepts — Amendement 1: Titre manque

General Information

Status
Published
Publication Date
08-Jan-2023
Current Stage
6060 - International Standard published
Due Date
24-May-2023
Completion Date
09-Jan-2023
Ref Project

Relations

Buy Standard

Standard
ISO/IEC 24760-1:2019/Amd 1:2023 - IT Security and Privacy — A framework for identity management — Part 1: Terminology and concepts — Amendment 1 Released:9. 01. 2023
English language
4 pages
sale 15% off
Preview
sale 15% off
Preview
Draft
REDLINE ISO/IEC 24760-1:2019/PRF Amd 1 - IT Security and Privacy — A framework for identity management — Part 1: Terminology and concepts — Amendment 1 Released:10. 11. 2022
English language
4 pages
sale 15% off
Preview
sale 15% off
Preview
Draft
ISO/IEC 24760-1:2019/PRF Amd 1 - IT Security and Privacy — A framework for identity management — Part 1: Terminology and concepts — Amendment 1 Released:10. 11. 2022
English language
4 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (Sample)

INTERNATIONAL ISO/IEC
STANDARD 24760-1
Second edition
2019-05
AMENDMENT 1
2023-01
IT Security and Privacy —
A framework for identity
management —
Part 1:
Terminology and concepts
AMENDMENT 1
Reference number
ISO/IEC 24760-1:2019/Amd. 1:2023(E)
© ISO/IEC 2023
---------------------- Page: 1 ----------------------
ISO/IEC 24760-1:2019/Amd. 1:2023(E)
COPYRIGHT PROTECTED DOCUMENT
© ISO/IEC 2023

All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may

be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on

the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below

or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
© ISO/IEC 2023 – All rights reserved
---------------------- Page: 2 ----------------------
ISO/IEC 24760-1:2019/Amd. 1:2023(E)
Foreword

ISO (the International Organization for Standardization) and IEC (the International Electrotechnical

Commission) form the specialized system for worldwide standardization. National bodies that are

members of ISO or IEC participate in the development of International Standards through technical

committees established by the respective organization to deal with particular fields of technical

activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international

organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the

work.

The procedures used to develop this document and those intended for its further maintenance

are described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria

needed for the different types of document should be noted. This document was drafted in

accordance with the editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives or

www.iec.ch/members_experts/refdocs).

Attention is drawn to the possibility that some of the elements of this document may be the subject

of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent

rights. Details of any patent rights identified during the development of the document will be in the

Introduction and/or on the ISO list of patent declarations received (see www.iso.org/patents) or the IEC

list of patent declarations received (see https://patents.iec.ch).

Any trade name used in this document is information given for the convenience of users and does not

constitute an endorsement.

For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and

expressions related to conformity assessment, as well as information about ISO's adherence to

the World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT) see

www.iso.org/iso/foreword.html. In the IEC, see www.iec.ch/understanding-standards.

This document was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology,

Subcommittee SC 27, Information security, cybersecurity and privacy protection.

A list of all parts in the ISO/IEC 24760 series can be found on the ISO and IEC websites.

Any feedback or questions on this document should be directed to the user’s national standards

body. A complete listing of these bodies can be found at www.iso.org/members.html and

www.iec.ch/national-committees.
iii
© ISO/IEC 2023 – All rights reserved
---------------------- Page: 3 ----------------------
ISO/IEC 24760-1:2019/Amd. 1:2023(E)
IT Security and Privacy — A framework for identity
management —
Part 1:
Terminology and concepts
AMENDMENT 1
3.1
Add the following two entries:
3.1.8
readily-verifiable identifier

identifier with a value which is constructed to be easily verified as valid and as referring to a known

entity

EXAMPLE The result of solving a cryptographic puzzle with its input can easily be validated as correct,

functioning as digital signature on that input.

Note 1 to entry: A readily verifiable identifier can be used as an authenticator.

3.1.9
authoritative identifier

unique identifier referring to an entity, known in a well-trusted domain of origin

Note 1 to entry: An authoritative identifier is typically managed by a well-known organization, e.g. a government.

3.2
Add the following term:
3.2.5
access token
trusted object encapsulating the authority for a principal to access a resource

Note 1 to entry: An access token can be obtained in the result of an authentication.

Note 2 to entry: An access token may contain access permission information for a subject to access the resource

and identifying information for the authority of the authorization decision.

Note 3 to entry: An access token may contain information that enables its integrity to be validated.

Note 4 to entry: An access token may take a physical or a virtual form.

[SOURCE: ISO/IEC 29146:2016, 3.3, modified —replaced the word 'subject' by 'principal', and replaced

Note 1 to entry.]
© ISO/IEC 2023 – All rights reserved
---------------------- Page: 4 ----------------------
ISO/IEC 24760-1:2019/Amd. 1:2023(E)
3.3
Add the following entries:
3.3.9
authentication factor

distinguishing feature of an authenticator to characterise its use in authentication

Note 1 to entry: Four different authentication factors can be recognized:

— cognition factor, any credential that is formed by something that the principal knows and can reproduce

(exclusively): a personal secret;

— possession factor, any credential that is formed by something that the principal possesses, e.g. an authenticator;

— inherent factor, any credential that is formed by a description of something that is inherent to the physical

existence of the principal, e.g. a biometric characteristic such as fingerprint, facial image, or 1, iris pattern;

— behaviour factor, any credential that is formed by a description of something that the principal typically

does, e.g. a behaviour pattern.
3.3.10
multi-factor authentication

authentication in which multiple authenticators are used of two or more authentication factors

Note 1 to entry: If two or more authenticators are being used in authentication that have the same authentication

factor, they should have been issued by different credential issuers.

Note 2 to entry: Using multiple authenticators (that differ in authentication factor can enhance the security of the

authentication as that could prompt the principal to act differently with each of them.

[SOURCE: ISO/IEC 19790:2012, 3.74, modified — definition and notes revised to match terminology

context.]
3.3.11
authenticator
repr
...

Date: 2022-08-2511-04 Style Definition: IneraTableMultiPar: Font: Bold, Font color:

Black, French (Switzerland), Tab stops: Not at 19.85 pt +
39.7 pt + 59.55 pt + 79.4 pt + 99.25 pt + 119.05 pt +
ISO/IEC 24760-1:2019/DAM Amd. 1:2022(E)
138.9 pt + 158.75 pt + 178.6 pt + 198.45 pt
Formatted: English (United States)
ISO/IEC JTC 1/SC 27/WG 5
Formatted: English (United States)
Formatted: English (United States)
Secretariat: DIN
Formatted: English (United States)
IT Security and Privacy —A framework for identity management—Part 1: Terminology
Formatted: English (United Kingdom)
and concepts — Amendment 1

Sécurité de l'information, Sécurité cyberIT et protection de données personellesconfidentialité —

Cadre pour la gestion de l’identité,l'identité — Partie 1: Terminologie et concepts, —

Amendement 1: Eléments de terminologie
Copyright notice
This
---------------------- Page: 1 ----------------------
ISO/IEC 24760-1:2019/DAM 1:2022(E)
© ISO document is a working draft2022

All rights reserved. Unless otherwise specified, or committee draft and is copyright-protected by Formatted: Line spacing: At least 12 pt, Adjust space

between Latin and Asian text, Adjust space between Asian

ISO. While required in the reproductioncontext of working drafts or committee drafts in any form

text and numbers

for use by participants in the ISO standards development process is permitted without prior

permission from ISO, neither its implementation, no part of this document nor any extract from

itpublication may be reproduced, stored or utilized otherwise in any form or transmitted in any

form for any other purposeby any means, electronic or mechanical, including photocopying, or

posting on the internet or an intranet, without prior written permission from ISO.. Permission can

be requested from either ISO at the address below or ISO's member body in the country of the

requester.

Requests for permission to reproduce this document for the purpose of selling it should be

addressed as shown below or to ISO's member body in the country of the requester:

ISO copyright officeCopyright Office Formatted: Line spacing: At least 12 pt, Adjust space

between Latin and Asian text, Adjust space between Asian
text and numbers
Case postale 56 • CP 401 • CH-12111214 Vernier, Geneva 20
Tel.Phone: + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org

Reproduction for sales purposes may be subject to royalty payments or a licensing agreement.

Violators may be prosecuted.
ii © ISO/IEC 2022 – All rights reserved
---------------------- Page: 2 ----------------------
ISO/IEC 24760-1 :2019/Amd.1:2022(E)
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland.
© ISO/IEC 2022 – All rights reserved iii
---------------------- Page: 3 ----------------------
ISO/IEC 24760-1:2019/Amd. 1:2022(E)
Formatted: Don't adjust space between Latin and Asian text,
Foreword
Don't adjust space between Asian text and numbers

ISO (the International Organization for Standardization) and IEC (the International Electrotechnical

Commission) form the specialized system for worldwide standardization. National bodies that are

members of ISO or IEC participate in the development of International Standards through technical

committees established by the respective organization to deal with particular fields of technical activity.

ISO and IEC technical committees collaborate in fields of mutual interest. Other international

organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the

work.

The procedures used to develop this document and those intended for its further maintenance are

described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for the

different types of document should be noted. This document was drafted in accordance with the editorial

rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives or
www.iec.ch/members_experts/refdocs).

Attention is drawn to the possibility that some of the elements of this document may be the subject of

patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights. Details

of any patent rights identified during the development of the document will be in the Introduction and/or

on the ISO list of patent declarations received (see www.iso.org/patents) or the IEC list of patent

declarations received (see https://patents.iec.ch).

Any trade name used in this document is information given for the convenience of users and does not

constitute an endorsement.

For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and

expressions related to conformity assessment, as well as information about ISO's adherence to the World

Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT) see

www.iso.org/iso/foreword.html. In the IEC, see www.iec.ch/understanding-standards.

This document was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology, Formatted: English (United Kingdom)

Subcommittee SC 27, Information security, cybersecurity and privacy protection.
Formatted: Don't adjust space between Latin and Asian text,
Don't adjust space between Asian text and numbers

A list of all parts in the ISO/IEC 24760 series can be found on the ISO and IEC websites.

Formatted: std_publisher, English (United Kingdom)
Formatted: English (United Kingdom)

Any feedback or questions on this document should be directed to the user’s national standards body. A

Formatted: std_docNumber, English (United Kingdom)

complete listing of these bodies can be found at www.iso.org/members.html and www.iec.ch/national-

Formatted: English (United Kingdom)
committees.
Formatted: std_docPartNumber, English (United Kingdom)
Formatted: English (United Kingdom)
Formatted: Don't adjust space between Latin and Asian text,
Don't adjust space between Asian text and numbers
iv © ISO/IEC 2022 – All rights reserved
---------------------- Page: 4 ----------------------
ISO/IEC 24760-1:2019/DAM Amd.1:2022(E)
IT Security and Privacy — A framework for identity management
— Part 1: Terminology and concepts — Amendment 1
3.1
Add the following two entries:
Formatted: Don't adjust space between Latin and Asian text,
Don't adjust space between Asian text and numbers
3.1.8
readily-verifiable identifier

identifier (3.1.4) with a value which is constructed to be easily verified as valid and as referring to a Formatted: Font: Not Italic

known entity (3.1.1)
Formatted: Font: Not Italic

EXAMPLE The result of solving a cryptographic puzzle with its input can easily be validated as correct,

functioning as digital signature on that input.

Note 1 to entry: A readily verifiable identifier can be used as an authenticator.

3.1.9
authoritative identifier

unique identifier (3.1.4) referring to an entity (3.1.1),, known in a well-trusted domain of origin Formatted: Font: Not Italic

Formatted: Font: Not Italic

Note 1 to entry: An authoritative identifier is typically managed by a well-known organization, e.g. a government.

Formatted: Don't adjust space between Latin and Asian text,
Don't adjust space between Asian text and numbers
3.2
Add the following term:
Formatted: Don't adjust space between Latin and Asian text,
Don't adjust space between Asian text and numbers
3.2.5
access token

trusted object encapsulating the authority for a principal (3.1.7) to access a resource Formatted: Font: Not Italic

Note 1 to entry: An access token can be obtained in the result of an authentication.

Note 2 to entry: An access token may contain access permission information for a subject to access the resource and

identifying information for the authority of the authorization decision.

Note 3 to entry: An access token may contain information that enables its integrity to be validated.

Note 4 to entry: An access token may take a physical or a virtual form.
© ISO/IEC 2022 – All rights reserved 1
---------------------- Page: 5 ----------------------
ISO/IEC 24760-1:2019/Amd.1:2022(E)

[SOURCE: ISO/IEC 29146:2016, 3.3, modified —replaced the word 'subject' by 'principal', and replaced Formatted: Default Paragraph Font

Note 1 to entry].]
Formatted: Don't adjust space between Latin and Asian text,
Don't adjust space between Asian text and numbers
Formatted: std_section
3.3
Add the following entries:
Formatted: Don't adjust space between Latin and Asian text,
Don't adjust space between Asian text and numbers
3.3.9
authentication factor

distinguishing feature of an authenticator (3.3.11) to characterise its use in authentication (3.3.1) Formatted: Font: Not Italic

Formatted: Font: Not Italic
Note 1 to entry: Four different authentication factors can be recognized:

— cognition factor, any credential (3.3.5) that is formed by something that the principal knows and can reproduce Formatted: Font: Not Italic

(exclusively): a personal secret (3.3.13);;
Formatted: Font: Not Italic
Formatted: Font: Not Italic

— possession factor, any credential that is formed by something that the principal possesses, e.g. an authenticator;

Formatted: Font: Not Italic

— inherent factor, any credential that is formed by a description of something that is inherent to the physical

Formatted: Font: Not Italic

existence of the principal, e.g. a biometric characteristic such as fingerprint, facial image, or 1, iris pattern;

— behaviour factor, any credential that is formed by a description of something that the principal typically does,

Formatted: Font: Not Italic
e.g. a behaviour pattern.
Formatted: Font: Not Italic
3.3.10
Formatted: Font: Not Italic
multi-factor authentication
Formatted: Font: Not Italic

authentication (3.3.1) in which multiple authenticators (3.3.11) are used of two or more auth

...

INTERNATIONAL ISO/IEC
STANDARD 24760-1
Second edition
2019-05
AMENDMENT 1
IT Security and Privacy —
A framework for identity
management —
Part 1:
Terminology and concepts
AMENDMENT 1
PROOF/ÉPREUVE
Reference number
ISO/IEC 24760-1:2019/Amd 1:2022(E)
© ISO/IEC 2022
---------------------- Page: 1 ----------------------
ISO/IEC 24760-1:2019/Amd 1:2022(E)
COPYRIGHT PROTECTED DOCUMENT
© ISO/IEC 2022

All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may

be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on

the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below

or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
PROOF/ÉPREUVE © ISO/IEC 2022 – All rights reserved
---------------------- Page: 2 ----------------------
ISO/IEC 24760-1:2019/Amd 1:2022(E)
Foreword

ISO (the International Organization for Standardization) and IEC (the International Electrotechnical

Commission) form the specialized system for worldwide standardization. National bodies that are

members of ISO or IEC participate in the development of International Standards through technical

committees established by the respective organization to deal with particular fields of technical

activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international

organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the

work.

The procedures used to develop this document and those intended for its further maintenance

are described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria

needed for the different types of document should be noted. This document was drafted in

accordance with the editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives or

www.iec.ch/members_experts/refdocs).

Attention is drawn to the possibility that some of the elements of this document may be the subject

of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent

rights. Details of any patent rights identified during the development of the document will be in the

Introduction and/or on the ISO list of patent declarations received (see www.iso.org/patents) or the IEC

list of patent declarations received (see https://patents.iec.ch).

Any trade name used in this document is information given for the convenience of users and does not

constitute an endorsement.

For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and

expressions related to conformity assessment, as well as information about ISO's adherence to

the World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT) see

www.iso.org/iso/foreword.html. In the IEC, see www.iec.ch/understanding-standards.

This document was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology,

Subcommittee SC 27, Information security, cybersecurity and privacy protection.

A list of all parts in the ISO/IEC 24760 series can be found on the ISO and IEC websites.

Any feedback or questions on this document should be directed to the user’s national standards

body. A complete listing of these bodies can be found at www.iso.org/members.html and

www.iec.ch/national-committees.
iii
© ISO/IEC 2022 – All rights reserved PROOF/ÉPREUVE
---------------------- Page: 3 ----------------------
ISO/IEC 24760-1:2019/Amd 1:2022(E)
IT Security and Privacy — A framework for identity
management —
Part 1:
Terminology and concepts
AMENDMENT 1
3.1
Add the following two entries:
3.1.8
readily-verifiable identifier

identifier with a value which is constructed to be easily verified as valid and as referring to a known

entity

EXAMPLE The result of solving a cryptographic puzzle with its input can easily be validated as correct,

functioning as digital signature on that input.

Note 1 to entry: A readily verifiable identifier can be used as an authenticator.

3.1.9
authoritative identifier

unique identifier referring to an entity, known in a well-trusted domain of origin

Note 1 to entry: An authoritative identifier is typically managed by a well-known organization, e.g. a government.

3.2
Add the following term:
3.2.5
access token
trusted object encapsulating the authority for a principal to access a resource

Note 1 to entry: An access token can be obtained in the result of an authentication.

Note 2 to entry: An access token may contain access permission information for a subject to access the resource

and identifying information for the authority of the authorization decision.

Note 3 to entry: An access token may contain information that enables its integrity to be validated.

Note 4 to entry: An access token may take a physical or a virtual form.

[SOURCE: ISO/IEC 29146:2016, 3.3, modified —replaced the word 'subject' by 'principal', and replaced

Note 1 to entry.]
© ISO/IEC 2022 – All rights reserved PROOF/ÉPREUVE
---------------------- Page: 4 ----------------------
ISO/IEC 24760-1:2019/Amd 1:2022(E)
3.3
Add the following entries:
3.3.9
authentication factor

distinguishing feature of an authenticator to characterise its use in authentication

Note 1 to entry: Four different authentication factors can be recognized:

— cognition factor, any credential that is formed by something that the principal knows and can reproduce

(exclusively): a personal secret;

— possession factor, any credential that is formed by something that the principal possesses, e.g. an authenticator;

— inherent factor, any credential that is formed by a description of something that is inherent to the physical

existence of the principal, e.g. a biometric characteristic such as fingerprint, facial image, or 1, iris pattern;

— behaviour factor, any credential that is formed by a description of something that the principal typically

does, e.g. a behaviour pattern.
3.3.10
multi-factor authentication

authentication in which multiple authenticators are used of two or more authentication factors

Note 1 to entry: If two or more authenticators are being used in authentication that have the same authentication

factor, they should have been issued by different credential issuers.

Note 2 to entry: Using multiple authenticators (that differ in authentication factor can enhance the security of the

authentication as that could prompt the principal to act differently with each of them.

[SOURCE: ISO/IEC 19790:2012, 3.74, modified — definition and notes revised to match terminology

context.]
3.3.11
authenticator
rep
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.