Guidance
Advice and guidance to help those implementing the identification standards.
-
Assessing identification risk
Understand how to conduct an identification risk assessment for your service or transaction. Use this to calculate the right strength of identification processes to protect against information fabrication and identity theft.
-
Implementing the Information Assurance Standard
Guidance on the Information Assurance Standard and how to comply with the controls.
-
Implementing the Binding Assurance Standard
Guidance on the Binding Assurance Standard and how to comply with the controls.
-
Implementing the Authentication Assurance Standard
Guidance on the Authentication Assurance Standard and how to comply with the controls.
-
Implementing the Federation Assurance Standard
Guidance on the Federation Assurance Standard and how to comply with the controls.
-
Using documents as evidence
Additional guidance for when physical documents are used in identification processes.
-
Authenticator types
This guide describes various authenticator types and provides examples and considerations for their use. It does not prescribe the use of any specific authenticator.
-
Counter fraud techniques
Guidance on additional steps that can be added to identification processes to increase their integrity and reduce fraud.
-
Derived information and other calculated values
This guidance describes how values for information are derived, inferred or estimated from other information. It also explains the levels of assurance of these values.
-
Authority to act for another Entity
This guidance describes how authorities to act are represented as relationships and how these can be verified.