You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 10 Next »

InCommon Silver Gap Analysis
Identity Assurance Profile (IAP) Functional Areas from InCommon Identity Assurance Profiles Bronze and Silver 1.2:
4.2.1 Business, Policy, and Operational Criteria
4.2.2 Registration and Identity Proofing
4.2.3 Credential Technology
4.2.4 Credential Issuance and Management
4.2.5 Authentication Process
4.2.6 Identity Information Management
4.2.7 Assertion Content
4.2.8 Technical Environment

Action item (identify section, sub-section, and the gap to close)

B

S

Who (Univ. unit)

Type (documentation, infrastructure, procedure, policy, Identity management system)

Effort (Major, moderate, minor)

Target completion date

4.2.1 Business, Policy, and Operational Criteria

 

 

 

 

 

 

4.2.1.1 InCommon Participant - <Add your gap closure requirement here>

Department XYZ

<type>

<effort>

mm/dd/yyyy or DONE

4.2.1.2 Notification to InCommon -

 

 

 

 

4.2.1.3 Continuing Compliance -

 

 

 

 

4.2.1.4 IdPO Risk Management

 

 

 

 

4.2.2 Registration and Identity Proofing

 

 

 

 

 

 

4.2.2.1 RA Authentication -

n/a

 

 

 

 

4.2.2.2 Identity verification process -

n/a

 

 

 

 

4.2.2.3 Registration Records –

n/a




 

4.2.2.4 Identity Proofing –

n/a




 

4.2.2.4.1 Existing relationship -

n/a




 

4.2.2.4.2 In-Person proofing -

n/a




 

4.2.2.4.3 Remote proofing -

n/a

 

 

 

 

4.2.2.5 Address of record confirmation -

n/a




 

4.2.3 Credential Technology

 

 

 

 

 

 

4.2.3.1 Credential unique identifier -




 

4.2.3.2 Basic Resistance to guessing Authentication Secret -

n/a

 

 

 

 

4.2.3.3 Strong Resistance to guessing Authentication Secret -

n/a

 

 

 

 

4.2.3.4 Stored Authentication Secrets -

n/a

 

 

 

 

4.2.3.5 Basic Protection of Authentication Secrets -

n/a

 

 

 

 

4.2.3.6 Strong Protection of Authentication Secrets -

n/a

 

 

 

 

4.2.4 Credential Issuance and Management

 

 

 

 

 

 

4.2.4.1 Credential issuance process -

n/a

 

 

 

 

4.2.4.2 Credential revocation or expiration –

n/a




 

4.2.4.3 Credential renewal or re-issuance -

n/a

 

 

 

 

4.2.4.4 Retention of credential issuance records –

n/a




 

4.2.5 Authentication Process

 

 

 

 

 

 

4.2.5.1 Resist replay attack -

 

 

 

 

4.2.5.2 Resist eavesdropper attack -

 

 

 

 

4.2.5.3 Secure communication -

 

 

 

 

4.2.5.4 Proof of possession -

 

 

 

 

4.2.5.5 Session authentication -

 

 

 

 

4.2.5.6 Mitigate risk of credential compromise -

 

 

 

 

4.2.6 Identity Information Management

 

 

 

 

 

 

4.2.6.1 Identity record qualification -

 

 

 

 

4.2.7 Assertion Content

 

 

 

 

 

 

4.2.7.1 Identity attributes -

 

 

 

 

4.2.7.2 Identity assertion qualifier -

 

 

 

 

4.2.7.3 Cryptographic security -

 

 

 

 

4.2.8 Technical Environment

 

 

 

 

 

 

4.2.8.1 Software maintenance -

n/a

 

 

 

 

4.2.8.2 Network security -

n/a

 

 

 

 

4.2.8.3 Physical security -

n/a

 

 

 

 

4.2.8.4 Reliable operations -

n/a

 

 

 

 

  • No labels