BS 8626:2020
$215.11
Design and operation of online user identification systems. Code of practice
Published By | Publication Date | Number of Pages |
BSI | 2020 | 122 |
This British Standard gives recommendations and supporting guidance for the design and operation of an online user identification system (OUIS) and the corresponding user digital identity management systems (IdMS). As authorized users, individuals can act in a personal capacity (e.g. consumer, customer or citizen) or on behalf of another individual (e.g. as a proxy) in a role in a digital identity provider (IdP) and/or relying party (RP), e.g. employee or authorized contractor. In particular, recommendations are given for:
-
establishing or revising an OUIS, including:
-
business objectives and requirements for an OUIS;
-
requirements for protecting the life cycle management of digital identities associated with individuals;
-
requirements for protecting data used specifically for identifying or authenticating individuals;
-
requirements for protecting against attacks on specific types of user knowledge‑based authentication methods, possession-based authentication methods and biometric recognition methods and modes of operation;
-
-
the controls for managing the life cycle of users’ digital identities for an OUIS, including:
-
creation, proofing and issuance of a digital identity and the formation of the digital identity’s associated credential;
-
identification together with credential usage (where applicable);
-
activities to update credentials and associated data, and notification of these changes to the user;
-
revocation, expiration, reinstatement, disqualification or user cancellation of a digital identity’s credential and purging or archiving of digital identities; and
-
-
evaluating the effectiveness of an OUIS, including the management of user identification errors, such as false positives and false negatives, and efficiency, including the user identification transaction timings and demand on resources.
This British Standard:
-
describes various knowledge-based authentication methods, possession-based authentication methods and biometric recognition methods, together with their inherent vulnerabilities;
-
provides recommended measures to mitigate the potential exploitation of these identified vulnerabilities; and
-
assists in the development of a risk mitigation strategy, though it does not cover risk identification, protection, detection, response and recovery, as part of developing a supporting performance management strategy and plan.
The standard is applicable where the user initiates the process of user identification for an online service supplied by an RP and the processes of user identification to access an IdP’s IdMS (if applicable).
This standard covers the management of digital identities by organizations, including IdPs, and individuals’ management of the credentials allocated to them by an IdP and/or RP. It concentrates on the OUIS component of access control mechanisms. However, reference is made to the permission management associated with roles and authorization functions of associated policy decision points in decision authorization systems.
This standard is applicable to online authentication transactions that are associated with either online or offline identity proofing processes, but its recommendations might also be useful for the design of offline authentication transactions, though their applicability in these contexts requires careful consideration.
The scope of the transaction commences with the authentication/recognition request from an authorization system or access control mechanism through to the return response by the authentication/recognition subsystem, as illustrated in Figure 1. The authentication/recognition subsystem includes capture of signals from an individual through an input device, e.g. keyboard or sensing apparatus (e.g. camera), through to a decision component, which determines whether the identification data presented are sufficient to authenticate or recognize an individual within predetermined user identification assurance parameters.
Figure 1 Generic model of user identification
This standard covers the situations where the authentication and/or recognition decision engine resides either on the user’s intelligent device or in a remote information system.
This standard covers “man-in-the-middle” (MITM) attacks on authentication methods and biometric recognition methods only. It does not cover MITM authentication attacks or similar substitution attacks on networks, computer operating systems, computer programs, applications, router and/or certificate repositories. The vulnerabilities and associated mitigation controls relating to these technologies are outside the scope of this standard.
This standard does not cover security controls in networks, computers, operating systems, application software and supporting utilities or input devices.
This standard is not applicable to device identification, though, in most digital interactions, the user needs to bind their digital identity or their credential to the device, so that the device can be trusted by the network and/or IdP or RP. The exclusion of device identification applies equally to a user’s device and the user’s application authentication of a remote information system (e.g. web server gated cryptography hosting the RP’s application or resource).
NOTE An example of the use of device identification is the binding of a user to their mobile phone’s international mobile equipment identifier (IMEI) or to the subscriber identity module (SIM) or international mobile subscriber identity (IMSI), to prevent an attacker replacing the SIM in a stolen mobile phone and impersonating the genuine user.
This standard does not give specific recommendations for:
-
single sign-on systems;
-
digital identity federation schemes;
-
password application managers and password generation software; and
-
attributes sharing between organizations in a contractual relationship.
The de-identification of data relating to a digital identity is outside the scope of this standard, but guidance on this is given in BS ISO/IEC 20889.
PDF Catalog
PDF Pages | PDF Title |
---|---|
5 | Foreword |
7 | Introduction |
8 | 1 Scope |
10 | Figure 1 — Generic model of user identification |
11 | 2 Normative references 3 Terms, definitions and abbreviations |
21 | 4 Establishing or enhancing an OUIS 4.1 Strategic factors |
22 | Figure 2 — Establishing an OUIS |
27 | 4.2 Requirements for an OUIS |
37 | 4.3 Design and implementation of an OUIS |
38 | 4.4 Operational management of an OUIS |
40 | 5 Design for life cycle management of user digital identities |
41 | Figure 3 — Digital identity life cycle 5.1 Digital identity creation |
47 | 5.2 Digital identity and credential usage 5.3 Digital identity and credential maintenance |
48 | 5.4 Digital identity termination 5.5 Digital identity system management |
49 | 6 Knowledge-based user authentication methods 6.1 Recovery from failure in knowledge-based user authentication 6.2 Creation, maintenance and recovery of authentication data |
52 | 6.3 Personal identification number (PIN) 6.4 Passwords and passphrases |
54 | 6.5 Partial PINs |
55 | 6.6 Security questions |
56 | 7 Possession-based user authentication methods 7.1 Recovery from failure in possession-based methods |
57 | 7.2 General |
58 | 7.3 One-time password (OTP) |
59 | 7.4 Disconnected hardware security token (OTT) method 7.5 Software secret one-time token (OTT) method |
61 | 7.6 Connected hardware security token (OTT) method |
62 | 8 Inherence-based (biometric) user recognition methods 8.1 Recovery from failure in inherence-based recognition methods 8.2 Structured approach 8.3 Mitigation measures for biometric recognition systems 8.4 Using biometric recognition as a component of the identity proofing process |
64 | 8.5 Biometric enrolment and registration |
67 | 8.6 Biometric verification method |
70 | 8.7 Privacy and data protection 8.8 Health and safety |
71 | 8.9 Biometric information security |
73 | 8.10 Biometric performance maintenance |
74 | 9 Confirmatory evidence and contra-indicators |
75 | 9.1 Confirmatory evidence |
77 | 9.2 Contra-indicators |
78 | Table 1 — Contra-indicators |
79 | 10 OUIS management 10.1 Establishing an service level agreement (SLA) between the IdP(s) and the RP(s) |
80 | 10.2 Operational responsibilities and procedures 10.3 Life cycle management of the OUIS |
85 | 10.4 Day-to-day system operation |
91 | Annex A (informative) User identification assurance |
92 | Table A.1 — Levels of identity proofing assurance |
93 | Table A.2 — Levels of user identification assurance |
94 | Table A.3 — Selecting the appropriate level of user identification assurance |
95 | Annex B (informative) Supplementary information on biometrics Figure B.1 — Components of a general biometric system [Source: PD ISO/IEC TR 24741:2018] |
100 | Table B.1 — Decision error outcomes for biometric functions Table B.2 — Suggested FAR values for user identification assurance levels |
103 | Figure B.2 — Examples of points of attack in a biometric system [Source: BS ISO/IEC 30107‑1:2016] |
108 | Annex C (informative) Risks for biometric recognition methods |
109 | Annex D (informative) Behavioural biometrics |
114 | Bibliography |