Shopping Cart

No products in the cart.

BS 8626:2020

$215.11

Design and operation of online user identification systems. Code of practice

Published By Publication Date Number of Pages
BSI 2020 122
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

This British Standard gives recommendations and supporting guidance for the design and operation of an online user identification system (OUIS) and the corresponding user digital identity management systems (IdMS). As authorized users, individuals can act in a personal capacity (e.g. consumer, customer or citizen) or on behalf of another individual (e.g. as a proxy) in a role in a digital identity provider (IdP) and/or relying party (RP), e.g. employee or authorized contractor. In particular, recommendations are given for:

  1. establishing or revising an OUIS, including:

    1. business objectives and requirements for an OUIS;

    2. requirements for protecting the life cycle management of digital identities associated with individuals;

    3. requirements for protecting data used specifically for identifying or authenticating individuals;

    4. requirements for protecting against attacks on specific types of user knowledge‑based authentication methods, possession-based authentication methods and biometric recognition methods and modes of operation;

  2. the controls for managing the life cycle of users’ digital identities for an OUIS, including:

    1. creation, proofing and issuance of a digital identity and the formation of the digital identity’s associated credential;

    2. identification together with credential usage (where applicable);

    3. activities to update credentials and associated data, and notification of these changes to the user;

    4. revocation, expiration, reinstatement, disqualification or user cancellation of a digital identity’s credential and purging or archiving of digital identities; and

  3. evaluating the effectiveness of an OUIS, including the management of user identification errors, such as false positives and false negatives, and efficiency, including the user identification transaction timings and demand on resources.

This British Standard:

  1. describes various knowledge-based authentication methods, possession-based authentication methods and biometric recognition methods, together with their inherent vulnerabilities;

  2. provides recommended measures to mitigate the potential exploitation of these identified vulnerabilities; and

  3. assists in the development of a risk mitigation strategy, though it does not cover risk identification, protection, detection, response and recovery, as part of developing a supporting performance management strategy and plan.

The standard is applicable where the user initiates the process of user identification for an online service supplied by an RP and the processes of user identification to access an IdP’s IdMS (if applicable).

This standard covers the management of digital identities by organizations, including IdPs, and individuals’ management of the credentials allocated to them by an IdP and/or RP. It concentrates on the OUIS component of access control mechanisms. However, reference is made to the permission management associated with roles and authorization functions of associated policy decision points in decision authorization systems.

This standard is applicable to online authentication transactions that are associated with either online or offline identity proofing processes, but its recommendations might also be useful for the design of offline authentication transactions, though their applicability in these contexts requires careful consideration.

The scope of the transaction commences with the authentication/recognition request from an authorization system or access control mechanism through to the return response by the authentication/recognition subsystem, as illustrated in Figure 1. The authentication/recognition subsystem includes capture of signals from an individual through an input device, e.g. keyboard or sensing apparatus (e.g. camera), through to a decision component, which determines whether the identification data presented are sufficient to authenticate or recognize an individual within predetermined user identification assurance parameters.

Figure 1 Generic model of user identification

This standard covers the situations where the authentication and/or recognition decision engine resides either on the user’s intelligent device or in a remote information system.

This standard covers “man-in-the-middle” (MITM) attacks on authentication methods and biometric recognition methods only. It does not cover MITM authentication attacks or similar substitution attacks on networks, computer operating systems, computer programs, applications, router and/or certificate repositories. The vulnerabilities and associated mitigation controls relating to these technologies are outside the scope of this standard.

This standard does not cover security controls in networks, computers, operating systems, application software and supporting utilities or input devices.

This standard is not applicable to device identification, though, in most digital interactions, the user needs to bind their digital identity or their credential to the device, so that the device can be trusted by the network and/or IdP or RP. The exclusion of device identification applies equally to a user’s device and the user’s application authentication of a remote information system (e.g. web server gated cryptography hosting the RP’s application or resource).

NOTE An example of the use of device identification is the binding of a user to their mobile phone’s international mobile equipment identifier (IMEI) or to the subscriber identity module (SIM) or international mobile subscriber identity (IMSI), to prevent an attacker replacing the SIM in a stolen mobile phone and impersonating the genuine user.

This standard does not give specific recommendations for:

  • single sign-on systems;

  • digital identity federation schemes;

  • password application managers and password generation software; and

  • attributes sharing between organizations in a contractual relationship.

The de-identification of data relating to a digital identity is outside the scope of this standard, but guidance on this is given in BS ISO/IEC 20889.

PDF Catalog

PDF Pages PDF Title
5 Foreword
7 Introduction
8 1 Scope
10 Figure 1 — Generic model of user identification
11 2 Normative references
3 Terms, definitions and abbreviations
21 4 Establishing or enhancing an OUIS
4.1 Strategic factors
22 Figure 2 — Establishing an OUIS
27 4.2 Requirements for an OUIS
37 4.3 Design and implementation of an OUIS
38 4.4 Operational management of an OUIS
40 5 Design for life cycle management of user digital identities
41 Figure 3 — Digital identity life cycle
5.1 Digital identity creation
47 5.2 Digital identity and credential usage
5.3 Digital identity and credential maintenance
48 5.4 Digital identity termination
5.5 Digital identity system management
49 6 Knowledge-based user authentication methods
6.1 Recovery from failure in knowledge-based user authentication
6.2 Creation, maintenance and recovery of authentication data
52 6.3 Personal identification number (PIN)
6.4 Passwords and passphrases
54 6.5 Partial PINs
55 6.6 Security questions
56 7 Possession-based user authentication methods
7.1 Recovery from failure in possession-based methods
57 7.2 General
58 7.3 One-time password (OTP)
59 7.4 Disconnected hardware security token (OTT) method
7.5 Software secret one-time token (OTT) method
61 7.6 Connected hardware security token (OTT) method
62 8 Inherence-based (biometric) user recognition methods
8.1 Recovery from failure in inherence-based recognition methods
8.2 Structured approach
8.3 Mitigation measures for biometric recognition systems
8.4 Using biometric recognition as a component of the identity proofing process
64 8.5 Biometric enrolment and registration
67 8.6 Biometric verification method
70 8.7 Privacy and data protection
8.8 Health and safety
71 8.9 Biometric information security
73 8.10 Biometric performance maintenance
74 9 Confirmatory evidence and contra-indicators
75 9.1 Confirmatory evidence
77 9.2 Contra-indicators
78 Table 1 — Contra-indicators
79 10 OUIS management
10.1 Establishing an service level agreement (SLA) between the IdP(s) and the RP(s)
80 10.2 Operational responsibilities and procedures
10.3 Life cycle management of the OUIS
85 10.4 Day-to-day system operation
91 Annex A (informative)  User identification assurance
92 Table A.1 — Levels of identity proofing assurance
93 Table A.2 — Levels of user identification assurance
94 Table A.3 — Selecting the appropriate level of user identification assurance
95 Annex B (informative)  Supplementary information on biometrics
Figure B.1 — Components of a general biometric system [Source: PD ISO/IEC TR 24741:2018]
100 Table B.1 — Decision error outcomes for biometric functions
Table B.2 — Suggested FAR values for user identification assurance levels
103 Figure B.2 — Examples of points of attack in a biometric system [Source: BS ISO/IEC 30107‑1:2016]
108 Annex C (informative)  Risks for biometric recognition methods
109 Annex D (informative)  Behavioural biometrics
114 Bibliography
BS 8626:2020
$215.11