Guidance
Advice and guidance to help those implementing the identification management standards.
-
Assessing identification risk
Understand how to conduct an identification risk assessment for your service or transaction. Use this to calculate the right strength of identification processes to protect against information fabrication and identity theft.
-
Implementing the Information Assurance Standard
This guidance provides additional information and examples to aid with the understanding of and compliance with the controls in the Information Assurance Standard.
-
Implementing the Binding Assurance Standard
This guidance provides additional information and examples to aid with the understanding of and compliance with the controls in the Binding Assurance Standard.
-
Implementing the Authentication Assurance Standard
This guidance provides additional information and examples to aid with the understanding of and compliance with the controls in the Authentication Assurance standard.
-
Using documents as evidence
Additional guidance for when physical documents are used in identification processes.
-
Authenticator types
This guide describes various authenticator types and provides examples and considerations for their use. It does not prescribe the use of any specific authenticator.