Guidance
Advice and guidance to help those implementing the identification standards.
- 
                            Assessing identification riskUnderstand how to conduct an identification risk assessment for your service or transaction. Use this to calculate the right strength of identification processes to protect against information fabrication and identity theft. 
- 
                            Implementing the Information Assurance StandardGuidance on the Information Assurance Standard and how to comply with the controls. 
- 
                            Implementing the Binding Assurance StandardGuidance on the Binding Assurance Standard and how to comply with the controls. 
- 
                            Implementing the Authentication Assurance StandardGuidance on the Authentication Assurance Standard and how to comply with the controls. 
- 
                            Implementing the Federation Assurance StandardGuidance on the Federation Assurance Standard and how to comply with the controls. 
- 
                            Using documents as evidenceAdditional guidance for when physical documents are used in identification processes. 
- 
                            Authenticator typesThis guide describes various authenticator types and provides examples and considerations for their use. It does not prescribe the use of any specific authenticator. 
- 
                            Counter fraud techniquesGuidance on additional steps that can be added to identification processes to increase their integrity and reduce fraud. 
- 
                            Derived information and other calculated valuesThis guidance describes how values for information are derived, inferred or estimated from other information. It also explains the levels of assurance of these values. 
- 
                            Authority to act for another EntityThis guidance describes how authorities to act are represented as relationships and how these can be verified. 
