<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.idesg.org/index.php?action=history&amp;feed=atom&amp;title=Secure_Req_3</id>
	<title>Secure Req 3 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.idesg.org/index.php?action=history&amp;feed=atom&amp;title=Secure_Req_3"/>
	<link rel="alternate" type="text/html" href="https://wiki.idesg.org/index.php?title=Secure_Req_3&amp;action=history"/>
	<updated>2026-05-01T09:43:24Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.38.4</generator>
	<entry>
		<id>https://wiki.idesg.org/index.php?title=Secure_Req_3&amp;diff=6618&amp;oldid=prev</id>
		<title>Omaerz: 7 revisions imported: Initial Upload of old pages from IDESG Wiki</title>
		<link rel="alternate" type="text/html" href="https://wiki.idesg.org/index.php?title=Secure_Req_3&amp;diff=6618&amp;oldid=prev"/>
		<updated>2018-06-28T04:03:35Z</updated>

		<summary type="html">&lt;p&gt;7 revisions imported: Initial Upload of old pages from IDESG Wiki&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;lt;&amp;lt; Back to [[Baseline_Functional_Requirements_v1.0|Baseline Functional Requirements Index]]&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
== SECURE-3.    CREDENTIAL REPRODUCTION ==&lt;br /&gt;
Entities that issue or manage credentials and tokens MUST implement industry-accepted processes to protect against their unauthorized disclosure and reproduction.&lt;br /&gt;
&lt;br /&gt;
=== SUPPLEMENTAL GUIDANCE ===&lt;br /&gt;
Potential controls that can be put in place to prevent unauthorized disclosure and reproduction&lt;br /&gt;
include: &lt;br /&gt;
* The use of secure transport for credential and token data (see [[Secure Req 2|SECURE-2 (DATA INTEGRITY)]]);&lt;br /&gt;
* Implementation of industry accepted cryptographic techniques for the storage of credential and token data (see [[Secure Req 2|SECURE-2 (DATA INTEGRITY)]]); &lt;br /&gt;
* Implementation of industry accepted key management and protection techniques (see [[Secure Req 11|SECURE-11 (KEY MANAGEMENT)]]); &lt;br /&gt;
* Out-of-band distribution of credentials or tokens; &lt;br /&gt;
* In-person issuance of credentials or tokens; and &lt;br /&gt;
* Anti-tampering and/or counterfeiting mechanism for tokens with a physical instantiation&lt;br /&gt;
&lt;br /&gt;
=== REFERENCES ===&lt;br /&gt;
FICAM TFPAP Trust Criteria, Registration and Issuance, LOA 2-3, #3 (p.21, 37)&lt;br /&gt;
&lt;br /&gt;
=== APPLIES TO ACTIVITIES ===&lt;br /&gt;
[[IDEF Functional Model CREDENTIALING|CREDENTIALING]]&lt;br /&gt;
&lt;br /&gt;
=== KEYWORDS ===&lt;br /&gt;
[[IDEF Keywords CREDENTIAL|CREDENTIAL]], [[IDEF Keywords DATA-INTEGRITY|DATA-INTEGRITY]], [[IDEF Keywords DUPLICATION|DUPLICATION]], [[IDEF Keywords PROCESS|PROCESS]], [[IDEF Keywords SECURITY|SECURITY]], [[IDEF Keywords TOKEN|TOKEN]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
----&lt;br /&gt;
Quick Links:   [[SALS]]  |  [[Baseline Functional Requirements v1.0]]  |  [[Glossary]]  |&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Omaerz</name></author>
	</entry>
</feed>