Framework Profiles: Difference between revisions

From IDESG Wiki
Jump to navigation Jump to search
Line 13: Line 13:
#The Kantara Initiative has a[https://kantarainitiative.org/trust-registry/ Trust Registry] based on SAML 2 metadata.
#The Kantara Initiative has a[https://kantarainitiative.org/trust-registry/ Trust Registry] based on SAML 2 metadata.
#The OpenID foundation has a certification program for several of their identity profiles that has won wards for [https://openid.net/2018/05/16/openid-certification-program-wins-2018-european-identity-and-cloud-award/ 2018 European Identity and Cloud Award] and the [https://openid.net/2018/03/29/openid-certification-program-wins-2018-identity-innovation-award/ 2018 Identity Innovation Award].
#The OpenID foundation has a certification program for several of their identity profiles that has won wards for [https://openid.net/2018/05/16/openid-certification-program-wins-2018-european-identity-and-cloud-award/ 2018 European Identity and Cloud Award] and the [https://openid.net/2018/03/29/openid-certification-program-wins-2018-identity-innovation-award/ 2018 Identity Innovation Award].
#The NIST has a [https://www.nist.gov/cyberframework Cybersecurity Framework] consisting of standards, guidelines, and best practices to manage cybersecurity-related risk. One example of the use of vertical industry profiles of this framework may be found by following the link [ below].
#The NIST has a [https://www.nist.gov/cyberframework Cybersecurity Framework] consisting of standards, guidelines, and best practices to manage cybersecurity-related risk. One example of the use of vertical industry profiles of this framework may be found by following the link [[Framework_Profiles#Profile|below]].
#The NIST has an [https://pages.nist.gov/800-63-3/ SP 800-63-3] compliance program which now has assessors like Kantara to certify compliance.
#The NIST has an [https://pages.nist.gov/800-63-3/ SP 800-63-3] compliance program which now has assessors like Kantara to certify compliance.



Revision as of 17:09, 27 October 2018

Full Title or Meme

The Identity Ecosystem Framework will need fine-grained specifications for applying its principles to specific vertical industry and horizontal community requirements.

Context

Goals

  • As a part of the creation of a set of Identity Ecosystems this plan lays out how to address specific community needs for security, privacy, interoperability and user experience. It is expected that all communities will start from the Baseline Functional Requirements (as amended from time to time) and add additional requirements in those four areas plus the potential for a trusted laboratory validation of compliance with the profiles.
  • Compliance results are freely available for query by any potential participant prior to any engagement. Potential users need to understand the results before they commit to joining in any framework.
  • Attestation need not be free. Joining any framework will likely be costly in terms of money and effort. Getting an attestation or certificate of membership is a value that must be paid for. The source of funding is not specified but could include charging for access to attested results, for example the acquisition of a signed or encrypted certificate of membership need not be freely available.

Existing Compliance Frameworks

A partial list of the existing compliance effort that are used as models includes:

  1. The IDEF registry is operation and will serve as the base framework for the sandbox efforts.
  2. The Kantara Initiative has aTrust Registry based on SAML 2 metadata.
  3. The OpenID foundation has a certification program for several of their identity profiles that has won wards for 2018 European Identity and Cloud Award and the 2018 Identity Innovation Award.
  4. The NIST has a Cybersecurity Framework consisting of standards, guidelines, and best practices to manage cybersecurity-related risk. One example of the use of vertical industry profiles of this framework may be found by following the link below.
  5. The NIST has an SP 800-63-3 compliance program which now has assessors like Kantara to certify compliance.

Problems

  • User need to real-time query access to the list of compliant participant.
  • Each jurisdiction creates their own Identifier domain(s) for users and for providers that can be used to identify participants with some central rooted registry for the participants that have met the framework profile requirements.

Solutions

A user-friendly online query service that will give users actionable information about compliant participants.

  • The establishment of individual profiles that can be verified online and inline by calling APIs is the core of all of these profiles.
  • Unstructured queries will return a list of all the participants that meet query.
  • The working document for the Trust Framework Membership Validation APIs has been under development since August 2017.
  • A Federation Trust Registry is proposed to strongly identify framework participants.

Profiles

As each community begins the process of creating profile the committee will coordinate and record their efforts here:

  1. Health Care Profile now in planing with various US healthcare committees.
  2. Financial Profile now considering the creation of a specific implementation of a Financial Profile Sandbox for compliance testing.

References