Attestation
Full Title
Attestation is a certified form of access checking or labeling that gives users or services the information needed to ascertain the trustworthiness of an entity.
Context
Goals
The end goal is safety and privacy for the end users at an acceptable level of user experience and enterprise cost.
Components
This is a taxonomy of the components, that might be attested, ordered in increasing levels of specificity.
- Framework - in this wiki a trust framework that provides principles.
- Profile - details on the application of the framework to a specific vertical or horizontal group of entities.
- Service - a digital web site or collection of sites or endpoints that offers services to entities, both digital and (through agents) real-world
- Endpoint - a single digital address providing a specified set of services
- Application - a collection of software that provides a service to entities, both digital and (through agents) real-world
- Device - a specific type of computing hardware with specific features specified in profile.
- Instance - an identified application on an identified device or endpoint
It is recognized that there are hybrids components, like web apps that are an application downloaded into a user agent on a device; but these can be handled by the above taxonomy if some overlap is permitted.
Problems
It is far too easy for a web site to make a set of claims or mimic a well know brand to trick a user into performing actions that are against their intentions or best interests.
Solutions
The best attestations are performed by a Trusted Third Party that is known to a community of users. This will involved at least a framework profile and a service. As the service branches out to increasing levels of security and privacy it is likely that more levels of specificity, as outlined above, will be desirable.
Framework or Profile Attestation
These are both as set of rules that others might follow. They are attested by a couple of methods:
- The creators of the artifacts themselves evaluate the effectiveness as the are typically subject matter experts (SMEs) in the field.
- Wide implementation is a prerequisite for any standard artifact to gain credence.
- Bug reports and updates are needed to be sure that as new attacks succeed against the integrity of conformant sites, these must be addressed in a timely fashion.
- At then end of the cycle success is measured by the relative safety of the users of sites conformant to the artifacts.
Self Attestation
All attestation regimes start with a list of "features" that must be supported in order to gain the right to display an attestation mark.
Audited Attestation
Example Device-App
Most mobile devices, like smart phones, have a strict policy of attestation before they will allow apps to be offered for down-load on their app stores. It is always possible to find other ways to load apps on smart phone, but it is deliberately difficult so that ordinary users will not bother with loading any app that is not attested by the O/S vendor, Android and Apple for smart phones. The Framework that each uses is unique to the O/S vendor, but the underlying framework for the web is coordinated by a common underlying platform that nearly all now support.
Example Authentication
The OpenID Foundation has a framework for authentication called OpenID Connect they also work with industry teams to create specific profiles for industries like the Financial Grade API profile. They have also created a certification program that will test an implementation by way of the endpoints on a web site. More than one endpoint is required to create a full implementation. They do list applications that have been used to obtain certification. But they do not attest that applications are conformant because there are so many ways to implement an application on a web site that it would have no meaning.