Search results

Jump to navigation Jump to search
  • == The IDEF Self-Assessment Listing Service (SALS) == ...status through self-assessment with a set of common standards for reliable security, privacy, ease of use, cost savings, and user choice and declare their comm
    3 KB (506 words) - 00:00, 24 January 2020
  • ...e their own credentials is protected storage and ask the CSP to verify the security of those credentials. ...e functions of an [electronic] Identity Proofing and Credential Management Service, either in full or as a discrete component (i.e., a sub-set of the function
    3 KB (467 words) - 01:56, 15 May 2020
  • ...ish an integrity (aka health) claim for a device that, together with other security measures, is good evidence of the integrity of the information exchanged wi Integrity has two meanings in computer security. The first relates to the device not having been changed in any way since i
    12 KB (1,835 words) - 20:44, 5 November 2020
  • Service Provider CAs, FCPCA, EGCA) are out of scope. The document provides a detail '''Security''': The document is an information security policy and procedures document.
    2 KB (230 words) - 23:00, 18 February 2021
  • ...non-compulsory and (5) for PII to be protected after the termination of a service. '''Security''': The document is an information security policy.
    3 KB (373 words) - 23:01, 18 February 2021
  • ...ion assertions from another party such as an Identity Provider, Credential Service Provider (CSP), or Trusted Broker. (Sal/Krum) ...rds that UXC is recommending. ISO 29115 has already been submitted by the Security Committee as confirmed by Mary Ellen Condon.
    4 KB (682 words) - 03:58, 28 June 2018
  • ...the Social Security numbers and information as it relates to the military service of a customer. Draft legislation has been put together that covers how an o ...t access to the Social Security is the Holy Grail. Someone gets the Social Security number and then they can find out all kinds of information about the person
    7 KB (1,073 words) - 03:58, 28 June 2018
  • ==SECURITY COMMITTEE / FUNCTIONAL MODEL MEETING NOTES - '''''draft'''''== *Review security requirements. #1 through #10 discussed in earlier meetings. However, ther
    2 KB (280 words) - 03:58, 28 June 2018
  • ==SECURITY COMMITTEE / FUNCTIONAL MODEL MEETING NOTES - '''draft'''== #**Andrew - this can be an extension of Authentication service
    5 KB (753 words) - 03:58, 28 June 2018
  • ...? What if we created a graph and called out UXC issues around privacy and security around organizations vs individuals. ...rement. “Service providers in the ecosystem follow recognized information security standards, frameworks, and/or appropriate practices.” We could include s
    7 KB (1,070 words) - 03:58, 28 June 2018
  • ...number of actors involved in the process. It describes a case in which a Service Provider obtains information about a User sufficient to make an access cont ...ies and often dictates a specific authentication solution in order for the service provider to authenticate the user.
    7 KB (1,007 words) - 03:58, 28 June 2018
  • ##Credential Service Provider (CSP) (A trusted entity hosting a subset of the above roles.) (aka ###Service (silicon based life form, like a newsfeed)
    8 KB (1,315 words) - 19:29, 30 July 2020
  • <center>'''National Security Telecom Advisory Comm.(NSTAC) Report to the President on Identity Managemen <center>'''Oasis: Glossary for the OASIS Security Assertion Markup Language (SAML) V2.0'''</center>
    845 KB (86,833 words) - 04:00, 28 June 2018
  • <center>'''National Security Telecom Advisory Comm.(NSTAC) Report to the President on Identity Managemen <center>'''Oasis: Glossary for the OASIS Security Assertion Markup Language (SAML) V2.0'''</center>
    135 KB (15,051 words) - 04:00, 28 June 2018
  • National Security Telecommunications Advisory Committee (NSTAC) Report to the President on Id Sample agreement between “relying party” and “credential service provider.”
    13 KB (1,562 words) - 04:00, 28 June 2018
  • ...ing Party (RP) role. This case is specifically designed to include general security, privacy and user experience criteria that will apply by default to all oth ...organization acting through a user agent that needs to access resources of service providers (RPs).
    5 KB (810 words) - 04:00, 28 June 2018
  • This design pattern assumes the use of a device connected to internet service providers as described in the [[Common to any Internet Identity Ecosystem]] ...):''' A service provider that needs a collection of claims to provide that service. The claims may relate to financial responsibility or other user attributes
    10 KB (1,596 words) - 20:11, 15 October 2019
  • == Terms and definitions specific to the IDESG Self-Assessment Listing Service (SALS) in 2016 == ...that exists, e.g., a person, organization, device, software application or service.
    11 KB (1,758 words) - 04:00, 28 June 2018
  • '''Title''': Security Assertion Markup Language (SAML) 2.0 Web Browser Single Sign-on (SSO) Profi '''Security''': The document is an information security profile. It requires IdPs and RPs to use "approved cryptographic
    2 KB (214 words) - 04:00, 28 June 2018
  • A product, service, environment or facility which is usable by USERs with the widest range of A non-human application or service acting in the digital environment on behalf of a human USER. Synonymous wi
    11 KB (1,496 words) - 23:48, 5 September 2020
  • This use case helps the IRS determine whether a taxpayer's Social Security Number is being used fraudulently in a tax return. It does this by checking Internal Revenue Service, Social Security Administration, commercial tax preparation software vendors
    10 KB (1,744 words) - 17:43, 25 May 2019
  • ...ategories and controls that can be implemented by a public cloud computing service provider acting as a PII processor. It has the following objectives. — To help the public cloud service provider to comply with applicable obligations when acting as a PII process
    4 KB (531 words) - 04:00, 28 June 2018
  • ...private and subject to protections. A high-security pseudonymous identity service (for example a dating website) could verify attributes such as legal names
    2 KB (255 words) - 04:00, 28 June 2018
  • ...the benefit of the user, not solely for the benefit of the web site of the service provider. The challenge will be to find a way to fund solutions to problems ...ony]] with an Identity or Attribute Provider that has an IDESG Trustmark. (security committee priority 1)
    12 KB (1,958 words) - 17:45, 25 May 2019
  • ...and behaviors, while the data in the [[User Object]] held in some internet service will never contain more than a small subset of those attributes. The model ...entities is considered to be an independent browser. Web apps supplied by service providers are not fully explored in this version.
    56 KB (9,154 words) - 00:16, 30 October 2020
  • ...gram state, it reduces user errors and surprises. A good GUI provides this service. Using an interactive program is like being a doctor trying to navigate a p ...ers deserve. After all the greatest hassle for users is created when their security or privacy are breached. While interoperability is seldom raised as a user
    8 KB (1,351 words) - 21:37, 27 March 2020
  • Identity Proofing is the process by which a Credential Service Provider (CSP) and a Registration Authority (RA) collect and verify informa * Credential Service Provider.
    3 KB (328 words) - 21:41, 10 January 2020
  • '''Security''': ...[[Public Key Infrastructure]], [[Relying Party]], [[Resource Provider]], [[Service Provider]], [[Shibboleth]], [[Sponsored Partner]], [[Support Contact]], [[T
    2 KB (205 words) - 04:01, 28 June 2018
  • '''Security''': The document is an information security assurance framework. ...he document promotes interoperability by specifying the requirements for a service to operate at the
    2 KB (203 words) - 21:48, 10 January 2020
  • '''Security''': The document is a information security profile at OMB-04-04 levels of assurance 1 and 2. ...he document promotes interoperability by specifying the requirements for a service to operate at the
    1 KB (156 words) - 04:01, 28 June 2018
  • ...ibilities and the parameters of those requirements and responsibilities to Service Providers in online transactions. At more detailed and granular layers as d ...rinciples and created from a bi-direction approach balancing human userand service provider requirements, desires, and benefits.
    13 KB (1,906 words) - 19:16, 2 July 2021
  • ...erent entities/roles (IdP, RP, User, etc.) that require different privacy, security, UX and other considerations. ...Such considerations will create a context for deriving requirements – like security requirements, UX requirements, and privacy requirements, so on.
    6 KB (888 words) - 04:01, 28 June 2018
  • Entities that act as [[IDEF Glossary THIRD PARTIES|THIRD-PARTY]] service providers for another entity, in conducting [[IDEF Glossary DIGITAL IDENTIT ...service provider. For purposes of this Requirement, the term "THIRD-PARTY service provider" refers to THIRD-PARTIES that an assessed entity outsources or del
    3 KB (451 words) - 04:01, 28 June 2018
  • *Standards – ISO 29115 has already been submitted by the Security Committee. **Self-Assessment Listing Service (SALS) will be up soon for examination and Sal requested that UXC review an
    3 KB (391 words) - 04:01, 28 June 2018
  • ==SECURITY COMMITTEE / FUNCTIONAL MODEL MEETING NOTES== #**** A service provider can hold more than one role
    4 KB (608 words) - 04:02, 28 June 2018
  • ==SECURITY COMMITTEE / FUNCTIONAL MODEL MEETING NOTES - '''''draft'''''== ...and Ryan Galluzzo. The task force will bring their findings to the broader Security Committee once they are finished. Again, if anyone joins the call outside o
    3 KB (454 words) - 04:02, 28 June 2018
  • ...e''': Identity Assurance Framework: Additional Requirements for Credential Service Providers: US Federal ...ia supplement the Kantara IAF level of assurance requirements found in the Service
    848 bytes (97 words) - 00:51, 31 May 2020
  • the Service Assessment Criteria (SAC), which establishes baseline criteria for general '''Security''':
    1 KB (128 words) - 04:02, 28 June 2018
  • '''Security''': The document defines terms used in a security assurance framework. ...[[Security]], [[Service Assessment Criteria]], [[Signatory]], [[Specified Service]], [[Subject]], [[Subscriber]], [[Threat]], [[Token]]
    2 KB (217 words) - 04:02, 28 June 2018
  • ...ments which will benefit both Kantara- accredited Assessors and Credential Service Providers having their services assessed against the IAF Service Assessment Criteria (SAC)
    1 KB (119 words) - 04:02, 28 June 2018
  • '''Title''': Identity Assurance Framework: Service Assessment Criteria ...rainitiative.org/confluence/download/attachments/45057040/Kantara+IAF-1400-Service+Assessment+Criteria.pdf
    653 bytes (65 words) - 04:02, 28 June 2018
  • ==SECURITY COMMITTEE NOTES - '''''draft'''''== **Final Security Requirements are due March 16.
    3 KB (478 words) - 04:02, 28 June 2018
  • ==SECURITY COMMITTEE MEETING NOTES - '''''draft'''''== **Requirement #10: Outcome based requirement statement, updated to: Service provider employs secure authentication on protocols for the purpose of demo
    2 KB (325 words) - 04:02, 28 June 2018
  • ==SECURITY COMMITTEE / FUNCTIONAL MODEL MEETING NOTES == *Process FMO Security Requirements feedback
    3 KB (448 words) - 04:02, 28 June 2018
  • ==SECURITY COMMITTEE / FUNCTIONAL MODEL MEETING NOTES == #Security Committee officer elections
    7 KB (1,007 words) - 04:02, 28 June 2018
  • ==SECURITY COMMITTEE / FUNCTIONAL MODEL MEETING NOTES - '''''draft'''''== *Confirm finalized security requirements (confirmation, not detailed discussion)
    3 KB (485 words) - 04:02, 28 June 2018
  • * Privacy, Security, Standards, User Experience, met to discuss requirements coordination. Furt ...rite requirements that cover material changes to services after an initial service agreement is established
    1 KB (190 words) - 04:02, 28 June 2018
  • ...ng how complete/accurate/timely data is that they collect to provide their service. How do we provide guidance to companies based on risk of that transaction ...tion in the Identity Ecosystem, organizations shall, while maintaining the security of individuals’ information, transfer it upon their request and destroy i
    2 KB (278 words) - 04:02, 28 June 2018
  • '''Category''': Security Requirements Specification '''Description''': Part of the Security Content Automation Protocol (SCAP), Asset Identification is a language for
    2 KB (204 words) - 04:02, 28 June 2018
  • '''Category''': Security Control Implementation Guide '''Security''': The document is an information security guideline. The requirements in the document are grouped into four
    4 KB (459 words) - 23:02, 18 February 2021
  • '''Security''': ...rust Identity]], [[Security Token]], [[Signed Security Token]], [[Unsigned Security Token]], [[Proof-of-possession]], [[Integrity]], [[Confidentiality]], [[Dig
    1 KB (112 words) - 04:02, 28 June 2018
  • '''Title''': Glossary for the OASIS Security Assertion Markup Language (SAML) V2.0 '''URL''': http://docs.oasis-open.org/security/saml/v2.0/saml-glossary-2.0-os.pdf
    2 KB (226 words) - 04:02, 28 June 2018
  • RFC 6819, OAuth 2.0 Threat Model and Security Considerations service, either on behalf of a resource owner by orchestrating an approval interact
    2 KB (193 words) - 21:30, 24 July 2020
  • ==SECURITY COMMITTEE / FUNCTIONAL MODEL MEETING NOTES - '''''draft'''''== *David Temoshok reviewed the SALS Program Overview with the Security Committee.
    7 KB (1,031 words) - 04:02, 28 June 2018
  • ...ovider which can exist either as a part of the user agent on in some cloud service. This use case considers the former implementation. In either implementatio ...(RP): A service provider that needs a collection of claims to provide that service. The claims may relate to financial responsibility or other user attributes
    12 KB (2,056 words) - 20:35, 27 November 2019
  • ...(RP): A service provider that needs a collection of claims to provide that service. The claims may relate to financial responsibility or other user attributes ...hnologies that may be used by the relying party and the various providers. Security Token Services typically provide token translation services. For example s
    14 KB (2,167 words) - 01:45, 15 May 2021
  • ...stry compatible database. Searches can be done on services, companies, and service category. The method describes how people can determine the current members ...to rely on certain assertions by other actors to fulfill their information security requirements." In this document the objective is simply to allow two digita
    21 KB (3,285 words) - 23:37, 15 January 2020
  • ...to provide identification or personal information to gain access to a web service. This pattern specifically focuses on the interaction with a relying party ...Party (RP):''' An entity that needs a collection of claims to provide that service; the RP might rely on a collection of claims from different identity or att
    24 KB (3,856 words) - 16:05, 16 December 2021
  • ...t calculate the tradeoffs among security, privacy, and gaining access to a service they desire." Page 12
    8 KB (1,190 words) - 16:21, 27 May 2020
  • * [https://playbook.cio.gov/ U.S. Digital Service Digital Playbook] ...2016/NIST.IR.8080.pdf NIST Interagency Report (NISTIR) 8080, Usability and Security Considerations for Public Safety Mobile Authentication]
    7 KB (944 words) - 20:05, 11 April 2018
  • ...this community as well as greater social cohesion and internet-wide cyber-security. 6 Any Relying Party or Service Provider in the IDESG Identity Ecosystem that complies with the NSTIC princ
    13 KB (1,990 words) - 21:48, 5 December 2020
  • This design pattern assumes the use of a device connected to internet service providers as described in the [[Design Pattern: Common to any Internet Iden ...):''' A service provider that needs a collection of claims to provide that service. The claims may relate to financial responsibility or other user attributes
    17 KB (2,712 words) - 19:20, 28 November 2021
  • *Terms of Service and Privacy Statements are shown on user sites and occasionally positive us *Organizations, such as financial institutions, offer a service to give user notification of specific status changes, which the user is typ
    13 KB (2,151 words) - 00:14, 30 October 2020
  • This design pattern assumes the use of a device connected to internet service providers as described in the [[Design Pattern: Common to any Internet Iden ...):''' A service provider that needs a collection of claims to provide that service. The claims may relate to financial responsibility or other user attributes
    9 KB (1,467 words) - 20:46, 9 September 2018
  • ...other service providers that interact with the user. Connections that the service providers have beyond the user connection are not indicated as all data sen This design pattern assumes the use of a device connected to internet service providers as described in the [[Design Pattern: Common to any Internet Iden
    11 KB (1,838 words) - 16:48, 19 January 2016
  • ...th a community identity card so they are welcomed as part of the community service system that coordinates social services. ...for them to use to assert their identity; the process will be privacy and security compliant.
    3 KB (399 words) - 18:50, 13 May 2020
  • ...ile] of the NIST cyber-security framework should serve as both a source of security assurance as well as a paradigm of federated frameworks that we could use i ...U provides a trust framework with qualified trust service providers. These service providers can issue both server and client certificates and there are vario
    5 KB (813 words) - 15:47, 26 November 2018
  • ...in the covered health care providers (aka the [[Electronic Health Record]] service). ...ns or, in some cases, all residents. The US has determined that the social security number (SSN) is not a secure means of identification and has mandated that
    18 KB (2,580 words) - 18:52, 7 December 2020
  • ...cosystem]]s this plan lays out how to address specific community needs for security, privacy, interoperability and user experience. It is expected that all com A user-friendly online query service that will give users actionable information about compliant participants.
    7 KB (988 words) - 21:22, 15 December 2018
  • ...cols, etc.). DIDs point to DID Documents. A DID Document contains a set of service endpoints for interacting with the entity." The primary difference between Security
    2 KB (365 words) - 23:09, 13 December 2018
  • * The immediate goal is that the user of the web platform service recognize the value of conformance to the framework profile. *Application - a collection of software that provides a service to entities, both digital and (through agents) real-world.
    7 KB (1,184 words) - 04:47, 23 August 2020
  • ...s an assurance of its own identity, provenance and policies as well as the security configuration of the device it is running on. ===Security===
    4 KB (509 words) - 19:24, 4 May 2020
  • ## Testing must include all 4 IDEF components of: Security, Privacy, User Experience and Interoperability. ...tested. This requirement likely goes beyond a strict reading of the HIPAA security requirements.
    28 KB (4,415 words) - 17:28, 21 March 2021
  • ...etrics, disease history, whatever (maybe even the old standard, the social security number). ...YOD) to work environments. In all cases the enterprise will have from some security, possibly even remote wipe capability, for the phone. In other words, the e
    19 KB (3,008 words) - 20:23, 20 March 2021
  • ...nitial consent and a method for notification from a subject to any digital Service Provider. ...sent receipt and authorization in response to this message which meets the security requirements of the intended purpose.
    14 KB (2,250 words) - 01:29, 23 December 2020
  • ...e entity to any other registered covered entity. (For the [[Record Locator Service]].) The services that they provide are listed below. # Specific physical location where service was provided to a patient. (eg Pine Lake Office of Swedish Physicians) (aka
    19 KB (2,997 words) - 01:34, 18 February 2021
  • ...user puts the agent on the smart phone, in that case the user lets a cloud service be their agent. #The auditor that verifies the functionality of the Remote Attestation Service.
    14 KB (2,290 words) - 21:36, 30 March 2020
  • ...to the [[Remote Attestation Use Case]]. In this case the user lets a cloud service be their agent, in that case the user puts the agent on the smart phone. ...ormation, for example, medical records for an [[Electronic Health Record]] service. The sink of the user data.
    13 KB (2,156 words) - 18:55, 7 December 2020
  • independently of the service provider infrastructure pretext that it will be protected by terms of service and
    17 KB (2,526 words) - 01:18, 21 February 2020
  • ...e user agrees to share some private, sensitive information from a resource service to a new partner web site. [[Category:Security]]
    3 KB (550 words) - 22:57, 18 February 2021
  • ...g on new or existing contractual relationships bolstered by negotiation of security and other technical details. Such an approach is not scalable, however, as #[[Record Locator Service]](RLS) = provides the ability to identify where records are located based u
    5 KB (803 words) - 22:49, 26 April 2021
  • #[[Record Locator Service]](RLS) = provides the ability to identify where records are located based u #Patient queries a known Medical [[Record Locator Service]] (MRLS) to see what sites have his data online and accessible. (Always opt
    7 KB (1,230 words) - 04:07, 19 May 2020
  • # [[Credential Service Provider]] # Security
    7 KB (1,033 words) - 23:32, 20 May 2020
  • ...s and entities to comply with the same standards that apply to the fee for service programs. The CMS Interoperability and Patient Access final rule requires c ...0] is a specification under development in Kantara.for apps to prove their security to the relying party.
    7 KB (971 words) - 16:33, 30 April 2021
  • ...ience]] will be through the web browser as the most common user agent, for security purposes the experience of the native app cannot be sacrificed to a good br ...the usual visual trust mechanisms may be bypassed (e.g., Transport Layer Security (TLS) confirmation, web site mechanisms). By using an embedded or internal
    7 KB (1,136 words) - 20:39, 8 September 2020
  • This is designed to be the source document for a Service Assessment Criteria for apps that are used in user, patient or delegate app ...urity, which provides that personal data should be protected by reasonable security safeguards against such risks as loss, unauthorized access, destruction, us
    4 KB (622 words) - 01:31, 18 February 2021
  • ...n report that the app will be sufficiently responsive to patient needs for security and privacy. This is a proposal to seek funding from the US HHS ONC to buil ## The security of the user's private data in transit and at rest on the app.
    11 KB (1,637 words) - 23:44, 10 November 2020
  • ...th requirements for travel that are collected from among many [[Credential Service Provider]]s. For example: acceptable proofs might include: # [[Credential Service Provider]] can generate a health travel credential from Patient Health Info
    13 KB (1,954 words) - 00:52, 4 May 2021
  • ...e entity to any other registered covered entity. (For the [[Record Locator Service]].) The services that they provide are listed below. ...- usually loss of access to one or more EHR - access to the record locator service might be the best place to address.
    20 KB (3,074 words) - 22:40, 21 March 2021
  • ...Planns, of the Department of Homeland Security (DHS) has issued a RFC] for security standards and requirements to enable Federal agencies to accept them if com **This includes comments relating to the economic, privacy, security, environmental, energy, or federalism impacts that might result from a futu
    30 KB (4,866 words) - 16:56, 9 June 2021
  • A proposal is in process to extend the Service Assessment Criteria for NIST SP 800-63 into a Trust Registry API for Mobile * Report on the level of security of user secrets (e.g. Private keys and other credentials). Hardware versus
    8 KB (1,238 words) - 16:37, 26 August 2021