Difference between revisions of "ISO/IEC 29115 Entity Authentication Assurance"

From IDESG Wiki
Jump to: navigation, search
(Abstract)
(Abstract)
 
(One intermediate revision by the same user not shown)
Line 18: Line 18:
  
 
In particular, it:
 
In particular, it:
*specifies four levels of entity authentication assurance;
+
*specifies four [[Level of Assurance|levels of entity authentication assurance]];
 
*specifies criteria and guidelines for achieving each of the four levels of entity authentication assurance;
 
*specifies criteria and guidelines for achieving each of the four levels of entity authentication assurance;
 
*provides guidance for mapping other authentication assurance schemes to the four LoAs;
 
*provides guidance for mapping other authentication assurance schemes to the four LoAs;
Line 24: Line 24:
 
*provides guidance concerning controls that should be used to mitigate authentication threats.
 
*provides guidance concerning controls that should be used to mitigate authentication threats.
  
Derived from [[NIST SP 800-63-2]] which has been replaced in the US by verion 3.
+
Derived from [[NIST SP 800-63-2]] which has been replaced in the US by version 3.
  
 
[[Category:Standards]]
 
[[Category:Standards]]
 
[[Category:Bibliography]]
 
[[Category:Bibliography]]
[[Category:Assurance]
+
[[Category:Assurance]]
 
[[Category:Authentication]]
 
[[Category:Authentication]]

Latest revision as of 00:28, 24 August 2020

Title: Entity Authentication Assurance


URL: http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=45138


Version: 2013


Date: 2013-03-27


Description

ISO/IEC 29115:2013 provides a framework for managing entity authentication assurance in a given context.

Abstract

In particular, it:

  • specifies four levels of entity authentication assurance;
  • specifies criteria and guidelines for achieving each of the four levels of entity authentication assurance;
  • provides guidance for mapping other authentication assurance schemes to the four LoAs;
  • provides guidance for exchanging the results of authentication that are based on the four LoAs; and
  • provides guidance concerning controls that should be used to mitigate authentication threats.

Derived from NIST SP 800-63-2 which has been replaced in the US by version 3.