Guidelines for Digital Identity Verification.
Material type:
- text
- computer
- online resource
- 9798886979299
- 005.8 23/eng/20230628
- TK5105.59 .S65 2023
Description based upon print version of record.
Intro -- Contents -- Preface -- Chapter 1 -- Derived Personal Identity Verification (PIV) Credentials0F* -- Volume A: Executive Summary -- Executive Summary -- Challenge -- Solution -- Benefits -- Volume B: Approach, Architecture, and Security Characteristics -- Abstract -- 1. Summary -- 1.1. Challenge -- 1.2. Solution -- 1.3. Benefits -- 2. How to Use This Guide -- 3. Approach -- 3.1. Audience -- 3.2. Scope -- 3.3. Relationship to NIST SP 800-63-3 -- 3.4. Assumptions -- 3.4.1. Modularity -- 3.4.2. Security -- 3.4.3. Existing Infrastructure -- 3.4.4. Architecture Components
3.4.4.1. Credential Management System -- 3.4.4.2. Public Key Infrastructure -- 3.4.4.3. Enterprise Mobility Management -- 3.4.4.4. Mobile Device -- 3.4.4.5. Authenticator -- 3.5. Risk Assessment -- 3.5.1. Threats -- 3.5.1.1. Other Threats -- 3.5.2. Vulnerabilities -- 3.5.2.1. Mobile Device Vulnerabilities -- 3.5.2.2. Network Vulnerabilities -- 3.5.3. Risk -- 3.5.4. Security Control Map -- 3.6. Technologies -- 3.6.1. Entrust Datacard -- 3.6.2. Intel Authenticate -- 3.6.3. Intercede -- 3.6.4. MobileIron -- 3.6.5. Verizon Shared Service Provider -- 3.6.6. Mobile End Points
3.6.7. Technology Mapping -- 4. Architecture -- 4.1. Architecture Description -- 4.2. Managed Architecture with EMM Integration -- 4.3. Hybrid Architecture for PIV and DPC Life-Cycle Management -- 5. Security Characteristic Analysis -- 5.1. Assumptions and Limitations -- 5.2. Build Testing -- 5.2.1. Managed Architecture Build Testing -- 5.2.1.1. Initial Issuance -- 5.2.1.2. Maintenance -- 5.2.1.3. Termination -- 5.2.1.4. Derived PIV Authentication Certificate Management -- 5.2.2. Hybrid Architecture Build Testing -- 5.2.2.1. Initial Issuance -- 5.2.2.2. Maintenance -- 5.2.2.3. Termination
5.2.2.4. Derived PIV Authentication Certificate Management -- 5.3. Scenarios and Findings -- 5.3.1. PR.AC-1: Identities and Credentials Are Issued, Managed, Verified, Revoked, and Audited for Authorized Devices, Users, and Processes -- 5.3.2. PR.AC-3: Remote Access Is Managed -- 5.3.3. PR.AC-6: Identities Are Proofed and Bound to Credentials and Asserted in Interactions -- 5.3.4. PR.AC-7: Users, Devices, and Other Assets Are Authenticated (e.g., Single-Factor, Multifactor) Commensurate with the Risk of the Transaction (e.g., Individuals' Security and Privacy Risks and Other Organizational Risks)
5.3.5. PR.DS-2: Data in Transit Is Protected -- 5.3.6. PR.DS-5: Protections against Data Leaks Are Implemented -- 5.3.7. PR.IP-3: Configuration Change Control Processes Are in Place -- 5.4. Authenticator AAL Mapping -- 6. Future Build Considerations -- Appendix A: List of Acronyms -- Appendix B: Glossary -- Appendix C. National Institute of Standards and Technology (NIST) Internal Report 8055 [10] Requirements Enumeration and Implementation Mappings -- Appendix D: References -- Volume C: How-To Guides -- Abstract -- 1. Introduction -- 1.1. Practice Guide Structure -- 1.2. Build Overview
2. Product Installation Guides
Added to collection customer.56279.3
There are no comments on this title.