This wiki has undergone a migration to Confluence found Here
<meta name="googlebot" content="noindex">

Difference between revisions of "August 29, 2017 Security Conference Call"

From HL7Wiki
Jump to navigation Jump to search
Line 71: Line 71:
 
*This bulletin will describe the components of digital identity – identity proofing, authentication, and federation – and explain how federal agencies can use them to protect the digital identities of their employees. It also provides an overview of the NIST documents that describe these digital identity components and explains how the information in them is organized.
 
*This bulletin will describe the components of digital identity – identity proofing, authentication, and federation – and explain how federal agencies can use them to protect the digital identities of their employees. It also provides an overview of the NIST documents that describe these digital identity components and explains how the information in them is organized.
 
Understanding Digital
 
Understanding Digital
**Identity proofing is the process used to verify a subject’s association with their real-world
+
*Identity proofing is the process used to verify a subject’s association with their real-world
 
identity, establishing that a subject is who they claim to be.
 
identity, establishing that a subject is who they claim to be.
**An authenticator is something the subject possesses and controls (typically, a cryptographic
+
*An authenticator is something the subject possesses and controls (typically, a cryptographic
 
module or password) that is used to authenticate the subject’s identity.
 
module or password) that is used to authenticate the subject’s identity.
**Digital authentication is the process of determining the validity of one or more authenticators
+
*Digital authentication is the process of determining the validity of one or more authenticators
 
used to claim a digital identity. Authentication establishes that a subject attempting to access a
 
used to claim a digital identity. Authentication establishes that a subject attempting to access a
 
digital service is in control of the technologies used to authenticate. Successful authentication
 
digital service is in control of the technologies used to authenticate. Successful authentication
 
provides reasonable risk-based assurances that the subject accessing the service today is the
 
provides reasonable risk-based assurances that the subject accessing the service today is the
 
same that previously accessed the service.
 
same that previously accessed the service.
**Federation is when the relying party (RP) and identity provider (IdP) are not a single entity or
+
*Federation is when the relying party (RP) and identity provider (IdP) are not a single entity or
 
not under common administration. Federation enables an IdP to proof and authenticate an
 
not under common administration. Federation enables an IdP to proof and authenticate an
 
individual and provide identity assertions that RPs can accept and trust.
 
individual and provide identity assertions that RPs can accept and trust.
Line 87: Line 87:
 
**Identity Assurance Level (IAL): the identity proofing process and the binding between one or
 
**Identity Assurance Level (IAL): the identity proofing process and the binding between one or
 
more authenticators and the records pertaining to a specific subscriber;
 
more authenticators and the records pertaining to a specific subscriber;
**Authenticator Assurance Level (AAL): the authentication process, including how additional
+
*Authenticator Assurance Level (AAL): the authentication process, including how additional
 
factors and authentication mechanisms can impact risk mitigation; and
 
factors and authentication mechanisms can impact risk mitigation; and
**Federation Assurance Level (FAL): the assertion used in a federated environment to
+
*Federation Assurance Level (FAL): the assertion used in a federated environment to
 
communicate authentication and attribute information to a RP.
 
communicate authentication and attribute information to a RP.
 
*SP 800-63 is a suite of four documents: SP 800-63-3 (the parent document; your starting point for all things digital identity and risk) and three additional documents – SP 800-63A, 800-63B, and 800-63C –which cover the various components of a digital identity system. These documents are described below:
 
*SP 800-63 is a suite of four documents: SP 800-63-3 (the parent document; your starting point for all things digital identity and risk) and three additional documents – SP 800-63A, 800-63B, and 800-63C –which cover the various components of a digital identity system. These documents are described below:
**SP 800-63-3, Digital Identity Guidelines, provides an overview of general identity frameworks,
+
*SP 800-63-3, Digital Identity Guidelines, provides an overview of general identity frameworks,
 
guidance regarding use of authenticators, credentials, and assertions together in a digital system, and a risk-based process of selecting assurance levels;
 
guidance regarding use of authenticators, credentials, and assertions together in a digital system, and a risk-based process of selecting assurance levels;
 
**SP 800-63A, Enrollment and Identity Proofing;
 
**SP 800-63A, Enrollment and Identity Proofing;

Revision as of 18:54, 29 August 2017

Back to Security Main Page

Attendees

x Member Name x Member Name x Member Name x Member Name
. John MoehrkeSecurity Co-chair x Kathleen ConnorSecurity Co-chair . Alexander Mense Security Co-chair . Trish WilliamsSecurity Co-chair
x Mike Davis x Suzanne Gonzales-Webb x David Staggs x Mohammed Jafari
x Glen Marshall, SRS x Beth Pumo . Ioana Singureanu . Rob Horn
x Diana Proud-Madruga . Serafina Versaggi x Joe Lamy . Galen Mulrooney
. Duane DeCouteau . Chris Clark . Johnathan Coleman . Aaron Seib
. Ken Salyards . Christopher D Brown TX . Gary Dickinson x Dave Silver
x Rick Grow . William Kinsley . Paul Knapp x Mayada Abdulmannan
. Kamalini Vaidya . Bill Kleinebecker x Christopher Shawn . Grahame Grieve
. Oliver Lawless . Ken Rubin . David Tao . Nathan Botts

Back to Security Main Page

Agenda

  1. (2 min) Roll Call, Agenda Approval
  2. (4 min) Review and Approval of Security WG Call Minutes August 15, 2017 and Security WG Call Minutes August 22, 2017
  3. (5 min) San Diego Sept WGM Agenda - Kathleen
  4. (15 min) Working Group Meeting Agenda Items - Mike Davis
  5. (5 min) Security WG Interim Health Metrics - presiding cochair
  6. (5 min) ONC Trusted Exchange Common Agreement Framework Comments - Kathleen
  7. (5 min) FHIR Security call -

News and Review Material

  • Need assisteance with PASS Audit Ballot Comments from Bernd Blobel resolved. E.g., Move Figure 1 to Functional Section because it is too detailed. Make references to "client" as source of audit content and "source" as source of audit content consistent.
  • NSTC National Privacy Research Strategy
  • NIST 800-53 Rev 5 Review Security and Privacy Controls for Information Systems and Organizations Initial Public Draft Comments due Sept. 12. Please add to CBCC and Security WG NIST SP 800-53 Rev 5 Comment Page
  • NIST SP Security and Privacy Controls for Information Systems and Organizations Revision 5 Comments due September 12, 2017 See [CBCC and Security WG Comment Page and Security WG Comment Page for NIST 800-53 Rev 5 Review Security and Privacy Controls for Information Systems and Organizations Initial Public Draft ]]
  • Understanding the Major Update to NIST SP 800-63: Digital Identity Guidelines
  • Introduction: Digital identities are used in nearly every aspect of our online activities each day. A digital identity is the unique representation of a subject that is engaged in an online transaction. This bulletin outlines updates that NIST recently made in its four-volume Special Publication (SP) 800-63, Digital Identity Guidelines, which provide agencies with technical guidelines regarding the digital authentication of users to federal networked systems. Rather than being a single, monolithic guideline, SP 800-63-3 has been separated in multiple parts – each representing a distinct component of digital identity services. This way, organizations can choose the document that applies to the digital identity services they want to offer. This approach makes applying the guidelines easier for agencies—and also sets the stage for a nimble continuous improvement process. Also, NIST can quickly release key updates, rather than delivering in two or three year cycles.
  • This bulletin will describe the components of digital identity – identity proofing, authentication, and federation – and explain how federal agencies can use them to protect the digital identities of their employees. It also provides an overview of the NIST documents that describe these digital identity components and explains how the information in them is organized.

Understanding Digital

  • Identity proofing is the process used to verify a subject’s association with their real-world

identity, establishing that a subject is who they claim to be.

  • An authenticator is something the subject possesses and controls (typically, a cryptographic

module or password) that is used to authenticate the subject’s identity.

  • Digital authentication is the process of determining the validity of one or more authenticators

used to claim a digital identity. Authentication establishes that a subject attempting to access a digital service is in control of the technologies used to authenticate. Successful authentication provides reasonable risk-based assurances that the subject accessing the service today is the same that previously accessed the service.

  • Federation is when the relying party (RP) and identity provider (IdP) are not a single entity or

not under common administration. Federation enables an IdP to proof and authenticate an individual and provide identity assertions that RPs can accept and trust. How has SP 800-63-3 evolved? Since the last revision of this document in 2013, NIST SP 800-63-2, digital identity components have evolved substantially. To better align with market-driven business models and innovation, the new revision replaces levels of assurance (LOAs) with ordinals for individual parts of the digital identity flow, providing implementers with more flexibility in their design and operations:

    • Identity Assurance Level (IAL): the identity proofing process and the binding between one or

more authenticators and the records pertaining to a specific subscriber;

  • Authenticator Assurance Level (AAL): the authentication process, including how additional

factors and authentication mechanisms can impact risk mitigation; and

  • Federation Assurance Level (FAL): the assertion used in a federated environment to

communicate authentication and attribute information to a RP.

  • SP 800-63 is a suite of four documents: SP 800-63-3 (the parent document; your starting point for all things digital identity and risk) and three additional documents – SP 800-63A, 800-63B, and 800-63C –which cover the various components of a digital identity system. These documents are described below:
  • SP 800-63-3, Digital Identity Guidelines, provides an overview of general identity frameworks,

guidance regarding use of authenticators, credentials, and assertions together in a digital system, and a risk-based process of selecting assurance levels;