BS EN ISO/IEC 24760-3:2022
$167.15
Information technology. Security techniques. A framework for identity management – Practice
Published By | Publication Date | Number of Pages |
BSI | 2022 | 40 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | undefined |
6 | Foreword |
7 | Introduction |
9 | 1 Scope 2 Normative references 3 Terms and definitions |
10 | 4 Symbols and abbreviated terms 5 Mitigating identity related risk in managing identity information 5.1 Overview 5.2 Risk assessment |
11 | 5.3 Assurance in identity information 5.3.1 General 5.3.2 Identity proofing 5.3.3 Credentials 5.3.4 Identity profile |
12 | 6 Identity information and identifiers 6.1 Overview 6.2 Policy on accessing identity information 6.3 Identifiers 6.3.1 General 6.3.2 Categorization of identifier by the type of entity to which the identifier is linked |
13 | 6.3.3 Categorization of identifier by the nature of linking |
14 | 6.3.4 Categorization of identifier by the grouping of entities 6.3.5 Management of identifiers 7 Auditing identity information usage 8 Control objectives and controls 8.1 General |
15 | 8.2 Contextual components for control 8.2.1 Establishing an identity management system |
17 | 8.2.2 Establishing identity information |
18 | 8.2.3 Managing identity information |
19 | 8.3 Architectural components for control 8.3.1 Establishing an identity management system |
21 | 8.3.2 Controlling an identity management system |
23 | Annex A (normative) Practice of managing identity information in a federation of identity management systems |
32 | Annex B (normative) Identity management practice using attribute-based credentials to enhance privacy protection |
39 | Bibliography |