This article provides a NIST digital identity summary and update related to NIST special publication 800-63 for digital identity guidelines. The National Institute of Standards and Technology (NIST) digital identity guidelines, known as Special Publication (SP) 800-63, provide recommendations for creating and maintaining secure digital identities. The guidelines are intended to help organizations, government agencies, and other entities establish a secure and trustworthy digital identity ecosystem.

NIST Digital Identity Update

The guidelines offer topics related to digital identity, including:

  • Authentication: guidelines for verifying the identity of a user through various methods such as multi-factor authentication, knowledge-based authentication, and biometric authentication.
  • Authorization: guidelines for granting access to resources and information based on the user’s verified identity.
  • Identity proofing: guidelines for verifying the identity of an individual, including identity proofing remotely and in-person.
  • Identity assurance: guidelines for determining the level of trust that can be placed in an individual’s identity claim.
  • Risk-based authentication: guidelines for assessing the risk level with a given transaction and adjusting authentication methods accordingly.
  • Out-of-band authentication: guidelines for using a separate method to verify an identity.

The NIST digital identity guidelines are voluntary but widely adopted by many companies and governments globally. They are designed to provide a comprehensive and flexible framework for creating and maintaining secure digital identities, with a focus on providing robust remote identity proofing and device-based authentication options, while balancing security and usability.

Purpose of NIST Digital Identity Guidelines

The purpose of NIST digital identity guidelines is to provide a set of best practices for creating and maintaining secure digital identities, to help organizations and government agencies to establish a secure and trustworthy digital identity ecosystem, and to provide a comprehensive and flexible framework for creating and maintaining secure digital identities.

NIST Digital Identity Updates

The National Institute of Standards and Technology (NIST) regularly updates its digital identity guidelines, known as Special Publication (SP) 800-63. These guidelines provide recommendations for creating and maintaining secure digital identities, including guidelines for authentication and authorization. Some of the changes in recent updates include:

  • SP 800-63-3 (2017): This update introduced new guidelines for multi-factor authentication and introduced the concept of “verifiers” (organizations or entities that verify identities) and “subscribers” (individuals who are seeking to prove their identity).
  • SP 800-63B (2018): This update provided additional guidelines for multi-factor authentication, including guidelines for using knowledge-based authentication (KBA) and risk-based authentication.
  • SP 800-63C (2020): This update was a major revision of the previous version, which added new guidelines for remote identity proofing, device-based authentication, and more. The guidelines are focused on the new concept of “identity assurance level (IAL)” and “authentication assurance level (AAL)”

It is important to note that NIST guidelines are voluntary, but are widely adopted by many organizations and government agencies in the United States and around the world.

SP 800-63C Update 2020

SP 800-63C, which was released in 2020, is a major update to the previous version of NIST’s digital identity guidelines. Some of the key updates include:

  • Remote Identity Proofing: This update introduces new guidelines for verifying identities remotely, such as through online or video-based methods. This is important in light of the increased use of remote work and online services.
  • Device-based Authentication: The update also includes new guidelines for device-based authentication methods, such as using a device’s biometric data or other unique characteristics to authenticate a user.
  • Identity Assurance Level (IAL) and Authentication Assurance Level (AAL): In previous versions of the guidelines, NIST recommended different levels of authentication based on the sensitivity of the information being accessed. In this update, NIST introduced the concept of “identity assurance level (IAL)” and “authentication assurance level (AAL)” to provide a more comprehensive framework for assessing the level of assurance required for different types of transactions.
  • Biometric Authentication: This update also provides specific guidelines for biometric authentication, which is becoming more widely adopted as a means of verifying identity.
  • Risk-based Authentication: The guidelines also introduce the concept of risk-based authentication, which allows organizations to assess the level of risk associated with a given transaction and adjust their authentication methods accordingly.
  • Out-of-band Authentication: The guidelines also provide recommendations for out-of-band authentication, which is a method of authentication that uses a separate communication channel (e.g. SMS, phone call) to verify a user’s identity.

Overall, the SP 800-63C update provides a more comprehensive and flexible framework for creating and maintaining secure digital identities, with a focus on providing more robust remote identity proofing and device-based authentication options.

What is Remote Identity Proofing?

Remote identity proofing, also known as remote identity verification, is the process of verifying a person’s identity remotely, typically through an online or video-based process. This can be accomplished through various methods, including:

  • Document verification: This involves verifying a person’s identity by comparing information on a government-issued ID (e.g. passport, driver’s license) to information provided by the individual.
  • Knowledge-based authentication (KBA): This involves verifying a person’s identity by asking them to answer personal questions, such as their mother’s maiden name or the name of their first pet.
  • Biometric verification: This involves using a person’s unique physical or behavioral characteristics (e.g. fingerprints, facial recognition) to verify their identity.
  • Video-based verification: This involves using video conferencing technology to conduct a live interview with the individual to verify their identity.

Remote identity proofing is becoming increasingly important as more and more transactions and interactions are conducted online, and in light of the increased use of remote work and online services. The NIST SP 800-63C guidelines provide recommendations for remote identity proofing, including the use of multiple methods to verify identity in order to increase the overall level of assurance.

It’s important to note that remote identity proofing is not a replacement of in-person identity verification, but rather it’s an additional means of identity verification that can be used in certain circumstances where in-person verification is not possible or feasible.

What is Risk-based Authentication?

Risk-based authentication (RBA) is a method of assessing the level of risk associated with a given transaction and adjusting authentication methods accordingly. This approach allows organizations to balance security and usability by only requiring stronger authentication methods when the risk of fraud or unauthorized access is higher.

Risk-based authentication typically involves evaluating a number of different factors to determine the level of risk associated with a given transaction. These factors can include:

  • The type of transaction being conducted
  • The sensitivity of the information being accessed
  • The location of the user
  • The device being used
  • The behavior of the user (e.g. whether they have a history of suspicious activity)

Based on the level of risk determined, the organization can then choose an appropriate level of authentication to use. For example, if the risk is low, a simple username and password may be sufficient, while a higher risk transaction may require multi-factor authentication (MFA) or other stronger methods.

Risk-based authentication is becoming an increasingly popular approach to identity and access management, as it allows organizations to provide a more seamless user experience while still maintaining a high level of security. The NIST SP 800-63C guidelines provide recommendations for risk-based authentication, including how to evaluate risk and how to implement risk-based authentication in a way that is both effective and secure.

What is Out-of-band Authentication?

Out-of-band authentication (OOB) is a method of authentication that uses a separate communication channel to verify a user’s identity. This separate channel is typically used as a secondary means of authentication, in addition to something the user knows (like a password), something the user has (like a security token), or something the user is (like a biometric).

There are different ways OOB authentication can be implemented, but some common examples include:

  • Sending a one-time passcode (OTP) to a user’s mobile phone or email address and asking the user to enter it on the login page
  • Making a phone call or sending a text message to a user’s phone number, and asking the user to confirm their identity by responding to the message
  • Using an application such as Google Authenticator, that generates a time-based OTP that the user must enter in addition to their password.

The idea behind OOB authentication is that it can be more secure, as it ensures that the person attempting to log in has access to a device or communication channel that is only available to the true user. It can also serve as an additional layer of security in case the primary means of authentication is compromised.

OOB authentication can be used in various scenarios, including high-security environments, such as financial institutions, government agencies, and healthcare organizations, as well as for online transactions that involve sensitive information or large amounts of money. The NIST SP 800-63C guidelines provide recommendations for OOB authentication, including how to implement it in a way that is both effective and secure.

NIST Digital Identity Update Video

The principle of least privilege is a concept in cybersecurity that emphasizes on limiting user and process access to a minimum required to perform their job duties. This principle is based on the idea that by limiting access to resources, the risk of unauthorized access, use, or disclosure is reduced.

In practice, this means that users should only be granted access to the specific resources and functions that are required for their job, and that their access should be regularly reviewed and adjusted as necessary. The idea is to provide just enough access for the user to perform their job, and no more. The principle of least privilege applies to Authorization in the AAA identity and access management model.

Principle of Least Privilege

Access Authorization Process

Authorization is the process that grants a user approval to take certain action in the designated systems whether it is to view, modify, share, or delete data. Authorization is concerned with what the user is allowed to do.

The granularity of authorization is only as good as the sophistication of the system which supports the access approval decision-making process and enforcement of approved access.

The access approval process is designed to grant access based on the user’s role and job duties which is referred to the principle of least privilege, which states users, devices, programs, and processes which are interconnected or must access each other to communicate and take certain actions, should be granted just enough permissions to do their required functions.

The risk of excessive and unnecessary access as well as the risk of insufficient access to perform a certain task to accomplish a goal should not be overlooked. Excessive access rights beyond someone’s normal job functions create an opportunity for errors, accidents, and exploits which can affect the confidentiality, integrity, and availability of data and systems. Insufficient access or access rights not provided in a timely manner can also negatively affect business operations.

A much severe case is when a user is granted administrator or a root access to a system without any justification. The highly privileged access should be limited to just a few persons in an organization because if the account is infected with malware or access credentials are stolen, the intruder can inflict much greater damage than with limited access privileges.

When someone’s access is beyond that person’s required access to perform their job duties, then that access is considered to be beyond the principle of least privilege.

Sure, access rights may be escalated for some persons to accomplish certain tasks such as when replacing another person who has higher privileges, however, the escalated access may have to be selective and temporary.

How the Principle of Least Privilege is Implemented

The Principle of Least Privilege can be implemented in many ways:

  • Role-based access control (RBAC): where users are assigned roles and those roles are associated with specific privileges and permissions.
  • Access control lists (ACLs): where permissions are assigned to users for specific resources.
  • Discretionary access control (DAC): where the owner of a resource decides who can access it.

The Principle of Least Privilege is closely related to the Zero Trust concept, which is an approach to cybersecurity that assumes that all devices and users are untrusted by default and that all access to resources must be verified and authorized.

Conclusion

In summary, the principle of least privilege is a concept in cybersecurity that is closely tied to identity and access management. When access to resources is limited, the risk of unauthorized access, modification, or disclosure is diminished. Principle of Least Privilege can be enforced with access control lists, role-based access control, and discretionary access control.

Identity and access management certifications

Zero trust cybersecurity model assumes that all network activities cannot be trusted and that every access request should be validated before permission is granted to access resources. This model is designed to mitigate the risk of unauthorized access to sensitive data or systems and to prevent the spread of malware or other malicious activity within a network.

Zero Trust Cybersecurity Model Explained

The Zero Trust security concept advocates for always verifying the identity of users and devices before granting them access to network resources, regardless of their location or whether they were authenticated for past activities. This approach is based on the premise that organizations should not automatically trust any user or device within their network, and that all network traffic should be treated as potentially malicious until it has been properly authenticated and authorized.

In a zero-trust environment, all users, devices, and traffic are treated as potential threats, and every access request is verified and authenticated using multiple layers of security controls. This includes using strong, multi-factor authentication methods, such as passwords and security tokens, to verify the identity of users, as well as using network segmentation and micro-segmentation to limit access to only those resources that are necessary for a user to perform their job.

The goal of a Zero Trust security model is to protect against cyber threats by implementing strict access controls and continuously monitoring and verifying the identity of users and devices. This is often achieved through the use of multi-factor authentication, network segmentation, and secure remote access solutions.

Adopting a Zero Trust cybersecurity model can help organizations improve cybersecurity, and reduce data breach risks or other security incidents. However, implementing a zero-trust model can also require significant changes to an organization’s network infrastructure and security protocols, and may require the use of specialized security tools and technologies.

One important aspect of a Zero Trust cybersecurity model is the concept of “least privilege,” which means that users and devices are only granted the minimum access necessary to perform their job duties, and that access is continually monitored and reviewed. This helps to minimize the risk of unauthorized access and can help to prevent data breaches and other cyber-attacks.

How Zero Trust Cybersecurity Model Prevents Data Breach

Zero trust cybersecurity model assumes that any user, device, or system within an organization’s network may be compromised and should not be trusted automatically. Instead, each access request should be validated before permission is granted.

The goal of zero trust is to prevent data breaches by creating multiple layers of defense and continuously verifying the trustworthiness of users, devices, and systems. This approach helps to reduce the risk of a data breach by minimizing the number of potential entry points for attackers and continuously monitoring and verifying the identity and trustworthiness of those who are granted access to sensitive data.

Some specific ways in which zero trust can help prevent data breaches include:

Multi-factor authentication: Requiring multiple forms of authentication, such as a password and a security token, can help ensure that only authorized users are granted access to sensitive data.

Access controls: Zero trust systems typically use granular access controls to limit what users can see and do based on their role and needs. This helps to reduce the risk of unauthorized access to sensitive data.

Network segmentation: Zero trust systems often use network segmentation to create isolated networks for different groups or types of data. This helps to limit the spread of any potential compromise.

Continuous monitoring: Zero trust systems continuously monitor for unusual activity and can automatically block or alert on suspicious activity. This helps to catch any potential breaches before they can do significant damage.

Overall, zero trust is a proactive approach to security that helps to prevent data breaches by continuously verifying the trustworthiness of users, devices, and systems and limiting access to sensitive data to only those who are authorized.

How Zero Trust Cybersecurity Model Works

A Zero Trust security model typically involves the implementation of several key strategies and technologies:

  1. Identity and access management: This involves verifying the identity of users and devices before granting them access to network resources. This may involve the use of multi-factor authentication, single sign-on solutions, and access controls based on user roles and permissions.
  2. Network segmentation: This involves dividing the network into smaller segments or “micro-perimeters,” each of which is secured and isolated from the others. This helps to prevent unauthorized access and can contain the impact of a cyber-attack.
  3. Secure remote access: This involves implementing secure solutions for remote workers and devices to access network resources from outside the physical network perimeter. This may involve the use of virtual private networks (VPNs) and other secure remote access technologies.
  4. Continuous monitoring: In a Zero Trust model, the identity and activity of users and devices are continuously monitored and reviewed. This helps to detect and prevent unauthorized access or activity and can also help to identify potential cyber threats.
  5. Least privilege: This involves granting users and devices the minimum access necessary to perform their tasks, and continually reviewing and revoking access as needed. This helps to minimize the risk of unauthorized access and can help to prevent data breaches and other cyber-attacks.

By implementing these strategies and technologies, organizations can create a security model that is designed to continuously verify the identity and activity of users and devices, and grant access only to those that have been properly authenticated and authorized. This helps to protect against cyber threats and can help to prevent data breaches and other security incidents.

Identity and access management certifications

In a permissionless access management system, anyone can participate without needing approval from a central authority. This contrasts with a permissioned system, where only those with explicit permission can access and participate in a network.

Permissionless access management system

What Does Permissionless Mean?

When we discuss permissionless access management systems, we’re talking about systems that don’t require centralized control or approval. This is in contrast to traditional systems, which often rely on a single entity having ultimate control over the system and its users.

Permissionless access is one of the characteristics and advantages of decentralized networks which makes access more resistant to censorship and tampering, as there’s no central point of failure that can be exploited. It also allows for much greater innovation, as anyone can participate and explore new ideas without obtaining permission first.

Permissionless access management systems are not perfect. Without centralized control, ensuring quality or enforcing rules and standards can have its own set of challenges. For example, as anyone can participate in the network without a central authority and monitoring, there’s always the risk of bad actors taking advantage of the network weaknesses such as attempting sybil attacks.

Permissionless in Access Management

Permissionless means that anyone can access the system without first requesting access. There is no central authority that controls who can or cannot participate. This lack of gatekeepers is one of the defining characteristics of permissionless systems in decentralized blockchain networks such as Bitcoin. Anyone with an Internet connection can download the Bitcoin software and begin participating in the network.

Benefits of Permissionless Access Management System

There are a few key benefits to a permissionless access management system:

  1. Cost-effective: Since there is no need for a central authority or intermediaries, permissionless systems are often more cost-effective than traditional systems.
  2. Time-saving: Permissionless systems can often be set up and run much faster than traditional systems, as there is no need to request access approvals from a central authority.
  3. Censorship-resistant: Without a central point of control, permissionless systems are much more resistant to censorship. This means that users can freely share information and ideas without fear of being censored or shut down by a central authority. Twitter and YouTube are examples of central access management systems which have occasionally banned their users for making comments in contradiction to their central authority standards and way of thinking.

Overall, permissionless systems offer a lot of advantages over traditional permissioned systems. They’re more open, equal opportunity systems, decentralized, and resilient, which makes them well-suited for a wide range of applications.

Permissionless vs. Permissioned

Permissionless systems, also known as public systems, do not require approval from a central authority to join or participate. Bitcoin, the first and most well-known cryptocurrency, is an example of a permissionless system. Anyone can download the Bitcoin software and start making transactions without obtaining approval from any central authority.

Permissioned systems, on the other hand require approval from a central authority to join or participate. Another example of a permissioned system is Facebook. You cannot simply create a Facebook account without providing personal information and going through an authorization process.

Examples of Permissionless Access Management System

The term “permissionless” is often used to describe cryptocurrencies or other decentralized systems and blockchain networks that don’t require any central authority or intermediaries. In a permissionless system, anyone can participate without needing approval from anyone else.

One well-known example of a permissionless system is Bitcoin, the world’s first cryptocurrency. Bitcoin is a decentralized peer-to-peer network where anyone can send or receive payments without going through a bank or third party.

Another example of a semi-permissionless system is the Internet. Anyone can create a website or start using email without getting approval from anyone else. No gatekeepers are controlling who can and can’t participate. Although some websites can still be shut down by ISPs due to forbidden content.

Permissionless Blockchain

When comparing permissionless vs. permissioned blockchain, a permissionless blockchain is a distributed ledger that anyone can access and read. There is no need for approval from a central authority to view or make changes to the blockchain data. All users are equal; anyone can contribute to the network without permission. This makes it ideal for general applications where transparency and censorship resistance are essential.

Challenges in Permissionless Access Management System

There are a few challenges that come with a permissionless access management system. One challenge is that anyone can join the network, meaning there’s no guarantee of quality or trustworthiness. This can lead to issues like Sybil attacks, where bad actors flood the network with fake identities to subvert the system.

Another challenge is that without a central authority, it can be hard to make decisions or coordinate changes to the network. This decentralization can also make tracking down and punishing malicious actors challenging.

How Can Permissionless Access Management Be Used in Business?

There are a few critical ways that permissionless access can be applied in business:

  1. When it comes to data, businesses can use permissionless distributed ledgers to create immutable records of transactions and customer data. This provides a high level of security and transparency and ensures that data cannot be tampered with or lost.
  2. Businesses can use a permissionless distributed ledger to issue and manage digital assets. This could include anything from loyalty points to currency. Doing so on a permissionless distributed ledger allows for a much more secure and efficient system, as there is no need to trust a central authority.
  3. Finally, businesses can use permissionless distributed ledgers for smart contracts. This allows two parties to agree on a specific set of actions and outcomes without needing a third party. Smart contracts are stored on the blockchain and cannot be changed or deleted, providing a high degree of security and trust.

Conclusion

Permissionless access refers to the ability to access a resource or system without requiring explicit permission or authorization from a central authority or administrator. This means that anyone can access the resource or system without having to go through a specific process or request permission from a specific individual or group.

One example of a system with permissionless access is the internet, which allows anyone with an internet connection to access a wide variety of information and services without the need to obtain permission from a central authority. Similarly, many blockchain systems, such as the Bitcoin network, are designed to be permissionless, allowing anyone to participate in the network and validate transactions without needing to seek permission from a central authority.

Permissionless systems can provide a level of decentralization and democratization, as they allow anyone to participate and contribute to the system without the need for a centralized point of control. However, they can also present security and scalability challenges, as there is no central authority to regulate access and ensure that users are acting in the best interests of the system.

Identity and access management certifications