The Security requirements define the ways in which online identity data needs to be protected as it is used in online transactions, how to prevent unauthorized access by another party, and able to be recovered.
About
ID Ecosystem Steering Group
Status: Logged Out
1 active tracker:
Why is it important for all websites to share this information? Learn More
Table of Contents: Security
The Security requirements define the ways in which online identity data needs to be protected as it is used in online transactions, how to prevent unauthorized access by another party, and able to be recovered.
SECURE-1. SECURITY PRACTICES
SECURE-2. DATA INTEGRITY
SECURE-3. CREDENTIAL REPRODUCTION
SECURE-4. CREDENTIAL PROTECTION
SECURE-5. CREDENTIAL ISSUANCE
SECURE-6. CREDENTIAL UNIQUENESS
SECURE-7. TOKEN CONTROL
SECURE-8. MULTIFACTOR AUTHENTICATION
SECURE-9. AUTHENTICATION RISK ASSESSMENT
SECURE-10. UPTIME
SECURE-11. KEY MANAGEMENT
SECURE-12. RECOVERY AND REISSUANCE
SECURE-13. REVOCATION
SECURE-14. SECURITY LOGS
SECURE-15. SECURITY AUDITS