NIST is specifically interested in comments on and recommendations for the following topics:
Identity Proofing and Enrollment
NIST sees a need for inclusion of an unattended, fully remote Identity Assurance Level (IAL) 2 identity proofing workflow that provides security and convenience, but does not require face recognition. Accordingly, NIST seeks input on the following questions:
· What technologies or methods can be applied to develop a remote, unattended IAL2 identity proofing process that demonstrably mitigates the same risks as the current IAL2 process?
· Are these technologies supported by existing or emerging technical standards?
· Do these technologies have established metrics and testing methodologies to allow for assessment of performance and understanding of impacts across user populations (e.g., bias in artificial intelligence)?
What methods exist for integrating digital evidence (e.g., Mobile Driver’s Licenses, Verifiable Credentials) into identity proofing at various identity assurance levels?
What are the impacts, benefits, and risks of specifying a set of requirements for CSPs to establish and maintain fraud detection, response, and notification capabilities?
· Are there existing fraud checks (e.g., date of death) or fraud prevention techniques (e.g., device fingerprinting) that should be incorporated as baseline normative requirements? If so, at what assurance levels could these be applied?
· How might emerging methods such as fraud analytics and risk scoring be further researched, standardized, measured, and integrated into the guidance in the future?
· What accompanying privacy and equity considerations should be addressed alongside these methods?
Are current testing programs for liveness detection and presentation attack detection sufficient for evaluating the performance of implementations and technologies?
What impacts would the proposed biometric performance requirements for identity proofing have on real-world implementations of biometric technologies?
Risk Management
What additional guidance or direction can be provided to integrate digital identity risk with enterprise risk management?
How might equity, privacy, and usability impacts be integrated into the assurance level selection process and digital identity risk management model?
How might risk analytics and fraud mitigation techniques be integrated into the selection of different identity assurance levels? How can we qualify or quantify their ability to mitigate overall identity risk?
Authentication and Lifecycle Management
Are emerging authentication models and techniques – such as FIDO passkey, Verifiable Credentials, and mobile driver’s licenses – sufficiently addressed and accommodated, as appropriate, by the guidelines? What are the potential associated security, privacy, and usability benefits and risks?
Are the controls for phishing resistance as defined in the guidelines for AAL2 and AAL3 authentication clear and sufficient?
How are session management thresholds and reauthentication requirements implemented by agencies and organizations? Should NIST provide thresholds or leave session lengths to agencies based on applications, users, and mission needs?
What impacts would the proposed biometric performance requirements for this volume have on real-world implementations of biometric technologies?
Federation and Assertions
What additional privacy considerations (e.g., revocation of consent, limitations of use) may be required to account for the use of identity and provisioning APIs that had not previously been discussed in the guidelines?
Is the updated text and introduction of “bound authenticators” sufficiently clear to allow for practical implementations of federation assurance level (FAL) 3 transactions? What complications or challenges are anticipated based on the updated guidance?
General
Is there an element of this guidance that you think is missing or could be expanded?
Is any language in the guidance confusing or hard to understand? Should we add definitions or additional context to any language?
Does the guidance sufficiently address privacy?
Does the guidance sufficiently address equity?
· What equity assessment methods, impact evaluation models, or metrics could we reference to better support organizations in preventing or detecting disparate impacts that could arise as a result of identity verification technologies or processes?
What specific implementation guidance, reference architectures, metrics, or other supporting resources may enable more rapid adoption and implementation of this and future iterations of the Digital Identity Guidelines?
What applied research and measurement efforts would provide the greatest impact on the identity market and advancement of these guidelines?