IT Security and Privacy - A framework for identity management - Part 1: Terminology and concepts - Amendment 1

Sécurité IT et confidentialité — Cadre pour la gestion de l'identité — Partie 1: Terminologie et concepts — Amendement 1

General Information

Status
Published
Publication Date
08-Jan-2023
Current Stage
9599 - Withdrawal of International Standard
Start Date
16-Sep-2025
Completion Date
30-Oct-2025

Relations

Effective Date
06-Jun-2022
Effective Date
22-Jul-2023

Overview

ISO/IEC 24760-1:2019/Amd 1:2023 is an internationally recognized amendment to the ISO/IEC 24760-1:2019 standard, issued by ISO and IEC. It focuses on enhancing the framework for identity management within the domain of IT security and privacy. This amendment updates key terminology and concepts related to identity management, addressing evolving security requirements and technological innovations.

The standard is critical for organizations aiming to establish robust identity management systems that ensure secure, reliable authentication and authorization. It defines foundational terms such as authenticators, authentication factors, and access tokens, which are essential in safeguarding digital identities and controlling access to resources.

Key Topics

  • Readily-verifiable Identifier
    An identifier designed to be easily validated as belonging to a known entity, supporting efficient authentication processes.
    Example: A digital signature derived from solving a cryptographic puzzle.

  • Authoritative Identifier
    A unique identifier issued by a trusted authority within a well-established domain, such as government-issued IDs, ensuring high trust in identity verification.

  • Access Token
    A trusted object encapsulating permissions that authorize a principal’s access to resources, often obtained after successful authentication. It can be either physical or virtual and may contain cryptographic information to verify its integrity.

  • Authentication Factors
    Four types are recognized to enhance authentication security:

    • Cognition factor: What the principal knows (e.g., a password).
    • Possession factor: What the principal holds (e.g., a security token).
    • Inherent factor: Physical characteristics (e.g., fingerprint).
    • Behaviour factor: Typical actions or patterns (e.g., typing rhythm).
  • Multi-factor Authentication
    Employs two or more authenticators from different authentication factors to increase security assurance.

  • Authenticator
    A secure device or software representing an entity in the authentication process, controlled by the principal. Examples include OTP generators, mobile authentication apps, and electronic identity cards.

  • One-Time Password (OTP)
    A single-use, randomly generated password for authentication, typically produced by an authenticator.

  • Personal Secret
    Exclusive knowledge to the principal, such as passwords or PINs, used for identity validation.

  • Entity Authentication Assurance & Level of Assurance
    These define the reliability and strength of confidence in identity assertions, guiding organizations in selecting appropriate authentication methods per risk level.

  • Principal’s Personal Identity Management System (PPI)
    An identity management system held under exclusive control by the principal, often implemented as a mobile identity or dedicated token.

Applications

ISO/IEC 24760-1:2019/Amd 1:2023 serves as a foundational reference for designing and implementing identity management solutions that prioritize IT security and privacy. Key application areas include:

  • Enterprise Identity and Access Management (IAM)
    Establishing reliable and standardized identity verification across corporate resources.

  • Government Identity Programs
    Supporting secure issuance and management of authoritative identifiers used in digital government services.

  • Multi-factor Authentication Deployment
    Enhancing user authentication security by integrating authenticators across various authentication factors.

  • Digital Identity Wallets and Mobile Identity Solutions
    Guiding the creation of personal identity management systems that empower users with control over their digital identities.

  • Secure Access Control Systems
    Implementing access tokens and assurance levels to fine-tune access privileges in cloud services, applications, and IoT devices.

Organizations benefit by aligning with this standard to improve interoperability, compliance with data protection regulations, and resilience against identity fraud.

Related Standards

  • ISO/IEC 29146:2016
    Provides guidelines on access control frameworks, referenced for defining access tokens in identity management.

  • ISO/IEC 19790:2012
    Details security requirements for cryptographic modules, informing multi-factor authentication concepts.

  • ISO/IEC 29115:2013
    Defines entity authentication assurance levels, crucial for interpreting assurance terms in identity management.

  • ISO/IEC 24760 Series
    The broader series addresses various aspects of identity management frameworks, offering comprehensive coverage.

  • ISO/IEC 24760-3:2016
    Offers examples and annexes on using authenticators for attribute-based credentials, related to authentication device management.

Conclusion

Implementing ISO/IEC 24760-1:2019/Amd 1:2023 helps organizations advance their identity management capabilities with up-to-date terminology and concepts critical for secure IT environments. By understanding and applying these definitions and principles, businesses and governments can strengthen privacy, trust, and control in digital identity ecosystems.

Keywords: ISO/IEC 24760-1 amendment, identity management framework, IT security, privacy, authentication factors, authenticators, access tokens, multi-factor authentication, digital identity, entity authentication assurance.

Standard

ISO/IEC 24760-1:2019/Amd 1:2023 - IT Security and Privacy — A framework for identity management — Part 1: Terminology and concepts — Amendment 1 Released:9. 01. 2023

English language
4 pages
sale 15% off
Preview
sale 15% off
Preview

Frequently Asked Questions

ISO/IEC 24760-1:2019/Amd 1:2023 is a standard published by the International Organization for Standardization (ISO). Its full title is "IT Security and Privacy - A framework for identity management - Part 1: Terminology and concepts - Amendment 1". This standard covers: IT Security and Privacy - A framework for identity management - Part 1: Terminology and concepts - Amendment 1

IT Security and Privacy - A framework for identity management - Part 1: Terminology and concepts - Amendment 1

ISO/IEC 24760-1:2019/Amd 1:2023 is classified under the following ICS (International Classification for Standards) categories: 35.030 - IT Security. The ICS classification helps identify the subject area and facilitates finding related standards.

ISO/IEC 24760-1:2019/Amd 1:2023 has the following relationships with other standards: It is inter standard links to ISO/IEC 24760-1:2019, ISO/IEC 24760-1:2025. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.

You can purchase ISO/IEC 24760-1:2019/Amd 1:2023 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of ISO standards.

Standards Content (Sample)


INTERNATIONAL ISO/IEC
STANDARD 24760-1
Second edition
2019-05
AMENDMENT 1
2023-01
IT Security and Privacy —
A framework for identity
management —
Part 1:
Terminology and concepts
AMENDMENT 1
Reference number
ISO/IEC 24760-1:2019/Amd. 1:2023(E)
© ISO/IEC 2023
ISO/IEC 24760-1:2019/Amd. 1:2023(E)
© ISO/IEC 2023
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on
the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below
or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii
© ISO/IEC 2023 – All rights reserved

ISO/IEC 24760-1:2019/Amd. 1:2023(E)
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are
members of ISO or IEC participate in the development of International Standards through technical
committees established by the respective organization to deal with particular fields of technical
activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international
organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the
work.
The procedures used to develop this document and those intended for its further maintenance
are described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria
needed for the different types of document should be noted. This document was drafted in
accordance with the editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives or
www.iec.ch/members_experts/refdocs).
Attention is drawn to the possibility that some of the elements of this document may be the subject
of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent
rights. Details of any patent rights identified during the development of the document will be in the
Introduction and/or on the ISO list of patent declarations received (see www.iso.org/patents) or the IEC
list of patent declarations received (see https://patents.iec.ch).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO's adherence to
the World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT) see
www.iso.org/iso/foreword.html. In the IEC, see www.iec.ch/understanding-standards.
This document was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology,
Subcommittee SC 27, Information security, cybersecurity and privacy protection.
A list of all parts in the ISO/IEC 24760 series can be found on the ISO and IEC websites.
Any feedback or questions on this document should be directed to the user’s national standards
body. A complete listing of these bodies can be found at www.iso.org/members.html and
www.iec.ch/national-committees.
iii
© ISO/IEC 2023 – All rights reserved

ISO/IEC 24760-1:2019/Amd. 1:2023(E)
IT Security and Privacy — A framework for identity
management —
Part 1:
Terminology and concepts
AMENDMENT 1
3.1
Add the following two entries:
3.1.8
readily-verifiable identifier
identifier with a value which is constructed to be easily verified as valid and as referring to a known
entity
EXAMPLE The result of solving a cryptographic puzzle with its input can easily be validated as correct,
functioning as digital signature on that input.
Note 1 to entry: A readily verifiable identifier can be used as an authenticator.
3.1.9
authoritative identifier
unique identifier referring to an entity, known in a well-trusted domain of origin
Note 1 to entry: An authoritative identifier is typically managed by a well-known organization, e.g. a government.

3.2
Add the following term:
3.2.5
access token
trusted object encapsulating the authority for a principal to access a resource
Note 1 to entry: An access token can be obtained in the result of an authentication.
Note 2 to entry: An access token may contain access permission information for a subject to access the resource
and identifying information for the authority of the authorization decision.
Note 3 to entry: An access token may contain information that enables its integrity to be validated.
Note 4 to entry: An access token may take a physical or a virtual form.
[SOURCE: ISO/IEC 29146:2016, 3.3, modified —replaced the word 'subject' by 'principal', and replaced
Note 1 to entry.]
© ISO/IEC 2023 – All rights reserved

ISO/IEC 24760-1:2019/Amd. 1:2023(E)
3.3
Add the following entries:
3.3.9
authentication factor
distinguishing feature of an authenticator to characterise its use in authentication
Note 1 to entry: Four different authentication factors can be recognized:
— cognition factor, any credential that is formed by something that the principal knows and can reproduce
(exclusively): a personal secret;
— possession factor, any credential that is formed by something that the principal possesses, e.g. an authenticator;
— inherent factor, any credential that is formed by a description of something that is inherent to the physical
existence of the principal, e.g. a biometric characteristic such as fingerprint, facial image, or 1, iris pattern;
— behaviour factor, any credential that is formed by a description of something that the principal typically
does, e.g. a behaviour pattern.
3.3.10
multi-factor authentication
authentication in which multiple authenticators are used of two or more authentication factors
Note 1 to entry: If two or more authenticators are being used in authentication that have the same authentication
factor, they should have been issued by different credential issuers.
Note 2 to entry: Using multiple authenticators (that differ in authentication factor can enhance the security of the
authentication as that could prompt the principal to act differently with each of them.
[SOURCE: ISO/IEC 19790:2012, 3.74, modified — definition and notes revised to match terminology
context.]
3.3.11
authenticator
repr
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...