ID Proofing - Supervised Remote Identity Proofing, v1.0

Credential Service Providers engaging in remote identity proofing must ensure biometric data is collected in a supervised manner to ensure it is legitimate and for the applicant.

Assessment Step

1
CSP Remote Biometric Collection (CSPRemoteBiometricCollection)
Does the CSP properly collect biometrics taking care to ensure the material is collected from the applicant and not another subject? Try to annotate how the process addresses all requirements for remote biometric collection:
  1. The CSP SHALL monitor the entire identity proofing session, from which the applicant SHALL NOT depart -- for example, by a continuous high-resolution video transmission of the applicant.
  2. The CSP SHALL have a live operator participate remotely with the applicant for the entirety of the identity proofing session.
  3. The CSP SHALL require all actions taken by the applicant during the identity proofing session to be clearly visible to the remote operator.
  4. The CSP SHALL require that all digital verification of evidence (e.g., via chip or wireless technologies) be performed by integrated scanners and sensors.
  5. The CSP SHALL require operators to have undergone a training program to detect potential fraud and to properly perform a supervised remote proofing session.
  6. The CSP SHALL employ physical tamper detection and resistance features appropriate for the environment in which it is located. For example, a kiosk located in a restricted area or one where it is monitored by a trusted individual requires less tamper detection than one that is located in a semi-public area such as a shopping mall concourse.
  7. The CSP SHALL ensure that all communications occur over a mutually authenticated protected channel.
Artifact
A1
Provide evidence (e.g. organizational policies, compliance/assessment reports, sample processes) that the CSP properly collects biometrics under remote supervision.

Conformance Criteria (1)

C1
  1. The CSP SHALL monitor the entire identity proofing session, from which the applicant SHALL NOT depart -- for example, by a continuous high-resolution video transmission of the applicant.
  2. The CSP SHALL have a live operator participate remotely with the applicant for the entirety of the identity proofing session.
  3. The CSP SHALL require all actions taken by the applicant during the identity proofing session to be clearly visible to the remote operator.
  4. The CSP SHALL require that all digital verification of evidence (e.g., via chip or wireless technologies) be performed by integrated scanners and sensors.
  5. The CSP SHALL require operators to have undergone a training program to detect potential fraud and to properly perform a supervised remote proofing session.
  6. The CSP SHALL employ physical tamper detection and resistance features appropriate for the environment in which it is located. For example, a kiosk located in a restricted area or one where it is monitored by a trusted individual requires less tamper detection than one that is located in a semi-public area such as a shopping mall concourse.
  7. The CSP SHALL ensure that all communications occur over a mutually authenticated protected channel.
Citation
NIST SP 800-63A
Section 5.3.3.2