ID Proofing - Use of Fraud Mitigation Measures, v1.0

Credential Service Providers should use fraud mitigation measures to increase confidence during identity proofing. These fraud mitigation measures must undergo risk assessments properly documenting all mitigations.

Assessment Step

1
CSP Fraud Mitigation Measures (CSPFraudMitigationMeasures)
Does the CSP use fraud mitigation measures during identity proofing and properly document all risk assessments associated with the chosen mitigation measures?
Artifact
A1
Provide evidence (e.g. organizational policies, risk assessments) that make it clear that the CSP has implemented fraud mitigation with appropriate risk assessment documentation.

Conformance Criteria (1)

C1
The CSP SHOULD obtain additional confidence in identity proofing using fraud mitigation measures (e.g., inspecting geolocation, examining the device characteristics of the applicant, evaluating behavioral characteristics, checking vital statistic repositories such as the Death Master File [DMF], so long as any additional mitigations do not substitute for the mandatory requirements contained herein. In the event the CSP uses fraud mitigation measures, the CSP SHALL conduct a privacy risk assessment for these mitigation measures. Such assessments SHALL include any privacy risk mitigations (e.g., risk acceptance or transfer, limited retention, use limitations, notice) or other technological mitigations (e.g., cryptography), and be documented appropriately.
Citation
NIST SP 800-63A
Section 4.2 (10)