Vetting of Federation Participants for Adherence to Expected Federation Criteria, v1.0

Federation authorities must have mechanisms in place to establish the security, identity, privacy, and interoperability standards for the federation, as well as providing details on how they ensure participants meet those requirements.

Assessment Steps (4)

1
Adherence to Security/Identity/Privacy Standards (AdherencetoSecurityIdentityPrivacyStandards)
Does the federation authority vet all federation participants to ensure they adhere to all security, identity, and privacy standards of the federation?
Artifact
A1
Provide evidence (e.g. organizational policies, compliance/assessment reports, sample data, required TIPs, etc.) that support whether the federation authority has established mechanisms in place for vetting participating members for adherence to standards.
2
Adherence to Assertions Requirements (AdherencetoAssertionsRequirements)
Does the federation authority vet all federation participants to ensure they generate all assertions in accordance with federation requirements?
Artifact
A1
Provide evidence (e.g. organizational policies, compliance/assessment reports, sample data, required TIPs, etc.) that support whether the federation authority has established mechanisms in place for vetting participating members for adherence to assertion requirements.
3
Adherence to Data Management Requirements (AdherencetoDataManagementRequirements)
Does the federation authority vet all federation participants to ensure they handle and protect user data in a manner that is consistent with federation and partner requirements?
Artifact
A1
Provide evidence (e.g. organizational policies, compliance/assessment reports, sample data, required TIPs, etc.) that support whether the federation authority has established mechanisms in place for vetting participating members for adherence to data handling requirements.
4
Usage of Approved Protocols and Profiles (UsageofApprovedProtocolsandProfiles)
Does the federation authority ensure all federation participants use approved profiles of federation protocols?
Artifact
A1
Provide evidence (e.g. organizational policies, compliance/assessment reports, sample data, required TIPs, etc.) that support whether the federation authority has established mechanisms in place for vetting participating members for adherence to federation protocols and profiles.

Conformance Criteria (4)

C1
Federation authorities SHALL individually vet each participant in the federation to determine whether they adhere to their expected security, identity, and privacy standards.
Citation
NIST SP 800-63C
Section 5.1.3, Paragraph 3
C2
Vetting of IdPs SHALL establish that assertions generated by IdPs adhere to the requirements set forth by the federation.
Citation
NIST SP 800-63C
Section 5.1.3, Paragraph 4
C3
Vetting of RPs SHALL establish that RPs adhere to IdP requirements for handling subscriber attribute data, such as retention, aggregation, and disclosure to third parties.
Citation
NIST SP 800-63C
Section 5.1.3, Paragraph 4
C4
Vetting of IdPs and RPs SHALL establish that RP and IdP systems use approved profiles of federation protocols.
Citation
NIST SP 800-63C
Section 5.1.3, Paragraph 4