<?xml version="1.0" encoding="iso-8859-1"?><doc title="Archived [2019-06-28]  - Standard on Identity and Credential Assurance" documentID="26776" versionID="4" language="en" space="preserve" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceSchemaLocation="PolicyInstrumentSchema.xsd"><chapters><chapter anchor="1" title="1. Effective Date"><p>1.1 This standard takes effect on February 1, 2013.</p></chapter><chapter anchor="2" title="2. Application"><p>2.1 This standard applies to all departments as defined in Schedules I, I.1, II, IV and V of the <em>Financial Administration Act</em>, unless excluded by specific acts, regulations or orders-in-council.</p></chapter><chapter anchor="3" title="3. Context"><p>3.1 This standard supports the objectives of the <em><a href="/pol/doc-eng.aspx?id=16578">Policy on Government Security</a></em> and the <em><a href="/pol/doc-eng.aspx?id=16577">Directive on Identity Management</a></em> by providing departments with requirements to ensure consistency in identity management practices.</p><p>3.2 This standard supports the Government of Canada's approach to federating identity. <a href="/sim-gsi/gcss-ssgc/ident-eng.asp">Federating identity</a> enables departments and agencies to fulfill program and service requirements by relying on identity and credential assurance processes that 
have been carried out by other departments, jurisdictions and industry sectors.</p><p>3.3 This standard establishes requirements for departments to adopt a common methodology for assessing their identity 
and credential risks and for selecting appropriate controls or arrangements to mitigate those risks using a standardized 
assurance level framework.</p><p>3.4 Identity assurance is a measure of certainty that an individual, organization or device is who or what it claims 
to be. Identity risk is the risk that an individual, organization or device is not who or what it claims to be.</p><p>3.5 Credential assurance is the assurance that an individual, organization or device has maintained control over what 
has been entrusted to him or her (e.g., key, token, document, identifier, etc.) and that the credential has not been compromised 
(e.g., tampered with, modified). A credential risk is the risk that an individual, organization or device has lost control 
over the credential that has been issued to him or her.</p><p>3.6 A standardized framework for identity and credential assurance levels is necessary to manage risk across government 
and to enable federation. A federation is a cooperative agreement between autonomous entities that have agreed to work together, 
supported by trust relationships and standards to support interoperability.</p><p>3.7 This standard applies to all government activities where each department must establish or rely on identities that 
are internal or external to the department.</p><p>3.8 <a href="#appB">Appendix B</a> and <a href="#appC">Appendix C</a> apply to the identities of individuals only.</p></chapter><chapter anchor="4" title="4. Definitions"><p>4.1 Definitions to be used in the interpretation of this standard are listed in <a href="#appA">Appendix A</a>.</p></chapter><chapter anchor="5" title="5. Standard Statement"><section anchor="5.1" title="5.1 Objective"><p>To ensure that identity risk is managed consistently and collaboratively within the Government of Canada and with other 
jurisdictions and industry sectors.</p></section><section anchor="5.2" title="5.2 Expected Results"><p>The expected results of this standard are as follows:</p><p>5.2.1 Identity risk is assessed and integrated into departments' risk management practices.</p><p>5.2.2 Departments' business processes and controls for managing identity are determined and implemented using a standardized 
assurance level framework.</p><p>5.2.3 Departments participate in arrangements for federated identity to meet identity and credential assurance requirements.</p></section></chapter><chapter anchor="6" title="6. Requirements"><p>Program and service delivery managers, in consultation with other functional specialists, are responsible for the activities 
described in sections 6.1, 6.2 and 6.3.</p><section anchor="6.1" title="6.1 Assessment of Identity and Credential Risks and Selection of Controls"><p>6.1.1 Identifying and evaluating identity and credential risks using an assessment of harms related to a program, activity, 
service or transaction.</p><p>6.1.2 Determining required identity and credential assurance levels using the standardized assurance levels specified 
in <a href="#appB">Appendix B</a>.</p><p>6.1.3 Selecting identity and credential controls for achieving assurance level requirements using the standardized assurance 
levels specified in <a href="#appB">Appendix B</a>.</p><p>6.1.4 Ensuring that the minimum requirements for establishing an identity assurance level as specified in 
<a href="#appC">Appendix C</a> 
are met.</p></section><section anchor="6.2" title="6.2 Federating Identity"><p>6.2.1 Ensuring participation in federating identity using criteria established by the Government of Canada's Chief Information 
Officer.</p></section><section anchor="6.3" title="6.3 Monitoring and Reporting"><p>6.3.1 Overseeing the implementation of this standard in their department, monitoring compliance with it, bringing to 
the deputy head's attention significant difficulties, gaps in performance or compliance issues, and developing proposals 
to address them; and</p><p>6.3.2 Providing the Treasury Board of Canada Secretariat with information, when requested, that supports timely and accurate 
reporting on compliance and achievement of the expected results of this standard.</p></section></chapter><chapter anchor="7" title="7. Government-Wide Monitoring and Reporting"><p>7.1 The Treasury Board of Canada Secretariat will monitor compliance with this standard and the achievement of the expected 
results and will review identity and credential risk assessment and the controls and arrangements for federating identity, 
through a variety of means, including the following:</p><ul><li>Government-wide and departmental assessments and fact-based consultations;</li><li>Examinations of Treasury Board submissions, departmental performance reports, and the results of audits, evaluations 
and studies; and</li><li>Work performed in collaboration with departments.</li></ul><p>7.2 Treasury Board of Canada Secretariat will review this standard and its effectiveness five years after the effective 
date (or earlier if warranted).</p></chapter><chapter anchor="8" title="8. Consequences"><p>8.1 The consequences of non-compliance with this standard are described in <a href="/pol/doc-eng.aspx?id=16578&amp;section=text#cha7">Section 7</a> of the <em><a href="/pol/doc-eng.aspx?id=16578">Policy on Government Security</a></em>.</p></chapter><chapter anchor="9" title="9. Roles and Responsibilities of Government Organizations"><p>9.1 The Chief Information Officer Branch supports the Treasury Board of Canada Secretariat in establishing and overseeing 
a whole-of-government approach to security and identity management as a key component of all management activities and in 
monitoring the adequacy of services to support these activities and practices across government.</p><p>9.2 This includes setting government-wide direction, establishing priorities and defining and formalizing security and identity management requirements for the Government of Canada and departments and establishing standards and designating the necessary authorities for identifying and authenticating individuals internal and external to the Government of Canada.</p><p>9.3 The Government of Canada <a href="/cio-dpi/index-eng.asp">Chief Information Officer Branch</a> fulfills these responsibilities by:</p><p class="indent1">9.3.1 Providing support to committees and working groups to address government-wide challenges and opportunities related 
to implementing this standard and its supporting instruments;</p><p class="indent1">9.3.2 Communicating and engaging government-wide and with partners in other jurisdictions and sectors to develop common 
or compatible strategies, approaches, and processes to support federating identity; and</p><p class="indent1">9.3.3 Establishing criteria for participating in arrangements for federating identity.</p></chapter><chapter anchor="10" title="10. References"><section anchor="10.1" title="10.1 Relevant Legislation"><ul><li><em><a href="http://laws-lois.justice.gc.ca/eng/acts/F-11/index.html">Financial Administration Act</a></em></li><li><em><a href="http://laws-lois.justice.gc.ca/eng/acts/P-21/index.html">Privacy Act</a></em></li></ul></section><section anchor="10.2" title="10.2 Related Policy Instruments and Publications"><ul><li><em><a href="/pol/doc-eng.aspx?id=16578">Policy on Government Security</a></em></li><li><em><a href="/pol/doc-eng.aspx?id=16577">Directive on Identity Management</a></em></li><li><em><a href="/sim-gsi/gcss-ssgc/ident-eng.asp">Federating Identity Management in the Government of Canada: A Backgrounder</a></em></li><li><em><a href="/pol/doc-eng.aspx?id=12510">Policy on Privacy Protection</a></em></li><li><em><a href="/pol/doc-eng.aspx?id=18308">Directive on Privacy Impact Assessment</a></em></li><li><em><a href="/pol/doc-eng.aspx?id=18309">Directive on Privacy Practices</a></em></li></ul></section></chapter><chapter anchor="11" title="11. Enquiries"><p>For answers to questions about this policy instrument, contact <a href="/ip-pi/contact-eng.asp">Treasury Board of Canada Secretariat Public Enquiries</a>.</p></chapter></chapters><appendices><appendix anchor="A" title="Appendix A: Definitions"><dl><dt><strong>assurance</strong></dt><dd><p>A measure of certainty that a statement or fact is true.</p></dd><dt><strong>assurance level</strong></dt><dd><p>A level of confidence that may be relied on by others.</p></dd><dt><strong>authoritative party</strong></dt><dd><p>A federation member that provides assurances (of credential or identity) to other members (relying 
parties).</p></dd><dt><strong>authoritative source</strong></dt><dd><p>A collection or registry of records maintained by an authority that meets established criteria.</p></dd><dt><strong>biological or behavioural characteristic confirmation</strong></dt><dd><p>A process that compares biological (anatomical and physiological) 
characteristics in order to establish a link to an individual. Example: Facial photo comparison.</p></dd><dt><strong>credential</strong></dt><dd><p>A unique physical or electronic object (or identifier) issued to, or associated with, an individual, organization 
or device.</p></dd><dt><strong>credential assurance</strong></dt><dd><p>The assurance that an individual, organization or device has maintained control over what has been 
entrusted to him or her (e.g., key, token, document, identifier) and that the credential has not been compromised (e.g., 
tampered with, modified).</p></dd><dt><strong>credential assurance level</strong></dt><dd><p>The level of confidence that an individual, organization or device has maintained control 
over what has been entrusted to him or her (e.g., key, token, document, identifier) and that the credential has not been 
compromised (e.g., tampered with, corrupted, modified).</p></dd><dt><strong>credential risk</strong></dt><dd><p>The risk that an individual, organization or device has lost control over the credential that has been 
issued to him or her.</p></dd><dt><strong>evidence of identity</strong></dt><dd><p>A record from an authoritative source indicating an individual's identity. There are two categories 
of evidence of identity: foundational and supporting.</p></dd><dt><strong>federation</strong></dt><dd><p>A cooperative agreement between autonomous entities that have agreed to work together. The federation is 
supported by trust relationships and standards to support interoperability.</p></dd><dt><strong>foundational evidence of identity</strong></dt><dd><p>Evidence of identity that establishes core identity information such as given name(s), 
surname, date of birth, sex and place of birth. Examples include records of birth, immigration or citizenship from an authority 
with the necessary jurisdiction.</p></dd><dt><strong>identity</strong></dt><dd><p>A reference or designation used to distinguish a unique and particular individual, organization or device.</p></dd><dt><strong>identity assurance</strong></dt><dd><p>A measure of certainty that an individual, organization or device is who or what it claims to be.</p></dd><dt><strong>identity assurance level</strong></dt><dd><p>The level of confidence that an individual, organization or device is who or what it claims 
to be.</p></dd><dt><strong>identity management</strong></dt><dd><p>The set of principles, practices, processes and procedures used to realize an organization's mandate 
and its objectives related to identity.</p></dd><dt><strong>identity risk</strong></dt><dd><p>The risk that an individual, organization or device is not who or what it claims to be.</p></dd><dt><strong>knowledge-based confirmation</strong></dt><dd><p>A process that compares personal or private information (i.e., shared secrets) to establish 
an individual's identity. Examples of information that can be used for knowledge-based confirmation include passwords, personal 
identification numbers, hint questions, program-specific information and credit or financial information.</p></dd><dt><strong>physical possession confirmation</strong></dt><dd><p>A process that requires physical possession or presentation of evidence to establish 
an individual's identity.</p></dd><dt><strong>relying party</strong></dt><dd><p>A federation member that relies on assurances (of credential or identity) from other members (authoritative 
parties).</p></dd><dt><strong>supporting evidence of identity</strong></dt><dd><p>Evidence of identity that corroborates the foundational evidence of identity and assists 
in linking the identity information to an individual. It may also provide additional information such as a photo, signature 
or address. Examples include social insurance records; records of entitlement to travel, drive or obtain health insurance; 
and records of marriage, death or name change originating from a jurisdictional authority.</p></dd><dt><strong>trusted referee confirmation</strong></dt><dd><p>A process that relies on a trusted referee to establish a link to an individual. The trusted 
referee is determined by program-specific criteria. Examples of trusted referee include guarantor, notary and certified 
agent.</p></dd></dl></appendix><appendix anchor="B" title="Appendix B: Standardized Assurance Levels for Managing Identity and Credential Risks"><table class="table table-bordered table-condensed"><caption><strong>Table 1: Identity Assurance Levels</strong></caption><tr class="active"><th class="active" scope="col"><strong>Level</strong></th><th class="active" scope="col"><strong>Description</strong></th></tr><tr><td class="alignMiddle alignCenter"><strong>4</strong></td><td class="alignTopLeft"><p><strong>Very high confidence required that an individual is who he or she claims to be.</strong></p><p>Compromise could reasonably be expected to cause serious to catastrophic harm.</p></td></tr><tr><td class="alignMiddle alignCenter"><strong>3</strong></td><td class="alignTopLeft"><p><strong>High confidence required that an individual is who he or she claims to be.</strong></p><p>Compromise could reasonably be expected to cause moderate to serious harm.</p></td></tr><tr><td class="alignMiddle alignCenter"><strong>2</strong></td><td class="alignTopLeft"><p><strong>Some confidence required that an individual is who he or she claims to be.</strong></p><p>Compromise could reasonably be expected to cause minimal to moderate harm.</p></td></tr><tr><td class="alignMiddle alignCenter"><strong>1</strong></td><td class="alignTopLeft"><p><strong>Little confidence required that an individual is who he or she claims to be.</strong></p><p>Compromise could reasonably be expected to cause nil to minimal harm.</p></td></tr></table><div><br /></div><table class="table table-bordered table-condensed"><caption><strong>Table 2: Credential Assurance Levels</strong></caption><tr class="active"><th class="active" scope="col"><strong>Level</strong></th><th class="active" scope="col"><strong>Description</strong></th></tr><tr><td class="alignMiddle alignCenter"><strong>4</strong></td><td class="alignTopLeft"><p><strong>Very high confidence required that an individual has maintained control over a credential that has been entrusted to 
him or her and that the credential has not been compromised.</strong></p><p>Compromise could reasonably be expected to cause serious to catastrophic harm.</p></td></tr><tr><td class="alignMiddle alignCenter"><strong>3</strong></td><td class="alignTopLeft"><p><strong>High confidence required that an individual has maintained control over a credential that has been entrusted to him 
or her and that the credential has not been compromised.</strong></p><p>Compromise could reasonably be expected to cause moderate to serious harm.</p></td></tr><tr><td class="alignMiddle alignCenter"><strong>2</strong></td><td class="alignTopLeft"><p><strong>Some confidence required that an individual has maintained control over a credential that has been entrusted to him 
or her and that the credential has not been compromised.</strong></p><p>Compromise could reasonably be expected to cause minimal to moderate harm.</p></td></tr><tr><td class="alignMiddle alignCenter"><strong>1</strong></td><td class="alignTopLeft"><p><strong>Little confidence required that an individual has maintained control over a credential that has been entrusted to him 
or her and that the credential has not been compromised.</strong></p><p>Compromise could reasonably be expected to cause nil to minimal harm.</p></td></tr></table></appendix><appendix anchor="C" title="Appendix C: Minimum Requirements to Establish an Identity Assurance Level"><table class="table table-bordered table-condensed"><thead><tr class="active"><th class="active" scope="col"><strong>Requirement</strong></th><th class="active" scope="col"><strong>Level 1</strong></th><th class="active" scope="col"><strong>Level 2</strong></th><th class="active" scope="col"><strong>Level 3</strong></th><th class="active" scope="col"><strong>Level 4</strong></th></tr></thead><tfoot><tr><td colspan="5" class="alignTopLeft fontSize85"><p><strong>Note:</strong> When the authoritative source is outside of Canadian jurisdiction, the accuracy of identity information will be 
determined through a risk-managed approach.</p></td></tr></tfoot><tbody><tr><th class="active" scope="row"><strong>Uniqueness</strong></th><td class="alignTopLeft"><p>Define identity information</p><p>Define context</p></td><td class="alignTopLeft"><p>Define identity information</p><p>Define context</p></td><td class="alignTopLeft"><p>Define identity information</p><p>Define context</p></td><td class="alignTopLeft"><p>Define identity information</p><p>Define context</p></td></tr><tr><th class="active" scope="row"><strong>Evidence of Identity</strong></th><td class="alignTopLeft"><p>No restriction on what is provided as evidence</p></td><td class="alignTopLeft"><p><strong>One</strong> instance of evidence of identity</p></td><td class="alignTopLeft"><p><strong>Two</strong> instances of evidence of identity</p><p>(At least one must be foundational evidence of identity)</p></td><td class="alignTopLeft"><p><strong>Three</strong> instances of evidence of identity</p><p>(At least one must be foundational evidence of identity)</p></td></tr><tr><th class="active" scope="row"><strong>Accuracy of Identity Information</strong></th><td class="alignTopLeft"><p>Acceptance of self-assertion of identity information by an individual</p></td><td class="alignTopLeft"><p>Identity information acceptably matches assertion by an individual and evidence of identity</p><p><strong>and</strong></p><p>Confirmation that evidence of identity originates from appropriate authority</p></td><td class="alignTopLeft"><p>Identity information acceptably matches assertion by an individual and all instances of evidence of identity</p><p><strong>and</strong></p><p>Confirmation of the foundational evidence of identity using authoritative source</p><p><strong>and</strong></p><p>Confirmation that supporting evidence of identity originates from appropriate authority, using authoritative source</p><p><strong>or</strong> inspection by trained examiner</p></td><td class="alignTopLeft"><p>Identity information acceptably matches assertion by an individual and all instances of evidence of identity</p><p><strong>and</strong></p><p>Confirmation of the foundational evidence of identity using authoritative source</p><p><strong>and</strong></p><p>Confirmation that supporting evidence of identity originates from appropriate authority, using authoritative source</p><p><strong>or</strong> inspection by trained examiner</p></td></tr><tr><th class="active" scope="row"><strong>Linkage of Identity Information to Individual</strong></th><td class="alignTopLeft"><p>No requirement</p></td><td class="alignTopLeft"><p>No requirement</p></td><td class="alignTopLeft"><p>At least <strong>one</strong> of the following:</p><ol class="lower-roman"><li>Knowledge-based confirmation</li><li>Biological or behavioural characteristic confirmation</li><li>Trusted referee confirmation</li><li>Physical possession confirmation</li></ol></td><td class="alignTopLeft"><p>At least <strong>three</strong> of the following:</p><ol class="lower-roman"><li>Knowledge-based confirmation</li><li>Biological or behavioural characteristic confirmation</li><li>Trusted referee confirmation</li><li>Physical possession confirmation</li></ol></td></tr></tbody></table></appendix></appendices></doc>