assurance - [Assurance] Silver assurance and process compliance
Subject: Assurance
List archive
- From: Eric Goodman <>
- To:
- Subject: [Assurance] Silver assurance and process compliance
- Date: Mon, 19 Mar 2012 11:30:48 -0700
This is a question that I ask on various lists periodically, but as we're beginning to come out with "cookbooks" for the technical implementatoins, I'm wondering if we can perhaps get some more detailed insight from "ahead of the curve" campuses.
Do we have any formal advice as to what level of rigor is required to meet the process-based elements of assurance? By process-based, I mean those that aren't (inherently) technology driven, such as processes for delivery of passwords to individuals, phone or email based help desk password resets or defining assurance for pre-existing hires. The typical answer I get to this question is "it's a risk assessment that should be worked out with your auditor", but I'm still looking for some objective measure to base those assessments on.
For example, assuming a strong identity vetting process is completed for all new employees (e.g., I-9 processing in the US), which of these methods for actually delivering credentials to our new employees provide acceptable ("recommended"? "advisable"?) levels of rigor for meeting the NIST LoA2 requirements:
- The help desk calls the campus department's main number and asks for the individual; once connected they deliver the initial account password
- An envelope is sent to the employee's new department (marked "confidential") containing the initial account password
- An initial password is sent via USMail to the home address of the new employee or via email to the individual's listed "personal email address"
- After hire, the new employee independently authenticates to the account system by providing name, last 4 ssn and DoB (gathered from the HR system) to allow them to set their account password
- We generate an initial password in the HR systems which is communicated to the employee at hire time and separately sent to the account system for password seeding.
- After hire, the employee visits a designated office (e.g., Help Desk) where staff reviews a picture ID against HR data and authenticates the employee's account activation.
- During the I9 verification, HR staff have the employee set their initial password in the account system directly (assume the HR staff authenticates to validate the process)
Perhaps another view on this question is, has anyone put together an overview of what the liabilities are of claiming compliance and then having a breach that was due to lack of sufficient IdP practices (as compared to user misconduct)?
Thanks in advance,
--- Eric
Eric Goodman
UC Santa Cruz
- [Assurance] Silver assurance and process compliance, Eric Goodman, 03/19/2012
- RE: [Assurance] Silver assurance and process compliance, Roy, Nicholas S, 03/22/2012
- RE: [Assurance] Silver assurance and process compliance, Jones, Mark B, 03/23/2012
- Re: [Assurance] Silver assurance and process compliance, Eric Goodman, 03/26/2012
- Re: [Assurance] Silver assurance and process compliance, Tom Scavo, 03/26/2012
- RE: [Assurance] Silver assurance and process compliance, Roy, Nicholas S, 03/29/2012
- RE: [Assurance] Silver assurance and process compliance, Jones, Mark B, 03/26/2012
- Re: [Assurance] Silver assurance and process compliance, Ann West, 03/30/2012
- Re: [Assurance] Silver assurance and process compliance, Tom Scavo, 03/26/2012
- Re: [Assurance] Silver assurance and process compliance, Eric Goodman, 03/26/2012
Archive powered by MHonArc 2.6.16.