Under active development Content is continuously updated and improved

IA-12(2)Identity Proofing | Identity Evidence

IL4 Mod
IL4 High
IL5
IL6

>Control Description

Require evidence of individual identification be presented to the registration authority.

>DoD Impact Level Requirements

No specific parameter values or requirements for this impact level.

>Discussion

Identity evidence, such as documentary evidence or a combination of documents and biometrics, reduces the likelihood of individuals using fraudulent identification to establish an identity or at least increases the work factor of potential adversaries. The forms of acceptable evidence are consistent with the risks to the systems, roles, and privileges associated with the user's account.

>Programmatic Queries

Beta

Related Services

Cognito Advanced Security
KYC/AML Services
Document Verification

CLI Commands

Enable advanced security in Cognito user pool
aws cognito-idp update-user-pool --user-pool-id POOL_ID --advanced-security-mode ENFORCED --account-takeover-risk-configuration EventAction=Block,RiskLevel=High
Enable identity verification
aws cognito-idp update-user-pool-client --user-pool-id POOL_ID --client-id CLIENT_ID --identity-proofing-enabled
Get user identity verification status
aws cognito-idp admin-get-user --user-pool-id POOL_ID --username USERNAME --query 'UserAttributes[?Name==`email_verified`]'

>Assessment Interview Topics

Questions assessors commonly ask

Process & Governance:

  • What formal policies and procedures govern the implementation of IA-12(2) (Identity Evidence)?
  • Who are the designated roles responsible for implementing, maintaining, and monitoring IA-12(2)?
  • How frequently is the IA-12(2) policy reviewed and updated, and what triggers policy changes?
  • What governance structure ensures IA-12(2) requirements are consistently applied across all systems?

Technical Implementation:

  • Describe the specific technical mechanisms or controls used to enforce IA-12(2) requirements.
  • What automated tools, systems, or technologies are deployed to implement IA-12(2)?
  • How is IA-12(2) integrated into your system architecture and overall security posture?
  • What configuration settings, parameters, or technical specifications enforce IA-12(2) requirements?

Evidence & Documentation:

  • What documentation demonstrates the complete implementation of IA-12(2)?
  • What audit logs, records, reports, or monitoring data validate IA-12(2) compliance?
  • Can you provide evidence of periodic reviews, assessments, or testing of IA-12(2) effectiveness?
  • What artifacts would you present during a FedRAMP assessment to demonstrate IA-12(2) compliance?

Ask AI

Configure your API key to use AI features.