Under active development Content is continuously updated and improved

IA-12(3)Identity Proofing | Identity Evidence Validation and Verification

IL4 Mod
IL4 High
IL5
IL6

>Control Description

Require that the presented identity evidence be validated and verified through organizational defined methods of validation and verification.

>DoD Impact Level Requirements

No specific parameter values or requirements for this impact level.

>Discussion

Validation and verification of identity evidence increases the assurance that accounts and identifiers are being established for the correct user and authenticators are being bound to that user. Validation refers to the process of confirming that the evidence is genuine and authentic, and the data contained in the evidence is correct, current, and related to an individual. Verification confirms and establishes a linkage between the claimed identity and the actual existence of the user presenting the evidence.

Acceptable methods for validating and verifying identity evidence are consistent with the risks to the systems, roles, and privileges associated with the users account.

>Programmatic Queries

Beta

Related Services

Cognito User Pool Triggers
Lambda
Third-party Verification Services

CLI Commands

Create custom verification Lambda
aws lambda create-function --function-name IdentityVerification --runtime python3.11 --role arn:aws:iam::ACCOUNT:role/lambda-role --handler index.handler --zip-file fileb://function.zip
Add verification trigger to Cognito
aws cognito-idp update-user-pool --user-pool-id POOL_ID --lambda-config PreSignUp=arn:aws:lambda:REGION:ACCOUNT:function:IdentityVerification
Get verification results
aws cognito-idp admin-get-user --user-pool-id POOL_ID --username USERNAME --query 'UserAttributes[?Name==`custom:identity_verified`]'

>Assessment Interview Topics

Questions assessors commonly ask

Process & Governance:

  • What formal policies and procedures govern the implementation of IA-12(3) (Identity Evidence Validation And Verification)?
  • Who are the designated roles responsible for implementing, maintaining, and monitoring IA-12(3)?
  • How frequently is the IA-12(3) policy reviewed and updated, and what triggers policy changes?
  • What governance structure ensures IA-12(3) requirements are consistently applied across all systems?

Technical Implementation:

  • Describe the specific technical mechanisms or controls used to enforce IA-12(3) requirements.
  • What automated tools, systems, or technologies are deployed to implement IA-12(3)?
  • How is IA-12(3) integrated into your system architecture and overall security posture?
  • What configuration settings, parameters, or technical specifications enforce IA-12(3) requirements?

Evidence & Documentation:

  • What documentation demonstrates the complete implementation of IA-12(3)?
  • What audit logs, records, reports, or monitoring data validate IA-12(3) compliance?
  • Can you provide evidence of periodic reviews, assessments, or testing of IA-12(3) effectiveness?
  • What artifacts would you present during a FedRAMP assessment to demonstrate IA-12(3) compliance?

Ask AI

Configure your API key to use AI features.