myctrl.tools
Compare

IA-12(3)Identity Evidence Validation And Verification

MODERATE
HIGH

>Control Description

Require that the presented identity evidence be validated and verified through organizational defined methods of validation and verification.

>Cross-Framework Mappings

>Programmatic Queries

Beta

Related Services

Cognito User Pool Triggers
Lambda
Third-party Verification Services

CLI Commands

Create custom verification Lambda
aws lambda create-function --function-name IdentityVerification --runtime python3.11 --role arn:aws:iam::ACCOUNT:role/lambda-role --handler index.handler --zip-file fileb://function.zip
Add verification trigger to Cognito
aws cognito-idp update-user-pool --user-pool-id POOL_ID --lambda-config PreSignUp=arn:aws:lambda:REGION:ACCOUNT:function:IdentityVerification
Get verification results
aws cognito-idp admin-get-user --user-pool-id POOL_ID --username USERNAME --query 'UserAttributes[?Name==`custom:identity_verified`]'

>Supplemental Guidance

Validation and verification of identity evidence increases the assurance that accounts and identifiers are being established for the correct user and authenticators are being bound to that user. Validation refers to the process of confirming that the evidence is genuine and authentic, and the data contained in the evidence is correct, current, and related to an individual. Verification confirms and establishes a linkage between the claimed identity and the actual existence of the user presenting the evidence.

Acceptable methods for validating and verifying identity evidence are consistent with the risks to the systems, roles, and privileges associated with the users account.

>Assessment Interview Topics

Questions assessors commonly ask

Process & Governance:

  • What formal policies and procedures govern the implementation of IA-12(3) (Identity Evidence Validation And Verification)?
  • Who are the designated roles responsible for implementing, maintaining, and monitoring IA-12(3)?
  • How frequently is the IA-12(3) policy reviewed and updated, and what triggers policy changes?
  • What governance structure ensures IA-12(3) requirements are consistently applied across all systems?

Technical Implementation:

  • Describe the specific technical mechanisms or controls used to enforce IA-12(3) requirements.
  • What automated tools, systems, or technologies are deployed to implement IA-12(3)?
  • How is IA-12(3) integrated into your system architecture and overall security posture?
  • What configuration settings, parameters, or technical specifications enforce IA-12(3) requirements?

Evidence & Documentation:

  • What documentation demonstrates the complete implementation of IA-12(3)?
  • What audit logs, records, reports, or monitoring data validate IA-12(3) compliance?
  • Can you provide evidence of periodic reviews, assessments, or testing of IA-12(3) effectiveness?
  • What artifacts would you present during a FedRAMP assessment to demonstrate IA-12(3) compliance?

Ask AI

Configure your API key to use AI features.