FISMA is a US regulation that provides an information security framework for government contractors and federal agencies, including the legislative and executive branches of government. It aims to ensure information is appropriately handled and managed. FISMA’s standards and procedures are defined by NIST, which provides a risk management framework for achieving FISMA compliance. The FISMA guidelines for compliance are outlined in NIST 800-53, NIST 800-63, NIST 800-171, FIPS 199, and FIPS 200.
For an in-depth breakdown of FISMA, and how to achieve compliance, check out our FISMA glossary entry.
Let’s take a deeper dive into NIST-800, the standard focused on digital identity services.
Understanding NIST 800-63
NIST 800-63, published in 2017, updated the Digital Identity Guidelines and provided technical requirements for federal agencies implementing digital identity services. The update noted, “the market for identity services is componentized, allowing organizations and agencies to employ standards-based, pluggable identity solutions based on mission need.” Despite this admission, federal agencies still struggle with these individual solutions since many do not connect across the entire data ecosystem, often creating Separation of Duties (SoD) violations or leaving the agency non-compliant.
What is a Digital Identity?
The irony of NIST SP 800-63 lies in its own admission that there is no clear definition of digital identity. However, the NIST publication defines digital identity as “the unique representation of a subject engaged in an online transaction.”
To create the guidelines, NIST drills down further to explain that federal agencies need to manage risk in federated and non-federated systems based on the following categories:
- Identity Assurance Level (IAL) Identity proofing process
- Authenticator Assurance Level (AAL): Authentication process
- Federated Assurance Level (FAL): Strength of assertion in a federated environment
Organizations using non-federated environments need the first two components, IAL and AAL. Agencies using federated systems need to add FAL as well, the details of which are described in NIST SP 800-63c.
Within each category, NIST 800-63 defines three risk mitigation levels based on the agency’s risk analysis.
- Level 1: Low risk
- Level 2: Moderate risk
- Level 3: High risk
The higher the risk level, the more assurance the agency needs to provide over its identity and access management (IAM) and identity governance and administration (IGA) programs.