From: CSO
The National Institute of Standards and Technology (NIST) has been the voice of consensus and reference material in identity management cybersecurity best practices by outlining the requirements and providing insightful reference material to help organizations.
***
1. Start with a high-level view of NIST’s plan
NIST’s three “Digital Identity Guidelines” publications offer a granular look at different aspects of access manage framework, so it’s best to start with the agency’s broad overview of identity management.
NIST Special Publication 800-63-3—each paper is labeled through a government numbering system—outlines the high level goals associated with access management, including identity proofing, digital authentication and federated authentication—when you use a single sign-on such as Twitter to log into different identity management systems.
![Share on Facebook Facebook](https://www.thecre.com/fisma/wp-content/plugins/social-media-feather/synved-social/image/social/regular/96x96/facebook.png)
![Share on Twitter twitter](https://www.thecre.com/fisma/wp-content/plugins/social-media-feather/synved-social/image/social/regular/96x96/twitter.png)
![Share on Google+ google_plus](https://www.thecre.com/fisma/wp-content/plugins/social-media-feather/synved-social/image/social/regular/96x96/google_plus.png)
![Share on Reddit reddit](https://www.thecre.com/fisma/wp-content/plugins/social-media-feather/synved-social/image/social/regular/96x96/reddit.png)
![Pin it with Pinterest pinterest](https://www.thecre.com/fisma/wp-content/plugins/social-media-feather/synved-social/image/social/regular/96x96/pinterest.png)
![Share on Linkedin linkedin](https://www.thecre.com/fisma/wp-content/plugins/social-media-feather/synved-social/image/social/regular/96x96/linkedin.png)
![Share by email mail](https://www.thecre.com/fisma/wp-content/plugins/social-media-feather/synved-social/image/social/regular/96x96/mail.png)
Leave a Reply