...
Control | Rationale | |
---|---|---|
1 | Mobile apps that are used to authenticate Users are installed from an authorised and certified source |
|
2 | Mobile apps that are used to authenticate Users verify they are installed on a mobile operating system version for which they are approved |
|
3 | A given installation of an application that performs User authentication is correlated to the signature of device on which it is installed |
|
4 | A given User is correlated to a private key, used for the purposes of User authentication, which in turn is correlated to a given device |
|
5 | Private keys created on a device for purposes of authentication are stored in the device security module |
|
6 | Private keys are represented by their corresponding public key or certificate, which can be published for use by relying parties |
|
7 | Use a biometric gesture (digit, face) as an authentication factor |
|
8 | A given authentication operation accepts an input parameter that uniquely links a given authentication operation to a given consent or consent signature |
|
9 | The identifier used to link to a given consent or consent signature is validated before a User authentication operation is initiated |
|
10 | A given User authentication operation is asserted using a complex object that describes the conditions of the User authentication operation |
|
11 | The assertion of a given User authentication operation is signed using the private key available in the device security module |
|
12 | Signing of the assertion of a given User authentication operation is completed using an appropriate function or method available on the device that provides signing access |
|
13 | Signing of the assertion of a given User authentication operation is consistent with the FAPI 2.0 Security Profile |
|
14 | Apps must verify the identity of external services on which they have a dependency for User authentication operations |
|
15 | TPPs must safeguard against installation of their apps on jailbroken devices and prohibiting initiating redirects for Authentication and Authorization when installed on a jailbroken device. |
|
16 | TPPs must not allow installation or usage of their apps from within sanctioned countries, including but not limited to initiating redirects for Authentication and Authorization. |
|
3. Emerging Standards
At the time of writing the standards and technologies considered to be consistent with the principles and controls above are as follows:
...