Identity Proofing - Protected Channels, v3.0

Requirements for using only protected channels during identity proofing.

Assessment Step

1
Protected Channels (ProtectedChannels)
Does the CSP only use authenticated and protected channels during the entire proofing process (including any transactions with 3rd parties)?
Artifact
Documentation
Provide policies and practices indicating conformance.

Conformance Criteria (1)

Protected Channels
The CSP shall use authenticated protected channels during the entire proofing transaction, including exchanges with third parties.
Citation
SP800-63A
Section 4.2 P9