user guide
Raw Data
This file contains raw search retrieval results or agent logs. The content below shows the original markdown source.
---
layout: raw-data.njk
title: "user guide"
---
# Stage 13: User Guide for New Consolidated Structure
## Guide to Using the Identification Standards
**Audience**: All users of the New Zealand Identification Management Standards
**Purpose**: Help you navigate and use the new consolidated structure effectively
**Document**: `identification_standards_consolidated.md`
---
## Welcome to the New Identification Standards
The Identification Management Standards have been restructured into a single, workflow-based resource designed to make your work easier. This guide will help you get the most out of the new structure.
### What's Changed?
**Before**: 30 separate documents scattered across multiple locations
**Now**: 1 consolidated resource organized around your workflow
**Key improvements**:
- **Easier navigation**: Follow a clear path from understanding to implementation
- **Conformance is central**: No longer hiddenβit's prominent throughout
- **Standards and guidance together**: Everything you need in one place
- **Clearer language**: Active voice makes instructions actionable
- **All content visible**: No more hidden content behind expanders
- **Better findability**: Clear section structure with role-based entry points
---
## Quick Start: Finding Your Entry Point
### Which Type of User Are You?
The document provides different entry points based on your role. Choose the pathway that matches your needs:
#### π§ Implementers and Developers
**Your goal**: Build or configure systems that conform with the standards
**Start here**:
1. **Section 2**: Understand your identification risks
2. **Section 3**: Determine which assurance levels you need
3. **Sections 4-7**: Implement the relevant standard controls
4. **Section 8**: Prepare for conformance assessment
**What you'll use most**:
- Implementation guidance sections (integrated with controls)
- Practical examples throughout Sections 4-7
- Risk assessment methodology (Section 2)
- Technical specifications (Section 9)
#### β
Conformance Assessors and Auditors
**Your goal**: Assess whether systems conform with the standards
**Start here**:
1. **Section 8**: Understand the assessment process and checklists
2. **Section 8.3**: Use the conformance checklists
3. **Sections 4-7**: Review the standards being assessed
4. **Section 8.4**: Understand evidence requirements
**What you'll use most**:
- Conformance checklists (Section 8.3)
- Evidence Code Reference (Section 8.3.5)
- Control statements (Sections 4-7)
- Assessment process guidance (Section 8.1-8.2)
#### π Policy Makers and Executives
**Your goal**: Understand strategic implications and organizational readiness
**Start here**:
1. **Section 1**: Understand why conformance matters
2. **Section 8.1**: Assess organizational readiness
3. **Sections 4-7** (objectives only): Understand scope of requirements
4. **Section 2**: Understand risk assessment requirements
**What you'll use most**:
- Conformance benefits (Section 1.1)
- Threshold considerations (Section 8.1.1)
- Team requirements (Section 8.1.2)
- Objective summaries (in Sections 4-7)
#### ποΈ Technical Architects and Designers
**Your goal**: Design systems that will meet conformance requirements
**Start here**:
1. **Section 3**: Understand assurance level framework
2. **Sections 4-7**: Review technical controls by standard
3. **Section 9**: Review authenticator specifications and technical details
4. **Section 2**: Understand risk-based decision making
**What you'll use most**:
- Control statements (Sections 4-7)
- Authenticator specifications (Section 9.2)
- Level-specific requirements (throughout Sections 4-7)
- Risk-to-assurance mapping (Section 2.5)
---
## Understanding the Document Structure
### The 9 Major Sections
The document follows a workflow from understanding to implementation to demonstration:
#### **Foundation** (Understand and Plan)
**Section 1: Understanding Conformance**
- Why conform? Is this relevant to you?
- Types of conformance (self, qualified, audited)
- DISTF relationship
- How to use this document
**Section 2: Assessing Identification Risk**
- 8-step risk assessment process
- Threat actor analysis
- Counter-fraud techniques
- Risk-to-assurance mapping
**Section 3: Selecting Assurance Levels**
- LoIA (Information Assurance)
- LoBA (Binding Assurance)
- LoAA (Authentication Assurance)
- LoFA (Federation Assurance)
- Decision criteria and mapping
#### **Implementation** (Apply the Standards)
**Section 4: Federation Assurance Standard & Implementation**
- 13 objectives, 42 controls
- Integrated implementation guidance
- Applies to Credential Providers and Facilitation Providers
**Section 5: Information Assurance Standard & Implementation**
- 5 objectives, 14 controls
- Integrated implementation guidance
- Plus: NCSC cybersecurity requirements (Section 5.4)
**Section 6: Authentication Assurance Standard & Implementation**
- 10 objectives, 38 controls
- Integrated implementation guidance
- Plus: Biometric privacy requirements (Section 6.4)
**Section 7: Binding Assurance Standard & Implementation**
- 5 objectives, 15 controls
- Integrated implementation guidance
#### **Demonstration** (Prove Conformance)
**Section 8: Demonstrating Conformance**
- Preparing for assessment (8.1)
- Understanding assessment types (8.2)
- Conformance checklists by standard (8.3)
- Evidence documentation (8.4)
#### **Reference** (Look Up Details)
**Section 9: Reference Materials**
- Terminology and definitions (9.1)
- Authenticator types and specifications (9.2)
- Templates and forms (9.3)
- Related standards (9.4)
- EIVA clarification (9.5)
- Document history (9.6)
---
## How to Navigate Effectively
### Finding Specific Information
#### Use Section Numbers
All sections are numbered for easy reference:
- **Section 5**: Information Assurance Standard
- **Section 5.4**: Cybersecurity Requirements
- **Section 8.3.2**: FA Facilitation Checklist
#### Use Control IDs
All 109 controls have unique IDs you can search:
- **FA1.01**: Credential risk assessment
- **IA2.01**: Information accuracy verification
- **AA5.03**: Authenticator protection
- **BA3.02**: Binding evidence capture
#### Use Search (Ctrl+F / Cmd+F)
The document is designed for text search:
- Search for control IDs (e.g., "FA1.01")
- Search for terms (e.g., "biometric", "risk assessment")
- Search for standards (e.g., "NCSC", "Privacy Code")
- Search for section numbers (e.g., "Section 8.1")
#### Follow Cross-References
Throughout the document, you'll find links like:
- "See Section 2 for risk assessment methodology"
- "Refer to Section 8.3 for conformance checklists"
- "Review Section 9.1 for terminology definitions"
These links help you navigate between related content.
### Understanding the Table of Contents
Your markdown viewer will auto-generate a table of contents from the headings. Use this to:
- See the overall structure at a glance
- Jump to specific sections quickly
- Understand where you are in the document
- Navigate back to major sections
---
## How Standards and Guidance Work Together
### The Integrated Format
In Sections 4-7, standards and implementation guidance are integrated using a consistent pattern:
#### Standard Control (What You Must Do)
```
### Objective 1 β Credential risk is understood
#### FA1.01 Credential risk assessment
At all credential assurance levels, Credential Providers MUST conduct an
identification risk assessment using a risk assessment methodology based on
ISO 31000:2018, or an equivalent, and document the risks and mitigations adopted.
([DocRef](URL/))
Additional information: Counter-fraud controls are part of identification risk
assessment. Refer to Section 2 for risk assessment methodology.
```
**This is normative** (you must comply):
- Uses MUST/SHOULD/MAY language
- States requirements clearly
- Cannot be changed (authoritative standard text)
- Has DocRef citation for traceability
#### Implementation Guidance (How to Do It)
```
### Implementing FA1.01 β Conduct an identification risk assessment
Conduct an identification risk assessment to understand what identification risks
your service faces and what counter-fraud techniques are appropriate...
Use the methodology described in Section 2 to:
* Identify potential threat actors
* Assess likelihood and impact
* Select counter-fraud techniques
* Document your assessment
([DocRef](URL/))
> **Example**: A credential provider offering credentials for government services
> should assess:
> * Threat: External attackers attempting synthetic identity fraud
> * Likelihood: Medium (based on service value)
> * Impact: High (access to government entitlements)
> * Mitigation: Implement document verification and biometric binding
```
**This is advisory** (guidance to help you):
- Uses active voice ("Conduct", "Assess", "Consider")
- Provides practical steps
- Includes examples and context
- Has DocRef citation for traceability
### How to Use This Format
**When implementing**:
1. Read the **control statement** first (the MUST/SHOULD requirement)
2. Then read the **implementation guidance** (how to achieve it)
3. Review the **example** if provided (practical illustration)
4. Check the **Additional information** for cross-references
**When assessing conformance**:
1. Check the **control statement** (what's required)
2. Use the **checklist** in Section 8.3 (structured assessment)
3. Refer to **implementation guidance** for evidence expectations
4. Check **Additional information** for dependencies
### Visual Cues
Learn to recognize these patterns:
**Control headings** use `####`:
- `#### FA1.01 Credential risk assessment`
**Guidance headings** use `###` with "Implementing":
- `### Implementing FA1.01 β Conduct an identification risk assessment`
**Examples** use blockquote format:
- `> **Example**: Description of scenario...`
**Additional information** uses bold:
- `**Additional information**: Cross-reference details...`
---
## Using the Conformance Section (Section 8)
### Section 8 Is Your Implementation Roadmap
Section 8 is the largest section (47 pages) and provides everything you need for conformance.
### Before You Start: Section 8.1
**Read Section 8.1 first** to prepare:
**8.1.1: Threshold Considerations**
- Is conformance mandatory or voluntary for you?
- What resources do you need?
- How long will it take?
- What's the right conformance approach (self, qualified, audited)?
**8.1.2: Assembling Your Team**
- What roles do you need? (Project Sponsor, Technical Lead, Compliance Lead)
- What skills are required?
- Internal vs external resources?
**8.1.3: Key Topics Before Starting**
- Understanding your service scope
- Identifying which standards apply
- Determining appropriate assurance levels
- Planning evidence collection
### During Implementation: Sections 8.2-8.3
**8.2: Understanding Assessment**
- Types of conformance assessment
- How the assessment process works
- What assessors look for
- Re-conformance requirements
**8.3: Conformance Requirements**
Use the checklists:
- **8.3.1**: FA Credential Establishment (FA1-FA5)
- **8.3.2**: FA Facilitation Mechanisms (FA6-FA13)
- **8.3.3**: IA and BA Combined (all IA + all BA)
- **8.3.4**: AA Authentication (all AA controls)
Each checklist shows:
- Control ID and description
- Evidence required
- Where to document evidence
- Yes/No/N/A checkboxes
### Organizing Evidence: Sections 8.3.5 and 8.4
**8.3.5: Downloadable Checklists and Evidence Codes**
- Descriptions of available checklists
- Evidence Code Reference (AUDIT1.1, AUDIT1.2, etc.)
- Cross-standard dependencies
- Evidence organization best practices
**8.4: Evidence Documentation**
- How to document evidence effectively
- Evidence types by control
- Documentation standards
- Submission requirements
### Evidence Organization Recommendation
Use this folder structure (from Section 8.3.5):
```
/conformance_evidence/
βββ /risk_assessments/
β βββ identification_risk_assessment_2024.pdf (AUDIT1.1)
β βββ privacy_impact_assessment_2024.pdf (AUDIT1.4)
βββ /policies_procedures/
β βββ credential_issuance_policy.pdf
β βββ information_security_policy.pdf
βββ /technical_specifications/
β βββ system_architecture.pdf
β βββ authentication_mechanisms.pdf
βββ /operational_records/
β βββ binding_ceremony_logs.csv
β βββ verification_transaction_logs.csv
βββ /checklists_completed/
βββ FA_credential_checklist_completed.md
βββ IA_BA_checklist_completed.md
```
---
## Understanding Key Concepts
### Assurance Levels
The standards use four types of assurance levels:
**LoIA (Level of Information Assurance)**: 1-4
- How sure you are that information is accurate
- LoIA1 (basic) β LoIA4 (very high)
**LoBA (Level of Binding Assurance)**: 1-4
- How sure you are that a credential belongs to the claimed person
- LoBA1 (basic) β LoBA4 (very high)
**LoAA (Level of Authentication Assurance)**: 1-4
- How sure you are that the person authenticating is the credential holder
- LoAA1 (basic) β LoAA4 (very high)
**LoFA (Level of Federation Assurance)**: 1-4
- How sure you are that federated assertions are trustworthy
- LoFA1 (basic) β LoFA4 (very high)
See Section 3 for detailed level descriptions and selection criteria.
### The Four Core Standards
**Federation Assurance (FA)**: 42 controls
- For Credential Providers (issue credentials)
- For Facilitation Providers (enable federation between services)
- Covers credential establishment and facilitation mechanisms
**Information Assurance (IA)**: 14 controls
- For all providers
- Covers information accuracy, security, retention, recovery
**Authentication Assurance (AA)**: 38 controls
- For all providers
- Covers authenticator types, lifecycle, strength, management
- Plus biometric privacy requirements
**Binding Assurance (BA)**: 15 controls
- For Credential Providers
- Covers binding credentials to people
- Evidence of binding ceremonies
### Conformance Types
**Self-assessment**:
- You assess yourself against the standards
- Suitable for low-risk, voluntary conformance
- Less rigorous, but quickest approach
**Qualified assessment**:
- Independent assessor reviews your implementation
- Suitable for medium-risk scenarios
- More rigorous than self-assessment
**Audited assessment**:
- Formal audit with evidence review and testing
- Required for DISTF and high-risk scenarios
- Most rigorous, provides highest confidence
See Section 1.2 and Section 8.2 for details.
---
## Special Content Sections
### Biometric Privacy Requirements (Section 6.4)
**When to read**: If you're implementing or assessing biometric authentication
**What's covered**:
- Privacy Commissioner's Biometric Processing Privacy Code 2025
- 13 mandatory privacy rules for biometric systems
- How privacy rules map to AA controls
- Privacy compliance checklist
- Legal compliance obligations
**Why it matters**: Mandatory law effective 3 November 2025. Biometric implementations must comply.
### NCSC Cybersecurity Requirements (Section 5.4)
**When to read**: If you're implementing information security for authentication systems
**What's covered**:
- NCSC 10 Minimum Cybersecurity Standards
- How NCSC standards complement identification standards
- Specific mappings to IA controls
- Implementation scenarios
**Why it matters**: Public service agencies must apply NCSC standards. This section shows how they integrate with identification standards.
### EIVA Clarification (Section 9.5)
**When to read**: If you're confused about EIVA's relationship to these standards
**What's covered**:
- Electronic Identity Verification Act 2012 (EIVA) established EIVA Service
- These Identification Standards are separate from EIVA
- Standards apply whether you use EIVA Service or not
- DISTF Act separates these frameworks
**Why it matters**: Clarifies that standards are technology-neutral and apply beyond EIVA.
---
## Tips for Effective Use
### For First-Time Readers
1. **Start with Section 1**: Get oriented before diving into technical content
2. **Understand your role**: Choose the right entry pathway (Section 1.4)
3. **Don't read linearly**: Jump to sections relevant to your immediate needs
4. **Use cross-references**: Follow links to related content
5. **Bookmark key sections**: Use your reader's bookmarking features
### For Implementers
1. **Risk assessment first**: Section 2 helps you understand what you're protecting against
2. **Know your levels**: Section 3 helps you determine appropriate assurance levels
3. **Read controls AND guidance**: Don't skip the implementation guidanceβit provides context
4. **Look for examples**: Practical examples help clarify abstract requirements
5. **Plan for evidence early**: Section 8.3.5 shows what evidence you'll need
### For Assessors
1. **Use the checklists**: Section 8.3 provides structured assessment tools
2. **Understand evidence codes**: Section 8.3.5 explains AUDIT codes
3. **Check cross-standard dependencies**: Some controls depend on others (documented in Section 8.3.5)
4. **Read additional information**: Control "Additional information" notes dependencies
5. **Reference implementation guidance**: Helps understand evidence expectations
### For Everyone
1. **Use search liberally**: Control IDs, section numbers, and terms are all searchable
2. **Check Section 9 for definitions**: Don't assume you know what terms mean
3. **Follow DocRef citations**: Trace content back to official source documents
4. **Note the date**: Standards evolveβcheck Section 9.6 for version history
5. **Ask for help**: Contact the Identification Team if you need clarification
---
## Common Questions
### Q: Where did all the separate documents go?
**A**: They've been consolidated into this single document. The content is still here, just better organized. If you were used to a specific document, here's where to find it now:
- "Conforming with the Standards" β Sections 1 and 8
- "Assessing Your Identification Risk" β Section 2
- "Levels of Assurance" β Section 3
- "Federation Assurance Standard" β Section 4
- "Implementation Guidance" documents β Integrated in Sections 4-7
- Checklists β Section 8.3
- "Terms and Definitions" β Section 9.1
- "Authenticator Types" β Section 9.2
### Q: Can I print out just one section?
**A**: Yes. Copy the section you need to a new file, or use your reader's print function to print specific page ranges.
### Q: Are the checklists still available as separate files?
**A**: Yes. Section 8.3.5 describes the downloadable checklist files and where to find them. The checklists are also embedded in Section 8.3 for convenience.
### Q: What if I only need to conform with one standard (e.g., FA)?
**A**: You'll still need to read:
- Section 1 (conformance overview)
- Section 2 (risk assessment)
- Section 3 (assurance levels)
- Section 4 (FA standard and guidance)
- Section 8 (conformance assessment)
- Section 9 (reference materials as needed)
Note: Information Assurance (IA) applies to all providers, so you may need Section 5 too.
### Q: Where are the worked examples?
**A**: Practical examples appear throughout Sections 2-8, integrated where relevant. Look for blockquote format starting with "> **Example**:".
### Q: How do I know which controls apply to me?
**A**:
1. Section 1.2 "Is This Relevant to You?" helps determine if you need to conform
2. Section 2 risk assessment determines your risk level
3. Section 3 maps risk to required assurance levels
4. Controls in Sections 4-7 specify which levels they apply to (e.g., "At LoIA2 and above")
### Q: What's changed from the previous version?
**A**: See Section 9.6 for document history and the separate `13_changes_and_transformations.md` document for comprehensive change log.
---
## Getting Help
### Need Clarification?
**Contact the Identification Team**:
- For conformance questions
- For assessment scheduling
- For technical interpretation
- For stakeholder consultation
**Check Related Standards**:
- Section 9.4 lists related standards (NCSC, Privacy Code, ISO/NIST)
- These may provide additional context
### Providing Feedback
Your feedback on this new structure is valuable:
- What's working well?
- What's confusing?
- What's missing?
- What could be improved?
Contact the Identification Team or the GCDO office with feedback.
---
## Document Maintenance
### Staying Current
**Check for updates**: Section 9.6 documents version history and changes
**Subscribe to notifications**: Ask the Identification Team about update notifications
**Review periodically**: Standards evolveβreview annually or when planning new implementations
### When Standards Change
When standards are updated:
- Control text may change (check DocRef citations for latest)
- New controls may be added
- Guidance may be enhanced
- Section 9.6 will document changes
---
## Summary: Getting the Most from This Document
β
**Use the right entry point** for your role (Section 1.4)
β
**Don't read linearly** unless you're new to identification management
β
**Follow the workflow** when implementing (Section 1 β 2 β 3 β 4-7 β 8)
β
**Use search and section numbers** to find specific information quickly
β
**Read controls AND guidance** together in Sections 4-7
β
**Start with Section 8.1** before beginning conformance work
β
**Use the checklists** in Section 8.3 for structured assessment
β
**Organize evidence early** using guidance in Section 8.3.5
β
**Check Section 9** for definitions and specifications
β
**Follow cross-references** to understand relationships between topics
This consolidated structure is designed to make your work easier. Take time to explore and familiarize yourself with the layoutβit will pay off in improved efficiency and understanding.
**Welcome to the new Identification Standards. We hope this structure serves you well.**
---
**Guide Prepared**: 2025-11-20
**For Document**: identification_standards_consolidated.md
**Stage 13 Task**: User Guide for New Structure
**Status**: COMPLETE