Skip main navigation

Identification Proofing

In this video, identification proofing will be expanded as we look at credential issuance and uniqueness, as well as some best practices.

In this video, identification proofing will be expanded. Specifically, we will look at credential issuance and uniqueness, as well as some best practices. We will also look at the different levels of identity proofing.

Remember, identification proofing is the process of establishing an identity to be able to answer the question ‘how do we know you are who you are you are?’.

To do this, you need to consider:

  • the breadth of evidence needed
  • the strength of evidence needed
  • the validation and verification processes
  • the history of the user’s activity
This article is from the free online

Cyber Security Foundations: Identity and Access Management

Created by
FutureLearn - Learning For Life

Reach your personal and professional goals

Unlock access to hundreds of expert online courses and degrees from top universities and educators to gain accredited qualifications and professional CV-building certificates.

Join over 18 million learners to launch, switch or build upon your career, all at your own pace, across a wide range of topic areas.

Start Learning now