What is e-Authentication Assurance Level
Home > 
What is e-Authentication Assurance Level
< back

What is e-Authentication Assurance Level

The Assurance Level is a term to describe the degree of confidence in the enrolment and authentication processes. The following are their detailed descriptions:

Level Definition Example
Assurance Level 1 Little or no confidence in the claimed or asserted identity.

This assurance level is used when minimum risk is associated with erroneous authentication. The authentication mechanism can provide some confidence that the entity is the same over consecutive authentication events.
Visitors and customers register with a valid email address for receiving promotional newsletters from an online shop. Email addresses may be used for registration without the consent of the respective email users. The users may experience minimal inconvenience arising from the unsolicited confirmation emails. Click here for more details
Assurance Level 2 Some confidence in the claimed or asserted identity.

This assurance level is used when moderate risk is associated with erroneous authentication.
A package delivery company provides online package tracking services for customers to check the real-time status of shipments, access their billing statements and maintain their accounts. The associated risks are not high if the services do not disclose sensitive information. Click here for more details
Assurance Level 3 High confidence in the claimed or asserted identity.

This assurance level is used where substantial risk is associated with erroneous authentication.
A cosmetic surgery centre has an online system to allow patients to retrieve their own medical records and the staff to manage the medical records, where improper access to the system could result in the release of sensitive information, thereby causing substantial distress to patients. Click here for more details
Assurance Level 4 Very high confidence in the claimed or asserted identity.

This assurance level is used when severe risk is associated with erroneous authentication.
A law firm uses a system to manage cases, client contacts, billing and other legal documents. Vicious alteration of case records could affect the legal proceedings related to civil or criminal violations. Click here for more details

e-Authentication Implementation Process Flow

The following is a suggested process flow for businesses to implement a secure e-Authentication system.

e-Authentication Implementation Process Flow
1. Assess Risks

Risk assessment is the first step to identify what authentication methods and security measures are required. Risks can be measured by the likelihood and impacts of an incident and can be financial, including immediate, direct and consequential damages arising from faulty execution or delayed execution. It may also relate to, among other things, loss of confidentiality or privacy, damages to reputation, or identity theft.

Common categories of impacts are listed out below for reference. Additional impacts on specific service nature or business requirements may have to be further identified.

Inconvenience, distress, or damage to standing / reputation
Financial loss or agency liability
Harm to the organisation or public interests
Unauthorised release of sensitive information
Personal safety
Civil or criminal violations

The degree of impact may vary from minimum to severe. The potential degree of impact can generally be grouped as follows:

Minimum Impact – minimal measurable impact
Moderate Impact – moderate and short-term impact
Substantial Impact – serious short-term, or moderate long-term impact
Severe Impact – severe, catastrophic, or serious long-term impact
2. Determine the Assurance Level

A reference assessment table that illustrates the maximum impact that can be covered by different assurance levels is listed below. The potential degree of impact identified for a category is associated with an appropriate assurance level that can cover it. The highest assurance level resulting from this mapping exercise will be chosen as the overall assurance level of that particular service or transaction.

Maximum Impact that can be covered

Potential Impact Assurance Level 1 Assurance Level 2 Assurance Level 3 Assurance Level 4
Inconvenience, distress, or damage to standing / reputation N/A / Minimum Moderate Substantial Severe
Financial loss or agency liability N/A / Minimum Moderate Substantial Severe
Harm to the organisation or public interests N/A Minimum Moderate / Substantial Severe
Unauthorised release of sensitive information N/A Minimum / Moderate Substantial Severe
Personal safety N/A N/A Minimum / Moderate Substantial / Severe
Civil or criminal violations N/A Minimum Moderate / Substantial Severe

For example, if all the ratings of the impact categories were found to be “Minimum”, the service or transaction would require an overall Assurance Level 3. This is because Assurance Level 2 cannot cover even a “Minimum Risk” in the category of “Personal safety”.

3. Determine Requirements

The basic requirements (Enrolment and Authentication) for each assurance level are described as follows:

Level Enrolment Requirement Authentication Requirement
Assurance Level 1 Self-claimed or self-asserted identities are accepted without verification.
No specific requirement for the authentication mechanism used.

Use of cryptographic authentication method not required.
Assurance Level 2 Identity proof by presentation of identity information issued or approved by at least one policy-compliant authoritative source.
Single-factor authentication with secure authentication protocol.
Assurance Level 3 Verification of identity information with one or more authoritative sources.
Hard or soft cryptographic authentication tokens with at least two authentication factors are required.

Secret information exchanged in authentication protocols shall be cryptographically protected in transit and at rest.
Assurance Level 4 In-person verification of identity documents with photos issued by the Government is required in all situations to protect against impersonation.
Same security measures at Level 3.

Hard tokens with tamper-resistant hardware for storage of secret or cryptographic keys required.
4. Implement Protections

Based on the determined requirements for the enrolment and authentication processes, the applicable authentication methods and appropriate measures to minimise the associated risks or impacts can then be implemented.

It should be noted that the overall security of an information system would depend on a number of factors. The sole use of a strong authentication token device does not necessarily ensure or improve the security level. There are other mitigation measures that may be deployed in designing a secure information system. The following protection activities are of particular importance:

Implement appropriate technological measures such as anti-malware software, firewall, key management, etc. to protect the underlying operating environment
Keep track on system activities and alerts, and identify suspicious activities
Keep informed of the latest security news, reported incidents, vulnerabilities, security threats and attacks
Adopt good information security practices
Inform users directly through channels such as publications, official websites, official statements about the policy or preventive measures in communicating or collecting sensitive personal or account information. For example, statements are issued to declare that the website
will not send emails that link to the log-in page of the website
will not ask for users’ personal or account information via emails or phone calls
Provide communication channels to handle incidents reported by users
Educate users about good security practices that they should follow

In addition, each participating party (e.g. user, technical support, user support, management) should understand his/her associated role and responsibility and be accountable for his/her actions.

5. Monitor, Report and Review

Mechanisms of constant monitoring and recording are important elements that should be established such that sufficient information can be obtained and proper arrangements can be made when tackling a security incident.

Day-to-day operational data such as audit trail of applications, event history, error log, access records or authorisation data should be properly recorded and backed up to support incident handling or other necessary security procedures.

In addition, the continual review and assessment should form an integral part of the whole system to take into account technological advances and to ensure that proper measures are put in place to cope with new requirements and changes in the underlying environment.