Federated ICAM RP ABAC Reqirements, v1.0

The requirements for publishing attribute based access control policies based on recommended user attributes.

Assessment Steps (2)

1
Well-Defined ABAC Policy (Well-DefinedABACPolicy)
Has the organization defined an ABAC policy for the system, and does the policy use appropriate community endorsed attributes wherever possible? Note that non-endorsed attributes are acceptable, but only in cases where no appropriate community endorsed attribute exists.
Artifact
Policy
ABAC policy that has been reviewed by the assessor and verified to meet the requirements.
2
Published List of Required Attributes (PublishedListofRequiredAttributes)
Has the organization published a list of all user attributes required for use of the system?
Artifact
Attribute List
List of user attributes required by the system.

Conformance Criteria (2)

Well-Defined ABAC Policy
The operator of the system SHOULD define the system's access control policy in a manner that enables the system to make attribute-based access control (ABAC) policy decisions for users based on attributes about those users received from IDP systems within trusted assertions (e.g., OpenID Connect claims or SAML attributes). The attributes required by the system SHOULD be limited to only those attributes that have been endorsed by NIEF or another appropriate community.
Citation
NIEF
Discussion/Review
Published List of Required Attributes
The operator of the system MUST publish the list of user attributes required for use of the system. In addition, the operator of the system SHOULD make the system's full access control policy (including ABAC rules and any other non-ABAC policy rules) available to administrators from information sharing partner agencies to help ensure attribute interoperability between systems within the community.
Citation
NIEF
Discussion/Review