Story image

Australia's Digital ID framework is now one step closer to reality

05 Mar 2018

Australia’s Trusted Digital Identity Framework is one step closer to being a reality. The framework (TDIF) is part of the Australian Government Digital Transformation Agency’s mission to boost accreditation standards for organisations that want to provide digital identity services.

“We believe that it should be safe and easy for everyone to prove who they are. This means giving people a secure option to verify their identity online rather than needing to visit an office or shopfront,” DTA explains.

The Digital Transformation Agency (DTA) consulted with privacy advocates, digital identity experts, the financial sector and the public to develop the accreditation standards.

The Agency received more than 1000 comments from public consultation and these were used to help shape the framework, DTA says.

The concept of a digital identity model for supporting Australia’s economic growth was first suggested in 2014 for by the Financial System Inquiry. It believed the model would best meet cost, efficiency, flexibility and innovation requirements driven by Australia’s digital economy.

TDIF outlines requirements for digital identities in six different areas: security; usability; privacy protection; accessibility; fraud protection; and risk management.

There are ten documents that outline various components and DTA says it must work closely with stakeholders under common standards and using common tools. Those documents fit under the categories mentioned above.

The documents cover accreditation; authentication credentials; fraud control; identity proofing; privacy; proactive security; risk management; usability and accessibility; proactive security reviews; and community and industry feedback.

Applicants that wish to start the accreditation process should be able to complete TDIF accreditation within 12 months of starting. They should have a fully operational identity service prior to application. They will be evaluated according to the nine other documents.

DTA says that the ultimate success of the framework will be evident when people are able to establish a secure digital identity through a provider and reuse their identity to transact with the government and private sector.

DTA is also working on adding offline management for creating digital identities and adding capabilities for individuals to act on behalf of a business.

“These components will help remove the barriers for people who do not have the required documentation to create their digital identity online. It will also simplify the interactions business people have to have with government to get their work done.”

The TDIF replaces the National e-Authentication Framework and the Third Party Identity Services Assurance Framework.

Read more about the DTA’s Trusted Digital Identity Framework and its ten components on the Digital Transformation Agency’s website

WhatsApp users warned to change voicemail PINs
Attackers are allegedly gaining access to users’ WhatsApp accounts by using the default voicemail PIN to access voice authentication codes.
Swiss Post asks public to hack its e-voting system
Switzerland’s postal service Swiss Post is inviting keen-eyed security experts and white hats to hack its e-voting system.
Spoofs, forgeries, and impersonations plague inboxes
It pays to double check any email that lands in your inbox, because phishing attacks are so advanced that they can now literally originate from a genuine sender’s account – but those emails are far from genuine.
Flashpoint signs on emt Distribution as APAC partner
"Key use cases that we see greatly benefiting the region are bolstering cybersecurity, combating insider threats, confronting fraud, and addressing supply chain risk, to name a few."
The attack surface: 2019's biggest security threat
As businesses expand, so does their attack surface – and that may be the biggest cybersecurity risk of them all, according to Aon’s 2019 Cyber Security Risk Report.
Opinion: Cybersecurity as a service answer to urgent change
Alan Calder believes a CSaaS model can enable a company to build a cyber resilience strategy in a coherent and consistent manner.
Why SD-WAN is key for expanding businesses - SonicWall
One cost every organisation cannot compromise on is reliable and quick internet connection.
New threat rears its head in new malware report
Check Point’s researchers view Speakup as a significant threat, as it can be used to download and spread any malware.