Requirements

Below is the list of the titles of each of the Requirements and Best Practices comprising the IDEF Baseline Functional Requirements v1.0. Each title on this page provides a link to a separate page on this website (wiki) containing the text of the item.

Additional commentary and supplemental material is in development and will be linked to each requirement page. In the requirement text: (a) Short titles for each item are included for indexing and ease of reading, but are not considered normative. (b) Certain words are CAPITALIZED for ease of review and identifying specific roles, but that capitalization is not considered normative.

A formal printed version of these same Requirements as approved, with IDESG logos, can be downloaded from: PDF Link

Interoperability

INTEROP-1. THIRD PARTY AUTHENTICATION
INTEROP-2. THIRD PARTY CREDENTIALS
INTEROP-3. STANDARDIZED CREDENTIALS
INTEROP-4. STANDARDIZED DATA EXCHANGES
INTEROP-5. DOCUMENTED PROCESSES
INTEROP-6. THIRD-PARTY COMPLIANCE
INTEROP-7. USER REDRESS
INTEROP-8. ACCOUNTABILITY 

Privacy

PRIVACY-1. DATA MINIMIZATION
PRIVACY-2. PURPOSE LIMITATION
PRIVACY-3. ATTRIBUTE MINIMIZATION
PRIVACY-4. CREDENTIAL LIMITATION
PRIVACY-5. DATA AGGREGATION RISK
PRIVACY-6. USAGE NOTICE
PRIVACY-7. USER DATA CONTROL
PRIVACY-8. THIRD-PARTY LIMITATIONS
PRIVACY-9. USER NOTICE OF CHANGES
PRIVACY-10. USER OPTION TO DECLINE
PRIVACY-11. OPTIONAL INFORMATION
PRIVACY-12. ANONYMITY
PRIVACY-13. CONTROLS PROPORTIONATE TO RISK
PRIVACY-14. DATA RETENTION AND DISPOSAL
PRIVACY-15. ATTRIBUTE SEGREGATION 

Security

SECURE-1. SECURITY PRACTICES
SECURE-2. DATA INTEGRITY
SECURE-3. CREDENTIAL REPRODUCTION
SECURE-4. CREDENTIAL PROTECTION
SECURE-5. CREDENTIAL ISSUANCE
SECURE-6. CREDENTIAL UNIQUENESS
SECURE-7. TOKEN CONTROL
SECURE-8. MULTIFACTOR AUTHENTICATION
SECURE-9. AUTHENTICATION RISK ASSESSMENT
SECURE-10. UPTIME
SECURE-11. KEY MANAGEMENT
SECURE-12. RECOVERY AND REISSUANCE
SECURE-13. REVOCATION
SECURE-14. SECURITY LOGS
SECURE-15. SECURITY AUDITS 

Usability

USABLE-1. USABILITY PRACTICES
USABLE-2. USABILITY ASSESSMENT
USABLE-3. PLAIN LANGUAGE
USABLE-4. NAVIGATION
USABLE-5. ACCESSIBILITY
USABLE-6. USABILITY FEEDBACK
USABLE-7. USER REQUIREMENTS