Home Menu

Cross-Media Electronic Reporting Rule

Lesson 8: CROMERR System Checklist Items

Item #3: Issuance of a Signing Credential

Back | Next

As described in Lesson 7, Decision 1—the type of credential used—affects what is required to ensure that the credential is protected from compromise, as required by checklist Item 3. Item 3 is critical to proving the authenticity of the signatures it is used to create—if the credential is compromised, then there would be no way to control who may use it to create associated signatures.

Generally, the solution for Item 3 needs to include answers to the following questions:

  • How is the credential issuance process linked to identity proofing (Item 1)?
  • What kind of credential is it?
  • What is the actual process for issuing or registering the credential?
  • How is the credential protected from compromise as it is issued or registered?
  • How is the credential protected from compromise or tampering as it is stored in your system?
  • Is there a process to allow the user to change his or her credential?

Back | Next