BS ISO 19092:2023
$215.11
Financial services. Biometrics. Security framework
Published By | Publication Date | Number of Pages |
BSI | 2023 | 76 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | National foreword |
8 | Foreword |
9 | Introduction |
11 | 1 Scope 2 Normative references |
12 | 3 Terms and definitions |
18 | 4 Abbreviated terms 5 Biometrics in financial service context 5.1 General |
20 | 5.2 Generic security considerations 5.3 Personal device vulnerabilities and controls strategy 5.4 Biometric verification versus biometric identification |
21 | 6 Biometric modalities and core systems 6.1 General 6.2 Modalities of biometrics 6.2.1 General 6.2.2 Fingerprint |
22 | 6.2.3 Voice biometrics 6.2.4 Iris biometrics 6.2.5 Face biometrics |
23 | 6.2.6 Signature biometrics 6.2.7 Vein biometrics |
24 | 6.2.8 Palm print biometrics 6.2.9 Keystroke biometrics 6.3 Biometric system and its supporting systems 6.3.1 Overview |
25 | 6.3.2 Core systems |
26 | 6.3.3 Core biometric authentication usage scenarios |
30 | 7 Financial biometric authentication systems — usability considerations 7.1 General 7.2 Properties of biometric modalities |
31 | 7.3 Properties and evaluation of biometric system 7.3.1 Recognition performance |
32 | 7.3.2 Recognition performance evaluation |
33 | 7.3.3 Presentation attack detection 7.3.4 Interoperability |
34 | 8 Financial biometric authentication systems – architectures 8.1 Overview 8.2 Conceptual business architecture |
35 | 8.3 Technical architecture 8.4 Registration architecture |
36 | 8.5 PBP devices and associated biometric authentication architectures 8.5.1 PBP device operators |
38 | 8.5.2 PBP device types 8.5.3 Point of biometric presentation (PBP) |
40 | 8.5.4 Biometric authentication architecture |
44 | 9 Financial biometric authentication systems – threats and vulnerabilities 9.1 Generic threat considerations |
45 | 9.2 Biometric presentation vulnerabilities 9.2.1 Overview 9.2.2 Synthetic biometric presentation attack vulnerabilities |
46 | 9.2.3 Improper PBP device calibration vulnerabilities 9.2.4 Fault injection 9.3 Comparison, decision and storage subsystem vulnerabilities 9.3.1 Overview |
47 | 9.3.2 Improper threshold settings vulnerability 9.3.3 Score and threshold vulnerabilities 9.3.4 Reference refinement vulnerabilities |
48 | 9.3.5 Self-targeted match search vulnerabilities 9.3.6 Other-party targeted match search vulnerabilities 9.3.7 Match collision vulnerabilities 9.3.8 Authentication result transmission vulnerabilities 9.3.9 Biometric storage vulnerabilities 10 Financial biometric authentication systems — security requirements 10.1 General 10.2 Generic security requirements 10.2.1 Physical security requirements |
49 | 10.2.2 Logical security requirements |
50 | 10.3 Identity registration 10.3.1 Overview 10.3.2 Security requirements 10.4 Presentation 10.4.1 Overview 10.4.2 Security requirements 10.5 Data storage and handling 10.5.1 Overview 10.5.2 Reference splitting procedure |
52 | 10.6 Comparison and decision 10.6.1 Overview 10.6.2 Security requirements 10.7 Enrolment 10.7.1 Overview 10.7.2 Security requirements |
53 | 10.8 Re-enrolment 10.8.1 Overview 10.8.2 Security requirements 10.9 Refinement 10.9.1 Overview 10.9.2 Security requirements 10.10 Verification 10.10.1 Overview |
54 | 10.10.2 Security requirements 10.11 Identification 10.11.1 Overview 10.11.2 Security requirements |
55 | 10.12 Termination 10.12.1 Overview 10.12.2 Security requirements 10.13 Suspension and reactivation 10.13.1 Overview 10.13.2 Security requirements |
56 | 10.14 Archiving 10.14.1 Overview 10.14.2 Security requirements 10.15 Security compliance verification |
57 | Annex A (informative) Threats and vulnerabilities for biometric environments |
60 | Annex B (informative) Biometric implementation scenarios |
69 | Annex C (normative) Biometric security controls checklist |
73 | Bibliography |