Digital Identity Risk Management (DIRM) – Step 4: Tailor and Document Assurance Levels
DIRM involves tailoring and documenting assurance levels (xALs: IAL, AAL, FAL) by addressing risks, applying compensating/supplemental controls, and ensuring alignment with organizational needs.
Core Elements
- Two Dimensions of Risk
- External Threats: Credential theft, phishing, impersonation, and replay attacks.
- Unintended Consequences: User friction, excessive data collection, misaligned controls.
- Tailoring
Adjust assurance levels to reduce unintended impacts. Requires documentation, governance, balance, and flexibility. - Assessment Areas
- Privacy: Use PTA/PIA to identify risks.
- Customer Experience: Ensure usability, inclusivity, and minimal friction.
- Threat Resistance: Strengthen defenses against attacks and misuse.
- Controls
- Compensating Controls: When baseline controls can’t be applied, alternatives must mitigate risk equally.
- Supplemental Controls: Add-ons such as phishing-resistant authentication or stronger identity verification.
- Digital Identity Acceptance Statement (DIAS)
Mandatory for each service (including SaaS). Documents assurance level choices, controls, risks, and rationale.
Check out this infographic for an overview of DIRM – Step 4: Tailor and Document Assurance Levels.


