Page tree
Skip to end of metadata
Go to start of metadata

Kantara Initiative Identity Assurance WG Teleconference


Meeting Minutes - Approved by IAWG 2013-11-07


Date and Time


  1. Administration:
    1. Roll Call
    2. Agenda Confirmation
    3. Minutes approval: IAWG Meeting Minutes 2013-10-10
    4. Action Item Review
    5. NEW: IDESG Update from Plenary Attendees
    6. Staff reports and updates
    7. LC reports and updates
    8. Call for Tweet-worthy items to feed (@KantaraNews or #kantara)
  2. Discussion
    1. F2F November 13 2013 afternoon in DC
    2. Discussion of initial draft of Modular IAF document
    3. Discussion of flight path of IAF v4.0 timelines/expectations
  3. AOB
    1. (Placeholder for: Resilient Trust Network update; Richard Wilsher's Antecedent Theorem thread - deferred to future meeting)
  4. Adjourn


Link to IAWG Roster

As of 1 July 2013, quorum is 5 of 9


Meeting achieved quorum


  • Myisha Frazier-McElveen (C)
  • Rich Furr (V-C) 
  • Andrew Hughes (S)
  • Scott Shorter
  • Cathy Tilton
  • Matt Thompson


  • Linda Goettler
  • Matt Woodhill




  • Bill Braithwaite
  • Richard Wilsher

Notes & Minutes


Minutes Approval

IAWG Meeting Minutes 2013-10-10

Motion to approve minutes of 2013-October-10: Richard Furr
Seconded: Scott Shorter
Discussion: None
Motion Passed

Action Item Review

See the Action Items Log wiki page

Staff Updates

LC Updates
  • No meeting this period
Participant updates
  • Andrew gave an overview of IDESG Plenary activities and IIW Conference activities of relevance to IAWG
  • Scott related Use Case group looking at Identity Proofing over video conference


F2F Meeting Plans
  • 1 day event - November 13, 2013
    • FCCX event in the morning
    • Afternoon to showcase IAWG work - Modular IAF discussion
  • Joni to post registration site today
Modular IAF Discussion Draft
  • Andrew gave an overview of the document structure, content and next steps
  • This document will probably end up as guidance to companies seeking to offer CSP services (who does what) and guidance to Assessors on who should do what.
  • Longer term, an analysis of how the SAC match up to the listed Functions will be done, and this will be source information for a discussion on approaches to Kantara Trustmarks (should there be Function-based Trustmarks? and if so, how to manage that)
  • Target 14 November for further IAWG discussion
  • Target end of 2013 for Deployment Patterns completion
  • Need to discuss what the actual impacts will be to IAF (non-SAC and non-AAS) in Q1
    • Need to to develop strategy to determine if/how to update IAF and potentially trust mark modifications
  • In Q2 proceed on the work to non-SAC and non-AAS parts of IAF (in particular the Overview and Levels of Assurance documents)
  • Q1 discussions will allow for planning of SAC and AAS modification requirements and direction


  • Electrosoft has new internal employee training material on handling data breaches at assessed entities. Scott plans to sanitize it and post portions on the Electrosoft blog.




Next Meeting


  • No labels