A great example of Enterprise Architecture is our T-Mobile engagement with Identity Verification.
Identity Verification is a security measure that verifies a user's identity by confirming their claimed identity matches their actual identity. It is also known as "Identity Verification." In a password-less ecosystem, Identity Verification is a must.
If you have flown within the United States you may have leveraged the TSA PreCheck line at the airport. In order to verify your identity, biometrics (such as Fingerprints, Iris, Retina) can be captured and compared against a profile to confirm an identity. The identity can then be compared against a custom list and checked for things like, fraud. Recognizing a fake identity artifact is a vital aspect of initial identity profile creation. It is important to collect the minimum amout of biometric data as necessary. Beyond airport travel, most companies have certain activites that can produce significant effects. Imagine have such a check BEFORE a large cash transation, when issuing privileged hardware or when granting administrator access.
Whenever we engage in a project I remind stakeholders that a design is the criteria outlining what success looks like. For example, if someone wants to build a house, requirements and use cases guide whether a house is built for humans or dogs. A organization looking to implement Identity Verification would do well to consider the below methodology.
An objective of cybersecurity could be to raise the expense of the attackers. A fake ID can be made for $100 that can pass most visual inspections. With Identity Verification technology, the cost of fake ids can be raised to $5,000.
For companies dealing with fraud, the benefits of implementing a Identity Verification solution can quickly be justified. Moving beyond the anti-fraud win, a business value, technology and cybersecurity win is part of this effort. Business value bundling win. T-Mobile currently bundles Netflix access for customers, bundling airport TSA PreCheck access is a solid business value add-on. Technology solution. Digital drivers licenses will soon be issued by the state of California. How does our company recognize valid digital identities? Cybersecurity risk reduction win. In additions to the anti-fraud win for customers, the workforce insider threat risk is also reduced. This will help enable initiatives such as "Passwordless access."
Great Enterprise Architecture ties together improvements to business value, technology and cybersecurity.