
Identity proofing has become a critical control as organizations shift to remote work, digital onboarding, and zero trust architectures. Yet it’s often misunderstood, conflated with authentication, or treated as a one-off compliance task instead of a foundational security capability. This article explains what identity proofing is, how it works, and why it matters across technical, business, and regulatory contexts.
A: Identity proofing and authentication serve distinct roles. Proofing establishes that a real person matches a claimed identity, typically once, using external verification services, while authentication continuously confirms that the already proofed person is returning. Strong authentication without strong proofing only verifies credential possession, not that the identity-proofed person is returning. proofed person is returning.
Architecturally, modern systems treat proofing as a separate service integrated with the identity provider during onboarding. Proofing providers return an assurance level that’s stored as an identity attribute, enabling access decisions based on how well someone was verified, not just whether they can authenticate.
A: Identity proofing typically layers multiple verification methods, including:
A: Document verification validates government-issued IDs. Modern services use machine learning (ML) models trained on thousands of document types to check security features –such as holograms, microprinting, UV patterns, and barcode encoding. These services look for tampering, expired documents, and format inconsistencies. Leading providers maintain updated templates as governments change ID designs. The output is typically a confidence score for document authenticity, along with extracted data (name, DOB, address, document number).
A: Database checks cross-reference extracted identity data against authoritative sources. These sources include credit bureau header data from Equifax, Experian, and TransUnion; commercial identity graphs; specialty databases such as OFAC watchlists, deceased records, and synthetic identity indicators; and government records where accessible. The goal is to confirm that the identity exists in the real world and that the details are consistent across sources.
A: Biometric matching compares a live capture (selfie or video) against the photo on the identity document. This confirms that the person presenting the document is the person pictured on it. Algorithms generate face embeddings and calculate similarity scores. The key metric is the tradeoff between the False Accept Rate (FAR) and the False Reject Rate (FRR).
A: Liveness detection confirms a real human is present, not a printed photo, video replay, or deepfake. Passive liveness analyzes image characteristics, while active liveness requires the user to perform actions such as blinking, turning their head, or speaking a phrase. This capability helps defend against presentation attacks.
The layers work together. Document verification confirms that a real ID exists. Database checks confirm that the identity is real and consistent across sources. Biometric matching confirms that the person presenting the ID is the person pictured on it. Liveness detection confirms that the person is physically present. Skipping any layer creates a gap that attackers can exploit.
A: Remote hiring has created a verification gap that attackers are actively exploiting. Candidates may perform well in interviews but later turn out to be someone else entirely, using proxy interviewers, stolen identities, or deepfakes.
In 2022, the FBI issued a public warning about this risk, citing fake identities used in remote IT interviews for roles with access to sensitive systems. Identity proofing provides a straightforward mitigation. Verifying a government-issued ID at the start of a video interview and confirming that the person on camera matches the document takes only minutes and can prevent proxy interviews altogether.
A: Failing to validate the identities of new hires can lead to several serious issues, including:
A: The average cost of a bad hire is estimated at 30% of an employee’s first-year salary, according to the U.S. Department of Labor. That figure reflects a typical bad hire –caused by poor fit or insufficient skills. When the hire is an imposter or someone using a fraudulent identity, the costs increase significantly and can include:
Identity proofing typically costs only $2 to 10 per verification. Without it, unverified employees can gain immediate access to email, systems, and applications. Preventing even a single incident can offset the cost of identity proofing across years of hiring activity.
A: NIST Special Publication 800-63-3 (Digital Identity Guidelines) is the authoritative framework for identity proofing in U.S. federal systems and has become the benchmark across many regulated industries.
The standard is divided into four volumes. For identity proofing specifically, organizations must follow SP 800-63A (Enrollment and Identity Proofing).
NIST defines three Identity Assurance Levels (IALs):
IAL1: No identity proofing is required. The identity is self-asserted and is appropriate only when there is no risk associated with an identity error.
IAL2: Remote or in-person proofing that provides high confidence in the claimed identity. This level requires:
IAL3: In-person proofing conducted by a trained credential service provider representative, requiring physical presence and direct inspection of identity evidence.
For most enterprise use cases, including workforce onboarding, customer account opening, and access to sensitive systems, IAL2 is the recommended target. It provides strong assurance while remaining achievable through remote and automated processes.
The key compliance consideration with NIST 800-63, is not only whether identities are proofed, but how thoroughly they are proofed and whether the process can be demonstrated. Auditors typically expect documented proofing procedures, records of evidence collection, and validation of results.
A: Identity proofing requirements show up across multiple regulatory frameworks. Here’s where you’ll run into explicit or implied mandates:
A: The Bank Secrecy Act (BSA) and its implementing regulations require financial institutions to maintain Customer Identification Programs (CIP) under 31 CFR §1020.220. These programs mandate risk-based identity verification using documentary and non-documentary methods to establish a reasonable belief that the institution knows the true identity of each customer. Financial Crimes Enforcement Network (FinCEN) guidance further clarifies acceptable verification procedures. Customer identification is a foundational element of broader BSA/AML (Anti-Money Laundering) programs, which also require ongoing monitoring and reporting.
A: HIPAA doesn’t explicitly mandate identity proofing, but the Security Rule’s access control requirements under 45 CFR §164.312 effectively require it for workforce members who access electronic protected health information (ePHI). In addition, for the e-prescribing of controlled substances, the DEA’s EPCS regulations under 21 CFR §1311 explicitly require identity proofing to standards equivalent to NIST IAL2 before prescribing credentials are issued.
A: Federal agencies are governed by Office of Management and Budget (OMB) guidance that establishes government-wide digital identity and access requirements. OMB Memorandum M-04-04 established the e-authentication guidance, and subsequent directives, including M-19-17, require federal agencies to implement digital identity practices aligned with NIST Special Publication 800-63. Federal contractors that handle Controlled Unclassified Information (CUI) must meet security and identity requirements under NIST 800-171, which defines identification and authentication controls for non-federal systems. For Department of Defense contractors, these requirements are enforced through the Cybersecurity Maturity Model Certification (CMMC) program.
A: Critical infrastructure organizations, including those in energy, transportation, and other regulated sectors, must comply with industry-specific standards. In the energy sector, NERC Critical Infrastructure Protection (CIP) standards require personnel risk assessments for individuals with authorized access to critical cyber assets. While these standards are not prescriptive about specific identity proofing methods, they clearly require identity verification as part of access authorization and ongoing risk management.
The common thread across critical infrastructure regulations is the need to clearly establish who has access to regulated data and systems. Meeting this requirement requires more than accepting a self-asserted identity and instead relies on verifiable, documented identity assurance.
A: Identity proofing integrates into existing HR and IT systems as part of the onboarding lifecycle. A typical workflow looks like this:
A: A common question with a simple answer is that a background check performed on an unverified identity is likely to return the wrong person.
Background checks provide information about someone’s history, including criminal records, employment verification, education, and credit. However, they assume the claimed identity is legitimate. If an individual applies using a stolen or synthetic identity, the background check may come back clean because it’s validating the fabricated persona, not the actual human being.
The correct sequence matters:
Skipping identity proofing makes the background check unreliable and significantly reduces its value.
A: Identity proofing typically costs only single-digit dollars per verification. The cost of not implementing proofing is far higher and is measured in incident response, regulatory penalties, and long-term recovery.
The risks include:
A: The right approach is to match the level of identity assurance to the level of risk. Not every access scenario requires the same degree of proofing.

The principle is straightforward. Over-proofing low-risk access adds cost and friction, while under-proofing high-risk access creates significant exposure. Organizations should map access types to risk tiers and apply controls accordingly.
An orchestration-based approach allows proofing requirements to adapt over time without brittle, point-to-point integrations. For organizations that need a formal, auditable framework, NIST SP 800-63-3 Section 5 (Digital Identity Risk Management) provides a structured methodology for aligning proofing levels to risk and documenting compliance.
A: The help desk is one of the most common targets for social engineering attacks. An attacker calls in, claims to be an employee who is locked out, and persuades a well-meaning support technician to reset credentials. Once that happens, the attacker gains legitimate access.
A well-known example is the 2023 MGM Resorts breach, which began with a phone call to the help desk. Attackers used information gathered from LinkedIn to impersonate an employee and convince support staff to reset credentials. The incident resulted in widespread operational disruption and an estimated $100 million in damages.
Traditional help desk verification methods are ineffective because:
These approaches verify familiarity, not identity, making them insufficient defenses against modern social engineering attacks.
A: Identity proofing adds a layer of verification that is difficult to fake. When someone contacts the help desk for a password reset or privileged access, support staff can trigger a identity proofing step. The requester receives a secure link on their mobile device, verifies a government-issued ID, and completes a biometric match. The help desk receives confirmation that the person requesting access matches the identity on file before taking action.
This approach is especially effective for high-risk requests, including:
For legitimate users, the added friction is minimal and typically takes only a minute or two. For attackers, the barrier is significant, as they cannot complete the process without the target’s physical presence and identity. By applying stronger proofing only to higher-risk scenarios, organizations can balance security with operational efficiency through tiered verification.
A: A strong starting point is IDProof+, a rapidly deployable identity assurance solution built in collaboration with authID and integrated with Microsoft Entra Verified ID. IDProof+verifies identities using government‑issued IDs and biometric matching, enabling organizations to confidently hire, onboard, and support remote users while strengthening overall identity assurance.
Want to learn more? Book a customized IDProof+ demo to see how it fits into your environment.