Till innehåll på sidan

ISO 22388 Security and resilience – Authenticity, integrity and trust for products and documents – Guidelines for securing physical documents

This project aims to create an International Standard that provides guidelines for the review of physical documents used in all kinds of usage context and enable evaluation of physical document designation. In this evaluation, consideration is given to the types and number of security features that should be incorporated into the document for authentication. An assessment of the risk level posed by the most common forms of attack is conducted in order to determine the document class. Based on such review and evaluation, these guidelines are expected to serve as guidelines for securing all designated security documents.

Dr. Manabu Yamakoshi (Japan), the project leader responsible for the development of ISO 22388 explains:Yamakoshi

In administrative procedures and commercial transactions, the role of "security documents" including certificates and financial instruments is extremely important. But there is no end to the number of document frauds such as counterfeit and alteration that threaten the reliability of these documents. Fraudulent transactions and identity theft using counterfeited documents have become a serious international problem, resulting in financial harms, money laundering, human trafficking etc.

Intaglio printing, watermark, and holograms on banknotes etc. are typical examples of conventional security features (technologies). These technologies do not require special online/offline authentication tools, and can be authenticated with human senses as first level inspection. So, they have been implemented in various security documents as resilient and mature authentication methods even during emergencies when the infrastructure is disrupted.

ISO 22388 is a set of recommendations for security design applicable to a wide variety of documents. It includes semi-quantitative rating systems for document fraud risk analysis and selection/evaluation of security technologies in the form of annex. Using those rating systems provide clear criteria for security technologies, enhance security and streamline the design process. Furthermore, operating those systems based on an international baseline can contribute to enhancing the global chain of security documents.