top of page

ISO/IEC 27566-2

ISO/IEC 27566-2 — Information security, cybersecurity and privacy protection — Age assurance systems — Part 2: Technical approaches and guidance for implementation

[PROPOSAL]

Abstract

ISO/IEC 27566 part 2 "describes different technical approaches suitable in different ecosystems for age assurance systems and guidance for their implementation.”


[Source: PROPOSAL]

Introduction

ISO/IEC 27566 part 2 "provides technical guidance for implementing age assurance systems in a consistent and modular manner. It supports the practical application of the framework defined in Part 1 by identifying technical components, implementation approaches, and context-specific trade-offs. This enables privacy-respecting, effective, and policy-aligned age assurance across diverse digital and physical environments."


[Source: Preliminary Work Instruction] 


Part 2 bridges between the foundational concepts in part 1 and the analytical approaches in part 3. 

Scope

ISO/IEC 27655 part 2 “ includes guidance for considering the characteristics of various approaches and for making trade-offs when selecting approaches for different users, actors and use cases. The document describes different technical approaches suitable in different ecosystems for the implementation of age assurance systems or of age assurance components”


[Source: Preliminary Work Instruction]

Structure

Main sections [from initial draft]:

  • 5: Principles carried forward from part 1

  • 6: Relating context of use to implementation choices

  • 7: Major contexts of use

  • 8: Selecting components

  • 9: Specifying requirements for procurement

  • 10: Documenting operational practice statements and evidence

  • Annex A: Commonalities of age assurance methods and interaction models

  • Annex B: Common concerns related to common sub-contexts of use

  • Annex C: Enrolment, user account management, and wallet management

  • Annex D: Relationship to part 3

  • Annex E: Examples of trade-off choices during design of age assurance systems

  • Annex F: Examples of practice statements

Status

Part 2 is at first Working Draft stage.

Commentary

'Context of use' refers - I think - to the particular business situation in which some form of age assurance is needed.   SInce these vary, the standard explains how to identify, determine and evaluate relevant requirements and parameters driving the design of the age assurance approach. e.g. how important is assurance to verify a person's true age?  It then offers guidance on how to go about satisfying the requirements by selecting and implementing appropriate age assurance methods and technologies.   

This page last updated:

19 November 2025

© 2025 IsecT Limited 

 

  • Link
  • LinkedIn
bottom of page