Federal ICAM Goals Fostering effective government-wide identity and access management Enabling trust in online transactions through common identity and.

Slides:



Advertisements
Similar presentations
Single Sign-On and Federated Authentication at NIH and Beyond
Advertisements

Portfolio Management, according to Office of Management and Budget (OMB) Circular A-16 Supplemental Guidance, is the coordination of Federal geospatial.
Overview of US Federal Identity Management Initiatives Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority and Asst. CIO E-Authentication, NIH.
2009 IT Summit Federal CIO Council Breakout Session #5 Identity and Access Management Federal IT Summit October 28, 2009 Moderator: Paul Christy, SBA Paul.
TFTM Interim Trust Mark/Listing Approach Paper Discussion Deck TFTM Committee IDESG Plenary Meeting January 14, IDESG TFTM Committee1.
Federal PKI Architecture Update
The Federation for Identity and Cross-Credentialing Systems (FiXs) FiXs ® - Federated and Secure Identity Management in Operation Implementing.
Paul D. Grant Special Assistant, Federated Identity Management and External Partnering Office of the DoD CIO Co-Chair, Identity, Credential.
Certificate Interoperability S&I Framework Initiative Final Report August 17, 2011.
The 4BF The Four Bridges Forum Federated PACS A Physical Access Use Case for Bridges FIPS 201/PIV-I PACS Interoperability April 28 th, 2009.
SAFE-BioPharma Association NSTIC Day How does industry drive forward.
15June’061 NASA PKI and the Federal Environment 13th Fed-Ed PKI Meeting 15 June ‘06 Presenter: Tice DeYoung.
Private Sector Perspectives on Federal Financial Systems Modernization and Shared Services.
Public Key Infrastructure (PKI) Hosting Services.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
Federal Identity Management
IDESG Goals & Work-plans for 2013 and beyond Brett McDowell IDESG Management Council Chair
“Personal Identity Verification (PIV) of Federal Employees and Contractors” October 27, 2005 Homeland Security Presidential Directive 12 (HSPD-12)
Spring 2013 ICAM Day Value of ICAM Breakout Session Paul D. Grant Director of Cybersecurity Policy, DoD CIO Co-Chair, Federal Identity, Credential &
1 Trust Framework Portable Identity Schemes Trust Framework Portable Identity Schemes NIH iTrust Forum December 10, 2009 Chris Louden.
Federal Information Processing Standard (FIPS) 201, Personal Identity Verification for Federal Employees and Contractors Tim Polk May.
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Emergence of Identity Management: A Federal Perspective Dr. Peter Alterman Chair, Federal PKI Policy Authority.
Update on Interoperability Roadmap Comments Sections E, F, and G Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair March.
ITPA Luncheon March 12, 2015 Emerging Role of the CTO.
Framework for Improving Critical Infrastructure Cybersecurity Overview and Status Executive Order “Improving Critical Infrastructure Cybersecurity”
Introduction to OIX: A Market Solution to Online Identity Trust Don Thibeau.
Federal CIO Council Information Security and Identity Management Committee IDManagement.gov FICAM Testing Program and Approved Products List (APL) Overview.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
Update and Implications of the DATA Act – Beyond the Beltway JUNE 3, 2015.
1 National Strategy for Trusted Identities in Cyberspace Identity in Cyberspace: Improving Trust via Public-Private Partnerships Jeremy Grant and Naomi.
1 National Strategy for Trusted Identities in Cyberspace Identity in Cyberspace: Improving Trust via Public-Private Partnerships Jeremy Grant Senior Executive.
1 Identity and Transparency ( Bridging the GAPS of Governance Bridging the GAPS of Governance in eGov Initiatives in eGov Initiatives )‏ Badri Sriraman.
Update on Interoperability Roadmap Comments Sections G, F and E Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair March.
TFTM Interim Trust Mark/Listing Approach Paper Analysis of Current Industry Trustmark Programs and GTRI PILOT Approach Discussion Deck TFTM Committee.
Use of Identity Credentials in Public Transit Fare Payment Systems Professional Capacity Building Program T3 Webinar June 29, 2011 Washington Metropolitan.
Elements of Trust Framework for Cyber Identity & Access Services CYBER TRUST FRAMEWORK Service Agreement Trust Framework Provider Identity Providers Credential.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Information Sharing Challenges, Trends and Opportunities
DRAFT – For Discussion Only HHSC IT Governance Executive Briefing Materials DRAFT April 2013.
National Institute of Standards and Technology Information Technology Laboratory 1 USG Cloud Computing Technology Roadmap Next Steps NIST Mission: To promote.
Business and Systems Aligned. Business Empowered. TM Federal Identity Management Handbook May 5, 2005.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
PKI and the U.S. Federal E- Authentication Architecture Peter Alterman, Ph.D. Assistant CIO for e-Authentication National Institutes of Health Internet2.
The Federal Bridge A Brief Overview 1. 4BF Industry Forum April Fed PKI: View from 20,000 km FBCA C4 Common Policy CA (HSPD-12) CertiPath SSPs.
I-CIDM Bridge to Bridge Working Group (BBWG) Purpose and Activities Fed-Ed Meeting The Fairmont Hotel Washington, DC December 14, 2004 Debb Blanchard Enspier.
GFIPM FICAM Status Update GFIPM Delivery Team Meeting November 2011.
Cloud Computing, Policy Management and Standardization Europe Identity Conference 2011 John Sabo, Director Global Government Relations, CA Technologies.
EGovOS Panel Discussion CIO Council Architecture & Infrastructure Committee Subcommittee Co-Chairs March 15, 2004.
Identity Federations and the U.S. E-Authentication Architecture Peter Alterman, Ph.D. Assistant CIO, E-Authentication National Institutes of Health.
1 Federal Identity Management Initiatives Federal Identity Management Initatives David Temoshok Director, Identity Policy and Management GSA Office of.
NSTIC and the Identity Ecosystem Jim Sheire Senior Advisor NSTIC National Program Office, NIST 14 November 2012.
NSDI Strategic Plan Update National Geospatial Advisory Committee Meeting December 11, 2013.
NSDI Strategic Plan Update January 14, NSDI Strategic Plan High-level Timeline 2 Timeframe Activity Dec - Feb Project Start-up – COMPLETED Feb -
Overview of US PKI Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority and Asst. CIO E-Authentication, NIH.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
NATIONAL INCIDENT MANAGEMENT SYSTEM Department of Homeland Security Executive Office of Public Safety.
Realize the Power of Information IJIS Institute Briefing June 24, 2014.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
Higher Education’s Role in the Identity Ecosystem
Privacy, Security, and Identity Management Update
Interoperability of Data Systems Administration for Children & Families Office of Planning, Research & Evaluation Robert (Bob) Garcia Regional Administrator,
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Overview of US PKI Peter Alterman, Ph.D.
HIMSS National Conference New Orleans Convention Center
A Quick Tour of the FIPS 201 Revision
Jeremy Grant Coordinator Better Identity Coalition
Presentation transcript:

ICAM is Executive Branch Implementation of the ICAM Update GTRA Workshop 16 February 2012 ICAM is Executive Branch Implementation of the National Strategy for Trusted Identities in Cyberspace Paul D. Grant Paul.Grant@OSD.Mil Special Assistant, Federated Identity Management and External Partnering Office of the DoD CIO Co-Chair, Identity, Credential and Access Management Sub-Committee, Federal CIO Council Time: https://www.us.army.mil/suite/page/647425 www.IdManagement.Gov

Federal ICAM Goals Fostering effective government-wide identity and access management Enabling trust in online transactions through common identity and access management policies and approaches Aligning federal agencies around common identity and access management practices Reducing the identity and access management burden for individual agencies by fostering common interoperable approaches Ensuring alignment across all identity and access management activities that cross individual agency boundaries Collaborating with external identity management activities through inter-federation to enhance interoperability The Federal ICAM Initiative provides cohesive governance for several programs that were previously governed and managed separately. Unclassified

ICAM Scope Non-Persons Persons Logical Access Physical Access Foundation for Trust and Interoperability in Conducting Electronic Transactions both within the Federal Government and with External Partners Unclassified

FICAM Governance Structure Evolving FICAM Governance Structure

FICAM Key Components in the ICAM Segment Architecture FICAM Service Areas Digital Identity Credentialing Privilege Management Authentication Authorization & Access Cryptography Auditing and Reporting ICAM represents the intersection of digital identities, credentials, and access control into one comprehensive approach Unclassified

FICAM Services Framework Credentialing Issuance Enrollment/Registration Credential Lifecycle Management Sponsorship Self-Service Auditing and Reporting Audit Trail Reports Management Authorization and Access Policy Decision Policy Enforcement Policy Administration Backend Attribute Retrieval Authentication Credential Validation Biometric Validation Session Management Federation Cryptography Encryption/Decryption Digital Signature Key Management Privilege Management Provisioning Account Management Bind/Unbind Privilege Administration Resource Attribute/ Metadata Management Digital Identity Digital Identity Lifecycle Management Identity Proofing Linking/Association Adjudication Vetting Authoritative Attribute Exchange Identity Attribute Discovery Unclassified

DoD ICAM Target State: Dynamic Access Control Resource Management Policy Decision Point (PDP) Enforcement Point (PEP) Environmental Factors (e.g., DEFCON, INFOCON, Etc.) Policy-Based Authorization Services Store Resource Attribute Management Audit Management Authenticate Identity Management Identity & Credential Policy Management Digital Policy Management Credential Management User/Device Attribute Management Unclassified

PIV Implementation OMB Memo M-11-11“Continued Implementation of Homeland Security Presidential Directive (HSPD) 12 Policy for a Common Identification Standard for Federal Employees and Contractors,” was released on 3 Feb 2011. Provides additional implementation requirements around HSPD-12 Also directed alignment with the FICAM Roadmap and Implementation Guidance The DoD-CIO has distributed a memo giving implementation requirements to the DoD Components The deadlines are the same as in M-11-11 This guidance will help move the paradigm of everyone having a PIV card to everyone using the PIV card to improve operations in their everyday business. UNCLASSIFIED

Approved PIV-I Providers Federal Bridge Approved PIV-I Providers:  VeriSign, Inc. (A Symantec Company)   Verizon Business Entrust Operational Research Consultants (ORC) Certipath Approved PIV-I Providers:  CitiBank HID (ActivIdentity) Goal: Large Number of Qualified Providers (NFI) for Partners to have Competitive Choices Unclassified

Recent Purchases of PIV-I Credentials Booz Allen Hamilton California Prison Health Care Services Computer Sciences Corporation ICF international Millennium Challenge Corporation US Senate State of Colorado – purchasing PIV-I and trusts DoD CAC State of Kansas State of Illinois Commonwealth of Virginia – First Responders State of West Virginia – RFP Commonwealth of Pennsylvania – Chester Country issuing PIV-I Unclassified

Now Available to Public Information Assurance Support Environment (IASE) PKI/PKE Hosts the DoD PKI/PKE site: http://iase.disa.mil/pki-pke/interoperability/index.html 3 categories of PKIs Category I – U.S. Federal agency PKIs (i.e. PIV) Category II – Non-Federal Agency PKIs cross certified with the FBCA or PKIs from other PKI Bridges that are cross certified with FBCA Category III – Foreign, Allied, or Coalition Partner PKIs There are currently 5 PIV-I providers approved for Authentication in DoD: HID - ActivIdentity Inc. NFI PKI (August 2011), and VeriSign NFI PKI (April 2011) CitiBank (Jul 2011) Verizon Business NFI PKI (Jul 2011) Entrust (Oct 2011) Unclassified

Identity Federations (PKI Based) Interoperable @ test level; HE Bridge dormant Participants: AstraZeneca Bristol-Myers-Squibb Genzyme GlaxoSmithKline Johnson & Johnson Merck Nektar Organon Pfizer Procter & Gamble Roche Sanofi-Aventis Federal Bridge Certipath (Aero/Def) SAFE (Bio/Pharma) Higher Education Cross Certified: D of Defense D of Justice Gov Printing Office D of State D of Treasury USPS Patent & Trademark Ofc DHS State of Illinois DEA CSOS Credential Svc Providers: VeriSign Verizon Business Entrust ORC DoD ECAs (ORC, IdenTrust, VeriSign) ACES (IdenTrust & ORC) Participants Boeing Lockheed Martin Northrop Grumman Raytheon EADS/Airbus MOD NL Exostar, SITA, ARINC, CitiBank, HID (ActivIdentity) BAE Systems (Exostar) Cross Certified at “Commercial Best Practices” Level Shared Service Providers VeriSign, Inc. Symantec Operational Research Consultants, Inc. The Department of the Treasury Entrust Managed Services U.S. Government Printing Office PKI Bridges Red: IAL-4 DoDI 8520.03 Federal Common Policy Root Current PIV-I issuers cross certified with the Federal Bridge: Approved PIV-I Providers:  VeriSign, Inc. (A Symantec Company) VeriSign Non-Federal SSP PKI in conjunction with the Intercede MyID CMS (version MyID8 SR1 and MyID 9) For more information contact: Nick Piazzola (Senior Director, Government Authentication Solutions) at 443-604-4069 or via email at "nick_piazzola@symantec.com"   Verizon Business For more information contact: Deborah Blanchard (Sr. Product Manager, Public Sector) at 410-871-0836 or via email at "deborah.blanchard@verizonbusiness.com"   Entrust Entrust NFI SSP in conjunction with the XTec AuthentX™ CMS For more information contact: Jeff Brooks, Director, Entrust Federal at 703-391-2658 or via email at "jeff.brooks@entrust.com" or Tom Murphy, Director of Sales, XTec at 703-547-3524 or via email at "tmurphy@xtec.com" Approved PIV-I Bridges:   CertiPath For more information, contact Sergio Smith (Senior Director of Corporate Development Operations) at # 703-793-7871 or via email at "sergio.smith@certipath.com" Fed Bridge Status: http://www.idmanagement.gov/fpkia/crosscert.cfm Certipath Status: http://www.certipath.com/certipath-bridge/piv-i-issuers Unclassified

Approach Trust Framework Providers Adoption Process Adopt technologies in use by industry “Scheme Adoption” Adopt industry Trust Models “Trust Framework Adoption” Approach documents posted on http://www.IDmanagement.gov Unclassified

Trust Framework Provider Adoption Process Federal Identity Initiatives Trust Framework Provider Adoption Process The TFPAP is a process for assessing the efficacy of industry-based trust frameworks to enable an agency to trust an externally-issued electronic identity credential at a known level of assurance, comparable to LOA 1, 2, or non-PKI 3. Industry-based trust frameworks are adopted at specific assurance levels, considering the requirements of NIST SP800-63 Industry-based Trust Framework Providers assess individual identity providers for compliance with the policies, standards, and processes of the trust framework TFPAP addresses basic privacy principles of Opt In, Minimalism, Activity Tracking, Adequate Notice, Non-compulsory, and Termination Unclassified

Non-Federally Issued Credentials and the DoD DoD is accepting approved IAL- 4 (Including PIV-I ) and approved PIV-I providers can be found at: http://iase.disa.mil/pki-pke/index.html DoD is drafting an approval process and implementation guidance for credentials approved through the Federal Trust Framework Process at IAL 1,2, and 3 (non-PKI) An executive summary on DoD’s acceptance of NFI credentials has been created and is being circulated now Trust Framework Provider Unclassified

Approved TFPs and NFIs under the TFPs Adopted Trust Framework Providers Open Identity Exchange (OIX) (http://openidentityexchange.org/) Kantara Initiative (http://kantarainitiative.org/) InCommon (http://www.incommonfederation.org/) SAFE Bio-Pharma (http://www.safe-biopharma.org/) Currently completing the approval process Approved NFI Providers Google – LOA 1 – OIX Equifax – LOA 1 – OIX Paypal – LOA 1 – OIX Verisign – LOA 1 – OIX Wave Systems – LOA 1 – OIX Verizon Business – LOA 1, 2, and 3 – Kantara Initiative Goal: Large Number of Qualified Providers (NFI) for Partners to have Competitive Choices Approved Trust Framework Providers and Identity Providers posted on http://www.IDmanagement.gov Unclassified

National Strategy for Trusted Identities in Cyberspace The National Strategy for Trusted Identities in Cyberspace (NSTIC or Strategy) charts a course for the public and private sectors to collaborate to raise the level of trust associated with the identities of individuals, organizations, networks, services, and devices involved in online transactions. The NSTIC’s vision is that: Individuals and organizations utilize secure, efficient, easy-to-use, and interoperable identity solutions to access online services in a manner that promotes confidence, privacy, choice, and innovation. The NSTIC prescribes 4 Guiding Principles: Identity Solutions will be Privacy-enhancing and Voluntary Identity Solutions will be Secure and Resilient Identity Solutions will be Interoperable Identity Solutions will be Cost-effective and Easy to Use The NSTIC Program Office is coordinating amongst multiple Federal Agencies to increase alignment with FICAM and working with the private sector to drive the future identity ecosystem. Unclassified

NSTIC Work In Progress NSTIC Federal Funding Opportunity NIST is soliciting proposals from eligible proposers to pilot on-line identity solutions that embrace and advance the NSTIC vision NIST anticipates funding five (5) to eight (8) projects for up to two (2) years in the range of approximately $1,250,000 to $2,000,000 per year per project NIST Conducted a public meeting (Proposers’ Conference) in Washington, D.C. on 15 February, 0900 – 1400 Steering Committee/ Governance Recommendations Provides the government’s recommendations on the establishment of an Identity Ecosystem Steering Group that can bring together all NSTIC stakeholders The Steering Group should be established as a new organization that is led by the private sector in conjunction with, but independent of, the federal government. The group should be structured to safeguard the individual An administrative body to support the Steering Group should be initially funded by the government through a competitive two-year grant. Unclassified

Summary & Conclusions Strong Identity, Credential and Access Management Are Foundational to Secure Information Sharing, Secure Collaboration and Cybersecurity Shared Guidance is Improving: Much Room for More Improvement Clear, Consistent, Credible For Ourselves and Our Mission Partners Federal Identity, Credential, and Access Management (ICAM) is providing this consistent approach (with your help) Mission/Business Partners are Fielding Strong Identity Credentials as well as Creating Federations for Sharing & Collaboration Progress Depends on Public-Private Partnering Domestically and Internationally Unclassified