Personal Identity Verification Program

Slides:



Advertisements
Similar presentations
For Joe Broghamer Philip S. Lee May 5, 2005 Implementing PIV Specifications HSPD-12 Workshop.
Advertisements

Cerner Presentation to S&I esMD Workgroup – Industry Scan
FIPS 201 Framework: Special Pubs ,76,78 Jim Dray HSPD-12 Workshop May 4/5, 2005.
Status of U.S. Smart Card Deployment Jim Dray Porvoo 7/ World eID Meeting May 2005.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
1 HSPD-12 Compliance: The Role of Federal PKI Judith Spencer Chair, Federal Identity Credentialing Office of Governmentwide Policy General Services Administration.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
The Federation for Identity and Cross-Credentialing Systems (FiXs) FiXs ® - Federated and Secure Identity Management in Operation Implementing.
PKE PP Mike Henry Jean Petty Entrust CygnaCom Santosh Chokhani.
15June’061 NASA PKI and the Federal Environment 13th Fed-Ed PKI Meeting 15 June ‘06 Presenter: Tice DeYoung.
1 1 A Synopsis of Federal Information Processing Standard (FIPS) 201 for Personal Identity Verification (PIV) of Federal Employees and Contractors Presentation.
Department of Health and Human Services Personal Identity Verification Training APPLICANT.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
Enterprise PACS Best Practices
“Personal Identity Verification (PIV) of Federal Employees and Contractors” October 27, 2005 Homeland Security Presidential Directive 12 (HSPD-12)
Department of Labor HSPD-12
Cryptography Usage in TWIC (Draft v4 8Dec06)
Civil Registry Agency of the Ministry of Justice, Georgia Digital Signature Services in Georgia Mikheil Kapanadze.
National Institute of Standards and Technology 1 NIST Guidance and Standards on System Level Information Security Management Dr. Alicia Clay Deputy Chief.
NIST Special Publication Biometric Data Specification for Personal Identity Verification March 3, 2006 Update.
Federal Information Processing Standard (FIPS) 201, Personal Identity Verification for Federal Employees and Contractors Tim Polk May.
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
1 1 PAIIWG++ Meeting #1 William I. MacGregor National Institute of Standards and Technology 16 Sep 2008.
Office of the Chief Information Officer EFCOG Annual Meeting Fred Catoe (IM-32) U.S. Department of Energy.
PIV Data Model Testing Ketan Mehta March 3, 2006.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
E-Authentication: What Technologies Are Effective? Donna F Dodson April 21, 2008.
1 Implementation of Homeland Security Presidential Directive 12 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide FED/ED.
I DENTITY M ANAGEMENT Joe Braceland Mount Airey Group, Inc.
NASA Personal Identity Verification (PIV) NASA Personal Identity Verification (PIV) High Level System Overview Tice F. DeYoung, PhD 14th Fed/Ed Workshop.
Complying With The Federal Information Security Act (FISMA)
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
Chapter 10: Authentication Guide to Computer Network Security.
Federal CIO Council Information Security and Identity Management Committee IDManagement.gov FICAM Testing Program and Approved Products List (APL) Overview.
Biometric Access Control in TWIC Read Hardware and Card Application Specification Roger Roehr.
HSPD-12 and FIPS-201 Overview v Learning Objectives At the end of this course, you will be able to: Describe Homeland Security Presidential Directive.
Special Publication : Interfaces for Personal Identity Verification Jim Dray NIST NPIVP Workshop March 3, 2006.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Key Management Workshop November 1-2, Cryptographic Algorithms, Keys, and other Keying Material  Approved cryptographic algorithms  Security.
1 1 Update: ISO/IEC Identification Cards - Integrated circuit cards programming interfaces Teresa Schwarzhoff, U.S. Department of Commerce Porvoo-12:
Business and Systems Aligned. Business Empowered. TM Federal Identity Management Handbook May 5, 2005.
The Value of Common Criteria Evaluations Stuart Katzke, Ph.D. Senior Research Scientist National Institute of Standards & Technology 100 Bureau Drive;
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
HSPD-12 Identity Management Initiative Carol Bales Senior Policy Analyst United States Office of Management and Budget North American Day 2006.
Page 1 ©1999 InfoGard Laboratories, Inc Centre for Applied Cryptographic Research workshop, Nov. 8, 1999 Third party evaluations of CA cryptographic implementations.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
Credentialing in Higher Education Michael R Gettes Duke University CAMP, June 2005, Denver Michael R Gettes Duke University
1 Federal Identity Management Initiatives Federal Identity Management Initatives David Temoshok Director, Identity Policy and Management GSA Office of.
NIST HIPAA Security Rule Toolkit Kevin Stine Computer Security Division Information Technology Laboratory National Institute of Standards and Technology.
11/18/2003 Smart Card Authentication Mechanism Tim W. Baldridge, CISSP Marshall Space Flight Center Office of the Chief Information Officer.
Security Systems | ST/SRM3-NA | 4/6/2016 © 2016 Robert Bosch LLC and affiliates. All rights reserved. 1 Ensure data security in a hyper-connected world.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
The Federal Information Processing Standards (FIPS) Encryption Suite Sean Smith COSC
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
1 NPIVP Workshop March 3, 2006 Red Auditorium, NIST, Gaithersburg PIV Test Guidelines Revisions Dr. R. Chandramouli (Mouli) (Director NPIVP)
E-Authentication Guidance Jeanette Thornton, Office of Management and Budget “Getting to Green with E-Authentication” February 3, 2004 Executive Session.
Ketan Mehta March 3, 2006 PIV Data Model Testing Ketan Mehta March 3, 2006.
Computer Security Division Information Technology Laboratory
NIST Computer Security Activities
Personal Identity Verification Program
NIST Computer Security Activities
NIST Computer Security Activities
NIST Computer Security Activities
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
E-Authentication: What Technologies Are Effective?
NIST Computer Security Activities
Public Key Infrastructure
NASA Personal Identity Verification (PIV) High Level System Overview Tice F. DeYoung, PhD 14th Fed/Ed Workshop December 14, 2006.
A Quick Tour of the FIPS 201 Revision
Presentation transcript:

Personal Identity Verification Program PIV Personal Identity Verification Program National Institute of Standards and Technology

Presidential Policy Driver Homeland Security Presidential Directive 12 HSPD-12: Policy for a Common Identification Standard for Federal Employees and Contractors (8/27/04) http://www.whitehouse.gov/news/releases/2004/08/20040827-8.html

General Objectives Common, secure, reliable identification for government employees and contractors Visual and electronic identity verification Government-wide - Technical interoperability - Common basis for reciprocity

Satisfying HSPD-12 Requirements Enhance security Increase government efficiency Reduce identity fraud Protect personal privacy Eliminate variations in quality and security of forms of personal identification

Current PIV Program Challenges Tight schedule mandated by EOP Unfunded nature of mandate Transition issues (e.g., challenges faced by agencies with installed bases when making changes to those bases or to existing development plans) Interoperability consequences from reluctance to accept precisely defined card interface (aka hard card edge) Biometric interoperability dependence on common accuracy standard Weigand interface dependency on physical access control environment Imprecise nature of current contactless technical standards

Current PIV Program Challenges (Continued) Wide variety of logical access control application interfaces Varying levels of technical understanding and infrastructure among agencies Foreign ownership or controlling interest in smart card vendor (deemed export issues) Conformance test infrastructure support requirements (admin & technical) Need for multiple NPIVP-certified products in very near-term Privacy concerns (e.g., identity databases, contactless interfaces) Need for stable standards vs requirement to revisit FIPS 201 in FY 2006

Federal Information Processing Standards (FIPS) Mandatory FISMA removed the waiver option In recent history, only two waivers had ever officially been requested and approved Technology advancements have contributed to the removal of waivers as more product developers are implementing the standards, increasing availability of compliant products especially in the area of encryption

Special Publications (800 Series) Security and interoperability publications Used to support and complement FIPS Prior to 2005, officially viewed as guidance FISMA reporting instructions for FY2005 called for agency compliance with NIST standards and guidance

HSPD #12 Key PIV Documents HSPD-12, Policy for a Common Identification Standard for Federal Employees and Contractors OMB M-05-24, Implementation of HSPD 12 - Policy for a Common Identification Standard for Federal Employees and Contractors FIPS 201, Personal Identity Verification for Federal Employees and Contractors SP 800-73, Interfaces for Personal Identity Verification SP 800-76, Biometric Data Specification for Personal Identity Verification SP 800-78, Cryptographic Algorithms and Key Sizes for Personal Identity Verification SP 800-79, Guidelines for the Certification and Accreditation of PIV Card Issuing Organizations SP 800-85, PIV Middleware and PIV Card Application Conformance Test Guidelines (Revision to permit transitional and end-point issuance system conformance certification) NISTIR 7284, Personal Identity Verification Card Management Report

Functional Components FIPS 201 REQUIREMENTS Functional Components PIV Front-End Subsystem — PIV Card, card and biometric readers, and personal identification number (PIN) input device. The PIV cardholder interacts with these components to gain physical or logical access to the desired Federal resource. PIV Card Issuance and Management Subsystem — the components responsible for identity proofing and registration, card and key issuance and management, and the various repositories and services (e.g., public key infrastructure [PKI] directory, certificate status servers) required as part of the verification infrastructure. Access Control Subsystem — the physical and logical access control systems, the protected resources, and the authorization data.

FIPS 201: Personal Identity Verification (PIV) Issued February 25, 2005 Mandatory Prerequisites for Personal Identity Verification (PIV) Card Issuance Mandatory and Optional PIV Card Visual Data Mandatory and Optional PIV Card Electromagnetic Elements Mandatory and Optional PIV Electronically Stored Data Minimal Card Information Available for “Free Read” Large population – affects every Federal government employee and eligible contractors (~ 10M+)

FIPS 201 REQUIREMENTS PIV Card Visual Data Mandatory Name Employee Affiliation Card Expiration Date Card Serial Number (Unique to Issuer) Issuer Identification Optional Card Holder’s Written Signature Pay Grade Rank Agency Name and/or Department Agency Seal Issue Date Information for Returning Lost Card Color codes Federal Emergency Official Designation

FIPS 201 REQUIREMENTS PIV Card Requirements Mandatory Integrated Circuit to Store/Process Data Optional Magnetic Stripe PDF 417 Bar Code Linear 3 of 9 Bar Code Interfaces: Contact ( ISO/IEC 7816) Contactless (ISO/IEC 14443)

FIPS 201 REQUIREMENTS PIV Electronically Stored Data Mandatory: PIN (used to prove the identity of the cardholder to the card) Cardholder Unique Identifier (CHUID) PIV Authentication Data (asymmetric key pair and corresponding PKI certificate) Two biometric fingerprints Optional: An asymmetric key pair and corresponding certificate for digital signatures An asymmetric key pair and corresponding certificate for key management Asymmetric or symmetric card authentication keys for supporting additional physical access applications Symmetric key(s) associated with the card management system

FIPS 201 REQUIREMENTS Authentication Mechanisms Three Identity Authentication Assurance levels Authentication using PIV Visual Credentials Authentication using the PIV CHUID Authentication using PIV Biometric Authentication using PIV asymmetric Cryptography (PKI)

FIPS 201 REQUIREMENTS PIV Card Management FIPS201 specifies: PIV Card Issuance PIV Card Maintenance PIV Card Renewal Card re-issuance Card PIN reset Card termination

Special Publication 800-73 Interfaces for Personal Identity Verification SP 800-73 specifies: PIV Data Model (Mandatory and Optional Data Elements) Optional Transition Card Interfaces (APIs, Object Naming Structure and Mapping Mechanism, Data Formats and Structures, Card Commands) Mandatory End-Point Card Interfaces Card Re-issuance Data Objects Data Types Client Application Programming Interfaces PIV Card Application Card Command Interface

Template specification is the INCITS 378:2004 standard. Special Publication 800-76 Biometric Data Specification for Personal Identity Verification SP 800-76 specifies: Template specification is the INCITS 378:2004 standard. 800-76 template specification is an application profile of INCITS 378 800-76 template specification restricts the options of INCITS 378 : No extended data No proprietary data Up to three views for each finger. Restriction of minutia type (bifurcation, ridge ending) Face specification is INCITS 385 for image acquisition and storage CBEFF PIV Format is specified with definitive data types for its elements and the FASC-N included per 800-73

Special Publication 800-78 Cryptographic Algorithms and Key Sizes for Personal Identity Verification SP 800-78 specifies: Mandatory PIV Authentication Data (asymmetric key pair and corresponding PKI certificate) Optional Keys Asymmetric key pair and corresponding certificate for digital signatures Asymmetric key pair and corresponding certificate for key management Asymmetric or symmetric card authentication keys for supporting additional physical access applications Cryptographic Algorithms and Key Sizes Authentication Information Stored on the PIV Card

SP 800-79 specifies: Certification & Accreditation Fundamentals Special Publication 800-79 Guidelines for the Certification and Accreditation of PIV Card Issuing Organizations SP 800-79 specifies: Certification & Accreditation Fundamentals C&A Phases (Initiation, Certification, Accreditation, Monitoring) Accreditation Decisions (Authorization, Interim Authorization, Denial) Accreditation Package and Supporting Documentation Attributes of PIV Card Issuers (PCI) and Assessment Methods PCI Functions and Operations (Plan, Document, Implement, Operate) PIV Services and Operations Applicant ID Proofing and Registration PIV Card Issuance PIV Card Life Cycle Management

Additional PIV Tools and Guidelines SP 800-73 Reference Implementation (Mandatory SP 800-73 elements) SP 800-87 Codes for the Identification of Federal and Federally-Assisted Organizations (Replaces Withdrawn FIPS 95-2) NPIVP Laboratory Designation for PIV Conformance Testing PIV Website http://csrc.nist.gov

SP 800-85 PIV Middleware and PIV Card Application Conformance Test Guidelines Test Plan, Test Set-up, and Test System Configuration Test Suite Elements (Middleware Tests, Card Command Interface Tests and Data Object Representation Tests) Derived Test Requirements Test Assertions Test and Compliance Documentation Acceptance Criteria Test and Compliance Process Being Revised to Separate Card/Middleware Interface and Data Object Representation Volumes (Phase II)

HSPD #12 PIV Document Relationships (NIST) SP 800-85 (NIST) HSPD 12 (Presidential) 4/05 10/05 Policy SP 800-76 (NIST) 8/04 (2/06) SP 800-85A (NIST) M-05-24 (Director OMB) FIPS 201 (Secretary of Commerce) SP 800-78 (NIST) (2/06) 2/05 4/05 8/05 SP 800-85B (NIST) SP 800-79 (NIST) FIPS 201-1 (Secretary of Commerce) 7/05 (2/06) (2/06) SP 800-87 (NIST) 10/05 Driver Date Revise ‘06 Standards Implementation Guidelines Test Guidelines Dynamic

Cryptographic Standards and Guidelines SP 800-21-1 Implementing Cryptography in the Federal Government General FIPS 140-2 Security Requirements for Cryptographic Modules SP 800-57 Recommendation for Key Management SP 800-67 TDEA FIPS 186-2 DSS FIPS 196 PKI Entity Authentication FIPS 197 AES FIPS 198 Keyed-hash Message Authentication Code Testing Draft SP 800-56 Pair-Wise Key Management Using Discrete Logarithm Cryptography SP 800-25 Federal Agency Use of Public Key Technology for Digital Signatures and Authentication SP 800-38A-C Recommendations for Block Cipher Modes Of Operation SP 800-63 Electronic Authentication SP 800-32 Introduction to Public Key Technology and the Federal PKI FIPS 180-2 Secure Hash Standard ANSI X9.31 RSA Digital Signatures Draft SP 800-90 Deterministic Random Number Generation ANSI X9.62 Elliptic Curve Digital Signature SP 800-15 Minimum Interoperability Specification for PKI Components Draft Document Digital Signatures and Authentication Codes ANSI X9.82 Random Number Generation Referenced In Key PIV Document(s) Key Management Algorithms

C&A Standards and Guidelines SP 800-37 Guide for the Security Certification and Accreditation of Federal Information Systems FIPS 199 Standards for Security Categorization of Federal Information and Federal Information Systems FIPS 200 Minimum Security Requirements for Federal Information and Information Systems SP 800-18 Rev. 1 Guide for Developing Security Plans for Federal Information Systems Security Planning SP 800-26 Security Self- Assessment Guide for Information Technology Systems SP 800-59 Guideline for Identifying an Information System as a National Security System SP 800-53 Recommended Security Controls for Federal Information Systems SP 800-26 Rev.1 Guide for Information System Security Assessments and System Reporting Form SP 800-60 Guide for Mapping Types of Information and Information Systems to Security Categories SP 800-53A Guide for Assessing the Security Controls in Federal Information Systems Draft Document Referenced In Key PIV Document(s) Security Assessment, Certification & Accreditation Security Controls SP 800-30 Risk Management Guide for Information Technology Systems Referenced and Being Revised Security Categorization

Conformance Testing NIST PIV Program (NPIVP) Atlan Laboratories, McLean, VA atsec information security corporation, Austin, TX BKP Security Labs, Santa Clara, CA USA BT Cryptographic Module Testing, Fleet, Hampshire, CEAL: a CygnaCom Solutions, McLean, VA COACT Inc. CAFÉ Laboratory, Columbia, MD DOMUS IT Security Laboratory, Ontario, Canada EWA – Canada IT Security Evaluation & Test, Ottawa, Ontario, Canada ICSA Labs, a division of Cybertrust, Inc., Mechanicsburg, PA InfoGard Laboratories, Inc., San Luis Obispo, CA LogicaCMG FIPS Laboratory, Leatherhead, Surrey UK NPIVP CMVP Conformance Through Testing

CRADA: PIV Demonstration Card Issuance & Management Front-End Components Access Control Components System Integrators Datacard Bamboo Technologies ADT BearingPoint Entrust BQT Technologies BridgePoint Systems Centech Group Fargo Electronics G&D Cogent Systems Lockheed Martin Precise Biometrics Gemplus Electrosoft Northrop Grumman Probaris Technologies Lowry Computer HID Oracle RSA Security Middleware Associates Hirsch Electronics SAIC Ultra Electronics Oberthur Card Systems Lenel Systems SETECS Omnikey Novell Viisage Technologies SCM Microsystems Quintron Systems XTec Secure Network Systems Veridt Sensormatic

Thank you! William C. Barker National Institute of Standards and Technology 301-975-8443 wbarker@nist.gov http://csrc@nist.gov