Your Electronic Key to the Future Personnel Transformation…The Way Ahead Keane, John M. Army Active Duty Expiration Date 2003OCT22 Pay Grade O10 Geneva.

Slides:



Advertisements
Similar presentations
HiPath SIcurity Card Manager Smartcard Management and Personalization System Sales Presentation.
Advertisements

Smart Cards Our Inevitable Future Mark Shippy. What are smart cards? Credit card sized plastic card with an embedded chip. Credit card sized plastic card.
Gareth Ellis Senior Solutions Consultant Session 5a Key and PIN Management.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
1 1 A Synopsis of Federal Information Processing Standard (FIPS) 201 for Personal Identity Verification (PIV) of Federal Employees and Contractors Presentation.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
European Electronic Identity Practices Country Update of …………… Speaker: Date:
1 WebTrust for Certification Authorities (CAs) Overview October 2011 WebTrust for Certification Authorities (CAs) Overview October 2011 Presentation based.
Ramanuj Banerjee Director Technical Consultancy. ActivCard, Inc. Headquartered in Fremont, CA Headquartered in Fremont, CA Over 12 years of experience.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
United States DoD Public Key Infrastructure: Deploying the PKI Token
“Personal Identity Verification (PIV) of Federal Employees and Contractors” October 27, 2005 Homeland Security Presidential Directive 12 (HSPD-12)
Department of Labor HSPD-12
Office of Military Personnel DEERS/RAPIDS CCGNRC Brief CWO Joey Brown Military Compensation (CG-1222)
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
Department of Defense Biometrics Management Office 1 Department of Defense (DoD) Common Access Card (CAC) and Biometrics Integration (CBI) Overview
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
Increased Security, while protecting Privacy ? True or False ? Christer Bergman, President and CEO, Precise Biometrics.
Federal Information Processing Standard (FIPS) 201, Personal Identity Verification for Federal Employees and Contractors Tim Polk May.
Office of the Chief Information Officer EFCOG Annual Meeting Fred Catoe (IM-32) U.S. Department of Energy.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
UNCLASS DoD Public Key Infrastructure LCDR Tom Winnenberg DISA API1 Chief Engineer 25 April 2002.
Chapter 19 Security.
SMT Proprietary and Confidential
Certificate and Key Storage Tokens and Software
Network Centric Enterprise Public Trust Information and Navy Enterprise Resource Planning Presented to the Small Business and Industry Outreach Initiative.
NASA Personal Identity Verification (PIV) NASA Personal Identity Verification (PIV) High Level System Overview Tice F. DeYoung, PhD 14th Fed/Ed Workshop.
National Smartcard Project Work Package 8 – Security Issues Report.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
Confidential Crisis Management Innovations, LLC. CMI CrisisPad TM Product Overview Copyright © 2011, Crisis Management Innovations, LLC. All Rights Reserved.
Chapter 19 Security Integrity Security Control –computer-based –non-computer-based PC security DBMS and Web security Risk Analysis Data protection and.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Transforming Army Management of Individual Chemical Protective Equipment Mobility Inventory Control and Accountability System Used in Individual Protective.
Account Authority Digital Signature AADS Lynn Wheeler First Data Corporation
Smart Card Application. Smart-card is a plastic card, the size of a standard credit card, with one or several integrated circuits (chips) capable to store.
Deploying PKI Inside Microsoft The experience of Microsoft in deploying its own corporate PKI Published: December 2003.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Lifecycle Workstation Operator Training: PIN Reset and Certificate Update Updated April 17, 2012.
5 March 2012 Full-time Support Review of the Reserve Components Phase 1: An analysis of and report for Congress on the Military Technician (MilTech) Program.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
Combined Federal Campaign myPay Module Update Summer-Fall 2015 Anthony DeCristofaro Division Chief, Communications & Engagement Office WHS-DoD.
1 Personnel Security 2007 Data Protection Seminar TMA Privacy Office HEALTH AFFAIRS TRICARE Management Activity.
NAPHSIS REAL ID Overview June 6, 2007 In support of this key requirement,
Configuring Directory Certificate Services Lesson 13.
U.S. General Services Administration Federal Technology Service November 9, 1999 Judith Spencer Director, Center for Governmentwide Security Office of.
Federal Electronic Commerce Program Office Tony Trenkle General Services Administration October 28, 1998.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
1 United States Army Logistics Integration Agency Automatic Identification Technology Radio Frequency Technology Overview Overview Briefing 24 April 2001.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Unit 3: Identifying and Safeguarding Vital Records Unit Introduction and Overview Unit objective:  Describe the elements of an effective vital records.
Network Security & Accounting
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Presented by: Defense Manpower Data Center Access Card Office
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Final Review Systems Analysis and Design in a Changing World, 4th Edition 1 Final Review u Chapters 1-6, 8-10, 13, 14, 15 u Multiple choice, short answer,
Identity and Access Management
How many people have heard of DANTES?
Presentation to Project Certification Committee, DoIT August 24, 2008
NASA Personal Identity Verification (PIV) High Level System Overview Tice F. DeYoung, PhD 14th Fed/Ed Workshop December 14, 2006.
Introduction to the PACS Security
Presentation transcript:

Your Electronic Key to the Future Personnel Transformation…The Way Ahead Keane, John M. Army Active Duty Expiration Date 2003OCT22 Pay Grade O10 Geneva Conventions Identification Card SAMPLE Common Access Card Update

Your Electronic Key to the Future Personnel Transformation…The Way Ahead Purpose To provide an overview and information update of the Common Access Card (CAC).

Your Electronic Key to the Future Personnel Transformation…The Way Ahead Definitions Common Access Card (CAC):Common Access Card (CAC): A mandated initiative that will use smart card technology to contain the following business applications; Personnel Identification, Building Access, and Network Access. Smart Card (SC):Smart Card (SC): A credit card-sized device that can contain multiple technologies and individualized databases. The types of re-programmable and static technology normally found on a smart card include: an integrated chip, a magnetic stripe, and bar codes. The topology of the card can also contain printed information and images such as photos, text, and fingerprints.

Your Electronic Key to the Future Personnel Transformation…The Way Ahead Definitions Public-Key Infrastructure (PKI):Public-Key Infrastructure (PKI): The people, policy, procedures, hardware/software, and facilities necessary to enable public key encryption, and digital signatures. Enhances information security and protects privacy. Business Process Reengineering (BPR):Business Process Reengineering (BPR): A structured analytical approach to examine core business processes and identify issues and improvement opportunities to remove non-value added activities, improve cycle-time, and lower process costs. Functional Economic Analysis (FEA):Functional Economic Analysis (FEA): A structured proposal that includes an analysis of functional process needs or problems, proposed solutions, assumptions and constraints, alternatives, life-cycle costs, benefits and/or cost analysis, and investment risk analysis.

Your Electronic Key to the Future Personnel Transformation…The Way Ahead A Credit Card-Sized Device That May Hold: Integrated Circuit Chip (ICC) Magnetic Stripe Bar Codes Photo Identification Encryption and Authentication Biometrics Non-Contact Radio Frequency Transmitter Keane, John M. C A C C ommon A ccess C ard

Your Electronic Key to the Future Personnel Transformation…The Way Ahead Personnel Identification Replaces the “ID” Card Personnel Identification Replaces the “ID” Card Building Access Systems & Network Access Systems & Network Access with PKI Application Provides: - Digital Signature - Data Encryption Issue Date 1999SEP03 Geneva Conventions Identification Card Army Active Duty Parker IV, Christopher J. Rank LTCOL Pay Grade O5 Expiration Date 2002SEP01 Armed Forces of the United States SAMPLE The CAC Provides...

Your Electronic Key to the Future Personnel Transformation…The Way Ahead Geneva Conv. Cat. VI Date of Birth 19XXJAN00 Social Security Number DD Form XXX XXX 2000 Property of the U.S. Government Integrated Circuit Chip Location Army anticipates a 32K Chip. PKI Certificates will take 9.9K to 12.9K of the Chip. Future residual space (7K or greater) for other functional and service applications. Barcode for Personnel Data Issue Date 2000OCT23 Keane, John M. Army Active Duty Expiration Date 2003OCT22 Pay Grade O10 Armed Forces of the United States Rank GEN Geneva Conventions Identification Card SAMPLE Barcode for Functional Applications Current Uses Include: Army Food Management Information System (AFMIS) -- 3 sites USAREUR (Army/USAF) -- Motor Vehicle Registration workstations USMC Flightline Access Control System -- 8 sites USAF Military Immunization Tracking System workstations Little Creek Naval Station VOQ/BOQ Check-in -- 1 site SAMPLE Medical Blood Type: O+ Organ Donor: Yes Medical Data Shows the Blood Type and Organ Donor Status. Magnetic Stripe Proposed use is for building and facility Access. Common Access Card Draft Layout

Your Electronic Key to the Future Personnel Transformation…The Way Ahead Where We Are Now Policy Memorandums and Execution Plans state: –ID Card Sections will issue CACs (DCSPER) –PKI maintenance conducted by DOIM (DISC4) –Building access procedures (DCSOPS) Beta Testing Phase I (DRPO) –DOD operationally tests the CAC Software –Started at Fort Eustis 15 Feb 01 –Heidelberg (28 Feb 01) / Korea (02 Mar 01) –Personnel identification functions Beta Testing Phase II (DISC4/SET-D) –Test CAC-PKI applications –Ability/impact to operate in day to day environment –Start dates projected for Apr-Jun 01 at Fort Eustis, Heidelberg, Mannheim DRPO/ACO developing an implementation/fielding schedule

Your Electronic Key to the Future Personnel Transformation…The Way Ahead Who Issues the CAC? DEERS/RAPIDS stations will be upgraded to issue the CACs with PKI certificates. There are approximately 305 DEERS/RAPIDS sites throughout all components of the Army.

Your Electronic Key to the Future Personnel Transformation…The Way Ahead Who Performs PKI Maintenance? Follow-on maintenance to the “chip” (i.e., changes to PKI certificates, , PIN changes, PIN recovery, etc.) will be performed at a separate workstation by the DOIM or equivalent. Minimizes workload on ID Card Section

Your Electronic Key to the Future Personnel Transformation…The Way Ahead CAC Issuance Process Basic Implementation, Augmented Infrastructure, Central Processing Facility LRA/VO issues DEERS/RAPIDS ID card and grants network access Receive PKI-enabled CAC Issue Date 1999SEP03 Parker IV, Christopher J. Marine Corps Active Duty Expiration Date 2003SEP01 Pay Grade O5 Armed Forces of the United States Rank LTCOL Geneva Conventions Identification Card Installation or building access facility grants Encode magnetic stripe DOIM CAC/PKI Maintenance Central Processing Facility Serves a portion of the population

Your Electronic Key to the Future Personnel Transformation…The Way Ahead CAC - “Key” to Personnel Redesign Bottom Line CAC’s PKI token will be the “key” for secure access to personnel data and web-based applications Provides the means to electronically “sign” electronic transactions The CAC is an enabler, not just a data carrier/repository Supports transition to customer service in a virtual environment

Your Electronic Key to the Future Personnel Transformation…The Way Ahead Summary CAC Beta Test Execution plans and policy documents to be finalized Implementation: –Define CPF –Card issuance with PKI certificates –DRPO/ACO developing fielding/training schedule Mandate for all Active Army soldiers, DOD civilians, selected Reserve Component soldiers, and selected contractors to have CAC by October 2002

Your Electronic Key to the Future Personnel Transformation…The Way Ahead For More Information