Department of Defense Biometrics Management Office 1 Department of Defense (DoD) Common Access Card (CAC) and Biometrics Integration (CBI) Overview

Slides:



Advertisements
Similar presentations
Mobile Devices in the DoD
Advertisements

Research, Development, and Evaluation Commission Department of Information Management Research, Development, and Evaluation Commission The Executive Yuan,
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
BENEFITS OF SUCCESSFUL IT MODERNIZATION
SPD1 Improving Security and Access to Network with Smart Badge Eril Pasaribu CISA,CISSP Security Consultant.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
Continuous Process Improvement (CPI) Program Update Colonel Ric Sherman, United States Army Office of the Assistant Deputy Under Secretary of Defense for.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
United States DoD Public Key Infrastructure: Deploying the PKI Token
Department of Labor HSPD-12
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
Your Electronic Key to the Future Personnel Transformation…The Way Ahead Keane, John M. Army Active Duty Expiration Date 2003OCT22 Pay Grade O10 Geneva.
UNCLASSIFIED 1 Enterprise Architecture Career Path Working Group Walt Okon Senior Architect Engineer Architecture & Infrastructure Directorate Office of.
Increased Security, while protecting Privacy ? True or False ? Christer Bergman, President and CEO, Precise Biometrics.
Password?. Project CLASP: Common Login and Access rights across Services Plan
Connecting People With Information DoD Net-Centric Services Strategy Frank Petroski October 31, 2006.
Security Controls – What Works
Connecting People With Information Conclusions DoD Net-Centric Data Strategy (DS) and Community of Interest (COI) Training For further information .
Password?. Project CLASP: Common Login and Access rights across Services Plan
Information Security Policies and Standards
© Southampton City Council Sean Dawtry – Southampton City Council Implementing a PKI The Southampton Pathfinder for Smart Cards in public services.
Biometrics in New Zealand Passport issuing Border crossing System and information access Building access.
Federal Information Processing Standard (FIPS) 201, Personal Identity Verification for Federal Employees and Contractors Tim Polk May.
BioSec Biometrics & Security IST © 2005 BIOSEC Consortium 1February 2005 BioSec Biometrics & Security Orestes SanchezBioSec Coordinator Telefónica.
0 AT&L Service-oriented Architecture (SOA) Demonstration Briefing Presented: DAMIR Conference - October 30 and 31, 2007 Gary R. Bliss Acquisition Resource.
Office of the Chief Information Officer EFCOG Annual Meeting Fred Catoe (IM-32) U.S. Department of Energy.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Polytechnic University of Tirana Faculty of Information Technology Computer Engineering Department Identification of on-line users and Digital Signature.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Army Doctrine Publication (ADP) 3-37; and Army
NASA Personal Identity Verification (PIV) NASA Personal Identity Verification (PIV) High Level System Overview Tice F. DeYoung, PhD 14th Fed/Ed Workshop.
A Combat Support Agency Defense Information Systems Agency UNCLASSIFIED Program Executive Office GIG Enterprise Services (PEO-GES) 101 Briefing As of October.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Overview of Access and Information Protection
Military Open Simulator Enterprise Strategy
Transforming Army Management of Individual Chemical Protective Equipment Mobility Inventory Control and Accountability System Used in Individual Protective.
Deploying PKI Inside Microsoft The experience of Microsoft in deploying its own corporate PKI Published: December 2003.
DoD Acquisition Domain (Sourcing) (DADS) Analysis of Alternatives (AoA) E-Business/SPS Joint Users’ Conference November 15-19, 2004 Houston, TX.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Unit 8:COOP Plan and Procedures  Explain purpose of a COOP plan  Propose an outline for a COOP plan  Identify procedures that can effectively support.
Enterprise User Enabling Warfighter Capability
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
U.S. Department of Agriculture eGovernment Program August 14, 2003 eAuthentication Agency Application Pre-Design Meeting eGovernment Program.
Evaluation and Testbed Development Bhavani Thuraisingham The University of Texas at Dallas Jim Massaro and Ravi Sandhu.
Army Net-Centric Data Strategy Center Of Excellence (ANCDS) Army Data Harmonization and Integration Working Group (ADHIWG) Sever Ciorlian ANCDS Team Lead.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Adoption of Commercial EDI Standards for DoD Logistics Business Transactions Integrated Product Team (EDI IPT) – Expanded DEFENSE LOGISTICS AGENCY Report.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
XMSF and Command & Control - GIG, XBML/C4I Testbed, XDV, XMSF Profiles Dr. Andreas Tolk Old Dominion University (ODU) - Virginia Modeling Analysis and.
Second Generation Electronic Filing Specifications Legal XML Court Filing Committee April 26, 2004.
Defense Information Systems Agency A Combat Support Agency E3 Engineering Division 13 December 2011 Defense Information Systems Agency A Combat Support.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
Public Works and Government Services Canada Travaux publics et Services gouvernementaux Canada Brenda Watkins Director Policy and Business Strategies Information.
Fax: (703) DoD BIOMETRICS PROGRAM DoD Biometrics Management Office Phone: (703)
MPE – Enabling ALL to securely SEE, DECIDE, ACT MPE - Highlights  Establish Core Implementation Working Group  Build Joining, Membership, and Exiting.
Securing SSH Admin Access
Camden County Travel Management Coordination Center Project Update Camden County WIB Board Meeting – March 26, 2008.
JNTC Joint Management Office
Cyber in the Cloud & Network Enabling Offense and Defense Mark Odell April 28, 2015.
9/4/2003 Preparing Warriors Individually through Development and Distribution of Joint Knowledge 1 Joint Knowledge Development and Distribution Capability.
Presented by: Defense Manpower Data Center Access Card Office
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
XMSF and Command & Control - GIG, XBML/C4I Testbed, XDV, XMSF Profiles
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
HIMSS National Conference New Orleans Convention Center
NASA Personal Identity Verification (PIV) High Level System Overview Tice F. DeYoung, PhD 14th Fed/Ed Workshop December 14, 2006.
Steering Committee Brief to the DoD M&S Conference 2008
Presentation transcript:

Department of Defense Biometrics Management Office 1 Department of Defense (DoD) Common Access Card (CAC) and Biometrics Integration (CBI) Overview Phone: (703) Fax: (703) DSN: Min Chong ISS Program Manager Department of Defense Biometrics Management Office Spring 2004 ADP IT and Acquisition Training Conference April 2004

Department of Defense Biometrics Management Office 2 To provide an overview of the CAC-Biometric Working Group (CAC-BWG) efforts in pursuing the inclusion of biometrics technology with the CAC Purpose

Department of Defense Biometrics Management Office 3 Agenda 1. Background 2. CAC-Biometrics Technology Demonstrations 3. Road Ahead

Department of Defense Biometrics Management Office 4 Biometrics Biometrics is the automated recognition of a person using distinguishing characteristics 1. Background

Department of Defense Biometrics Management Office 5 Biometrics and DoD Changes in today’s military…  Global operations  Distributed working & warfighting scenarios  Increased reliance on information technology  Dependence on extensive electronic situational awareness in the battle space …require a paradigm shift in identity assurance.  Connect identity to biometrics  Link actions with identity  Employ a “human-centric” approach

Department of Defense Biometrics Management Office 6 Biometrics Addresses the Gap Claimed Identity  “Official” Documents  Tokens & Keys  PINs & Passwords Status Quo 100% Identity Management  Biometrics  Enterprise Solution Objective Deficiencies in  Identity Authentication  Access Control The Gap

Department of Defense Biometrics Management Office 7 Personnel Identification Replaces the “ID” Card Personnel Identification Replaces the “ID” Card Building Access Systems & Network Access with PKI Application Provides: - Digital Signature - Data Encryption Issue Date 1999SEP03 Geneva Conventions Identification Card Army Active Duty Parker IV, Christopher J. Rank LTCOL Pay Grade O5 Expiration Date 2002SEP01 Armed Forces of the United States SAMPLE Common Access Card CAC is a Smart Card that serves as…

Department of Defense Biometrics Management Office 8 1. Coordinate and analyze requirements for CAC-Biometrics. 2. Seek commonality and interoperability in applications. 3. Assist combatant commands, Services, Agencies, and Functional Community Panels. 4. Evaluate biometrics alternatives. 5. Develop and recommend a CAC-Biometrics integration solution. 6. Recommend related CAC-biometrics hardware and software. 7. Recommend related CAC-biometrics policy and legal Issues. 8. Develop the business case. 9. Develop the roadmap for successful integration of biometrics with the CAC. “ CAC-BWG Objectives” Smart Card Senior Coordinating Group (SCSCG) Establishes the CAC-Biometrics Working Group (CAC-BWG) Identity Management Senior Coordinating Group (26 Sept 2001)

Department of Defense Biometrics Management Office 9  The strategy to achieve a DoD Enterprise CAC- Biometrics solution is a two-phased approach –Phase I: Technology Demonstrations –Phase II: Demonstrate suitable Enterprise Solution  The three Technology Demonstration Concepts are: 1.CAC-A: Biometrics/PIN 2.CAC-B: Template on CAC Application 3.CAC-C: Contactless with CAC Inclusion of Biometrics Technology 2. CAC-Biometrics TD

Department of Defense Biometrics Management Office 10  Four scenario proof-of- concept: 1.Store on Server-Match on Server 2.Store on PC-Match on PC 3.Store on CAC-Match on server 4.Store on CAC-Match on CAC  Phase I of CAC-A has two distinct parts: –Part 1: develop biometrics solutions –Part 2: DMDC develops an applet (“Access Control Applet”) that supports a generic PIN/key solution Technology Demonstration CAC-A (Biometric/PIN) Rank LTC Armed Forces of the United States Army Active Duty Parker IV, Christopher J. SAMPLE Pa y Gr ad e O 5 Issue Date 1999SEP03 PIN Access to CAC CAC-A Biometrics as an Alternative to the PIN

Department of Defense Biometrics Management Office 11 Access the CAC  Next Generation CAC –64k smart cards –Contactless capability (TBD) –Version 2 Applet –Utilizes the Access Control Applet (ACA) –Set Access Control Rules to access the CAC  Current Status –Version 1 Applet –Must utilize the PIN –Users often forget their PIN –Interim CAC PIN Reset (CPR) Solution Issue Date 1999SEP03 Geneva Conventions Identification Card Army Active Duty Parker IV, Christopher J. Rank LTCOL Pay Grade O5 Expiration Date 2002SEP01 Armed Forces of the United States SAMPLE Integrated Circuit Chip (ICC)

Department of Defense Biometrics Management Office 12  CAC-B is a follow on effort from CAC-A Scenario 3  CAC-B focuses on placing the Biometric Attribute Certificate on the CAC –Logical Access 1.Log on to Windows Secure Website –Physical Access 1.CAC + Biometric 2.Biometric + PIN Technology Demonstration CAC-B (Template on CAC Application) Rank LTC Armed Forces of the United States Army Active Duty Parker IV, Christopher J. SAMPLE Pa y Gr ad e O 5 Issue Date 1999SEP03 Biometric On CAC CAC-B Logical Physical The CAC as a carrier for the Biometrics

Department of Defense Biometrics Management Office 13  CAC-C focuses on three biometrics contactless solution: –Physical Access System –Portable Physical Access System –Physical Access System that uses a turnstile  Provide an interoperable contactless physical security solution  Evaluation in progress Technology Demonstration CAC-C (Contactless with CAC) Rank LTC Armed Forces of the United States Army Active Duty Parker IV, Christopher J. SAMPLE Pa y Gr ad e O 5 Issue Date 1999SEP03 Contactless CAC-C Mifare and DESFire Contactless Technology

Department of Defense Biometrics Management Office 14 Proposed CAC-A /B Phase II Efforts  Merge CAC-A and CAC-B into one Phase II effort  CAC-A/B Phase II effort is a two parts process: –Part 1: Concept Refinement –Part 2: Technology Development 3. Road Ahead

Department of Defense Biometrics Management Office 15 Part 1: Concept Refinement  Focus the scope and evaluate two distinct capabilities –Store Biometrics on Card and perform Match-On-Card Capability –Store Biometrics on Card and perform Match-Off-Card Capability  Coordinate the Match-On-Card development effort between the CAC-BWG and the DMDC-West  Conduct further analysis and study to determine the optimal capability for DoD

Department of Defense Biometrics Management Office 16 Part 2: Technology Development  Leverage the results and lessons learned from the CAC-Biometrics Phase I efforts  Develop prototype capability that reflects the optimized CAC-Biometrics solution for DoD –Identify operational and security requirements –Demonstrate the business process and systems architecture –Recommend appropriate standards

Department of Defense Biometrics Management Office 17 Summary  Biometrics on or with the CAC may open the door to enterprise use of biometrics throughout the DoD  The use of CAC with the biometrics authentication capability is vital to achieving a secure Information Assurance posture for the Defense Information Infrastructure

Department of Defense Biometrics Management Office 18 Questions ?

Department of Defense Biometrics Management Office 19 Department of Defense Biometrics Management Office Biometrics Fusion Center BFC Help Desk: (304) x 2233