FICAM Testing Program For more information, please contact GSA-FICAM- The FIPS 201 Evaluation Program is now the FICAM Testing.

Slides:



Advertisements
Similar presentations
Current Technology and the TWIC Program Walter Hamilton Chairman, International Biometric Industry Association Sr. Consultant, Identification Technology.
Advertisements

EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
Quality Label and Certification Processes Vienna Summit 11 April 2014 Karima Bourquard Director of Interoperability IHE-Europe.
The Internet2 NET+ Services Program Jerry Grochow Interim Vice President CSG January, 2012.
POC Security System High security system combining PIN-on-Card, information security, physical access, control and alarm – all in one system.
Certificate Interoperability S&I Framework Initiative Final Report August 17, 2011.
15June’061 NASA PKI and the Federal Environment 13th Fed-Ed PKI Meeting 15 June ‘06 Presenter: Tice DeYoung.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
Federal Identity Management
European Electronic Identity Practices Country Update of …………… Speaker: Date:
Enterprise PACS Best Practices
United States DoD Public Key Infrastructure: Deploying the PKI Token
“Personal Identity Verification (PIV) of Federal Employees and Contractors” October 27, 2005 Homeland Security Presidential Directive 12 (HSPD-12)
August 2004 Providing Industry-wide Security and Identity Management Solutions.
New Procurement Rules Training Purchases Greater Than $25,000.
U.S. Department of Agriculture eGovernment Program February 2004 eAuthentication Integration Status eGovernment Program.
1/13/05NCASSR PNNL Visit1 Security Tools Area Overview, Credential Management Services, and the PKI Testbed Jim Basney Senior Research Scientist
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Office of the Chief Information Officer EFCOG Annual Meeting Fred Catoe (IM-32) U.S. Department of Energy.
Information. Insight. Influence. securityindustry.org
Enterprise Architecture The Arkansas Approach. Key Areas What is enterprise architecture? Why is it important? How you can participate Current status.
Identity and Access Management IAM. 2 Definition Identity and Access Management provide the following: – Mechanisms for identifying, creating, updating.
ITPA Luncheon March 12, 2015 Emerging Role of the CTO.
Enterprise Physical Access Control System (ePACS) Overview Briefing
The topics addressed in this briefing include:
PCI PIN Entry Device Security Requirements PCI PIN Security Standards
NASA Personal Identity Verification (PIV) NASA Personal Identity Verification (PIV) High Level System Overview Tice F. DeYoung, PhD 14th Fed/Ed Workshop.
Procurement Forum October 16, ELECTRONIC SIGNATURES Arkansas Department of Human Services Ray Stafford.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
1 Configuration Management 101 ITS Professional Capacity Building Program T3 Webinar February 21, 2008.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
Federal CIO Council Information Security and Identity Management Committee IDManagement.gov FICAM Testing Program and Approved Products List (APL) Overview.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
Electronic and Information Resources (EIR) Accessibility in Cooperative Contracts Procurement June 2013.
Introduction & Overview April 11, 2011 Barry Haaser Managing Director.
Active Directory ® Certificate Services Infrastructure Planning and Design Published: June 2010 Updated: November 2011.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
GOC Technical Architecture GoC Position on Open Source Presentation to eGovOS Open Source in Government Series March 15, 2004.
Larry L. Johnson Federal Transition Framework.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
U.S. General Services Administration Federal Technology Service November 9, 1999 Judith Spencer Director, Center for Governmentwide Security Office of.
MD Digital Government Summit, June 26, Maryland Project Management Oversight & System Development Life Cycle (SDLC) Robert Krauss MD Digital Government.
Federal Electronic Commerce Program Office Tony Trenkle General Services Administration October 28, 1998.
Business and Systems Aligned. Business Empowered. TM Federal Identity Management Handbook May 5, 2005.
Enterprise Architecture, Enterprise Data Management, and Data Standardization Efforts at the U.S. Department of Education May 2006 Joe Rose, Chief Architect.
COAG AUSTRALIA The Prime Minister, Premiers and Chief Ministers signed the IGA at the COAG meeting on 13 April The key objectives of the Strategy,
EGovOS Panel Discussion CIO Council Architecture & Infrastructure Committee Subcommittee Co-Chairs March 15, 2004.
Cybersecurity : Optimal Approach for PSAPs
1 Geospatial Line of Business Update FGDC Coordination Group April 14, 2009.
1 Federal Identity Management Initiatives Federal Identity Management Initatives David Temoshok Director, Identity Policy and Management GSA Office of.
Fax: (703) DoD BIOMETRICS PROGRAM DoD Biometrics Management Office Phone: (703)
Information Technology Services Strategic Directions Approach and Proposal “Charting Our Course”
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
How a State Documents Deployment of CVISN Core Capabilities 95 MARYLAND INTERSTATE 29 CVISNCVISN September 2003.
Government and Industry IT: one vision, one community Vice Chairs April Meeting Agenda Welcome and Introductions GAPs welcome meeting with ACT Board (John.
Standards Development Proposal A Suite of Framework Standards FGDC Coordination Group October 2, 2001 John Moeller.
GP Confidential GlobalPlatform’s Modular Approach to its Compliance and certification.
Security Systems | ST/SRM3-NA | 4/6/2016 © 2016 Robert Bosch LLC and affiliates. All rights reserved. 1 Ensure data security in a hyper-connected world.
1 Federal Emergency Management Agency Charlie Hoffman Disaster Operations Directorate Chief, DEC Programs Disaster Emergency Communications National Public.
Realize the Power of Information IJIS Institute Briefing June 24, 2014.
Pennsylvania Health Information Exchange NJHIMSS - DVHIMSS Enabling Healthcare Transformation Through Information Technology September, 2010.
Information Security Review Panel Report
U.S. Federal e-Authentication Initiative
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
HIMSS National Conference New Orleans Convention Center
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
Presentation to Project Certification Committee, DoIT August 24, 2008
NASA Personal Identity Verification (PIV) High Level System Overview Tice F. DeYoung, PhD 14th Fed/Ed Workshop December 14, 2006.
PLANNING A SECURE BASELINE INSTALLATION
A Quick Tour of the FIPS 201 Revision
Presentation transcript:

FICAM Testing Program For more information, please contact GSA-FICAM- The FIPS 201 Evaluation Program is now the FICAM Testing Program! The revamped FICAM Testing Program provides a comprehensive evaluation capability to support the selection and procurement of qualified products and services for the implementation of a federated and interoperable ICAM segment architecture. Information for Product Vendors Access Approval and Testing Procedures Contact labs for submitting a product or service for evaluation Information for Agency Implementers View the Approved Products List (APL) to purchase items Access and explore Evaluation Program (EP) test tools Key Features and Benefits Ensure interoperability among newly deployed PACS components by using the new system builder tool (coming September CY13). Coordinates interaction and coordination with the ICAM vendor community to improve the inclusion of ICAM requirements into product offerings and services. Provides a common government-wide testing capability for ICAM/HSPD12 products and services. Provides compliance, consistency, and alignment of commercially-available products and services with the requirements and functional needs of government ICAM implementers.     New & Improved!

Federal Chief Information Officer Council Information Security and Identity Management Committee Identity, Credential, and Access Management Subcommittee What the FICAM Testing Program Can do for You The updated program leverages a continuously-improving process with the ability to adapt to new products developed by industry. The program provides a feedback loop for vendors that undergo the evaluation process and agencies that are end customers of the APL, enabling the program to make improvements as necessary. Physical Access Control System (PACS) Testing The updated FICAM Testing Program is organized into four primary solution segments: Physical Access Control Systems (PACS), Logical Access Control Systems (LACS), Credentialing Systems, and Usage. Updates to the FICAM Testing Program are being made in spirals based on these solution segments, with the first one being PACS. PACS incorporates system level testing incorporating interoperability and security. Today you can find information related to PACS products testing elements, approved PACS products, and lab certification on the program’s website. PACS Infrastructure PACS application and server (also called head-end) Database and server Controllers (field panels or door controllers) Workstations (administration, registration of individuals) Validation Systems SCVP server OCSP responders Secure controllers Caching status proxy server PKI validation software PKI registration and management software FICAM Reader Contact/Contactless Smart Card Reader Pin pad Fingerprint sensor Other Biometric modalities (iris) Communications to a validation system (Wiegand, RS-485, etc.) To access the new testing program resources, please visit: New Tool: ICAM Test Cards In order to perform end to end security and interoperability testing of proposed FICAM solutions, an approach had to be taken to create a convenient way of ensuring systematic testing. In order to support this type of testing, ICAM test cards and a PKI TEEcoSystem (Test Environment EcoSystem)have been created to ensure consistent testing results and interoperability between security components.