Office of the Chief Information Officer EFCOG Annual Meeting Fred Catoe (IM-32) U.S. Department of Energy.

Slides:



Advertisements
Similar presentations
For Joe Broghamer Philip S. Lee May 5, 2005 Implementing PIV Specifications HSPD-12 Workshop.
Advertisements

June 27, 2005 Preparing your Implementation Plan.
Mobile Devices in the DoD
Brian Epley, VA PIV Program Manager
Course: e-Governance Project Lifecycle Day 1
The Federation for Identity and Cross-Credentialing Systems (FiXs) FiXs ® - Federated and Secure Identity Management in Operation Implementing.
15June’061 NASA PKI and the Federal Environment 13th Fed-Ed PKI Meeting 15 June ‘06 Presenter: Tice DeYoung.
Public Key Infrastructure (PKI) Hosting Services.
1  AGA-DC and GWSPCA 6 th ANNUAL CONFERENCE OMB Circular A-123, Appendix A Internal Control Over Financial Reporting Innovative Approaches Jerome A. Vaiana.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
Federal Identity Management
“Personal Identity Verification (PIV) of Federal Employees and Contractors” October 27, 2005 Homeland Security Presidential Directive 12 (HSPD-12)
Department of Labor HSPD-12
August 2004 Providing Industry-wide Security and Identity Management Solutions.
FICAM Testing Program For more information, please contact GSA-FICAM- The FIPS 201 Evaluation Program is now the FICAM Testing.
Presented By: Thelma Ameyaw Security Management TEL2813 4/18/2008Thelma Ameyaw TEL2813.
U.S. Environmental Protection Agency Central Data Exchange EPA E-Authentication Pilot NOLA Network Node Workshop February 28, 2005.
Federal Information Processing Standard (FIPS) 201, Personal Identity Verification for Federal Employees and Contractors Tim Polk May.
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Overarching Roles of Critical Partners In A Project 9:30 – 10:00 Rob Curlee, FMO Joseph Dominque, OCISO Mike Perry, EA.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies.
Helen Schmitz Update on EA July 13, 2011 NIH Enterprise Information Technology Architecture Contact:
Asset management guidelines
1 Implementation of Homeland Security Presidential Directive 12 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide FED/ED.
Investment Management Concepts Portfolio Management | Segment Architecture March 25, 2009 Adrienne Walker and Kshemendra Paul
Click to add text © 2010 IBM Corporation OpenPages Solution Overview Mark Dinning Principal Solutions Consultant.
I DENTITY M ANAGEMENT Joe Braceland Mount Airey Group, Inc.
NASA Personal Identity Verification (PIV) NASA Personal Identity Verification (PIV) High Level System Overview Tice F. DeYoung, PhD 14th Fed/Ed Workshop.
Federal CIO Council Information Security and Identity Management Committee IDManagement.gov FICAM Testing Program and Approved Products List (APL) Overview.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
HW&W, Incorporated 7602 Granada Drive Bethesda, MD Telephone: H W & W, Incorporated e-Business Strategies “Providing Just-in-Time Solutions.
HSPD-12 and FIPS-201 Overview v Learning Objectives At the end of this course, you will be able to: Describe Homeland Security Presidential Directive.
Mr. Frank J. Anderson, Jr. President, Defense Acquisition University Acquisition Education Challenges and the Human Capital Strategic Plan.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
PIV 1 Ketan Mehta May 5, 2005.
Use of Identity Credentials in Public Transit Fare Payment Systems Professional Capacity Building Program T3 Webinar June 29, 2011 Washington Metropolitan.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Committee of Sponsoring Organizations of The Treadway Commission Formed in 1985 to sponsor the National Commission on Fraudulent Financial Reporting “Internal.
U.S. General Services Administration Federal Technology Service November 9, 1999 Judith Spencer Director, Center for Governmentwide Security Office of.
IT Requirements Management Balancing Needs and Expectations.
Business and Systems Aligned. Business Empowered. TM Federal Identity Management Handbook May 5, 2005.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
HSPD-12 Identity Management Initiative Carol Bales Senior Policy Analyst United States Office of Management and Budget North American Day 2006.
U.S. Department of Agriculture eGovernment Program July 9, 2003 eAuthentication Initiative Update for the eGovernment Working Group eGovernment Program.
U.S. Department of Agriculture eGovernment Program eAuthentication Draft Business Case Executive Summary January 2003.
EGovOS Panel Discussion CIO Council Architecture & Infrastructure Committee Subcommittee Co-Chairs March 15, 2004.
Federal Enterprise BOF Rick Murphy Chief Architect, Blueprint Technologies June 7, 2004.
1 Federal Identity Management Initiatives Federal Identity Management Initatives David Temoshok Director, Identity Policy and Management GSA Office of.
Federal Software Asset Management Initiative Concept of Operations Report to the Executive Steering Committee March 8, 2004 Implementing the President’s.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process A course for the Department of Commerce contracting and contracting.
U.S. Department of Agriculture eGovernment Program eDeployment Kickoff August 26, 2003.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
U.S. Department of Agriculture eGovernment Program Smart Choice Pre-Select Phase Transition September 2002.
U.S. Department of Agriculture eGovernment Program May 26, 2004 eGovernment Working Group U.S. Department of Agriculture eGovernment Program.
Case Study: Applying Authentication Technologies as Part of a HIPAA Compliance Strategy.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Sample Fit-Gap Kick-off
Improving Mission Effectiveness By Exploiting the Command’s Implementation Of the DoD Enterprise Services Management Framework - DESMF in the [name the.
Enterprise Content Management Owners Representative Contract Approval
U.S. Federal e-Authentication Initiative
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Lockheed Martin Canada’s SMB Mentoring Program
HIMSS National Conference New Orleans Convention Center
Digitization and Modernization Project
Vijay Rachamadugu and David Snyder September 7, 2006
NASA Personal Identity Verification (PIV) High Level System Overview Tice F. DeYoung, PhD 14th Fed/Ed Workshop December 14, 2006.
Presentation transcript:

Office of the Chief Information Officer EFCOG Annual Meeting Fred Catoe (IM-32) U.S. Department of Energy

Office of the Chief Information Officer Project Objectives  Achieve control and security objectives of HSPD 12 and FIPS 201  Meet HSPD 12 deadlines  June 27, 2005 – Implementation Plan  August 27, 2005 – Additional system recommendations for HSPD 12  October 27, 2005 – Compliance with PIV I  October 2006 – Compliance with PIV II  September 30, 2007 – Background checks for current employees & contractors  Successfully integrate into DOE environment at selected sites for logical and physical security  Engineer compliant solution  ACTD approach - limited deployment (10% of DOE population)  Full deployment (based on validated cost & technical models)  Ensure compliance with HSPD 12 and FIPS 201 privacy requirements

Office of the Chief Information Officer Project Benefits  Provides standard infrastructure access across the corporation  Provides a corporate solution for Identity Management (IdM) and credentialing  Provides a cost savings and cost avoidance over time based on results from other agencies  Consolidates physical access control systems (PACS)  Improves security in disk-less computing environment  Reduces PKI costs by moving from 40+ PKIs to an SSP PKI per OMB M  Reduces Help Desk costs  Improves compliance with Federal mandates  Enables future functionality:  E-Signature  E-Authentication  Automated digital forms  Single Sign-On (SSO) Not just an unfunded mandate – project is based on demonstrated business benefits

Office of the Chief Information Officer Coordinated Effort WorkgroupParticipants HSPD 12 System IntegrationOCIO/SSA lead, NNSA, ME, Ops, Science and field activity participation OMB Reporting IT System Integration Physical Access Control System Integration Smart card data model HSPD 12 Identity Verification and Token TopologySSA lead, OCIO, NNSA, ME, Ops, Science, GC and field activity participation Identity Verification Token Topology HSPD 12 Human Resources & Procurement ActivitiesME lead, OCIO, SSA, NNSA, Ops, Science, GC and field activity participation Personnel/HR process adjustment Procurement activities Privacy activities HSPD 12 System Certification and ApprovalIndependent Audit (OA) lead, OCIO, SSA, NNSA, ME, Ops, Science, GC, OIG and field activity participation

Office of the Chief Information Officer DOE Methodology  Acquisition Lifecycle Management complimented by a systems engineering approach  Staff Project Office with government and contractor Subject Matter Experts (SMEs) possessing technical and deployment experience with identified technologies  Use ACTD type approach based on 10% of DOE population  Adjust as required based on lessons learned  Use this approach to validate cost and technical models  Leverage other agencies lessons learned and best practices  Implementation of functionally equivalent card systems has been completed and is under way at several Federal agencies  Memorandum of Understanding (MOU) between agencies for information and infrastructure sharing as appropriate  System procurement experiences, including Analysis of Alternatives (AoA) (government and department wide) We have a running head-start and HSPD-12 milestones are achievable

Office of the Chief Information Officer Systems Engineering System engineering allows you to identify requirements and test them against the identified alternatives Meets OMB requirement for Requirements Traceability Matrix This type of approach is iterative, allowing management of each life cycle phase You can always tell where you are in the process, and what still has to be done Approach successfully completed GAO audit & Congressional review Controls costs – minimizes rework by getting right 1 st time Enterprise Architecture – identifies components and dependencies Best practice – viewed across government as most effective approach Proven repeatable for full deployment Based on validated Department requirements resulting in integrated repeatable process capable of refinement as required

Office of the Chief Information Officer Integrated Project Plan  Organizational  Resource  Scope  Requirements  Quality  Schedule  Cost  Communications  Acquisition  Risk  Configuration  Training  Security Framework for project management of the following functions: Structured & detailed approach to management of project in line with industry and Government best practices

Office of the Chief Information Officer What do we need to do?  Submit Implementation Plan 6/27/05  Provide list of other potential uses of FIPS Standard within DOE 8/27/05  Comply with FIPS 201, Part 1 10/27/05  Satisfy control objectives of the standard  Adopt and accredit a registration process  Include language implementing the standard in applicable contracts  Complete the privacy requirements  Comply with FIPS 201, Part 2 10/27/06  Technical requirements  Credential issuance  Credential authentication  Identity verification – Sep 30, 2007 identity proofing on record for all current employees and contractors  System access

Office of the Chief Information Officer Summary  Integrate solution across the Department to achieve key goals:  Meet Secretary’s objective and be recognized leader in HSPD-12 compliance and technology integration  Meet the control and security objectives of HSPD-12  Integrated solution:  Improves the security and business process  Provides Return on Investment (ROI)  Timelines are challenging and require immediate attention to meet both near term and long term goals and objectives  Leveraging other Department/Agency experiences and lessons learned will be beneficial to DOE Cannot afford to do this more than once