1 Implementation of Homeland Security Presidential Directive 12 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide FED/ED.

Slides:



Advertisements
Similar presentations
For Joe Broghamer Philip S. Lee May 5, 2005 Implementing PIV Specifications HSPD-12 Workshop.
Advertisements

June 27, 2005 Preparing your Implementation Plan.
Status of U.S. Smart Card Deployment Jim Dray Porvoo 7/ World eID Meeting May 2005.
Overview of US Federal Identity Management Initiatives Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority and Asst. CIO E-Authentication, NIH.
Brian Epley, VA PIV Program Manager
1 HSPD-12 Compliance: The Role of Federal PKI Judith Spencer Chair, Federal Identity Credentialing Office of Governmentwide Policy General Services Administration.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
The Federation for Identity and Cross-Credentialing Systems (FiXs) FiXs ® - Federated and Secure Identity Management in Operation Implementing.
15June’061 NASA PKI and the Federal Environment 13th Fed-Ed PKI Meeting 15 June ‘06 Presenter: Tice DeYoung.
1 1 A Synopsis of Federal Information Processing Standard (FIPS) 201 for Personal Identity Verification (PIV) of Federal Employees and Contractors Presentation.
Public Key Infrastructure (PKI) Hosting Services.
Department of Health and Human Services Personal Identity Verification Training APPLICANT.
1 Federal Identity Management and Homeland Security Presidential Directive 12 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
HIMSS/GSA E-Authentication Initiative A Pilot Project of the HIMSS RHIO Federation HIMSS Public Policy Forum September 28, 2006 Mary Grizkewicz, HIMSS.
“Personal Identity Verification (PIV) of Federal Employees and Contractors” October 27, 2005 Homeland Security Presidential Directive 12 (HSPD-12)
Department of Labor HSPD-12
U.S. Environmental Protection Agency Central Data Exchange EPA E-Authentication Pilot NOLA Network Node Workshop February 28, 2005.
Biometrics in New Zealand Passport issuing Border crossing System and information access Building access.
Federal Information Processing Standard (FIPS) 201, Personal Identity Verification for Federal Employees and Contractors Tim Polk May.
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Office of the Chief Information Officer EFCOG Annual Meeting Fred Catoe (IM-32) U.S. Department of Energy.
E-Authentication: What Technologies Are Effective? Donna F Dodson April 21, 2008.
The E-Authentication Initiative: A Status Report Presented at Educause Meeting June 16, 2004 The E-Authentication Initiative.
Federated Identity and Interoperability: Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide.
NASA Personal Identity Verification (PIV) NASA Personal Identity Verification (PIV) High Level System Overview Tice F. DeYoung, PhD 14th Fed/Ed Workshop.
U.S. Department of Agriculture HSPD 12 Program HSPD 12 Personal Identity Verification (PIV) I Core Training: Registrars.
Federal CIO Council Information Security and Identity Management Committee IDManagement.gov FICAM Testing Program and Approved Products List (APL) Overview.
Homeland Security Presidential Directive-12 (HSPD-12)
HSPD-12 and FIPS-201 Overview v Learning Objectives At the end of this course, you will be able to: Describe Homeland Security Presidential Directive.
EmpowHR Sponsorship.
Special Publication : Interfaces for Personal Identity Verification Jim Dray NIST NPIVP Workshop March 3, 2006.
1 The Government-wide Implementation of Homeland Security Presidential Directive 12 (HSPD-12) David Temoshok Director, Identity Policy and Management GSA.
Page 1 EmpowHR Adjudicator.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
PIV 1 Ketan Mehta May 5, 2005.
Use of Identity Credentials in Public Transit Fare Payment Systems Professional Capacity Building Program T3 Webinar June 29, 2011 Washington Metropolitan.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
E-Authentication: The Need for Public and Private Sector Trust David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
Homeland Security Presidential
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
Federal e-Authentication Initiative: Federated Identity and Interoperability David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
Non-Employee Identity System (NEIS) Adjudicator Training.
Non-Employee Identity System (NEIS) Adjudicator Training.
HSPD-12 Identity Management Initiative Carol Bales Senior Policy Analyst United States Office of Management and Budget North American Day 2006.
U.S. Department of Agriculture eGovernment Program July 9, 2003 eAuthentication Initiative Update for the eGovernment Working Group eGovernment Program.
U.S. Department of Agriculture eGovernment Program eAuthentication Draft Business Case Executive Summary January 2003.
COAG AUSTRALIA The Prime Minister, Premiers and Chief Ministers signed the IGA at the COAG meeting on 13 April The key objectives of the Strategy,
1 Federal Identity Management Initiatives Federal Identity Management Initatives David Temoshok Director, Identity Policy and Management GSA Office of.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Electronic Security and PKI Richard Guida Chair, Federal PKI Steering Committee Chief Information Officers Council
Presented by: Defense Manpower Data Center Access Card Office
1 Federal Identity Management Infrastructure and Policy David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide August 15,
Identity Crisis: Defining the Problem and Framing a Solution for Terrorism Incident Response Presented by Mark Landahl Supervisor – Homeland Security Section.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
E-Authentication Guidance Jeanette Thornton, Office of Management and Budget “Getting to Green with E-Authentication” February 3, 2004 Executive Session.
Cyber Security Means Locking the Front Door Too: Use High-Assurance Identity Management to Control Access to the Federal Bridge.
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
E-Authentication: What Technologies Are Effective?
HIMSS National Conference New Orleans Convention Center
Preparing your Implementation Plan
NASA Personal Identity Verification (PIV) High Level System Overview Tice F. DeYoung, PhD 14th Fed/Ed Workshop December 14, 2006.
Appropriate Access InCommon Identity Assurance Profiles
E-Government Procurement: Standard Transactions and Interoperability David Temoshok Director, Federal Identity Management GSA Office of Governmentwide.
Presentation transcript:

1 Implementation of Homeland Security Presidential Directive 12 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide FED/ED Technology Meeting December 14, 2006

2 The HSPD-12 Mandate Home Security Presidential Directive 12 (HSPD-12): “Policy for a Common Identification Standard for Federal Employees and Contractors” -- Signed by President: August 27, 2004  HSPD-12 has Four Control Objectives:  Issue Identification based on sound criteria to verify an individual’s identity.  Strongly resistant to fraud, tampering, counterfeiting, and terrorist exploitation.  Personal Identity can be rapidly authenticated electronically.  Issued by providers who’s reliability has been established by an official accreditation process.

3 Key Milestones TimelineAgency/Department Requirement/Milestone August 27, 2004HSPD-12 signed and issued Not later than 6 months (February 27, 2005) NIST Issue standard (FIPS-201) Not later than 8 months following issuance of standard (October 27, 2005) Compliance with FIPS-201 Part One: Identity Proofing and Enrollment. PIV-I Not later 20 months following issuance of standard (October 27, 2006) Commence deployment of FIPS- 201 compliant Identity Credentials (FIPS-201 Part Two). PIV-II Not later than 32 months following issuance of standard (October 27, 2007) Compliance with FIPS-201 Part Two: Fully operational Physical and Logical Access

4 Multi-Factor Token Very High Medium Low Employee Screening for a High Risk Job Obtaining Govt. Benefits Applying for a Loan Online Access to Protected Website PIN/User ID - Knowledge Strong Password -Based PKI/ Digital Signature PIV Card Increased $ Cost Increased Need for Identity Assurance Four Authentication Assurance Levels to meet multiple risk levels Biometrics

5 Multiple Authentication Technologies To provide multiple authentication assurance levels, FIPS 201 requires multiple authentication technologies: Authentication using PIV Visual Credentials Authentication using the CHUID – contact or contact-less Authentication using PIN Authentication using Biometric (match on/off card) Authentication using PIV asymmetric Cryptography (PKI) Something I have – PIV Card Something I know - PIN Something I am - Biometric

6 OMB Guidance – Key Points OMB Guidance for HSPD-12 - M-05-24: To ensure government-wide interoperability, agencies must acquire only products and services that are on the approved products list GSA is designated the “executive agent for Government-wide acquisitions of information technology" for the products and services required to implement HSPD-12 GSA will make approved products and services available for acquisition through SIN under IT Schedule 70 GSA will ensure all approved suppliers provide products and services that meet all applicable federal standards and requirements

7 GSA’s Role Establish interoperability and common performance testing to meet NIST standards, product interoperability testing Establish Approved Products Lists for product and services categories requiring FIPS 201 compliance Qualify products and services on IT Schedule 70 and SIN as FIPS 201 compliant Provide full-range of qualified products and services to meet Agency implementation needs Approved products and services will be made available on government-wide basis through GSA IT Multi-Award Schedule 70 Under E-Gov Act of 2002, State and local Governments can acquire products/services directly from IT Schedule 70.

8 Status of GSA FIPS 201 Evaluation Program NIST FIPS the PIV Standard -- established normative requirements for processes and technologies for HSPD-12 security and interoperability GSA identified 22 categories of products/services directly impacted by FIPS 201 requirements All 22 categories of products/services are needed for full HSPD-12 implementation GSA Evaluation Program evaluates all products/services for conformance to FIPS 201 requirements Approved products are posted to the Approved Products List Currently product and services approvals: 137 products on FIPS 201 Approved Product List 4 approved PKI Shared Service Providers 20+ approved integrators, 8 provide end-to-end HSPD-12 solutions

9 Accessing the Approved Products List The idmanagement.gov website is a portal. To access HSPD-12 approved products click on “Govt. Approved Services and Products”

10 Accessing the Approved Products Lists The idmanagement.gov website is a portal. To access HSPD-12 approved products click on “Govt. Approved Products”

11 Accessing the FIPS 201 Approved Products List

12 Where are we today? 10+ agencies committed to their own infrastructure: DHS, DoD, NASA, DoS, SSA, EPA, VA, HHS, ED, DOL, 100+ Agencies want to share infrastructure All small agencies DOC, HUD, USDA, DOI, GSA, DOE, OPM, Federal Reserve, NARA, FCC committed Shared Service Providers DoD – for branches of military 8 agencies serviced by State Dept DOI for HR LOB customers GSA for government-wide services GSA Government-wide Shared Service Intended for government-wide use 40 agencies have signed up Met 10/27/06 implementation requirements for all participating agencies Initial shared enrollment offices in Washington DC, NYC, Atlanta, and Seattle – enrollments are underway

13 GSA HSPD-12 Shared Services Architecture Fourth, after agency adjudication the PSP accepts cardholder information from the SIP needed to print the card. When card printing is completed card data is returned to the SIP, including which chip ID was used for this applicant. The card is then locked with a transport key and shipped to the designated FSP. Second, the ESP retrieves applicant data from the SIP, enrolls the applicant, and sends enrollment data back to the SIP. Fifth, the FSP matches the applicant biometric, and then uses the SIP CMS to unlock the card, load the signed objects, and finalize the configuration. The card leaves the FSP ready to use. This step is often referred to as issuance because it is the last step in issuance process. Sixth, the certificate could be requested and loaded at the FSP, if desired. First, the issuing agency provides affiliation (sponsorship) feeds, adjudication results, and revocation requests to the SIP. The SIP provides reports back to the agency. Third, the SIP sends fingerprint data collected from the ESP to OPM for suitability checks, and results are sent to the agency. Scope of shared services are HSPD-12 system components inside the red border. These are core HSPD-12 services to meet PIV 1 & 2 compliance. LACS/PACS, FBI and OPM interfaces are outside scope.

14 HSPD-12 Federal Shared Enrollment Service Enrollment Broker 300+ geographically distributed & shared Enrollment Stations; GSA provides leased space, operators Card Mgmt System ID Mgmt System Card Printing System PKI Certificate Integration Dual Site Shared Centralized Components Other HSPD-12 Centralized Answers (a authorized by OMB) Station 1 Station 2 Station 3 Station 4 Station 5 Station 6 Station 7 Station 8 Station “n” Add. Needs Stations The Shared Enrollment Service will provide an “Enrollment Broker” to handle standard enrollment data from hundreds of enrollment stations into the shared PIV system.

15 Sharing Opportunities 1.Enrollment Stations – largest single cost; largest opportunity for savings 2.Centralized Components – “fixed cost” item whether 10,000 card holders or 1 million card holders 3.Standard Interfaces -- AWG developing standard interfaces for enrollment/SIP, SIP/OPM, SIP/FBI, SIP/PACS, backend authentication -- Potential for standard APIs 4.Other Opportunities - TBD

16 Conclusion This is the THE START … surface is only scratched There is a much work … –Roll-out hundreds of enrollment stations nationwide –Issue to 2 million users in next 23 months –Test and Qualify systems –Build common applications for access control and e-Government Physical security Logical access E-commerce Emergency Response Stabilize operations … –Commitment to continue issuance –Protect and promote interoperability Testing, monitoring, auditing and configuration control Make life-cycle easier –Government procurement rules provide discipline Extend to other communities