Cartes America - Secure ID: Fraud and ID Management Part 1 Track Personal Identity Verification (PIV) Case Study within the TSCP Community Keith Ward TSCP.

Slides:



Advertisements
Similar presentations
PAGE 2 | CONFIDENTIAL | TSCP| Aerospace & Defense Industry Challenges Customer Lead Contractor Manufacturing Subcontractor Manufacturing & Design Subcontractor.
Advertisements

EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
The GSMA July 2014 Restricted - Confidential Information
The Federation for Identity and Cross-Credentialing Systems (FiXs) FiXs ® - Federated and Secure Identity Management in Operation Implementing.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
August 2004 Providing Industry-wide Security and Identity Management Solutions.
U.S. Environmental Protection Agency Central Data Exchange EPA E-Authentication Pilot NOLA Network Node Workshop February 28, 2005.
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Building Trusted Transactions Identity Authentication & Attribute Exchange In Public and Private Federations OASIS Conference September 2010 Joni Brennan,
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
1 Secure Interoperability within the Defence Supply Chain Colin Nash – Business Development Manager Thursday 28 th October 2010.
Accessibility, Integrity, & Confidentiality: Security Challenges for E-Business Rodney J. Petersen University of Maryland & Educause/Internet2 Security.
Large-Scale, Cost-Effective, Progressive Authentication and Identify Management Solutions Enabling Security, Efficiency and Collaboration through Technology.
Introduction to OIX: A Market Solution to Online Identity Trust Don Thibeau.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
No one questions that Microsoft can write great software. Customers want to know if we can be innovative, scalable, reliable in the cloud. (1996) 450M+
© 2011 IBM Corporation Smarter Software for a Smarter Planet The Capabilities of IBM Software Borislav Borissov SWG Manager, IBM.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Secure Electronic Transaction (SET)
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Account Authority Digital Signature AADS Lynn Wheeler First Data Corporation
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
Trusted Federated Identity and Access Management to provide the Cornerstone for Cyber Defense.
Climate Sciences: Use Case and Vision Summary Philip Kershaw CEDA, RAL Space, STFC.
TSCP Early Work on Trust Framework Agreement Developing a Flexible Trust Agreement PAGE 1 | TSCP.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
·
Elements of Trust Framework for Cyber Identity & Access Services CYBER TRUST FRAMEWORK Service Agreement Trust Framework Provider Identity Providers Credential.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Grid Security Issues Shelestov Andrii Space Research Institute NASU-NSAU, Ukraine.
UN CEFACT Single Window Recommendation Simplifying International Trade Gordon Cragge Chair – International Trade Procedures Working Group (TBG 15 of UN.
E-Authentication: Enabling E-Government Presented to PESC May 2, 2005 The E  Authentication Initiative.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
The Federal Bridge A Brief Overview 1. 4BF Industry Forum April Fed PKI: View from 20,000 km FBCA C4 Common Policy CA (HSPD-12) CertiPath SSPs.
EResearchers Requirements the IGTF model of interoperable global trust and with a view towards FIM4R AAI Workshop Presenter: David Groep, Nikhef.
Identity Assurance Emory University Security Conference March 26, 2008.
Identity Federations and the U.S. E-Authentication Architecture Peter Alterman, Ph.D. Assistant CIO, E-Authentication National Institutes of Health.
1 Federal Identity Management Initiatives Federal Identity Management Initatives David Temoshok Director, Identity Policy and Management GSA Office of.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
PKI: The Key to Electronic Identity Initiatives? Overview of models and examples Stijn Bijnens, SVP Identity Management, Cybertrust.
Don Thibeau, Executive Director, OpenID Foundation (OIDF) Drummond Reed, Executive Director, Information Card Foundation (ICF)
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
E-Commerce Systems Chapter 8 Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Built on the Powerful Microsoft Azure Platform, Forensic Advantage Helps Public Safety and National Security Agencies Collect, Analyze, Report, and Distribute.
Security Systems | ST/SRM3-NA | 4/6/2016 © 2016 Robert Bosch LLC and affiliates. All rights reserved. 1 Ensure data security in a hyper-connected world.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
Chapter 4 Access Control. Access Control Principles RFC 4949 defines computer security as: “Measures that implement and assure security services in a.
Task Performance Group Provides Cutting-Edge E-Commerce B2B EDI Integration Using MegaXML SaaS Solution on Microsoft Azure Cloud Platform MICROSOFT AZURE.
Private KEEP OFF! Private KEEP OFF! Open! What is a cloud? Cloud computing is a model for enabling convenient, on-demand network access to a shared.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
Chapter 5 – E-commerce and Enterprise Systems
Cyber Security Means Locking the Front Door Too: Use High-Assurance Identity Management to Control Access to the Federal Bridge.
Data and Applications Security Developments and Directions
Module 8: Securing Network Traffic by Using IPSec and Certificates
SWIM Common PKI and policies & procedures for establishing a Trust Framework                           Kick-off meeting Patrick MANA Project lead 29 November.
Blockchain initiatives
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Public Key Infrastructure from the Most Trusted Name in e-Security
HIMSS National Conference New Orleans Convention Center
Module 8: Securing Network Traffic by Using IPSec and Certificates
Presentation transcript:

Cartes America - Secure ID: Fraud and ID Management Part 1 Track Personal Identity Verification (PIV) Case Study within the TSCP Community Keith Ward TSCP Inc. President & CEO May 14, 2014

What is TSCP? Government-Industry Partnership is focused on mitigating the risks, complexity, cost of IT inherent in large-scale, collaborative programs that span national jurisdictions. TSCP provides: Influence to drive a common approach and specifications Efficiency of working together on a common problem Lower costs of development and implementation – leverage common solutions Requirements, architecture, prototypes, deployed capabilities. TSCP member companies have invested over $400M into internal federated systems using TSCP’s common operating rules and specifications. TSCP is the Transglobal Secure Collaboration Program was established 2002, TSCP is a non-profit 501(C)(6) technical association. Common Framework for Federated Collaboration Key focus is on providing the mechanism and governance for: Trust. Member companies’ and governments’ users digital identities can be trusted by others. Identity Assurance. Trusted authority assures that its users with cross-certified- enabled digital identities are who they say they are. Interoperability through Federation. Member companies and credentials are interoperable across the industry and government. PAGE 2 | TSCP

What Does TSCP Do? * Where relevant, TSCP specifications comply with FICAM/PIV-I specifications and guidelines. SPECIFICATIONS DEVELOPMENT.* Develops common specifications for secure collaboration solutions across the TSCP membership that align to government requirements. The specifications fall into these categories: Secure information exchange Identity credentials/digital identities and attributes Federated identity Information assurance Data labeling and protection VALIDATION THROUGH REFERENCE LAB. Before TSCP publishes its specifications, the capability is in production with two or more members. GOVERNANCE. Establishes policy and governance for TSCP Solutions. Interoperable Identity Federation Trust Framework Common Operating Rules Legal Framework & Allocation of Liabilities Accreditation & Trustmark FEDERATED HUB. Hosts a Federated Hub for TSCP Membership that enables secure collaboration between TSCP membership and government customers. PAGE 3 | TSCP

PIV-I Smart Card Illustrative Banking Smart Card Same Smart Card Technology – Different Applications Secure chip stores payment informationChip card authentication prevents counterfeiting Adds cardholder verification methodsOffers online or offline authorizationSecure chip stores strong Identity information.e.g. in-person vetting, biometrics PKI certificates and 3DES encryption prevents cyber threats Adds cardholder verification methods pin and chip and Biometrics verification Offers logical and physical as well as online and offline authorization PAGE 4 | TSCP

TSCP Trust Framework: Bank Card Analogy Bank(s) TSCP Member IdP(s) Retailer Acquirers Agency Relying Parties Issue Visa credit cards to customers. Issue identities/ credentials to users Customers present Visa cards for payment. Retailers transmit payment requests to the bank/card issuer through Visa. Users present member credentials to agency applications; RPs transmit authentication requests to IdPs through TSCP. Routes authentication requests and responses between RPs and IdPs. Routes payment requests and responses between banks and retailers. Visa conducts settlement.. GOVERNANCE: Establishes and enforces standards, specifications and operating rules. UK MOD Federal PKI Bridge Direct Bilateral Trust PAGE 5 | TSCP

TSCP Trust Framework and Specifications TSCP Trust Framework TSCP Trustmark AUTHORIZATION AUTHENTICATION MESSAGE SECURITY Secure Messaging Networking Layer Federated Authentication Service Secure / Messaging (Hosted) Secure Messaging Communications Layer Secure Messaging Applications/Services Layer Identity Provider Services Secure Document Management/ Archiving Secure/Anonymous Shipping Secure Online Payment Interface Secure Mail & Package Tracking Secure Address Validation Secure G2C, B2B Communications TSCP Federation Framework & Specifications & Hub TSCP Secure Specification TSCP Attribute Management/ Data Labeling Specification TSCP Secure Specification TSCP PIV-I Specification Illustrative Secure Messaging Platform TSCP Trust Framework, Common Operating Rules & Governance Documents PAGE 6 | TSCP

Remote & Desktop Login Credential & Rights Management Network Controls Building Access Corporate Access Card User Local or Remote User Host-Based Intrusion Protection Systems Strong Authentication – PIV-I Credentials Credential Management – Centralized Public Key Infrastructure Global A&D Supply Chain Commercial Industry Base User and Privilege Management – Automated Provisioning Multi-Layered approach to provide additional security layers across our networks, systems, facilities, data, intellectual property and information assets Data Monitoring & Protection Systems Use Case 1: Multi-Layer Security across the enterprise PAGE 7 | TSCP TSCP Common Operating Rules

Use Case 2: PIV-I into Adjacent Markets: Financial & Retail Sectors PAGE 8 | TSCP

Use Case 2: PIV-I into Adjacent Markets: Financial & Retail Sectors PAGE 9 | TSCP B2GB2BC2B

Use Case 3: PIV-I into adjacent markets: Business Continuity Information Sharing Initiative Private Sector Information is Sensitive and needs to be Secured Media can miss-interpret fleet movement and cause public concern Gangs track fleet movement and can steel copper/supplies from hotel lots where fleets park over night Others can intervene and cause un-needed delays and/or commandeer fleets as in Katrina Need to share PS Fleet Data & Info w/State EMs, DOTs, Police, other agencies at regional/national levels Need info from Government to make operational decision to expedite power restoration efforts at regional level Ultimate solution must: Be trusted, proven and simple Allow state/local government agencies to participate Standards based, scalable in size, adaptable to each organization Must use Trusted Credentials Must have a Trust Framework Model for all entities to legally participate Must have strong security controls PAGE 10 | TSCP

Data ProvidersData Consumers Use Case 3: TSCP Trust Framework PIV-I Information SharingPIV-I Information Sharing Exchange Cloud Environment EOC Identity Claims Providers Commercial Identity Providers State Government Identity Providers TSCP Trust Framework PIV-I Data Access Controls PIV-I GIS Layer Access PIV-IPIV-I PAGE 11 | TSCP ILHDSIF ILHDSIF

PIV-I Smart Card Banking Smart Card Next Steps – Bridge the Gap! PAGE 12 | TSCP The higher-level credentials represent over ~40M users TSCP is looking for applications, technologies and solutions to Bridge the Gap!

TSCP Fall Collaboration Workshop For more information please visit PAGE 13 | TSCP

PAGE 14 | TSCP 14 CONFIDENTIAL Questions? TSCP Inc. Keith Ward 8000 Towers Crescent Drive, Suite 1350 Vienna, VA Phone: (703) Web: