Functional Model Workstream 1: Functional Element Development.

Slides:



Advertisements
Similar presentations
Appropriate Access InCommon Identity Assurance Profiles David L. Wasley Campus Architecture and Middleware Planning workshop February 2008.
Advertisements

TFTM TFTM Committee working call to discuss how to describe the “IDESG-Acknowledged Identity Ecosystem” in its interim or long term state October.
Quality Label and Certification Processes Vienna Summit 11 April 2014 Karima Bourquard Director of Interoperability IHE-Europe.
TFTM Interim Trust Mark/Listing Approach Paper Discussion Deck TFTM Committee IDESG Plenary Meeting January 14, IDESG TFTM Committee1.
Sponsored by the National Science Foundation 1 Activities this trimester 0.5 revision of Operational Security Plan Independently (from GPO) developing.
Electronic Submission of Medical Documentation (esMD) Face to Face Informational Session esMD Requirements, Priorities and Potential Workgroups – 2:00pm.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
IDESG Goals & Work-plans for 2013 and beyond Brett McDowell IDESG Management Council Chair
Functional component terminology - thoughts C. Tilton.
TFTM Sub-Committee What do we need for the IDESG Trust Mark Program Discussion Deck TFTM Committee April 16, IDESG TFTM Committee1.
Information Security Policies and Standards
User Authentication Recommendations Transport & Security Standards Workgroup December 10, 2014.
Intra-ASEAN Secure Transactions Framework Project Progress Report
Office of Inspector General (OIG) Internal Audit
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Purpose of the Standards
Use Case Development Scott Shorter, Electrosoft Services January/February 2013.
© 2008 Prentice Hall11-1 Introduction to Project Management Chapter 11 Managing Project Execution Information Systems Project Management: A Process and.
Project Execution.
PRESENTED BY TRUST THOMAS EROMOSELE STUDENT NO:
1 Data Strategy Overview Keith Wilson Session 15.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
Release & Deployment ITIL Version 3
National Smartcard Project Work Package 8 – Security Issues Report.
SCC Activities C. Tilton. Standards Are applied to SOMETHING Within some CONTEXT Something = ID Ecosystem Context = Use Cases 2.
HIT Standards Committee Hearing on Trusted Identity of Patients in Cyberspace November 29, 2012 Jointly sponsored by HITPC Privacy and Security Tiger Team.
NSTIC ID Ecosystem A Conceptual Model v03 Andrew Hughes October October IDESG Version 1.
TFTM Interim Trust Mark/Listing Approach Paper Accreditation, Certification, and Trust Mark Program Key Administrative and Operational Responsibilities.
Requirements Development & Template Presentation to All Chairs 8/12/2014.
Report of the IOC Task Force on the GEOSS Common Infrastructure (GCI) Ivan DeLoatch, U.S. Geological Survey Alan Edwards, European Commission Co-chairs.
Digital Object Architecture
Demystifying the Business Analysis Body of Knowledge Central Iowa IIBA Chapter December 7, 2005.
© Grant Thornton | | | | | Guidance on Monitoring Internal Control Systems COSO Monitoring Project Update FEI - CFIT Meeting September 25, 2008.
TFTM Interim Trust Mark/Listing Approach Paper Analysis of Current Industry Trustmark Programs and GTRI PILOT Approach Discussion Deck TFTM Committee.
A DESCRIPTION OF CONCEPTS AND PLANS MAY 14, 2014 A. HUGHES FOR TFTM The Identity Ecosystem DISCUSSION DRAFT 1.
U.S. Department of Agriculture eGovernment Program August 14, 2003 eAuthentication Agency Application Pre-Design Meeting eGovernment Program.
TFTM Deliverable Self Assessment and Attestation Program Discussion Deck TFTM Committee June 25, IDESG TFTM Committee1.
WGClimate John Bates NOAA SIT Workshop Agenda Item #8 WGClimate Work Plan progress & Issues CEOS SIT Technical Workshop CNES, Montpellier, France 17 th.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Identity Ecosystem Framework and Charter Gap Analysis.
IDESG Security Committee Charter Update. Objectives The Security Committee is responsible for defining a Security Model for the Identity Ecosystem Framework.
ITU-T X.1254 | ISO/IEC An Overview of the Entity Authentication Assurance Framework.
Lecture 11 Managing Project Execution. Project Execution The phase of a project in which work towards direct achievement of the project’s objectives and.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
HIT Policy Committee NHIN Workgroup Recommendations Phase 2 David Lansky, Chair Pacific Business Group on Health Danny Weitzner, Co-Chair Department of.
STANDARDS COORDINATION COMMITTEE PLENARY BREAKOUT 18 SEPTEMBER 2014 Interoperability Requirements.
P1516.4: VV&A Overlay to the FEDEP 20 September 2007 Briefing for the VV&A Summit Simone Youngblood Simone Youngblood M&S CO VV&A Proponency Leader
S&I Standards Organization Engagement & Communication Plan DRAFT Standards Support Team 1 September 2011.
Use Case Development Cathy Tilton, Daon Scott Shorter, Electrosoft Services 7 February 2013.
Weekly Discussion Guide Functional Model Planning October 31, 2013 Adam Madlin Security Committee.
Implementation Strategy July 2002 STANDARDS DEVELOPMENT LIFECYCLE PROCESS ORP Publishes & Maintains 8 Standing Committee Recommends Approval / Disapproval.
Targets for project progress 2015: graduation review – clear documentation and PoC implementation specify general framework and API requirements gap analysis.
The PHEA Educational Technology Initiative. Project Partners PHEA Foundations – Ford, Carnegie, Kresge, MacArthur South African Institute for Distance.
Data Report July Collect and analyze RtI data Determine effectiveness of RtI in South Dakota in Guide.
1 Designing a Privacy Management System International Security Trust & Privacy Alliance.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Euan Lockie Australian Continuous Improvement Group Better Business Regulation Evaluate the way you regulate Mary Stanley Department of Justice Victoria.
JRA1.4 Models for implementing Attribute Providers and Token Translation Services Andrea Biancini.
AuthZ WG Conceptual Grid Authorization Framework document Presentation of Chapter 2 GGF8 Seattle June 25th 2003 Document AID 222 draft-ggf-authz-framework pdf.
Internal Audit Section. Authorized in Section , Florida Statutes Section , Florida Statutes (F.S.), authorizes the Inspector General to review.
Progress Report on the U.S. NSTIC Efforts Jack Suess – Delegate for Research, Development, Education & Innovation
Chapter 4 Access Control. Access Control Principles RFC 4949 defines computer security as: “Measures that implement and assure security services in a.
Capacity Building in: GEO Strategic Plan 2016 – 2025 and Work Programme 2016 Andiswa Mlisa GEO Secretariat Workshop on Capacity Building and Developing.
Planning meetingCertification audit, stage 1 Pre-audit (optional) Document review Prior to every certification audit a planning meeting is conducted where.
Identity Management (IdM)
Implementation Strategy July 2002
Outcome TFCS-11// February Washington DC
Appropriate Access InCommon Identity Assurance Profiles
Presentation transcript:

Functional Model Workstream 1: Functional Element Development

Background: Excerpt from the Functional Model AHG Terms of Reference Background: At the July 2013 plenary meeting in Boston, the Security Committee offered to steward the progression of the IDESG functional model work. Some preliminary work had previously been done under the auspices of the Standards Committee. The consensus out of the Plenary meeting in Boston was that these activities should be carried forward by the Security Committee. These Terms of Reference recite the basis for this work, and establish an Ad Hoc Group under the Security Committee to which all IDESG members are invited to participate. Purpose: The purpose of the Functional Model AHG is to define Functional Elements of identity ecosystems, which can be combined to implement identified and sustainable IDESG Use Cases. The functional model that comprises such Functional Elements can be used to: a) characterize the adoption of the NSTIC Guiding Principles by identity systems; b) explore comparability among existing identity trust frameworks; c) provide a basis for other deliverables within IDESG, such as evaluation methodologies; and d) articulate a proposed model of identity functional areas with elements that can be articulated to the broader identity community. Deliverables: A document describing the identity functional areas, including a diagram, entitled “IDESG Functional Model(s) Definition” will be produced.

Functional Element Development Lifecycle IDENTIFYCONSOLIDATEDESCRIBEDISCUSSSELECTTEST Reduce Use Cases to common functional elements Consolidate and disaggregate common elements (as necessary) Develop list and describe each functional element Discuss relevant Functional Elements within working group Select Functional Elements for inclusion Test Functional Elements(s) against existing and future use cases, models, and architectures

Functional Element Goals/Objectives Create a modular, flexible, and adaptive set of functional elements that can be effectively applied to the broadest possible collection of use cases, frameworks, and identity models. Establish functional elements in such a way that requirements can be written to them and assessed against them. Thus, the Functional Elements should: o Provide a basis set of functional elements that can be combined to support NSTIC pilot and IDESG Use Cases o Be implementable by various Actors within the identity ecosystem to fulfil required Roles o Help to delineate the responsibilities of various Actors in the identity ecosystem so that accountability for privacy/security/legal requirements is clear. o Define the functional elements that can be assessed by certification providers to provide interoperable functional components.

Functional Element Key Terms Functional Elements- The foundational set of functions and operations that occur within the Identity Ecosystem. o Not every function or operation is a Functional Element o Items were included for their common applicability across most environments, technologies, and transaction types. Deliverable team defined two types of functional elements: o Core Operations- High level actions that will likely be integral to most Identity Ecosystem use cases, frameworks, and architectures. o Functions- Common functions that support the execution and completion of the Core Operations.

Core Operations & Functions Registration o Functions: Application, Data Request, Submission of Data, Attribute Verification (Identity Proofing), Eligibility Determination Credential Provisioning o Functions: Credential Issuance/Association, Token binding, Attribute Binding Authentication o Functions: Access Request, Credential Presentation, Identity Mapping, Credential Validation, Authentication Decision Authorization o Functions: Access Request Response, Access Control Policy, Data Request, Submission of Data, Attribute Verification, Authorization Decision System Management and Maintenance o Functions: Revocation, Periodic Updates, Events Based Updates, Redress

Functional Element Matrix Core OperationsFunctions Description Registration Set of processes that establishes the identity of an entity to the extent necessary prior to creating the digital identity and issuing a credential. ApplicationProcess by which an entity requests initiation of registration. Data Request Process by which an entity is notified of the attributes required for determining eligibility to create the digital identity. Submission of Data Process for collecting identity data once an application has been received and data has been requested. Attribute Verification (Identity Proofing) Process of confirming or denying that claimed identity attributes are correct and meet the pre-determined requirements for accuracy, assurance, etc. to the required levels. Eligibility Determination A decision that an entity does or does not meet the pre-determined requirements of eligibility for an entitlement. Credential ProvisioningThe process to bind an established digital identity with a credential. Credential Issuance/AssociationProcess by which ownership of a credential is transferred or confirmed. Token BindingThe process of binding a physical or electronic token to a credential. Attribute BindingThe process of binding pre-determined attributes to a credential. Authentication Process of determining the validity of one or more credentials used to claim a digital identity. Access RequestProcess by which authentication is initiated by an entity. Credential Presentation Process by which a entity submits a credential for the purposes of authentication. Identity MappingProcess of linking the presented credential to a stored digital identity. Credential Validation/VerificationThe process of establishing the validity of the presented credential. Authentication Decision The decision to accept or not accept the results of the credential validation process.

Functional Element Matrix (Cont.) Core OperationsFunctionsDescription Authorization Authorization is the process of granting or denying specific requests for access to resources. Access Request ResponseProcess by which authorization is initiated by an entity. Access Control Policy Rules that are executed by an access control system that defines what access an entity should be granted or denied to the resource. Data Request Process by which a entity is notified of the attributes required for determining access to a specific resource; typically, these attributes for authorization have not been bound to the credential or previously available to the organization making the authorization decision. Submission of Data Process for collecting attributes required to make a determination regarding authorization. Attribute Verification The process of confirming or denying that claimed attributes are correct and meet the pre-determined requirements for authorization; typically, these attributes for authorization have not been bound to the credential or previously available to the organization making the authorization decision. Authorization Decision The decision to grant and deny access to a resource based on access controls that determine what operations are allowed to be performed on the resource System Management and Maintenance Process of creating, maintaining, deactivating and deleting digital identities, credentials, and tokens within a system. Revocation The process by which an issuing authority renders an issued credential useless for authentication to a specific digital identity. Periodic Updates Periodic scheduled background update to determine eligibility for an entitlement. Event Based Updates Background update to determine eligibility for an entitlement as a result of changes in a entity's status (e.g., change in marital status, end of subscription, etc.) Redress The process by which entities and organizations reconcile errors that occur during the operations and processes of an identity system.

Functional Elements Applied Frameworks/Architectures

NIST IdM Architecture

7

Functional Elements Applied Use Cases

Use Case: Four Party Authentication and Authorization IDP RP AP Authenticated User Authorized Use case assumes & Have been previously completed.

RP PII AP / Identity Proofer Credential Issuer/Manager/ Verifier AuthN data + PII PII (biographics) Daon Componentized Services– Credential service* *From IDESG Presentation Pilot Outbrief, Dec. 2013

RP PII AP / Identity Proofer Credential Issuer/Manager/ Verifier AuthN data + PII PII (biographics) 19 Authenticated Identity Proofed Daon Componentized Services– Credential service* *From IDESG Presentation Pilot Outbrief, Dec. 2013

Daon Componentized Services– Identity Service Provider* PII AP / Identity Proofer Credential Issuer/Manager/ Verifier AuthN data + PII PII (biographics) RP *From IDESG Presentation Pilot Outbrief, Dec. 2013

RP PII AP / Identity Proofer Credential Issuer/Manager/ Verifier AuthN data + PII PII (biographics) 21 Authorized Daon Componentized Services– Identity Provider Service* *From IDESG Presentation Pilot Outbrief, Dec Authenticated Identity Proofed

Further Considerations and Next Steps Map functional element to NSTIC derived requirements o Identify gaps, redundancies, or deficiencies. o Develop recommendations for additional security requirements. o Communicate the role of functional elements and models in requirements development to the other committees of the IDESG. Map functional elements to selected use cases and frameworks o Use case and framework selection o Develop mapping approach. o Coordination with Standards Committee. Additional steps to complete Functional Model? o Actors, Roles, Participants? o What level of detail? o Do we build the variations? Or, do we allow potential participants to map their own functional models/architectures/federations to our functional elements?

Questions?