Presentation is loading. Please wait.

Presentation is loading. Please wait.

Trusted Federated Identity and Access Management to provide the Cornerstone for Cyber Defense.

Similar presentations


Presentation on theme: "Trusted Federated Identity and Access Management to provide the Cornerstone for Cyber Defense."— Presentation transcript:

1 Trusted Federated Identity and Access Management to provide the Cornerstone for Cyber Defense.

2 What is TSCP? TSCP is the Transglobal Secure Collaboration Program established in 2002, TSCP is a non- profit 501(c)(6) technical association, which relies on Government-Industry Partnership to accomplish: Managed Trust through a federated Trust Framework with all the agreed governance documents e.g. business, technical, legal, privacy. Scalable Trust to the Supply Chain. Pooling resources to accomplish specification development, validation in a production and operational environments. Sharing lessons learned. Leverage International Standards adding the framework to meet operational needs. Providing the Cornerstone for cyber defense. Aerospace & Defense, Technology Members, and Government Partners TSCP A&D companies have invested over $400M in internal federated systems using TSCP’s common operating rules and specifications. PAGE 2 | TSCP

3 What Does TSCP Do? SPECIFICATIONS DEVELOPMENT.* Develops common specifications for secure collaboration solutions across the TSCP membership that align to government requirements. The specifications fall into these categories: Secure information exchange Identity credentials/digital identities and attributes Federated identity Information assurance Data labeling and protection and ITAR/Export VALIDATION THROUGH PRODUCTION REFERENCE LAB. Before TSCP publishes its specifications, the capability is in production with two or more members. GOVERNANCE. Establishes policy and governance for TSCP Solutions. Interoperable Identity Federation Trust Framework Common Operating Rules Legal Framework & Allocation of Liabilities Accreditation & Trustmark FEDERATED HUB. Hosts a Federated Hub for TSCP Membership that enables secure collaboration between TSCP membership and government customers. PAGE 3 | TSCP

4 PAGE 4 | TSCP Barriers to Efficient, Cross-Enterprise Information Sharing in a Collaborative Environment Electronic Information Sharing Fiscal Practicality Access Control Identity Management Compliance Enablement Data Integrity 4 Large upfront investments and ongoing expense Inability to scale across multiple enterprises Lack of flexibility to meet evolving requirements Enabling partners regardless of their geographical locations, size, or technical expertise Integrating different processes and systems - across partners Risk to intellectual property and compliance issues Information assurance an inhibitor for information sharing PAGE 4 | TSCP

5 PAGE 5 | TSCP TSCP must extend chain of trust to the supply chain. A&D companies are responsible for vetting their supply chain. At any given time within the A&D global supply-chain, there are approximately 300,000 supplier Benefits for the Supply Chain companies working on government contracts, representing roughly 3 to 4 million individuals. Supply Chain - Leverages business processes for the A&D Industry Reduced Supplier on boarding/network costs (benefit to both A&D and Supply Base) Accelerated time to value for supply chain management technology initiatives Enhanced Security through strong authentication Authenticated Assurance through access management PAGE 5 | TSCP

6 PAGE 6 | TSCP TSCP Involvement with Other Key Initiatives TSCP Defense Industry Base (DIB) Defense Industry Base (DIB) Federal Working Groups Eg., POWG, EIWG, AEFI,... Federal Working Groups Eg., POWG, EIWG, AEFI,... Industry Organizations e.g. AIA, AHC, ASD, UKCeB, OASIS, Kantara, OIX, Safe-Biopharma, Smart Card Alliance, STRAC, TTWG Industry Organizations e.g. AIA, AHC, ASD, UKCeB, OASIS, Kantara, OIX, Safe-Biopharma, Smart Card Alliance, STRAC, TTWG Federal Programs Federal Programs A number of the same TSCP companies & governments are involved with these other initiatives - our goal is to synergize and leverage TSCP efforts Enhancing Synergy e.g. NSTIC,ESF (hiatus), NSA, DISA etc. Enhancing Synergy e.g. NSTIC,ESF (hiatus), NSA, DISA etc. Cyber Security Supply Chain & Adoption NATO Initiatives Supply Chain Adoption PAGE 6 | TSCP

7  People. Uniformly vetted and proofed personnel to consistent standards to create the digital identity.  Data. Applying consistent data labeling and data tagging techniques.  Hardware. Embedding digital identity into the Trusted Platform Module (TPM).  Software. Binding the digital identity to applications. The Elements for End To End Managed Trust Risk of Enterprise Exposure. Cyber Security “In Depth Approach” does not provide adequate security controls to prevent and detect unauthorized access to enterprise networks, data, applications and systems. PAGE 7 | TSCP TSCP Trust Framework Cornerstone

8 PAGE 8 | TSCP Online Shopping Investing & Banking Secure Sign- on to work Government Websites Trustworthy Critical Service Delivery Private Emails and Postings Business and Consumer Applications 3 Identity And Attribute Providers 4 Trust Framework Credential Attribute Exchange Network (AXN) Trust Framework Credential Attribute Exchange Network (AXN) 2 Users Credentials and Devices 1 Market Sectors Operational Trust Framework PAGE 8 | TSCP

9 Government Agencies Portals Use Case 1: Federation and Mission Support TSCP Member IdP(s) Issue identities/ credentials to users Routes authentication requests and responses between RPs and IdPs. Supply Chain Company 1Company 4Company 3Company nCompany 5Government 1 International Governments Government nGovernment 2 Programs / Operations Company 2 PAGE 9 | TSCP

10 Remote & Desktop Login Credential & Rights Management Network Controls Building Access Corporate Access Card User Local or Remote User Host-Based Intrusion Protection Systems Strong Authentication – PIV-I Credentials Credential Management – Centralized Public Key Infrastructure Global A&D Supply Chain Commercial Industry Base User and Privilege Management – Automated Provisioning Multi-Layered approach to provide additional security layers across our networks, systems, facilities, data, intellectual property and information assets Data Monitoring & Protection Systems Use Case 2: Multi-Layer Security Across the Enterprise TSCP Common Operating Rules PAGE 10 | TSCP

11 Use Case 3: Information Labeling and Access - ITAR/Export PAGE 11 | TSCP

12 Use Case 4: Operational Cyber and Identity Deployments PAGE 12 | TSCP

13 Use Case 5: Adjacent Markets: Financial & Retail Sectors B2GB2BC2B PAGE 13 | TSCP

14 Areas for Collaboration TSCP Trust Framework TSCP Trustmark SOA PLATFORM INFORMATION ASSURANCE PATTERNS FMN PROFILE MESSAGE SECURITY Secure Messaging Networking Layer Federated Authentication Service Secure Messaging Communications Layer Secure Messaging Applications/Services Layer Identity Provider Services Secure Document Management/ Archiving Federated Mission Networking Secure Address Validation TSCP Federation Framework & Specifications & Hub TSCP Secure E-Mail Specification TSCP Attribute Management/ Data Labeling Specification TSCP Secure E-Mail Specification TSCP PIV-I Specification Illustrative Secure Messaging Platform TSCP Trust Framework, Common Operating Rules & Governance Documents Secure E-Mail/ Messaging (Hosted) Secure Mail & Package Tracking Secure G2C, B2B Communications Secure/Anonymous Shipping PAGE 14 | TSCP

15 PAGE 15 | TSCP Benefits to the TSCP Community Managed Trust through a global federated Trust Framework with agreed common governance documents e.g. business, technical, legal, privacy. Scalable Trust for Collaborative Endeavors. Pooling resources to accomplish specification development, validation in a production and operational environments. Sharing lessons learned. Leverage International Standards adding the framework to meet operational needs. Using Trusted Federated Identity and Access Management to provide the Cornerstone for Cyber Defense.


Download ppt "Trusted Federated Identity and Access Management to provide the Cornerstone for Cyber Defense."

Similar presentations


Ads by Google