Download presentation
Presentation is loading. Please wait.
Published byHoward Augustus Bradley Modified over 9 years ago
1
COAG AUSTRALIA The Prime Minister, Premiers and Chief Ministers signed the IGA at the COAG meeting on 13 April 2007. The key objectives of the Strategy, as set out in the IGA and detailed in the reports to COAG, include: improving standards and procedures for enrolment and registration for the issue of proof of identity documents (POI) enhancing the security features on POI documents to reduce the risk of incidence of forgery establishing mechanisms to enable organisations to verify the data on key POI documents provided by clients when registering for services improving the accuracy of personal identity information held on organisations' databases
2
COAG Cont enabling greater confidence in the authentication of individuals using online services, and enhancing the national inter-operability of biometric identity security measures. At that meeting, COAG also noted the progress made to date in giving effect to the six to the six elements of the Strategy, and acknowledged the value of this work in providing guidance to government.
3
From Standard Identity To Scaleable Higher Security Capabilities – Governments should provide plan for a standard, secure, reliable and comprehensive backbone solutions for identity assurance and credentialing for all types of instruments whether they be for public (driver licences, permits, accessing government resources e.g portals, payments local government etc) or for employees and others (logical and physical access) – both government and also designated private sector critical industries (banking, telco, utilities, transport, aviation, ports) – Credentialing and identity management functions that can be started as basic backbone structures and migrated to higher levels of security providing for… o Background checks (1:1, 1:n) Fingerprint based and biographic based International and national government agencies and local record searches o Biometric processing o Uniqueness checks o Payload and credential creation (desktop, central issuance or mix) o Payment processing o Systems management and reporting Kevin Beck
4
What Identity CARDS Should Be Mandated to What levels of Security Web ID Benefits Eligibility, and Access Portals NBN Logical and physical Identity and access Driver Firearms Other Licences Define Security Levels Kevin Beck Social & Permits High Security Licenses High Govt Parliament Agencies, Police, Responders High By Job & Industry Rated Civil – Differing Levels depending on Criticality Government Critical transport, utilities, ports water, banking Logical and physical identity and access,. Lower Identity Web Id Students Specific Workers Licences Proof of age Permits Instruments and data, can be protected and carried on the National Broadband Network
5
INSTRUMENTS Interoperability STANDARDS PROGRAM SECURITYEFFICIENCY Single &Multi- Operation Logical and Physical FIPS 201 and ICAO standards Reducing or eliminating : Fraud and Misuse Unauthorised Access Logical and Physical – Airports and Ports Replace manual or paper-based workflows Reduce identity costs Should be built upon major industry standards (FIPS and ICAO) via a modular framework Differing levels Secure transport and central storage of data (identity, credential, cryptographic keys) Secure configurable automated workflows which can be adapted over time Cost-effective (proven integrated COTS software) – reduction of development & maintenance costs while decreasing program risk (with custom solutions) Utilise the National Broadband Network Create an issuance backbone that is Scaleable For higher security Strong authentication (1, 2 or 3 factor authentication) Vendor lock-in avoidance due to open system architecture Known cost – common platforms for all agencies, multi-ops, eliminate need for multiple cards Elimination of price gouging Assured identity and credential security proven using integrated COTS software Integrated end-to-end chain-of- trust Issuance and post issuance Quickly & easily deployed solution proven integrated COTS software
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.