FOUR PILLARS FOR A SUCCESSFUL PIV ECOSYSTEM
|
|
|
- Bernard Johns
- 9 years ago
- Views:
Transcription
1 FOUR PILLARS FOR A SUCCESSFUL PIV ECOSYSTEM Four Pillars that HSPD-12 Programs must consider for a secure, efficient, interoperable PIV enterprise deployment. Continued HSPD-12 Implementation under OMB M-11-11
2 About XTec Incorporated XTec Incorporated, a Small Business, has provided government and commercial users viable, sustainable security solutions for over two decades. We are a key technology management provider and leading developer of Homeland Security Presidential Directive-12 (HSPD-12) solutions. An acknowledged thought leader in the security and authentication field, XTec provides unparalleled expertise. A testament to our knowledge base, to date XTec has more Certified Smart Card Industry Professionals/Government (CSCIP/G) than any other company. More importantly, we leverage this expertise to create a forward-thinking vision to meet our customers needs. Our customized solutions implement industry-leading technology to address today s requirements and anticipate future mandates. XTec has dedicated the past 15 years to authentication and identification solutions in support of large-scale identity management deployments. These include, but are not limited to, experiences with Department of Homeland Security (DHS), Department of State (DOS), and Department of Defense (DOD). Many XTec customers achieved card issuance in a fraction of the implementation time and cost per cardholder of other Agencies, all while managing cardholder identities in a secure, interoperable, and high-performance identity management system (IDMS). XTec has issued more than 500,000 PIV/FAC cards for the Federal Government and supports more than 70 Federal Agencies with card usage. Authentication and security solutions you can trust. TM Sunrise Valley Drive Suite 310 Reston, Virginia Telephone (703) Fax (703)
3 Table of Contents INTRODUCTION... 1 I. STRONG AUTHENTICATION... 2 II. HEIGHTENED FUNCTIONALITY & PERFORMANCE... 4 III. FULL CARD LIFECYCLE MANAGEMENT... 6 IV. SECURE INTEROPERABILITY... 7 CONCLUSION... 9 REFERENCES... 11
4 Introduction OMB M February 3, 2011 Effective FY2012, existing physical and logical access control systems must be upgraded to use PIV credentials, in accordance with National Institute of Standards and Technology (NIST) guidelines, prior to the Agency s using development and technology refresh funds to complete other activities. The Government-wide architecture and completion of Agency transition plans must align with the Federal CIO Council s Federal Identity, Credential, and Access Management Roadmap and Implementation Guidance. Homeland Security Presidential Directive-12 1 (HSPD-12), issued in 2004, requires Federal Government identity verification that: a) Is issued based on sound criteria for verifying an individual employee's identity b) Is strongly resistant to identity fraud, tampering, counterfeiting, and terrorist exploitation c) Can be rapidly authenticated electronically d) Is issued only by providers whose reliability has been established by an official accreditation process. In March 2011 the Office of Management and Budget (OMB) reported 2 that 84% of Federal employees and contractors had been issued a personal identity verification (PIV) card. This statistic indicates widespread deployment, but use of the card and its electronic capabilities has yet to be fully leveraged. OMB s recent Memorandum encourages Federal Agencies to aggressively step up their efforts to use the electronic capabilities of the PIV card. The memorandum calls for enterprise PIV use by FY2012. Implementing a comprehensive identity and access management program with the PIV card as the authentication token is a significant, and often expensive, undertaking. Federal Agencies tasked with implementation can successfully meet OMB M mandates and continue HSPD-12 implementation by achieving four major goals: Strong Authentication Heightened Functionality & Performance Full Lifecycle Management Secure Interoperability P a g e 1
5 This white paper explores the four pillars needed for a successful identity and access management solution under the direction of HSPD-12. While additional implementation techniques and guidelines are addressed in Federal guidance such as the Federal Identity, Credential and Access Management (FICAM), this paper focuses on main points Agencies should consider when designing and implementing their PIV-based access control systems and support infrastructure. The insight and recommendations provided herein are based on best practices implementation of smart card technology derived from years of experience. I. Strong Authentication Authentication is the process of establishing confidence in user identities. Strong PIV card authentication ensures that the credential is, as required by HSPD-12, strongly resistant to identity fraud, tampering, counterfeiting, and terrorist exploitation. Authentication can mean a username-password pair and matching the credentials presented with entries in a database but strong authentication must include cryptographic functions. Two major types of cryptographic functions, symmetric and asymmetric, exist with respect to PIV card authentication. Asymmetric cryptography is the use of two related keys, a public and a private, to perform complementary operations. Symmetric cryptography is the use of a secret cryptographic key to perform both the cryptographic operation and its inverse. Both symmetric and asymmetric methods allow for strong authentication, as both methods meet P a g e 2
6 the highest level of assurance defined by National Institute of Standards and Technology (NIST) Special Publication (SP) Electronic Authentication Guideline 4. While both offer the same level of assurance, each requires different steps and is suited for different situations. While asymmetric cryptography is necessary for authenticating X.509 digital certificates, Agencies can use symmetric authentication in some instances to increase efficiency without compromising assurance and security. For example, symmetric cryptography is ideal when most cardholders entering a building at the perimeter have been vetted and issued personalized cards at that particular Agency. The Agency maintains and manages the credential being presented and is the primary party for notification of compromise, replacement, renewal, expiration, and status. Cryptography The discipline that embodies principles, means and methods for providing information security, including confidentiality, data integrity, nonrepudiation, and authenticity. -NIST SP Guideline for Implementing Cryptography In the Federal Government Symmetric cryptography works best when the PACS or LACS system operator and owner (Agency) know the individual presenting the credential. In these cases, Agencies that employ symmetric cryptography will decrease the time required to complete a transaction, allow the card to readily authenticate, and increase user experience by preventing burdensome lines. Note: It is assumed that any implementation will not be deployed without diversified symmetric keys. Asymmetric cryptography is widely accepted as an interoperable means of authenticating a PIV card. To perform strong authentication, access control systems must complete four major steps. 1. Verify Genuine Card Identity. Verify that the unique ID on the card was not altered. Check unique ID (CHUID/FASCN) to ensure it is signed and matches unique ID on the digital certificates. 2. Ensure Certificate is Linked to Card. Perform challenge-response exchange to ensure the certificate belongs to that specific card. Challenge is issued using public key, to which the card responds with the corresponding private key. 3. Validate Trusted Origin. Ensure that no root or intermediate key certificate has been revoked. Perform path validation. Review the chain of issuers to determine that all are legitimate and trusted. 4. Check Status. With the legitimacy of the certificate and card confirmed, now ensure that the certificate is active and has not been revoked. Check status of digital certificate using Certificate Revocation List (CRL) or Online Certificate Status Protocol (OCSP) Responder. P a g e 3
7 Figure 1- PIV Authentication Failure to confirm all four links results in vulnerabilities. In addition to the steps for strong authentication, an Agency should be prepared to conduct asymmetric cryptography for physical and logical access as practically and efficiently as possible. Methods for asymmetric cryptography will be addressed in the next section. Realizing both forms of strong authentication requires Federal Agencies to guarantee that their physical and logical access control systems can perform both symmetric and asymmetric cryptography. Given the progress of HSPD- 12, Agencies with established access controls systems would be wise to determine if a vendor can upgrade legacy access control systems to perform strong authentication. Recommendation: Always use cryptographic mechanisms to perform strong authentication. To fully leverage the PIV card capabilities and increase security, avoid minimal, basic authentication (CHUID check, free read ). Implement access control that can perform both (and seamlessly switch between) symmetric and asymmetric cryptography. II. Heightened Functionality & Performance In conjunction with strong authentication, Agencies must consider the ability of their access control systems to operate efficiently. To add value to end users and maintain security, access control systems should perform authentication reliably. The design of the access control system architecture should be used as the primary tool to improve functionality, performance and availability. Agencies should consider two methods that result in increased functionality, the deployment of trusted edge devices and the use of cloud technology. To increase performance and availability, Agencies should deploy authentication devices geographically close to access points. Much like a network router, an Online Certificate Status Protocol (OCSP) responder placed near an entry point or access decision point will decrease the time required to perform cryptographic functions and will ensure the appropriate decision P a g e 4
8 point is reached. Decreasing the load of requests on a single server or OCSP is a significant benefit with the deployment of enterprise access control. The number of users that possess a PIV card can be significant at any single Agency; deploying edge devices can be done strategically in areas of high concentration or in any area where several transactions take place. An edge device works to bring functionality to a specified location and prevents the procurement of multiple servers that operate identically. It is important to note that an edge device must be deployed in a trusted environment with two-way communication. For example, if the edge device is communicating with a card reader the card reader must be able to authenticate to the edge device, and vice versa. All critical devices should be capable of two-way communication to safeguard the infrastructure from fraudulent devices and communications. In addition to increasing efficiency, trusted edge devices allow an access control system to be easily deployed, modified, or upgraded across multiple areas. As a result of placing trusted edge devices at or near access points and high-population areas, sub-agencies and various building locations can possess a certain level of autonomy to enforce entity policies. Local monitoring and configuration can be supported when an access control system is designed with trusted edge devices. For example, an access control point that requires multi-factor authentication and is strictly monitored can benefit from a dedicated OCSP responder edge device. In addition to the deployment of edge devices, utilizing a Software as a Service (SaaS) or cloud computing model can improve services. As noted in the Federal Cloud Computing Strategy, 5 cloud computing can maximize capacity utilization, improve IT flexibility and responsiveness, and minimize cost. The ability to improve IT flexibility, responsiveness and reduce costs leaves room for Agencies to focus on mission critical items. Particularly applicable to access control systems and the missions of HSPD-12, as well as to FICAM, is the fact that cloud computing can help to mitigate the fragmented data, application, and infrastructure silo issues. Cloud technology, in combination with the deployment of edge devices that securely communicate through the cloud, will ultimately heighten the functionality of the access control system by: Increasing Performance Increasing Availability Increasing End User Experience Readily Performing Electronic Authentication Decreasing Cost P a g e 5
9 Recommendation: Deploy authentication devices such as OCSP responders geographically close to access points to increase availability and performance. Consider combining cloud technology with edge devices to reduce costs and increase flexibility. III. Full Card Lifecycle Management ID badges were traditionally static; the information they contained rarely changed. They were low maintenance and presented few problems. In the few cases where change was necessary, it was simple to issue a new one. Likewise, lifecycle management was effectively a non-issue. PIV technology is a game changer. Security migrated to a secure portable FIPS device. The card s integrated circuit contains information that is likely to change over time. It also requires a PIN code that must be remembered and entered to activate the card. So when a data item changes or a PIN is forgotten, Agencies have only one recourse, electrically updating the PIV. (Issuing a brand new PIV is economically prohibitive.) Electrical updates bring Agencies into the realm of significant card lifecycle management. If they don t prepare carefully, Agencies will find that the lifecycle management becomes a high maintenance activity. Therefore, Agencies should take practical steps to ensure that PIV lifecycle management remains low maintenance. Let s consider three PIV maintenance activities that are current or seemingly imminent. 1. PIN Reset. A cardholder forgets the PIN or remembers it too late, locking the card after too many unsuccessful attempts. To be usable, the card must be unlocked and the PIN reset. 2. UPN Update (or equivalent). The PIV authentication digital certificate contains information needed for enabling single sign-on to networks and applications. For Agencies using Microsoft s Active Directory (AD), the needed data element is the user principal Name (UPN). The UPN might change for a number of reasons. For example, a large Federal Department redesigns its AD forest structure and wants to modify UPNs to reflect the new structure. Another reason is that a cardholder might transfer to an organization based in a different AD forest. Depending on the AD P a g e 6
10 forest structure, the cardholder s UPN may change. In these and other cases, an Agency must update the PIV Card with the new UPN. FICAM Value Proposition Enhanced customer service, both within agencies and with their business partners and constituents. Facilitating secure, streamlined, and userfriendly transactions including information sharing translates directly into improved customer service scores, lower help desk costs, and increased consumer confidence in Agency services. -Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance V Key Recovery. Agencies are required to protect information including transmitted documents and s with encryption. The PIV card and the PIV Key Encryption Key (KEK) each play a role in providing that protection. But encryption keys don t last forever, even though access to the protected information should. For example, an encrypted may be needed many years after it was originally sent, even if the encryption key is expired or revoked. Key Recovery is a mechanism for retrieving one or more previous encryption keys for this purpose. As Agencies fully implement encrypted protection, they will need the ability to perform key recovery for legacy cardholders PIV Cards who are not enabled with information about escrowed encryption keys. These are three PIV lifecycle management requirements envisioned today; others will undoubtedly arise over time. The challenge Agencies face is supporting these and forthcoming PIV lifecycle management activities securely using an efficient, low maintenance mechanism. Requiring the cardholder to return to a location where PIV cards are issued is secure, but it is neither low maintenance nor low cost. Far better is to empower cardholders to perform these operations from their desktops. The trick is to extend the reach of the PIV management infrastructure to the user s desktop so that it not only enables the lifecycle management functionality but also does so securely, guaranteeing the integrity of the PIV Card during and after the update. Recommendation: Expand the reach of the PIV management infrastructure down to the cardholder desktop. Use edge devices and software to provide security, efficiency, and scalability. IV. Secure Interoperability An Agency s ability to accept PIV credentials in a Government-wide scenario, as described in OMB M-11-11, is critical to the success of any PIV P a g e 7
11 environment. Interoperability can be interpreted as accepting cards based on visual inspection, reading a CHUID value, or purchasing approved products. Unfortunately, these methods can be insecure and may cause Agencies to invest in solutions that do not foster secure interoperability. Therefore, Agencies should take advantage of the electronic capabilities of the PIV card specification to implement secure electronic interoperability. FICAM Value Proposition Improved interoperability, specifically between agencies using their PIV credentials along with other partners carrying PIV-interoperable or third party credentials that meet the requirements of the federal trust framework. Additional benefits include minimizing the number of credentials requiring lifecycle management. -Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance V1.0 Secure electronic interoperability with respect to the PIV card means leveraging the Federal trust network or the Federal public key infrastructure (PKI). Asymmetric cryptography, previously discussed in Section I, is the most common facet of interoperability. A core HSPD-12 requirement is that the PIV credential is issued only by providers whose reliability has been established by an official accreditation process. The Federal PKI provides trust based on a set of common policies, processes, and supporting technical infrastructure. Furthermore, the Federal PKI has the sole ability with respect to HSPD-12 to issue, maintain and revoke public key certificates. The established policies and processes for maintaining a credential must be followed to ensure interoperable trust across the Government. Secure interoperability, in addition to using the Federal PKI and strong authentication, will allow Agencies to reduce PIV lifecycle costs. The ability to accept and trust a different Agency s PIV card alleviates the cost of issuing multiple credentials for an individual who works at several Agencies, such as a contractor or an employee on assignment at a different Agency. Vendors today can provide software that is not only capable of performing strong authentication but also able to introduce that credential in their identity and credential management systems. This is particularly relevant for multi-tenant facilities, where more than one Agency is present at a location, but can be beneficial in other areas such as Agencies with independently operated facilities or branches. Implementing access control systems that utilize cryptography is a timely investment for the future as well. New standards and infrastructure supporting Federal PKI cross-certified credentials, such as the PIV- Interoperable (PIV-I) credential, are currently being deployed. Federal CIO Council guidance Personal Identity Verification Interoperability for Non- Federal Issuers 6 is one such standard that will guide this practice; it is expected that NIST and additional CIO Council guidance will follow. Agencies can reduce future costs and prevent the use of technology refresh funds by ensuring their access control solutions support PIV-I or third party trusted credentials now. P a g e 8
12 Recommendation: Implement access control systems that use cryptographic authentication mechanisms and are capable of supporting future interoperability enhancements, such as PIV-I. Invest in products that can incorporate differing Agency credentials into the identity and credential management system on a regular or as-needed basis. Conclusion It is not enough to simply procure approved products; Agencies must consider the ability of those products to provide true security, yet also be efficient and scalable. By addressing the four pillars described in this white paper, Federal Agencies can achieve a secure, efficient, interoperable enterprise PIV environment. Strong authentication will ensure that physical and logical resources are protected from intrusion and fraud. Heightened Functionality & Performance, specifically self-service and cloud or edge technology will make the PIV enterprise more efficient. Full Lifecycle Management will be addressed by expanding the reach of the PIV management infrastructure down to the cardholder desktop and using edge devices and software to provide security, efficiency, and scalability. Secure Interoperability, the ability to accept and trust differing Agency credentials while preparing for the acceptance of third party credentials, will prevent costly, time-consuming upgrades. Recommendations: Always use cryptographic mechanisms to perform strong authentication. To fully leverage the PIV card capabilities and increase security, avoid minimal, basic authentication (CHUID check, free read ). Implement access control that can perform both (and seamlessly switch between) symmetric and asymmetric cryptography. Deploy authentication devices such as OCSP responders geographically close to access points to increase availability and performance. Consider combining cloud technology with edge devices to reduce costs and increase flexibility. Expand the reach of the PIV management infrastructure down to the cardholder desktop. Use edge devices and software to provide security, efficiency, and scalability. P a g e 9
13 Implement access control systems that use cryptographic authentication mechanisms and are capable of supporting future interoperability enhancements, such as PIV-I. Invest in products that can incorporate differing Agency credentials into the identity and credential management system on a regular or as-needed basis. P a g e 10
14 References 1 Homeland Security Presidential Directive 12 HSPD-12 August 22, HSPD-12 Status Report March OMB M11-11 Continued Implementation of Homeland Security Presidential Directive (HSPD) 12 Policy for a Common Identification Standard for Federal Employees and Contractors, February 3, NIST SP Electronic Authentication Guideline, April Federal Cloud Computing Strategy February Strategy.pdf 6 Personal Identity Verification Interoperability for Non-Federal Issuers, Federal CIO Council July P a g e 11
DEPARTMENTAL REGULATION
U.S. DEPARTMENT OF AGRICULTURE WASHINGTON, D.C. 20250 DEPARTMENTAL REGULATION SUBJECT: Identity, Credential, and Access Management Number: 3640-001 DATE: December 9, 2011 OPI: Office of the Chief Information
2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.
Purpose and Scope The purpose of this policy is to define the roles and responsibilities on implementing the Homeland Security Presidential Directive 12 (HSPD-12) Logical Access Control (LAC) throughout
Identity, Credential, and Access Management. An information exchange For Information Security and Privacy Advisory Board
Federal CIO Council Information Security and Identity Management Committee Identity, Credential, and Access Management An information exchange For Information Security and Privacy Advisory Board Deb Gallagher
What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form. December 3, 2012
Federal CIO Council Information Security and Identity Management Committee IDManagement.gov What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form December 3, 2012 HSPD-12
GAO PERSONAL ID VERIFICATION. Agencies Should Set a Higher Priority on Using the Capabilities of Standardized Identification Cards
GAO United States Government Accountability Office Report to Congressional Requesters September 2011 PERSONAL ID VERIFICATION Agencies Should Set a Higher Priority on Using the Capabilities of Standardized
GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.
PERSONAL IDENTITY VERIFICATION (PIV) OVERVIEW INTRODUCTION (1) Welcome to the Homeland Security Presidential Directive 12 (HSPD-12) Personal Identity Verification (PIV) Overview module, designed to familiarize
Commonwealth of Virginia Personal Identity Verification-Interoperable (PIV-I) First Responder Authentication Credential (FRAC) Program
Commonwealth of Virginia Personal Identity Verification-Interoperable (PIV-I) First Responder Authentication Credential (FRAC) Program October 2012 W. Duane Stafford Statewide Credentialing Coordinator
NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics
NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics Jan Krhovják Outline Introduction and basics of PIV Minimum
Information Technology Policy
Information Technology Policy Identity Protection and Access Management (IPAM) Architectural Standard Identity Management Services ITP Number ITP-SEC013 Category Recommended Policy Contact [email protected]
An Operational Architecture for Federated Identity Management
An Operational Architecture for Federated Identity Management March 2011 Implementing federated identity management and assurance in operational scenarios Federated Identity Solution The Federated identity
HSPD-12 Implementation Architecture Working Group Concept Overview. Version 1.0 March 17, 2006
HSPD-12 Implementation Architecture Working Group Concept Overview Version 1.0 March 17, 2006 Table of Contents 1 PIV Lifecycle... 3 2 High Level Component Interaction Diagram... 4 3 PIV Infrastructure
Department of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT
Department of Veterans Affairs VA DIRECTIVE 6510 Washington, DC 20420 Transmittal Sheet VA IDENTITY AND ACCESS MANAGEMENT 1. REASON FOR ISSUE: This Directive defines the policy and responsibilities to
Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment
Strong Authentication: Enabling Efficiency and Maximizing Security in Your Microsoft Environment IIIIII Best Practices www.gemalto.com IIIIII Table of Contents Strong Authentication and Cybercrime... 1
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
US Security Directive FIPS 201
Security US Security Directive FIPS 201 Compliance Strategies Learn about compliance strategies for governmental agencies in meeting requirements of Homeland Security Presidential Directive 12 (HSPD-12),
NOAA HSPD-12 PIV-II Implementation October 23, 2007. Who is responsible for implementation of HSPD-12 PIV-II?
NOAA HSPD-12 PIV-II Implementation What is HSPD-12? Homeland Security Presidential Directive 12 (HSPD-12) is a Presidential requirement signed on August 27, 2004 requiring Federal agencies comply with
Identity, Credential, and Access Management. Open Solutions for Open Government
Federal CIO Council Information Security and Identity Management Committee Identity, Credential, and Access Management www.idmanagement.gov Open Solutions for Open Government Judith Spencer Co-Chair, ICAM
Audio: This overview module contains an introduction, five lessons, and a conclusion.
Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules
Federal PKI (FPKI) Community Transition to SHA-256 Frequently Asked Questions (FAQ)
Federal PKI (FPKI) Community Transition to SHA-256 Frequently Asked Questions (FAQ) Version 1.0 January 18, 2011 Table of Contents 1. INTRODUCTION... 3 1.1 BACKGROUND... 3 1.2 OBJECTIVE AND AUDIENCE...
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT
For Official Use Only (FOUO)
The FEMA Mission To support our citizens and first responders to ensure that as a nation we work together to build, sustain, and improve our capability to prepare for, protect against, respond to, and
Federal PKI. Trust Infrastructure. Overview V1.0. September 21, 2015 FINAL
Federal PKI Trust Infrastructure Overview V1.0 September 21, 2015 FINAL This Page is Blank Table of Contents 1. Introduction... 1 2. Public Key Infrastructure Overview... 2 3. Federal Public Key Infrastructure
Implementing Federal Personal Identity Verification for VMware View. By Bryan Salek, Federal Desktop Systems Engineer, VMware
Implementing Federal Personal Identity Verification for VMware View By Bryan Salek, Federal Desktop Systems Engineer, VMware Technical WHITE PAPER Introduction This guide explains how to implement authentication
The Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
Personal Identity Verification (PIV) of Federal Employees and Contractors
FIPS PUB 201-2 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Personal Identity Verification (PIV) of Federal Employees and Contractors Computer Security Division Information Technology Laboratory
Identity & Privacy Protection
Identity & Privacy Protection An Essential Component for a Federated Access Ecosystem Dan Turissini - CTO, WidePoint Corporation [email protected] 703 246 8550 CyberSecurity One of the most serious economic
Smart Cards and Biometrics in Physical Access Control Systems
Smart Cards and Biometrics in Physical Access Control Systems Robert J. Merkert, Sr. Vice President of Sales Americas Biometric Consortium 2005 Conference September 21, 2005 All Company and/or product
Federal Identity, Credential, and Access Management Trust Framework Solutions. Relying Party Guidance For Accepting Externally-Issued Credentials
Federal Identity, Credential, and Access Management Trust Framework Solutions Relying Party Guidance For Accepting Externally-Issued Credentials Version 1.1.0 Questions? Contact the FICAM TFS Program Manager
Federal Identity Management Handbook
September 2005 PUBLIC DRAFT Acknowledgements The Office of Management and Budget and the Federal Identity Credentialing Committee would like to acknowledge the significant contributions of the National
Enable Your Applications for CAC and PIV Smart Cards
Enable Your Applications for CAC and PIV Smart Cards Executive Summary Since HSPD-2 was signed in 2004, government agencies have issued over 5 million identity badges. About 90% of government workers and
Announcing Approval of Federal Information Processing Standard (FIPS) Publication 201-2,
This document is scheduled to be published in the Federal Register on 09/05/2013 and available online at http://federalregister.gov/a/2013-21491, and on FDsys.gov Billing Code 3510-13 DEPARTMENT OF COMMERCE
Practical Challenges in Adopting PIV/PIV-I
UNCLASSIFIED Practical Challenges in Adopting PIV/PIV-I Hank Morris UNCLASSIFIED 2 UNCLASSIFIED // FOUO Purpose and Agenda Purpose: Explore the policy, process, and mechanisms to securely leverage biometrics
Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software
WHITE PAPER: COMPARING TCO: SYMANTEC MANAGED PKI SERVICE........ VS..... ON-PREMISE........... SOFTWARE................. Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software
FEDERAL IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT AND PERSONAL IDENTITY VERIFICATION (PIV) SOLUTIONS
FEDERAL IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT AND PERSONAL IDENTITY VERIFICATION (PIV) SOLUTIONS Homeland Security Presidential Directive 12 (HSPD 12), FIPS 201, and the latest Federal Identity,
Federal Identity, Credential, and Access Management Trust Framework Solutions. Overview
Federal Identity, Credential, and Access Management Trust Framework Solutions Overview Version 1.0 02/07/2014 Questions? Contact the FICAM TFS Program Manager at [email protected] 1 Table of Contents 1.
Understanding the differences in PIV, PIV-I, PIV-C August 23, 2010
Federal CIO Council Information Security and Identity Management Committee Identity, Credential, and Access Management Understanding the differences in PIV, PIV-I, PIV-C August 23, 2010 Tim Baldridge AWG
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
E X E C U T I V E O F F I CE O F T H E P R E S I D EN T
EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 THE DIRECTOR M-05-24 August 5, 2005 MEMORANDUM FOR THE HEADS OF ALL DEPARTMENTS AND AGENCIES FROM: SUBJECT: Joshua
Deriving a Trusted Mobile Identity from an Existing Credential
Deriving a Trusted Mobile Identity from an Existing Credential Exploring and applying real-world use cases for mobile derived credentials +1-888-690-2424 entrust.com Table of contents Approval of the mobile
NIST Cyber Security Activities
NIST Cyber Security Activities Dr. Alicia Clay Deputy Chief, Computer Security Division NIST Information Technology Laboratory U.S. Department of Commerce September 29, 2004 1 Computer Security Division
Identity and Access Management Initiatives in the United States Government
Identity and Access Management Initiatives in the United States Government Executive Office of the President November 2008 Importance of Identity Management within the Federal Government "Trusted Identity"
Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance
Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance December 2, 2011 Powered by the Federal Chief Information Officers Council and the Federal Enterprise Architecture
STATEMENT OF WORK. For
STATEMENT OF WORK For Credentialing and Validation Support for DC Homeland Security & Emergency Management Agency (DC HSEMA) IN SUPPORT OF THE GOVERNMENT OF THE DISTRICT OF COLUMBIA November 15, 2012 1.
NSF AuthentX Identity Management System (IDMS) Privacy Impact Assessment. Version: 1.1 Date: 12/04/2006. National Science Foundation
This document has been archived and replaced by piaauthentx1207..0 National Science Foundation NSF AuthentX Identity Management System (IDMS) Privacy Impact Assessment Version: 1.1 Date: 12/04/2006 Table
DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, DC 20301-6000
DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, DC 20301-6000 CHIEF INFORMATION OFFICER OCT 05 2010 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS CHAIRMAN OF THE JOrNT CHIEFS OF STAFF
Frequently Asked Questions (FAQs) SIPRNet Hardware Token
Air Force Public Key Infrastructure System Program Office (ESC/HNCDP) Phone: 210-925-2562 / DSN: 945-2562 Web: https://afpki.lackland.af.mil Frequently Asked Questions (FAQs) SIPRNet Hardware Token Updated:
The Government-wide Implementation of Biometrics for HSPD-12
The Government-wide Implementation of Biometrics for HSPD-12 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy September 24, 2008 1 The HSPD-12 Mandate Home Security
Intelligent Security Design, Development and Acquisition
PAGE 1 Intelligent Security Design, Development and Acquisition Presented by Kashif Dhatwani Security Practice Director BIAS Corporation Agenda PAGE 2 Introduction Security Challenges Securing the New
U.S. Department of Energy Washington, D.C.
U.S. Department of Energy Washington, D.C. ORDER DOE O 206.2 Approved: SUBJECT: IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT (ICAM) 1. PURPOSE. To establish requirements and responsibilities for DOE s identity,
NIST Test Personal Identity Verification (PIV) Cards
NISTIR 7870 NIST Test Personal Identity Verification (PIV) Cards David A. Cooper http://dx.doi.org/10.6028/nist.ir.7870 NISTIR 7870 NIST Text Personal Identity Verification (PIV) Cards David A. Cooper
IDaaS: Managed Credentials for Local & State Emergency Responders
IDaaS: Managed Credentials for Local & State Emergency Responders NextgenID ID*TRUST Platform NextgenID - Headquarters USA 10226 San Pedro, Suite 100 San Antonio, TX 78216 +1 (210) 530-9991 www.nextgenid.com
Personal Identity Verification (PIV) of Federal Employees and Contractors
FIPS PUB 201-1 Change Notice 1 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Personal Identity Verification (PIV) of Federal Employees and Contractors Computer Security Division Information Technology
Justice Management Division
Justice Management Division Privacy Impact Assessment for the Personal Identity Verification (PIV) Card System Issued by: Stuart Frisch, Senior Component Official for Privacy Reviewed by: Vance E. Hitch,
1. The human guard at the access control entry point determines whether the PIV Card appears to be genuine and has not been altered in any way.
+ Expiration date + Agency card serial number (back of card) + Issuer identification (back of card). The PIV Card may also bear the following optional components: + Agency name and/or department + Department
Architecture for Issuing DoD Mobile Derived Credentials. David A. Sowers. Master of Science In Computer Engineering
Architecture for Issuing DoD Mobile Derived Credentials David A. Sowers Thesis submitted to the faculty of the Virginia Polytechnic Institute and State University in partial fulfillment of the requirements
Personal Identity Verification (PIV) of Federal Employees and Contractors DRAFT
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 FIPS PUB 201-2 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Personal Identity Verification (PIV) of Federal Employees and
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
The Benefits of an Industry Standard Platform for Enterprise Sign-On
white paper The Benefits of an Industry Standard Platform for Enterprise Sign-On The need for scalable solutions to the growing concerns about enterprise security and regulatory compliance can be addressed
PKI Deployment Business Issues
An OASIS PKI White Paper PKI Deployment Business Issues By Amir Jafri and June Leung (FundSERV Inc.) For the Oasis PKI Member Section OASIS PKI White Paper OASIS (Organization for the Advancement of Structured
Authentication, Authorization, and Audit Design Pattern: Internal User Identity Authentication
Authentication, Authorization, and Audit Design Pattern: Internal User Identity Authentication Office of Technology Strategies (TS) Architecture, Strategy, and Design (ASD) Office of Information and Technology
Federal Identity, Credentialing, and Access Management. Identity Scheme Adoption Process
Federal Identity, Credentialing, and Access Management Identity Scheme Adoption Process Version 1.0.0 Release Candidate July 8, 2009 ii Document History Status Release Date Comment Audience Draft 0.0.1
Neutralus Certification Practices Statement
Neutralus Certification Practices Statement Version 2.8 April, 2013 INDEX INDEX...1 1.0 INTRODUCTION...3 1.1 Overview...3 1.2 Policy Identification...3 1.3 Community & Applicability...3 1.4 Contact Details...3
MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory. Chapter 11: Active Directory Certificate Services
MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 11: Active Directory Certificate Services Objectives Describe the components of a PKI system Deploy the Active Directory
DOE Joint ICAM Program - Unclass & Secret Fabrics
DOE Joint ICAM Program - Unclass & Secret Fabrics GSA Federal ICAM Day, 16 April 2014 Mr. Frank Husson & Mr. Rich Tannich Unclassified Agenda Unclassified Initiative Mr. Frank Husson will share DOE s vision
NIST Cybersecurity White Paper
The attached DRAFT document (provided here for historical purposes) has been superseded by the following publication: Publication: Title: NIST Cybersecurity White Paper Best Practices for Privileged User
I N F O R M A T I O N S E C U R I T Y
NIST Special Publication 800-78-2 DRAFT Cryptographic Algorithms and Key Sizes for Personal Identity Verification W. Timothy Polk Donna F. Dodson William. E. Burr I N F O R M A T I O N S E C U R I T Y
WHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT
WHITE PAPER: STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT IntelliDyne, LLC MARCH 2012 STRATEGIC IMPACT PILLARS FOR EFFICIENT MIGRATION TO CLOUD COMPUTING IN GOVERNMENT
Integration of Access Security with Cloud- Based Credentialing Services
Integration of Access Security with Cloud- Based Credentialing Services Global Identity Summit September 17, 2014 All text, graphics, the selection and arrangement thereof, unless otherwise cited as externally
WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES
WHITEPAPER SECUREAUTH AND CAC HSPD-12 AUTHENTICATION TO WEB, NETWORK, AND CLOUD RESOURCES Executive Overview U.S. Federal mandates dictates that personal with defense related initiatives must prove access
The Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
No additional requirements to use the PIV I card for physical facility access have been identified.
1. The RFI request document regarding Driver Authentication states that "any one or more of the following methods" will be required: Personal Identification Number (PIN) Non Federal Personal Identity Verification
Using FICAM as a model for TSCP Best Prac:ces in Physical Iden:ty and Access Management. TSCP Symposium November 2013
Using FICAM as a model for TSCP Best Prac:ces in Physical Iden:ty and Access Management TSCP Symposium November 2013 Quantum Secure s Focus on FICAM and Related Standards Complete Suite of Physical Iden:ty
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions May 3, 2004 TABLE OF CONTENTS GENERAL PKI QUESTIONS... 1 1. What is PKI?...1 2. What functionality is provided by a
GSA FIPS 201 Evaluation Program
GSA FIPS 201 Evaluation Program David Temoshok Director, Federal Identity Policy and Management GSA Office of Governmentwide Policy NIST/DHS/TSA TWIC QPL Workshop April 21, 2010 1 HSPD-12 Government-wide
Personal Identity Verification (PIV) of Federal Employees and Contractors
FIPS PUB 201-2 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Personal Identity Verification (PIV) of Federal Employees and Contractors Computer Security Division Information Technology Laboratory
CoSign by ARX for PIV Cards
The Digital Signature Company CoSign by ARX for PIV Cards Seamless and affordable digital signature processes across FIPS 201-compliant systems Introduction to Personal Identity Verification (PIV) In response
Department of Defense SHA-256 Migration Overview
Department of Defense SHA-256 Migration Overview 18 March 2011 Tim Fong DoD-CIO/ IIA [email protected] General Observations This is Important INFOSEC: Algorithms can be compromised over time. Crypto
SecureAuth Authentication: How SecureAuth performs what was previously impossible using X.509 certificates
SecureAuth Authentication: How SecureAuth performs what was previously impossible using X.509 certificates As enterprises move their applications to the Web and mobile platforms, providing strong security
INFORMATION PROCEDURE
INFORMATION PROCEDURE Information Security - Identification and Authentication Procedure Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY
Office of the Chief Information Officer Department of Energy Identity, Credential, and Access Management (ICAM)
Department of Energy Identity, Credential, and Access Management (ICAM) Cyber Security Training Conference Tuesday, May 18, 2010 1 Announcement LACS Birds-of-a-Feather Session Logistics Wednesday, May
Using FIPS 201 and the PIV Card for the Corporate Enterprise
Using FIPS 201 and the PIV Card for the Corporate Enterprise A Smart Card Alliance White Paper Publication Date: October 2008 Publication Number: IC-08002 Smart Card Alliance 191 Clarksville Rd. Princeton
Best Practices for Privileged User PIV Authentication
NIST Cybersecurity White Paper csrc.nist.gov Best Practices for Privileged User PIV Authentication Computer Security Division Information Technology Laboratory Applied Cybersecurity Division Information
White paper. Implications of digital certificates on trusted e-business.
White paper Implications of digital certificates on trusted e-business. Abstract: To remain ahead of e-business competition, companies must first transform traditional business processes using security
Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions.
Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH White Paper February 2010 www.alvandsolutions.com Overview Today s increasing security threats and regulatory
GOVERNMENT USE OF MOBILE TECHNOLOGY
GOVERNMENT USE OF MOBILE TECHNOLOGY Barriers, Opportunities, and Gap Analysis DECEMBER 2012 Product of the Digital Services Advisory Group and Federal Chief Information Officers Council Contents Introduction...
Apple Corporate Email Certificates Certificate Policy and Certification Practice Statement. Apple Inc.
Apple Inc. Certificate Policy and Certification Practice Statement Version 2.0 Effective Date: April 10, 2015 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2. Table of acronyms... 4 1.3.
NATIONAL DIRECTIVE FOR IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT CAPABILITIES (ICAM) ON THE UNITED STATES (US) FEDERAL SECRET FABRIC
Committee on National Security Systems 1 CNSSD No. 507 January 2014 NATIONAL DIRECTIVE FOR IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT CAPABILITIES (ICAM) ON THE UNITED STATES (US) FEDERAL SECRET FABRIC
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
I N F O R M A T I O N S E C U R I T Y
NIST Special Publication 800-78-3 DRAFT Cryptographic Algorithms and Key Sizes for Personal Identity Verification W. Timothy Polk Donna F. Dodson William E. Burr Hildegard Ferraiolo David Cooper I N F
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access
Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access CONTENTS What is Authentication? Implementing Multi-Factor Authentication Token and Smart Card Technologies
Schlumberger PKI /Corporate Badge Deployment. Neville Pattinson Director of Business Development & Technology IT & Public Sector
Schlumberger PKI /Corporate Badge Deployment Neville Pattinson Director of Business Development & Technology IT & Public Sector 1 Overview Background Overview of the PKI and Corporate Badge components
State Identity Credential and Access Management (SICAM) Guidance and Roadmap
State Identity Credential and Access Management (SICAM) - Version 1.0 September 2012 EXECUTIVE SUMMARY The State Identity and Credential Access Management (SICAM) outline a strategic vision for state-based
Strong Authentication for PIV and PIV-I using PKI and Biometrics
Strong Authentication for PIV and PIV-I using PKI and Biometrics Adam Shane PSP, Product Manager and Sr. Systems Design Architect AMAG Technology Bob Fontana CSCIP/G, Vice President-Federal Identity Codebench/HID
