SecurityManager. Enterprise Personnel & Physical Security Case Management Solution for Federal Agencies
|
|
- Anastasia Harrell
- 8 years ago
- Views:
Transcription
1 SecurityManager Enterprise Personnel & Physical Security Case Management Solution for Federal Agencies SecurityManager is THE CENTECH GROUP, Inc s (CENTECH s) Web-based enterprise case management solution providing workflow and process support functions that address the needs of Federal Department/Agency Personnel and Physical Security divisions. Capabilities SecurityManager s application suite provides the industry s most advanced configurable and customizable rule-based workflow processes to streamline and automate Personnel Security and Physical Security tasks related to: Pre-Appointment / Entry-on-Duty Suitability Security Clearance Adjudication Associating Contractors to Contracts DD 254 Automation Classified Visit Management Information Security Foreign National Visitor Management SMartPIV Identity Management System (IDMS) SMartPIV Card Management System (CMS) Benefits Supports Executive Order (EO) eligibility determination process reform goals All transactions audit logged Extensive automation through system interfaces and data import/export edelivery upload and context sensitive association with subject, case, investigation eadjudication for low risk non-issue cases Task workflow queue management for effective management of workforce/workload Supports timeliness goals of the Performance Accountability Council (PAC) Interfaces with Office of Personnel Management (OPM) Personnel Investigation Processing System (PIPS), OPM Central Verification System (CVS), National Finance Center (NFC) and others Complete integration between the adjudicative system and the IDMS/CMS IDMS/CMS - CENTECH s SMartPIV is one of only nine GSA FIPS-201 certified CMSs (APL#1215) SecurityManager supports Homeland Security Presidential Directive (HSPD)-12 mandates through our Federal Information Processing Standards (FIPS)-201 General Services Administration (GSA) approved SMartPIV IDMS and CMS. Our comprehensive workflow and business rules ensure successful navigation of FIPS-201 while maintaining the biometric chain of trust, investigative data and credential history. The integration between the SecurityManager personnel security processes (adjudication of trust) and physical security IDMS/CMS (identity proofing and card issuance/ maintenance) provide a robust integrated solution that eliminates duplicate data entry, streamlines adjudicative and card issuance decisions, ensures adherence to FIPS-201 standards, and provides for adjudication and card life cycle management and auditing. For more information, contact: THE CENTECH GROUP, Inc Arlington Blvd., 10th Floor Falls Church, VA (P)
2 Personnel and Physical Security / FIPS-201 / HSPD-12 Personnel Security (PerSec) Rule-based, workflow driven, case management system to manage the life cycle of federal employee and contractor pre-appointment, suitability and security clearance processing Automated interfaces, imports and exports with OPM, CVS, NFC, Scattered Castles, human resource (HR) systems, IDMS, CMS, and others edelivery with automatic parsing, upload and attachment to person, case and investigation eadjudication with automatic task completion and adjudication for issue-free cases Supports multi-tenancy, multiple positions, cases and investigations Attached documents and electronic notifications for maintaining communications audit trail National Institute of Standards and Technology (NIST) security control compliant for High and Moderate risk systems Contracts & DD 254 Supports the association, management and tracking of contracts to contractors; automatic generation of DD 254 forms, and links to the PerSec module to support contractor personnel management. Visitor Management Manages incoming and outgoing visitors enforcing clearance level requirements; records sponsor and sponsoring entity, point of contact, etc. Generates outgoing and revocation visitor letters Allows for incoming letter upload and attachment to the person Information Security Rules-based management of classified documents, containers, rooms, facilities and related audits. Integrates with PerSec enforcing custodial clearance requirements and asset reassignment before separation. Foreign National Visitor Manages visitor approval adjudication process including index checks with Federal Bureau of Investigation s ( FBI s) III and Central Intelligence Agency s (CIA s) Scattered Castles Enforces rules for country relationship of visitor, visit length, sponsor and others SMartPIV IDMS Biometric collection and management supporting FIPS-201 workflow for enrollment and registration SMartPIV Card Management System (CMS) FIPS-201 approved for HSPD-12 Personal Identity Verification (PIV) card personalization and FIPS-201 card life cycle workflow Personalizes and encodes PIV, PIV-I, and other smart cards formats according to client needs Interfaces with IDMS, Certificate Authorities (CAs) and public key infrastructure (PKI) certificate providers 2
3 Personnel Security (PerSec) Module The PerSec Module is the core of SecurityManager, providing the capability to manage all aspects of personnel security including enforcing business rules; workflow driven processes; generation of automated forms, letters and reports; electronic notifications; productivity metrics on processes and people; automated import/export and web services to/from other systems/agencies; and auditable records meeting NIST and FIPS-201 compliance mandates. Specific processes include: Employee/Contractor Pre-Employment/Entry on Duty (EOD) º º Interfaces with CMS to authorize creation of a PIV credential case Employee/Contractor Suitability includes FIPS-201 compliant steps for fingerprint check, credit check, FBI name check º º Interfaces with CMS to provide adjudication results; approval or revocation º º Contractors can be associated with contracts/task orders to better manage separation, PIV collection accountability and Physical Access Control System (PACS) deprovisioning Employee/Contractor Security Clearance º º Special Access º º Suspension/Denial/Revocation º º Appeals º º Security Re-Briefing º º Periodic Re-Investigation Incoming/Outgoing Classified Visit Request Management Import/Exports OPM PIPS, OPM CVS, NFC, and other systems edelivery Automatic file parsing and attachment upload to the Person, Case, and/or Investigation record eadjudication Automatic Personnel and Security Research Center (PERSEREC) rule evaluation and adjudication for no issue cases Contract Module The Contract Module is included with the core SecurityManager. It enables the definition and management of contracts and contractors. It enables linkage and rule enforcement of contractor personnel processed in PerSec to the contracts and task orders of contracts for which suitability can be approved. It also allows for the creation and management of DD 254 documents for contracts, and can enforce the dependency of contractor suitability and security clearance processing in PerSec on current DD 254 authorization. Creation of solicitation, initiation, revision & final DD 254 Select and assign pre-defined standard text inserts from field specific lists Select and assign contractor address information from contractor record Auto fill Commercial and Government Entity (CAGE) Code and Cognizant Security Office (CSO) information for contractor & address selected Manage contract data, including related prime & subcontractors Manage task order data, including task order specific subcontractors Enforce DD 254 authorization in adding subcontractors to a contract or task order 3
4
5 Credentialing Module The Credentialing Module is an optional module that integrates with the PerSec Module and allows for the enrollment and/or enrollment data import from external enrollment systems consistent with PIV enrollment data standards of NIST When integrated with the PerSec Module, it will provide the agency the ability to meet FIPS- 201 Appendix A identity proofing and registration requirements, enabling authorization messages and identity information passage to card management systems, and accepting messages confirming card issuance from the card management system. Processes - When interfaced with a card management system, SecurityManager will provide the process management capabilities for: PIV Credential Issuance Authorization including: Ability to import and view identity documents, photos & fingerprints Ability to export identity information to a PIV credential station Satisfies FIPS 201 PIV 1 process related requirements PIV Credential Revocation Authorization PIV Credential Re-issuance Authorization External Interfaces SecurityManager has an interface capability for receiving PIV identity information (including fingerprints and photo) from external enrollment systems as well as a corresponding interface for sending identity information to external systems. The standard external interfaces include Web services, Extensible Markup Language (XML) schemas and/or direct file uploads. Information Security (InfoSec) Module The InfoSec Module is an optional feature that integrates with the PerSec Module to enable management and audits of secure buildings, rooms, containers, documents and custodial responsibilities. It can enforce custodial security clearance requirements, require custodial transfer of all documents and storage/room/building responsibilities before separation and other business rules. Classified Document Management & Inspections Secure Container Management & Inspections Host Facility Management & Inspections Host Facility Locations (Rooms) Management & Inspections Foreign National Visitor (FNV) Module The FNV Module is an optional feature that integrates with the PerSec Module for sponsorship and processing of foreign national visitor requests. It enforces business rules for country relationship of visitor, length of visit, sponsor and other factors. Additional modules including Investigation & Intelligence Module, Emergency Management Module, Anti-Terrorism Module, etc. have been developed for custom contracts and are available upon request. 6
6 SMartPIV IDMS/CMS provides strong workflow support for credential verification and card operations with enforcement of FIPS-201 roles; provides fully integrated end-to-end establishment and management of employee and contractor trust level and PIV card access rights when used with the SecurityManager suite. Available to be configured as a stand-alone IDMS/CMS with integration with your existing adjudication system, SMartPIV provides: Enrollment Identity Proofing Biometrics Capture, Management & Transmission to OPM/Integrated Automated Fingerprint Identification System (IAFIS) Automated Approval Checks & Adjudication Approvals Card Personalization, Encoding, Issuance & Activation Card Maintenance & Life Cycle Management SMartPIV and SecurityManager with its cutting edge e-delivery technology, team up to create a comprehensive process that follows a subject through enrollment, credentialing, adjudication, card management, card maintenance and post-employment activities. With automated and manual data collection options at almost every step of the way, everything flows together and assembles into the complete view of a subject s trust relationship with your agency. Subject Information eqip Enrollment Package Identity Proofing Documents Investigation Requests Investigation Status Updates Investigation Documents Fingerprint Submission Fingerprint Response Employment Status Adjudicative Decisions Miscellaneous Attachments PIV Card Status (Logical and Physical) Automatic Live Transactions Import Export Manual Entry IN OUT 7
7 Federal Government Implementations of SecurityManager U. S. Department of Homeland Security (DHS) Headquarters U.S. Customs and Border Protection (CBP) Federal Emergency Management Agency (FEMA) Federal Law Enforcement Training Center (FLETC) U. S. Immigration and Customs Enforcement (USCIS) U. S. Citizenship and Immigration Services (USCIS) U. S. Secret Service (USSS) Transportation Security Administration (TSA) U.S. Coast Guard (USCG) U. S. Department of Commerce Headquarters Bureau of economic Analysis (BEA) Bureau of Industry and Security (BIS) U. S. Census Bureau (CENSUS) Economic Development Administration (EDA) Economics and Statistics Administration (ESA) International Trade Administration (ITA) Minority Business Development Agency (MBDA) National Oceanic and Atmospheric Administration (NOAA) National Telecommunications and Information Administration (NTIA) National Institute of Standards and Technology (NIST) National Technical Information Services (NTIS) U. S. Patent and Trademark Office (USPTO) U. S. Department of Education U. S. Department of Veterans Affairs U. S. Health and Human Services Headquarters Centers for Medicare & Medicaid Services (CMS) Administration for Children and Families (ACF) Administration for Community Living (ACL) Agency for Healthcare Research and Quality (AHRQ) Agency for Toxic Substances and Disease Registry (ATSDR) Centers for Disease Control and Prevention (CDC) Food and Drug Administration (FDA) Health Resources and Services Administration (HRSA) Indian Health Service (IHS) National Institutes of Health (NIH) Substance Abuse and Mental Health Services Administration (SAMHSA) Since 1988, THE CENTECH GROUP, Inc. (CENTECH) has become a leader in performance based contracting, program management, as a provider of systems and solutions for numerous federal government agencies and as a an excellent place to expand your career objectives. We have the experience, skills, systems and processes to deliver customer satisfaction on every project and an unrivaled history in delivering ON TIME, ON BUDGET, IN THE FIELD, EVERY TIME. CENTECH has technical solutions in the areas of: Program & Acquisition Management Support Services Systems Engineering/Technical Assistance (SETA) Web Solutions & Services Business Operations Support Computer Data Center Operations Engineering Services Help Desk Systems & Services Logistics Support Systems & Services Network & Infrastructure Services Security Systems & Services Software Development & Maintenance Test & Evaluation Services Training/Knowledge Transfer Systems & Services For more information, contact: THE CENTECH GROUP, Inc Arlington Blvd., 10th Floor Falls Church, VA (P) _0314
GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.
PERSONAL IDENTITY VERIFICATION (PIV) OVERVIEW INTRODUCTION (1) Welcome to the Homeland Security Presidential Directive 12 (HSPD-12) Personal Identity Verification (PIV) Overview module, designed to familiarize
More informationHSPD-12 Implementation Architecture Working Group Concept Overview. Version 1.0 March 17, 2006
HSPD-12 Implementation Architecture Working Group Concept Overview Version 1.0 March 17, 2006 Table of Contents 1 PIV Lifecycle... 3 2 High Level Component Interaction Diagram... 4 3 PIV Infrastructure
More informationIntegrated Security Management System (ISMS)
for the (ISMS) September 16, 2014 Contact Point David Colangelo Security Systems Division, Office of the Chief Security Officer Management Directorate (202) 447-5320 Reviewing Official Karen L. Neuman
More informationHow To Get A Piv Credential
Homeland Security Presidential Directive HSPD-12 PIV-1 Implementation And Suitability Processing POLICIES & PROCEDURES U.S. Department of Commerce National Oceanic and Atmospheric Administration (Revised
More information~ Final Credentialing Standards for Issuing Personal Identity Verification Cards under HSPD-12
UNITED STATES OFFICE OF PERSONNEL MANAGEMENT Washington, DC 20415 The Director July 31, 2008 MEMORANDUM FOR HEADS OF DEPARTMENTS AND AGENCIES FROM: SUBJECT: LINDA M. SPRINGER DIRECTOR ~ Final Credentialing
More informationDEPARTMENTAL REGULATION
U.S. DEPARTMENT OF AGRICULTURE WASHINGTON, D.C. 20250 DEPARTMENTAL REGULATION SUBJECT: Identity, Credential, and Access Management Number: 3640-001 DATE: December 9, 2011 OPI: Office of the Chief Information
More informationNOAA HSPD-12 PIV-II Implementation October 23, 2007. Who is responsible for implementation of HSPD-12 PIV-II?
NOAA HSPD-12 PIV-II Implementation What is HSPD-12? Homeland Security Presidential Directive 12 (HSPD-12) is a Presidential requirement signed on August 27, 2004 requiring Federal agencies comply with
More informationStatus: Final. Form Date: 30-SEP-13. Question 1: OPDIV Question 1 Answer: OS
Status: Final Form Date: 30-SEP-13 Question 1: OPDIV Question 1 Answer: OS Question 2: PIA Unique Identifier (UID): Question 2 Answer: P-2277902-798208 Question 2A: Name: Question 2A Answer: Identity and
More informationFEDERAL CLOUD COMPUTING SUMMIT
FEDERAL CLOUD COMPUTING SUMMIT Federal Cloud Computing Summit January 14-15, 2015 Washington Marriott at Metro Center The Federal Cloud Computing Summit will be held on January 14-15, 2015, at the Washington
More information1. The human guard at the access control entry point determines whether the PIV Card appears to be genuine and has not been altered in any way.
+ Expiration date + Agency card serial number (back of card) + Issuer identification (back of card). The PIV Card may also bear the following optional components: + Agency name and/or department + Department
More informationE X E C U T I V E O F F I CE O F T H E P R E S I D EN T
EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 THE DIRECTOR M-05-24 August 5, 2005 MEMORANDUM FOR THE HEADS OF ALL DEPARTMENTS AND AGENCIES FROM: SUBJECT: Joshua
More informationDEPARTMENTAL DIRECTIVE
ADMINISTRATIVE COMMUNICATIONS SYSTEM U.S. DEPARTMENT OF EDUCATION DEPARTMENTAL DIRECTIVE OM:5-101 Page 1 of 17 (07/16/2010) Distribution: All Department of Education employees Approved by: /s/ Winona H.
More informationUnited States Public Health Service (USPHS) Social Work Career Map & Mentoring Guide
Social Work Professional Advisory Group (SWPAG) Mentoring Subcommittee United States Public Health Service (USPHS) Social Work Career Map & Mentoring Guide Developed by SWPAG Mentoring Subcommittee 1 Table
More informationAudio: This overview module contains an introduction, five lessons, and a conclusion.
Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules
More informationHSPD-12 Homeland Security Presidential Directive #12 Overview
HSPD-12 Homeland Security Presidential Directive #12 Overview HSPD-12 Stands for Homeland Security Presidential Directive #12. HSPD-12 is the Policy for a Common Identification Standard for Federal Employees
More informationU.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE. Privacy Impact Assessment
U.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE Privacy Impact Assessment Personal Identity Verification System Card Management System (HSPD12-PIVS/CMS) PTOI-007-00 September 18,
More informationJustice Management Division
Justice Management Division Privacy Impact Assessment for the Personal Identity Verification (PIV) Card System Issued by: Stuart Frisch, Senior Component Official for Privacy Reviewed by: Vance E. Hitch,
More informationIDaaS: Managed Credentials for Local & State Emergency Responders
IDaaS: Managed Credentials for Local & State Emergency Responders NextgenID ID*TRUST Platform NextgenID - Headquarters USA 10226 San Pedro, Suite 100 San Antonio, TX 78216 +1 (210) 530-9991 www.nextgenid.com
More informationDepartment of Veterans Affairs VA Directive 0710 PERSONNEL SECURITY AND SUITABILITY PROGRAM
Department of Veterans Affairs VA Directive 0710 Washington, DC 20420 Transmittal Sheet June 4, 2010 PERSONNEL SECURITY AND SUITABILITY PROGRAM 1. REASON FOR ISSUE: To revise Department of Veterans Affairs
More informationThe Government-wide Implementation of Biometrics for HSPD-12
The Government-wide Implementation of Biometrics for HSPD-12 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy September 24, 2008 1 The HSPD-12 Mandate Home Security
More informationUS Security Directive FIPS 201
Security US Security Directive FIPS 201 Compliance Strategies Learn about compliance strategies for governmental agencies in meeting requirements of Homeland Security Presidential Directive 12 (HSPD-12),
More informationThe Social Security Administration s Internal Controls over Issuing and Monitoring Contractors Homeland Security Presidential Directive-12 Credentials
Audit Report The Social Security Administration s Internal Controls over Issuing and Monitoring Contractors Homeland Security Presidential Directive-12 Credentials A-15-11-11178 April 2013 MEMORANDUM Date:
More informationNSF AuthentX Identity Management System (IDMS) Privacy Impact Assessment. Version: 1.1 Date: 12/04/2006. National Science Foundation
This document has been archived and replaced by piaauthentx1207..0 National Science Foundation NSF AuthentX Identity Management System (IDMS) Privacy Impact Assessment Version: 1.1 Date: 12/04/2006 Table
More informationDerived credentials. NIST SP 800-63-1 ( 5.3.5) provides for long term derived credentials
Daon your trusted Identity Partner Derived Credentials A Use Case Cathy Tilton Daon 1 February 2012 Derived credentials NIST SP 800-63-1 ( 5.3.5) provides for long term derived credentials Derived credential
More informationFederal Identity Management Handbook
September 2005 PUBLIC DRAFT Acknowledgements The Office of Management and Budget and the Federal Identity Credentialing Committee would like to acknowledge the significant contributions of the National
More informationBackground Check Service
for the Background Check Service Contact Point Elizabeth Gaffin USCIS Privacy Officer United States Citizenship and Immigration Services 202-272-1400 Reviewing Official Hugo Teufel III Chief Privacy Officer
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 1000.13 January 23, 2014 USD(P&R) SUBJECT: Identification (ID) Cards for Members of the Uniformed Services, Their Dependents, and Other Eligible Individuals References:
More informationU.S. Department of Energy Washington, D.C.
U.S. Department of Energy Washington, D.C. ORDER DOE O 206.2 Approved: SUBJECT: IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT (ICAM) 1. PURPOSE. To establish requirements and responsibilities for DOE s identity,
More informationDepartment of Homeland Security
Evaluation of DHS Information Security Program for Fiscal Year 2013 OIG-14-09 November 2013 Washington, DC 20528 / www.oig.dhs.gov November 21, 2013 MEMORANDUM FOR: FROM: SUBJECT: Jeffrey Eisensmith Chief
More informationDEPARTMENT OF DEFENSE GUIDEBOOK FOR CAC-ELIGIBLE CONTRACTORS FOR UNCLASSIFIED NETWORK ACCESS
DEPARTMENT OF DEFENSE GUIDEBOOK FOR CAC-ELIGIBLE CONTRACTORS FOR UNCLASSIFIED NETWORK ACCESS 21 NOVEMBER 2014 Contents SCOPE CHAPTER 1 INTRODUCTION... 4 1.1 PURPOSE AND BACKGROUND... 4 1.2 POLICY AND REGULATIONS...
More informationBiometrics in Identity as a Service
Daon - your trusted Identity Partner Biometrics in Identity as a Service What is BaaS and who is doing it? Catherine Tilton 28 September 2011 The Need As the world becomes more interdependent, as transactions
More informationDefense Security Service
Defense Security Service Electronic Fingerprint Capture Options for Industry Version 2.0 January 2013 Issuing Office: Defense Security Service Russell Knox Building 27130 Telegraph Rd Quantico VA 22134
More informationNEIS HELP DESK FAQS. HSPD-12 Policy/Business Process. General HSPD-12 FAQs can be found online at: http://lincpass.usda.gov/faq.
General HSPD-12 FAQs can be found online at: http://lincpass.usda.gov/faq.html HSPD-12 Policy/Business Process 1. How long is the entire process for Non-Employees? After enrollment, applicants should receive
More informationOFFICE OF THE SECRETARY Office of the Secretary s Working Capital Fund Billing Control Issues Resulted in Incorrect Charges
OFFICE OF THE SECRETARY Office of the Secretary s Working Capital Fund Billing Control Issues Resulted in Incorrect Charges FINAL REPORT NO. OIG-14-020-A MAY 15, 2014 U.S. Department of Commerce Office
More informationSTATEMENT OF WORK. For
STATEMENT OF WORK For Credentialing and Validation Support for DC Homeland Security & Emergency Management Agency (DC HSEMA) IN SUPPORT OF THE GOVERNMENT OF THE DISTRICT OF COLUMBIA November 15, 2012 1.
More informationGAO PERSONAL ID VERIFICATION. Agencies Should Set a Higher Priority on Using the Capabilities of Standardized Identification Cards
GAO United States Government Accountability Office Report to Congressional Requesters September 2011 PERSONAL ID VERIFICATION Agencies Should Set a Higher Priority on Using the Capabilities of Standardized
More information2. APPLICABILITY AND SCOPE
Department of Defense DIRECTIVE NUMBER 1000.25 July 19, 2004 Certified Current as of April 23, 2007 USD(P&R) SUBJECT: DoD Personnel Identity Protection (PIP) Program References: (a) DoD Directive 1000.22,
More informationPRIME IDENTITY MANAGEMENT CORE
PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It
More informationDepartment of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT
Department of Veterans Affairs VA DIRECTIVE 6510 Washington, DC 20420 Transmittal Sheet VA IDENTITY AND ACCESS MANAGEMENT 1. REASON FOR ISSUE: This Directive defines the policy and responsibilities to
More information2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.
Purpose and Scope The purpose of this policy is to define the roles and responsibilities on implementing the Homeland Security Presidential Directive 12 (HSPD-12) Logical Access Control (LAC) throughout
More informationOne Research Court, Suite 200 Rockville, MD 20850 www.ctisinc.com Tel: 301.948.3033 Fax: 301.948.2242
TRANSFORMATION OF HEALTH INDUSTRY THROUGH PERFORMANCE PYRAMID: Providing Excellent End-to-End Healthcare to the Population with a 30% Reduction in Cost and Time. Introduction The American health industry
More informationSIGNIFICANT CHANGES DOCUMENT
SIGNIFICANT CHANGES DOCUMENT Descriptive Title Schedule 70_MassModification_Health IT SIN Significant Changes Disclaimer Language DISCLAIMER: GSA FAS is posting this notification of a planned solicitation
More informationLife After PIV. Authentication In Federated Spaces. Presented to. Card Tech/Secure Tech. May 2009. By Lynne Prince Defense Manpower Data Center
Life After PIV Authentication In Federated Spaces Presented to Card Tech/Secure Tech By Lynne Prince Defense Manpower Data Center Interoperability with HSPD12 Capability PIV provides a secure common credential,
More informationU.S. Department of Housing and Urban Development
U.S. Department of Housing and Urban Development PRIVACY IMPACT ASSESSMENT FOR: PERSONAL IDENTITY VERIFICATION (PIV) PROCESS TECHNOLOGY AND DATABASE IN COMPLIANCE WITH HOMELAND SECURITY PRESIDENTIAL DIRECTIVE
More informationIdentity Verification Program Guide
Identity Verification Program Guide The National Crime Prevention and Privacy Compact Council (Compact Council) is a15-member body of local, state, and federal governmental officials which prescribes system
More informationATLANTA. May 18-21. U.S. Public Health Service Scientific and Training Symposium. Sheraton, Atlanta, Georgia.
ATLANTA 2015 U.S. Public Health Service Scientific and Training Symposium May 18-21 Sheraton, Atlanta, Georgia. As a sponsor or exhibitor at the USPHS Scientific and Training Symposium your organization
More informationAnnouncing Approval of Federal Information Processing Standard (FIPS) Publication 201-2,
This document is scheduled to be published in the Federal Register on 09/05/2013 and available online at http://federalregister.gov/a/2013-21491, and on FDsys.gov Billing Code 3510-13 DEPARTMENT OF COMMERCE
More informationElectronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust
Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust Imprivata Confirm ID and the DEA Interim Final Rule on EPCS Technology requirements to comply with the DEA
More informationAn Operational Architecture for Federated Identity Management
An Operational Architecture for Federated Identity Management March 2011 Implementing federated identity management and assurance in operational scenarios Federated Identity Solution The Federated identity
More informationU.S. Nuclear Regulatory Commission
ADAMS ML11066A005 U.S. Nuclear Regulatory Commission Privacy Impact Assessment (Designed to collect the information necessary to make relevant determinations regarding the applicability of the Privacy
More informationEvaluation of DHS' Information Security Program for Fiscal Year 2015
Evaluation of DHS' Information Security Program for Fiscal Year 2015 January 5, 2016 OIG-16-08 (Revised) DHS OIG HIGHLIGHTS Evaluation of DHS Information Security Program for Fiscal Year 2015 January 5,
More informationTOP MANAGEMENT CHALLENGES MOST FREQUENTLY IDENTIFIED December 2000
TOP MANAGEMENT CHALLENGES MOST FREQUENTLY IDENTIFIED December 2000 Agency Information Technology Management & Security GPRA Compliance, Implementation & Accountability Financial Management & CFO Statements
More informationDepartment of Homeland Security Office of Inspector General
Department of Homeland Security Office of Inspector General Vulnerabilities Highlight the Need for More Effective Web Security Management (Redacted) OIG-09-101 September 2009 Office of Inspector General
More informationNASA DESK GUIDE FOR SUITABILITY AND SECURITY CLEARANCE PROCESSING. Version 2
NASA DESK GUIDE FOR SUITABILITY AND SECURITY CLEARANCE PROCESSING Version 2 Agency Human Resources Division NASA Headquarters SREF-3000-0003 (This page intentionally left blank.) Page 2 of 94 Status (Basic/Revision
More informationCapabilities Briefing 2015
Linking Security with Business Strategies www.anasec.com Service Disabled Veteran Owned Small Business (SDVOSB) 125 Woodstream Blvd Suite 204 Stafford, VA 22556 (540) 657-9465 Capabilities Briefing 2015
More informationSmall Business Administration Privacy Impact Assessment
Small Business Administration Privacy Impact Assessment Name of Project: Personal Identity Verification (PIV)/ Homeland Security Presidential Directive 12 (HSPD-12) (Note: This PIA is intended to cover
More informationDepartment of Homeland Security
Department of Homeland Security Biometrics Overview Neal Latta US-VISIT IDENT Program Manager 1 Importance of Biometric Standards in Post 9/11 Environment Dramatic Increase in Utilization of Biometric
More informationUsing FICAM as a model for TSCP Best Prac:ces in Physical Iden:ty and Access Management. TSCP Symposium November 2013
Using FICAM as a model for TSCP Best Prac:ces in Physical Iden:ty and Access Management TSCP Symposium November 2013 Quantum Secure s Focus on FICAM and Related Standards Complete Suite of Physical Iden:ty
More informationFor Official Use Only (FOUO)
The FEMA Mission To support our citizens and first responders to ensure that as a nation we work together to build, sustain, and improve our capability to prepare for, protect against, respond to, and
More informationEnrolling with PIV and PIV-I Velocity Enrollment Manager
Enrolling with PIV and PIV-I Velocity Enrollment Manager Overview The Homeland Security Presidential Directive 12 (HSPD-12) called for a common identification standard to be adopted by all Federal Government
More informationPrivacy Impact Assessment of. Personal Identity Verification Program
Official of Federal Governors Reserve seal of of the System. Board Program or application name. Privacy Impact Assessment of Personal Identity Verification Program Personal Identity Verification (PIV)
More informationCoSign by ARX for PIV Cards
The Digital Signature Company CoSign by ARX for PIV Cards Seamless and affordable digital signature processes across FIPS 201-compliant systems Introduction to Personal Identity Verification (PIV) In response
More informationSTATEMENT OF CHARLES EDWARDS DEPUTY INSPECTOR GENERAL U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE
STATEMENT OF CHARLES EDWARDS DEPUTY INSPECTOR GENERAL U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE COMMITTEE ON HOMELAND SECURITY SUBCOMMITTEE ON OVERSIGHT AND MANAGEMENT EFFICIENCY U.S. HOUSE OF REPRESENTATIVES
More informationPersonal Identity Verification (PIV) of Federal Employees and Contractors
FIPS PUB 201-2 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Personal Identity Verification (PIV) of Federal Employees and Contractors Computer Security Division Information Technology Laboratory
More informationAML.ms. Management System. Case Study by AML.ms, LLC. Anti-Money Laundering / Combating the Financing of Terrorism (AML/CFT)
AML.ms Anti-Money Laundering / Combating the Financing of Terrorism (AML/CFT) Management System Case Study by AML.ms, LLC Overview About AML.ms Enterprise Platform Application Case Study Introduction Challenge
More informationPersonal Identity Verification
for the Personal Identity Verification Contact Point Cynthia Sjoberg Program Manager, HSPD 12 Training and Operations Security Division Office of Security Department of Homeland Security (202) 447 5010
More informationACI - NA PUBLIC SAFETY & SECURITY FALL CONFERENCE 2012 AVIATION BADGING EFFICIENCIES
ACI - NA PUBLIC SAFETY & SECURITY FALL CONFERENCE 2012 AVIATION BADGING EFFICIENCIES ACI-NA PUBLIC SAFETY & SECURITY, FALL CONFERENCE 2012 BADGING BEST PRACTICES SURVEY Cheryl Vauk Productive Solutions
More informationSTATEMENT OF JOHN E. MCCOY II DEPUTY ASSISTANT INSPECTOR GENERAL FOR AUDITS U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE
STATEMENT OF JOHN E. MCCOY II DEPUTY ASSISTANT INSPECTOR GENERAL FOR AUDITS U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM SUBCOMMITTEE ON GOVERNMENT ORGANIZATION,
More informationWhat Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form. December 3, 2012
Federal CIO Council Information Security and Identity Management Committee IDManagement.gov What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form December 3, 2012 HSPD-12
More informationIntegration of Access Security with Cloud- Based Credentialing Services
Integration of Access Security with Cloud- Based Credentialing Services Global Identity Summit September 17, 2014 All text, graphics, the selection and arrangement thereof, unless otherwise cited as externally
More informationSingle Sign-On. Security and comfort can be friend. Arnd Langguth. alangguth@novell.com. September, 2006
Single Sign-On Security and comfort can be friend. Arnd Langguth alangguth@novell.com September, 2006 Identity proliferation in the enterprise Password management problem How many passwords do you have?
More informationNational Security Adjudicator Training Program
DIRECTOR OF NATIONAL INTELLIGENCE WASHINGTON, DC 20511 E/S 00530 MEMORANDUM FOR: SUBJECT: Distribution National Security Adjudicator Training Program In my role as Security Executive Agent pursuant to
More informationOFFICE OF THE GENERAL COUNSEL HONORS ATTORNEY PROGRAM AND SUMMER LAW INTERN PROGRAM for 2011
OFFICE OF THE GENERAL COUNSEL HONORS ATTORNEY PROGRAM AND SUMMER LAW INTERN PROGRAM for 2011 Eligibility Requirements Open only to U.S. citizens Does not include lawful permanent residents Must obtain
More informationThe Security Clearance and Investigation Process
The Security Clearance and Investigation Process OPM s Mission OPM s Mission is to Recruit, Retain and Honor a World-Class Workforce to Serve the American People OPM s Federal Investigative Services (FIS)
More informationemipp Extending Medicaid Connectivity for Managing EHR Incentive Payments Overview
Extending Medicaid Connectivity for Managing EHR Incentive Payments JANUARY 2011 Registration for EHR Incentive Program begins APRIL 2011 Attestation for the Medicare EHR Incentive Program begins NOVEMBER
More informationPRIVACY IMPACT ASSESSMENT
PRIVACY IMPACT ASSESSMENT U.S. Office of Personnel Management (OPM) Electronic Delivery System March 2013 FDIC External System Table of Contents System Overview Personally Identifiable Information (PII)
More informationIdentity, Credential, and Access Management. An information exchange For Information Security and Privacy Advisory Board
Federal CIO Council Information Security and Identity Management Committee Identity, Credential, and Access Management An information exchange For Information Security and Privacy Advisory Board Deb Gallagher
More informationDHS Trusted Identity Exchange
for the DHS Trusted Identity Exchange DHS/ALL/PIA-050 April 2, 2015 Contact Point Ashley Stevenson Identity, Credential & Access Management (ICAM) PMO Information Sharing Environment Office (ISEO) Office
More information1. First, how familiar are you with Master of Public Administration (MPA) and Master of Public Policy (MPP) degrees?
. First, how familiar are you with Master of Public Administration (MPA) and Master of Public Policy (MPP) degrees? Not familiar at all 6.2% 64 2 3.4% 3 3 26.6% 0 4 9.2% 76 Extremely familiar 23.8% 94
More informationFinancial Procedure Note FPN 13. Financial Conflict of Interest Policy
Financial Procedure Note FPN 13 Financial Conflict of Interest Policy September 2013 Financial Procedure Notes supplement Financial Regulations, providing detailed guidance on various topics. Failure to
More informationSecurity Language for IT Acquisition Efforts CIO-IT Security-09-48
Security Language for IT Acquisition Efforts CIO-IT Security-09-48 Office of the Senior Agency Information Security Officer VERSION HISTORY/CHANGE RECORD Change Number Person Posting Change Change Reason
More informationOffice of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Review of DHS Security Controls for Portable Storage Devices OIG-08-95 September 2008 Office of Inspector General U.S. Department of Homeland
More informationDHS DIRECTIVES INSTRUCTION HANDBOOK DHS INSTRUCTION HANDBOOK 121-01-007 THE DEPARTMENT OF HOMELAND SECURITY PERSONNEL SUITABILITY AND SECURITY PROGRAM
DHS DIRECTIVES INSTRUCTION HANDBOOK DHS INSTRUCTION HANDBOOK 121-01-007 THE DEPARTMENT OF HOMELAND SECURITY PERSONNEL SUITABILITY AND SECURITY PROGRAM APPROVAL DATE: JUNE 2009 DEPARTMENT OF HOMELAND SECURITY
More informationPhysical Access Control System
for the Physical Access Control System DHS/ALL 039 June 9, 2011 Contact Point David S. Coven Chief, Access Control Branch (202) 282-8742 Reviewing Official Mary Ellen Callahan Chief Privacy Officer (703)
More informationEnterprise IT. Aligning Strong Solutions, Assuring Enterprise Strength
Enterprise IT Aligning Strong Solutions, Assuring Enterprise Strength Strategic planning aligns your enterprise IT infrastructure with your mission, operational and efficiency goals. From the start, we
More informationOFFICE OF INSPECTOR GENERAL DEPARTMENT OF HOMELAND SECURITY
s ANNUAL PERFORMANCE PLAN FOR FISCAL YEAR 2013 OFFICE OF INSPECTOR GENERAL DEPARTMENT OF HOMELAND SECURITY The Government Performance and Results Act of 1993, Public Law 103-62, requires agencies to submit
More informationGSA FIPS 201 Evaluation Program
GSA FIPS 201 Evaluation Program David Temoshok Director, Federal Identity Policy and Management GSA Office of Governmentwide Policy NIST/DHS/TSA TWIC QPL Workshop April 21, 2010 1 HSPD-12 Government-wide
More informationIdentity - Privacy - Security
Identity - Privacy - Security Systems Security Engineering and Privacy Privacy and Security Workshop 3 Nov 2006 Toronto Recent Digital FIPS Border 201 Motivation Identity Security for Security Privacy
More informationTaking Adverse Actions Based on Suitability or Security Issues
Taking Adverse Actions Based on Suitability or Security Issues Objectives Discuss the various purposes for personnel investigations HSPD-12 (PIV access) Suitability/Fitness (character and conduct) National
More informationCanine Website System (CWS System) DHS/TSA/PIA-036 January 13, 2012
for the (CWS System) DHS/TSA/PIA-036 January 13, 2012 Contact Point Carolyn Y. Dorgham Program Manager, National Explosives Detection Canine Team Program Carolyn.Dorgham@dhs.gov Reviewing Official Mary
More informationAgency Information Collection Activities: REAL ID: Minimum Standards for Driver s
This document is scheduled to be published in the Federal Register on 05/11/2016 and available online at http://federalregister.gov/a/2016-11133, and on FDsys.gov 9110-9B DEPARTMENT OF HOMELAND SECURITY
More informationEvaluation of DHS' Information Security Program for Fiscal Year 2015
Evaluation of DHS' Information Security Program for Fiscal Year 2015 November 13, 2015 OIG-16-08 DHS OIG HIGHLIGHTS Evaluation of DHS Information Security Program for Fiscal Year 2015 November 13, 2015
More informationAIRSPACE WAIVERS AND FLIGHT AUTHORIZATIONS FOR CERTAIN AVIATION OPERATIONS (INCLUDING DCA) (Amended)
for the AIRSPACE WAIVERS AND FLIGHT AUTHORIZATIONS FOR CERTAIN AVIATION OPERATIONS (INCLUDING DCA) (Amended) Contact Point Lisa S. Dean Privacy Officer Transportation Security Administration (571) 227-3947
More informationARC Outreach on HSPD 12 and Mandatory Use of ODIN
ARC Outreach on HSPD 12 and Mandatory Use of ODIN August 28 & 29, 2007 Agenda Center Management Opening Remarks CIO Perspective Homeland Security Presidential Directive (HSPD) 12 Questions & Answers Mandatory
More informationFEDERAL IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT AND PERSONAL IDENTITY VERIFICATION (PIV) SOLUTIONS
FEDERAL IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT AND PERSONAL IDENTITY VERIFICATION (PIV) SOLUTIONS Homeland Security Presidential Directive 12 (HSPD 12), FIPS 201, and the latest Federal Identity,
More informationIT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS V. POLICY VI. RESPONSIBILITIES
More informationUnderstanding the differences in PIV, PIV-I, PIV-C August 23, 2010
Federal CIO Council Information Security and Identity Management Committee Identity, Credential, and Access Management Understanding the differences in PIV, PIV-I, PIV-C August 23, 2010 Tim Baldridge AWG
More informationThis directive establishes the Department of Homeland Security (DHS) Security Education, Training, and Awareness (SETA) Program.
Department of Homeland Security Management Directive System MD Number: 11053 Issue Date: 10/12/2004 SECURITY EDUCATION, TRAINING, AND AWARENESS PROGRAM DIRECTIVE 1. Purpose This directive establishes the
More informationDS-2019 is controlled by the U.S. Department of State.
United States Department of Homeland Security document issued by colleges, universities, and vocational schools that provides supporting information for the issuance of a student visa or change of status
More informationAppendix -- Homeland Security Mission Funding by Agency and Budget Account (budget authority in millions of dollars)
Department of Agriculture 508.8-528.6-603.6 Agricultural Research Service/ Buildings and Facilities/005-18-1401 - - 45.0-113.7 Protecting Critical Infrastructure and Key Assets - - 45.0-113.7 Agricultural
More information