Government Smart Card Interagency Advisory Board Moving to SHA-2: Overview and Treasury Activities October 27, 2010
|
|
- Colin Cannon
- 8 years ago
- Views:
Transcription
1 Government Smart Card Interagency Advisory Board Moving to SHA-2: Overview and Treasury Activities October 27, 2010
2 Interagency Advisory Board Meeting Agenda, October 27, Opening Remarks 2. A Discussion on the Implementation of Treasury s SHA-256 (Mike Cockrell and Darren Kiel, Treasury HSPD-12 / IdAM PMO) 3. The Relationship of Fair Information Practice Principles to Identity and Credentialing Programs (Helen Foster, DHS and Naomi Lefkovitz, FTC) 4. The Impact of Identity Theft (Anne Wallace, Identity Theft Assistance Corporation) 5. A Discussion on the Improvements to FPKI Infrastructure (Judy Spencer, GSA and Chris Louden, Protiviti) 6. Closing Remarks
3 Moving to SHA-2 Today s Agenda 1. Introduction: Treasury HSPD-12 high-level solution architecture 2. SHA-2 overview: drivers, requirements and impact 3. Treasury activities: Treasury s SHA-2 migration plan 4. Audience engagement: Participation and feedback from you 5
4 Moving to SHA-2: Introduction Treasury HSPD-12 high-level solution architecture Treasury continues to work with GSA to ensure SHA-2 compliance on Treasury PIV cards Treasury Production Migration: November 7 GSA Production Migration: Early-mid December 6
5 Moving to SHA-2: Overview The need to migrate to SHA-2 Weaknesses recently discovered in SHA-1 dramatically lower its practical security strength below 80 bits, to the point where it is theoretically possible to produce a collision This in turn puts trust at risk for Federal PIV-reliant applications Examples: Someone is authenticating to my network environment as me Someone authored this document, but it wasn t me My application trusts a PIV certificate signed by a rogue CA because it looks trustworthy 7
6 Moving to SHA-2: Overview SHA-2 requirements and recommendations To mitigate this risk, the Federal community is migrating to SHA-2, which employs up to 256 bits of security and strengthens the PIV PKI trust model The Federal community has published various documents reflecting the need to move to SHA-2, particularly as it pertains to digital signatures, by the end of 2010: NIST SP800-57, Recommendation for Key Management. NIST SP800-78, Cryptographic Algorithms and Key Sizes for Personal Identification Verification (PIV). DRAFT NIST SP , Recommendation for the Transitioning of Cryptographic Algorithms and Key Sizes NIST s Policy on Hash Functions. Federal Common Policy. 8
7 Moving to SHA-2: Overview Impact to PIV card usage Not all PIV-reliant solutions support SHA-2 According to Microsoft, Windows Vista, Windows 7 and Server 2008/2008 R2 provide full SHA-2 support Windows XP SP3 and Server 2003 SP2, with hotfixes applied, provide limited support, though they are incapable of generating new hashes based on SHA-2. Other PIV-reliant solutions vary in SHA-2 capability. Sources for determining solution interoperability: Vendor material, such as product documentation and administrator guides FPKI SHA-256 Tracking Spreadsheet (via SHA-256 WG mailing list) NIST material, such as the Secure Hash Standards Validation List. This is a list of products that have been validated for SHA-1, SHA-224, SHA-256, SHA-384, and SHA Test results 9
8 Moving to SHA-2: Overview Federal recommendations for SHA-256 readiness Recommendations from the Federal PKI Policy Authority (Source: FPKI SHA-256 Memorandum. October 07, 2010) Inventory existing PK-enabled applications that use certificates for authentication, digital signature and/or encryption Determine which applications are at risk by verifying COTS SHA-256 support and minimum required versions Request SHA-256 signed test CA certificates from the FICAM SHA-256 Test Infrastructure ( or through the GSA/ USAccess Program ( Create a SHA-256 test plan, testing three fundamental capabilities: Capability to accept SHA-256 signed PIV certificates and CRLs Capability to process SHA-256 signed data Capability to produce SHA-256 signatures Report test results to: Contact FPKI.Webmaster@gsa.gov for username/password Contact FPKI.Webmaster@gsa.gov to obtain further SHA-256 information or participate in the SHA-256 dialog 10
9 Moving to SHA-2: Treasury Activities Treasury PKI SHA-2 migration plan Phase 1 - Test Card Acquisition: Treasury Bureaus acquired test cards and device certificates issued with SHA-2 Phase 2 Application Testing: Bureaus test applications against development environment Periodic, temporary transition of development PKI environment is necessary Bureaus have further opportunities to obtain SHA-2 PIV cards and device certs Phase 3 Development Transition: Development PKI environment permanently transitions to SHA-2. This includes all Treasury-issued certificates and validity data Development CA certificates are also re-keyed to reflect SHA-2 Treasury is currently in this phase Phase 4 Production Transition: Production PKI environment permanently transitions to SHA-2. This includes all Treasury-issued certificates and validity data Production CA certificates are also re-keyed to reflect SHA-2 Other activities such as Federal Bridge re-certification may occur at this time Bureaus do not need to re-key cards previously issued with SHA-1 11
10 Moving to SHA-2: audience engagement Has your organization started using SHA-2 already, and if so, what were your biggest lessons learned? Examples: Issue PIV/PKI certificates and validity data with SHA-2 Domain authentication using SHA-2 PIV card Remote access using SHA-2 PIV card Sign and validate SHA-2 secure What are some of the biggest challenges preparing for SHA-2 as your organization has discovered? Does your organization have remaining SHA-2 issues to address prior to the end of the year? 12
Federal PKI (FPKI) Community Transition to SHA-256 Frequently Asked Questions (FAQ)
Federal PKI (FPKI) Community Transition to SHA-256 Frequently Asked Questions (FAQ) Version 1.0 January 18, 2011 Table of Contents 1. INTRODUCTION... 3 1.1 BACKGROUND... 3 1.2 OBJECTIVE AND AUDIENCE...
More informationDepartment of Defense SHA-256 Migration Overview
Department of Defense SHA-256 Migration Overview 18 March 2011 Tim Fong DoD-CIO/ IIA Timothy.Fong@osd.mil General Observations This is Important INFOSEC: Algorithms can be compromised over time. Crypto
More informationInteragency Advisory Board Meeting Agenda, July 28, 2010
Interagency Advisory Board Meeting Agenda, July 28, 2010 1. Opening Remarks 2. Research Collaboration in the Cloud: How NCI and Research Partners Are Improving Business Processes using Digital Identities
More informationGSA FIPS 201 Evaluation Program
GSA FIPS 201 Evaluation Program David Temoshok Director, Federal Identity Policy and Management GSA Office of Governmentwide Policy NIST/DHS/TSA TWIC QPL Workshop April 21, 2010 1 HSPD-12 Government-wide
More informationIdentity and Access Management Initiatives in the United States Government
Identity and Access Management Initiatives in the United States Government Executive Office of the President November 2008 Importance of Identity Management within the Federal Government "Trusted Identity"
More informationIdentity, Credential, and Access Management. An information exchange For Information Security and Privacy Advisory Board
Federal CIO Council Information Security and Identity Management Committee Identity, Credential, and Access Management An information exchange For Information Security and Privacy Advisory Board Deb Gallagher
More informationInteragency Advisory Board Meeting Agenda, May 27, 2010
Interagency Advisory Board Meeting Agenda, May 27, 2010 1. Opening Remarks 2. PIV-I Status (Judy Spencer, GSA) 3. PIV Test Requirements (Dave Temoshok, GSA) 4. ICAM Progress at USDA (Owen Unangst, USDA))
More informationTest Plan for Department of Defense (DoD) Public Key Infrastructure (PKI) Interagency/Partner Interoperability. Version 1.0.3
Test Plan for Department of Defense (DoD) Public Key Infrastructure (PKI) Interagency/Partner Interoperability Version 1.0.3 Prepared for: Department of Defense (DoD) PKI August 27, 2008 Page 1 Table of
More informationDepartment of Defense PKI Use Case/Experiences
UNCLASSIFIED//FOR OFFICIAL USE ONLY Department of Defense PKI Use Case/Experiences PKI IMPLEMENTATION WORKSHOP Debbie Mitchell DoD PKI PMO dmmitc3@missi.ncsc.mil UNCLASSIFIED//FOR OFFICIAL USE ONLY Current
More informationWhat Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form. December 3, 2012
Federal CIO Council Information Security and Identity Management Committee IDManagement.gov What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form December 3, 2012 HSPD-12
More informationInteragency Advisory Board Meeting Agenda, March 5, 2009
Interagency Advisory Board Meeting Agenda, March 5, 2009 1. Opening Remarks (Tim Baldridge, NASA) 2. Federal Identity, Credential, and Access Management (ICAM) The Future of the Government s IDM Strategy
More informationAudio: This overview module contains an introduction, five lessons, and a conclusion.
Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules
More informationFrom. Medusa. Midas. Lynn Kluegel Glen Lee. Lee Neely. Melissa Nimmo LA-UR-22904. Unclassified
From to Medusa Midas Lynn Kluegel Glen Lee Lee Neely Melissa Nimmo LA-UR-22904 Goals of the DOE PKI Path Forward Establish a more robust/resilient PKI directory service for obtaining encryption certificates
More informationFederal PKI TWG Federal PKI Directory Profile v2.3 (draft)
Federal PKI TWG Federal PKI Profile v2.3 (draft) 05 September, 2002 Agenda! Status of Federal PKI Profile! New Components to be Added to the Bridge! Connecting -based to the Bridge! Connecting Microsoft
More informationInteragency Advisory Board Meeting Agenda, August 25, 2009
Interagency Advisory Board Meeting Agenda, August 25, 2009 1. Opening Remarks 2. Policy, process, regulations, technology, and infrastructure to employ HSPD-12 in USDA (Owen Unangst, USDA) 3. Policy and
More informationFederal Public Key Infrastructure Technical Working Group Meeting Minutes
Federal Public Key Infrastructure Technical Working Group Meeting Minutes Prepared for the General Services Administration By SRA International Time Topic Friday March 25, 2015 1:00 p.m. 2:30 p.m. Teleconference
More informationIntegration of Access Security with Cloud- Based Credentialing Services
Integration of Access Security with Cloud- Based Credentialing Services Global Identity Summit September 17, 2014 All text, graphics, the selection and arrangement thereof, unless otherwise cited as externally
More informationUnderstanding the differences in PIV, PIV-I, PIV-C August 23, 2010
Federal CIO Council Information Security and Identity Management Committee Identity, Credential, and Access Management Understanding the differences in PIV, PIV-I, PIV-C August 23, 2010 Tim Baldridge AWG
More informationIdentity, Credential, and Access Management. Open Solutions for Open Government
Federal CIO Council Information Security and Identity Management Committee Identity, Credential, and Access Management www.idmanagement.gov Open Solutions for Open Government Judith Spencer Co-Chair, ICAM
More informationFederal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance
Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance December 2, 2011 Powered by the Federal Chief Information Officers Council and the Federal Enterprise Architecture
More informationHIPAA Security Regulations: Assessing Vendor Capabilities and Negotiating Agreements re: PKI and Security
HIPAA Security Regulations: Assessing Vendor Capabilities and Negotiating Agreements re: PKI and Security March 2, 2001 Cy D. Ardoin, Ph.D. 2 Agenda Quick View of Security Strategy for Security Quick View
More informationThe DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions May 3, 2004 TABLE OF CONTENTS GENERAL PKI QUESTIONS... 1 1. What is PKI?...1 2. What functionality is provided by a
More informationNIST Test Personal Identity Verification (PIV) Cards
NISTIR 7870 NIST Test Personal Identity Verification (PIV) Cards David A. Cooper http://dx.doi.org/10.6028/nist.ir.7870 NISTIR 7870 NIST Text Personal Identity Verification (PIV) Cards David A. Cooper
More informationI. Configuring Digital signature certificate in Microsoft Outlook 2003:
I. Configuring Digital signature certificate in Microsoft Outlook 2003: In order to configure Outlook 2003 to use the new message security settings please follow these steps: 1. Open Outlook. 2. Go to
More informationNIST Cyber Security Activities
NIST Cyber Security Activities Dr. Alicia Clay Deputy Chief, Computer Security Division NIST Information Technology Laboratory U.S. Department of Commerce September 29, 2004 1 Computer Security Division
More informationCisco Trust Anchor Technologies
Data Sheet Cisco Trust Anchor Technologies Overview Cisco Trust Anchor Technologies provide the foundation for trustworthy systems across Cisco. The Cisco Trust Anchor and a Secure Boot check of signed
More informationFederal Identity, Credentialing, and Access Management. Identity Scheme Adoption Process
Federal Identity, Credentialing, and Access Management Identity Scheme Adoption Process Version 1.0.0 Release Candidate July 8, 2009 ii Document History Status Release Date Comment Audience Draft 0.0.1
More informationOFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT
More informationCertification Practice Statement
Certification Practice Statement Revision R1 2013-01-09 1 Copyright Printed: January 9, 2013 This work is the intellectual property of Salzburger Banken Software. Reproduction and distribution require
More informationI N F O R M A T I O N S E C U R I T Y
NIST Special Publication 800-78-2 DRAFT Cryptographic Algorithms and Key Sizes for Personal Identity Verification W. Timothy Polk Donna F. Dodson William. E. Burr I N F O R M A T I O N S E C U R I T Y
More informationCryptographic and Security Testing Laboratory. Deputy Laboratory Director, CST Laboratory Manager
Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager About our Cryptographic and Security Testing Laboratory Bringing together a suite of conformance testing
More informationCoSign by ARX for PIV Cards
The Digital Signature Company CoSign by ARX for PIV Cards Seamless and affordable digital signature processes across FIPS 201-compliant systems Introduction to Personal Identity Verification (PIV) In response
More informationI N F O R M A T I O N S E C U R I T Y
NIST Special Publication 800-78-3 DRAFT Cryptographic Algorithms and Key Sizes for Personal Identity Verification W. Timothy Polk Donna F. Dodson William E. Burr Hildegard Ferraiolo David Cooper I N F
More informationFederal Identity, Credential, and Access Management Trust Framework Solutions. Relying Party Guidance For Accepting Externally-Issued Credentials
Federal Identity, Credential, and Access Management Trust Framework Solutions Relying Party Guidance For Accepting Externally-Issued Credentials Version 1.1.0 Questions? Contact the FICAM TFS Program Manager
More informationHow To Send An Encrypted Email In Outlook 2000 (For A Password Protected Email) On A Pc Or Macintosh (For An Ipo) On Pc Or Ipo (For Pc Or For A Password Safemail) On An Iphone Or
Outlook 2000 1. Open Outlook 2000 and select the Tools > Options > Security. 2. Click Change Settings. 3. Under the Certificates and Algorithms, there are two Choose buttons. The first allows you to select
More informationInteragency Advisory Board Meeting Agenda, September 27, 2010
Interagency Advisory Board Meeting Agenda, September 27, 2010 1. Opening Remarks 2. Transportation Worker Identity Credential Program Status Update (John Schwartz, TWIC PM) 3. Virginia First Responder
More informationVerification of digitally signed PDFs
Verification of digitally signed PDFs Configuring Adobe Reader to verify digitally signed PDFs This document is freely redistributable. You can find the latest version at: http://www.netlock.hu/useren
More informationCard Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
More informationState of PKI for SSL/TLS
State of PKI for SSL/TLS NIST Workshop on Improving Trust in the Online Marketplace Russ Housley Vigil Security, LLC Introduction State of the PKI for SSL/TLS: Mostly working, but too fragile Facing motivated
More informationGovernment Information Security System with ITS Product Pre-qualification
Government Information Security System with ITS Product Pre-qualification Wan S. Yi 1, Dongbum Lee 2, Jin Kwak 2, Dongho Won 1 1 Information Security Group, Sungkyunkwan University, 300 Cheoncheon-dong,
More informationFrequently Asked Questions (FAQs) SIPRNet Hardware Token
Air Force Public Key Infrastructure System Program Office (ESC/HNCDP) Phone: 210-925-2562 / DSN: 945-2562 Web: https://afpki.lackland.af.mil Frequently Asked Questions (FAQs) SIPRNet Hardware Token Updated:
More informationFEDERAL IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT AND PERSONAL IDENTITY VERIFICATION (PIV) SOLUTIONS
FEDERAL IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT AND PERSONAL IDENTITY VERIFICATION (PIV) SOLUTIONS Homeland Security Presidential Directive 12 (HSPD 12), FIPS 201, and the latest Federal Identity,
More informationInformation Technology Policy
Information Technology Policy Identity Protection and Access Management (IPAM) Architectural Standard Identity Management Services ITP Number ITP-SEC013 Category Recommended Policy Contact RA-ITCentral@pa.gov
More informationSECURE DIGITAL SIGNATURES FOR APPRAISERS
ABSTRACT An appraiser s credibility is represented by a valid license and the signature affixed to a report. Providing a common requirement for the creation of digital signatures for licensed or certified
More informationOPC UA vs OPC Classic
OPC UA vs OPC Classic By Paul Hunkar Security and Communication comparison In the world of automation security has become a major source of discussion and an important part of most systems. The OPC Foundation
More informationInstalling your Digital Certificate & Using on MS Out Look 2007.
Installing your Digital Certificate & Using on MS Out Look 2007. Note: This technical paper is only to guide you the steps to follow on how to configure and use digital signatures. Therefore Certificate
More informationUsing etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
More informationDraft Middleware Specification. Version X.X MM/DD/YYYY
Draft Middleware Specification Version X.X MM/DD/YYYY Contents Contents... ii 1. Introduction... 1 1.2. Purpose... 1 1.3. Audience... 1 1.4. Document Scope... 1 1.5. Document Objectives... 1 1.6. Assumptions
More informationFederal Identity, Credential, and Access Management Trust Framework Solutions. Overview
Federal Identity, Credential, and Access Management Trust Framework Solutions Overview Version 1.0 02/07/2014 Questions? Contact the FICAM TFS Program Manager at TFS.EAO@gsa.gov 1 Table of Contents 1.
More informationOffice of the Chief Information Officer Department of Energy Identity, Credential, and Access Management (ICAM)
Department of Energy Identity, Credential, and Access Management (ICAM) Cyber Security Training Conference Tuesday, May 18, 2010 1 Announcement LACS Birds-of-a-Feather Session Logistics Wednesday, May
More informationDoD CAC Middleware Requirements Release 4.0
DoD CAC Middleware Requirements Release 4.0 Version 1.01 26 November 2012 Prepared by: DoD Identity Protection and Senior Coordinating Group s (IPMSCG) Test and Evaluation Work Group (TEWG) UNCLASSIFIED
More informationOverview Most of the documentation out there on the transition from SHA-1 certificates to SHA-2 certificates will tell you three things:
SHA-1 Versus SHA-2 Overview Most of the documentation out there on the transition from SHA-1 certificates to SHA-2 certificates will tell you three things: - Breaking SHA-1 is not yet practical but will
More informationFCCX Briefing. Information Security and Privacy Advisory Board. June 13, 2014
FCCX Briefing Information Security and Privacy Advisory Board June 13, 2014 1 Agenda Overview NSTIC FICAM Federal Cloud Credential Exchange Lessons Learned Enhancing Federation Privacy Questions 2 Challenge
More informationState of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008
State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008 Background In the last ten years Arkansas has enacted several laws to facilitate electronic transactions
More informationGuide to Using DoD PKI Certificates in Outlook
Report Number: I33-002R-2005 Guide to Using DoD PKI Certificates in Outlook Security Evaluation Group Authors: Margaret Salter Mike Boyle Updated: June 9, 2005 Version 4.0 National Security Agency 9800
More informationCipherShare Features and Benefits
CipherShare s and CipherShare s and Security End-to-end Encryption Need-to-Know: Challenge / Response Authentication Transitive Trust Consistent Security Password and Key Recovery Temporary Application
More informationNational Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016
National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy Version 1.1 February 2, 2016 Copyright 2016, Georgia Tech Research Institute Table of Contents TABLE OF CONTENTS I 1 INTRODUCTION
More informationAPPENDIX C TABLE OF CONTENTS
APPENDIX C TABLE OF CONTENTS APPENDIX C. INFORMATION TECHNOLOGY SERVICES CHARGES...1 C.1 INFORMATION TECHNOLOGY PROFESSIONAL SERVICES...1 C.1.1 Technical And Consulting Services Hourly Rates...1 C.1.2
More informationDEPARTMENTAL REGULATION
U.S. DEPARTMENT OF AGRICULTURE WASHINGTON, D.C. 20250 DEPARTMENTAL REGULATION SUBJECT: Identity, Credential, and Access Management Number: 3640-001 DATE: December 9, 2011 OPI: Office of the Chief Information
More informationDepartment of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT
Department of Veterans Affairs VA DIRECTIVE 6510 Washington, DC 20420 Transmittal Sheet VA IDENTITY AND ACCESS MANAGEMENT 1. REASON FOR ISSUE: This Directive defines the policy and responsibilities to
More informationGAO PERSONAL ID VERIFICATION. Agencies Should Set a Higher Priority on Using the Capabilities of Standardized Identification Cards
GAO United States Government Accountability Office Report to Congressional Requesters September 2011 PERSONAL ID VERIFICATION Agencies Should Set a Higher Priority on Using the Capabilities of Standardized
More informationRelease Notes. NCP Secure Client Juniper Edition. 1. New Features and Enhancements. 2. Problems Resolved
NCP Secure Client Juniper Edition Service Release: 9.30 Build 102 Date: February 2012 1. New Features and Enhancements The following describe the new features introduced in this release: Visual Feedback
More informationNATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL INDEPENDENT EVALUATION OF THE NATIONAL CREDIT UNION ADMINISTRATION S COMPLIANCE WITH THE FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA)
More informationFederal PKI. Trust Infrastructure. Overview V1.0. September 21, 2015 FINAL
Federal PKI Trust Infrastructure Overview V1.0 September 21, 2015 FINAL This Page is Blank Table of Contents 1. Introduction... 1 2. Public Key Infrastructure Overview... 2 3. Federal Public Key Infrastructure
More informationMicrosoft Trusted Root Certificate: Program Requirements
Microsoft Trusted Root Certificate: Program Requirements 1. Introduction The Microsoft Root Certificate Program supports the distribution of root certificates, enabling customers to trust Windows products.
More informationAuthentication, Authorization, and Audit Design Pattern: Internal User Identity Authentication
Authentication, Authorization, and Audit Design Pattern: Internal User Identity Authentication Office of Technology Strategies (TS) Architecture, Strategy, and Design (ASD) Office of Information and Technology
More informationEMC Celerra Version 5.6 Technical Primer: Public Key Infrastructure Support
EMC Celerra Version 5.6 Technical Primer: Public Key Infrastructure Support Technology Concepts and Business Considerations Abstract Encryption plays an increasingly important role in IT infrastructure
More informationAnalyzing the MD5 collision in Flame
Analyzing the MD5 collision in Flame Alex Sotirov Co-Founder and Chief Scientist Trail of Bits, Inc Overview of Flame Discovered sometime in 2012 Active since at least 2010 Complex malware almost 20MB
More informationNISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards
NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards David A. Cooper NISTIR 7676 Maintaining and Using Key History on Personal Identity Verification (PIV) Cards David
More informationArkansas Department of Information Systems Arkansas Department of Finance and Administration
Arkansas Department of Information Systems Arkansas Department of Finance and Administration Title: Electronic Signature Standard Document Number: SS 70 011 Effective Date: Act 722 of 2007 requires state
More informationHow to use Certificate in Microsoft Outlook
How to use Certificate in Microsoft Outlook Macau Post esigntrust Version. 2006-01.01p Agenda Configure Microsoft Outlook for using esigntrust Certificate Use certificate to sign e-mail Use Microsoft Outlook
More informationEntrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
More informationMobile Device as a Platform for Assured Identity for the Federal Workforce
Mobile Device as a Platform for Assured Identity for the Federal Workforce Dr. Sarbari Gupta President and CEO, Electrosoft U.S. Army Information Technology Agency (ITA) Security Forum Fort Belvoir Electrosoft
More informationMore on SHA-1 deprecation:
Dear PTC Axeda Customer, This message specifies Axeda and IDM Agent upgrade requirements and timelines for transitioning Axeda Enterprise Server, Global Access Server (GAS), Policy Server, and Questra
More information1. Server 2008 - Microsoft FEP 2010 - Instalation
1. Server 2008 - Microsoft FEP 2010 - Instalation 1 2. Windows XP x86 (32bit) - Microsoft FEP 2010 Instalation 2 3 2.1. 4 System Requirements Microsoft Forefront Endpoint Protection 2010 1 System Requirements
More informationFebruary 2015 Federal Mobile Computing Summit Collaboration Session Summary
February 2015 Federal Mobile Computing Summit Collaboration Session Summary Tom Suder ATARC Mike Peck, Gaurav Seth, Mark Russell, Patrick Benito, Marie Collins The MITRE Corporation Approved for Public
More informationDigital Signatures and Interoperability
Setting Processes for Electronic Signature Dr. Joachim Schiff On behalf of the SPES Consortium Workgroup City of Saarbruecken IKS Nell-Breuning-Allee 1 D-66115 Saarbruecken Germany Tel. 0049 681 905 5000
More informationUsing etoken for Securing E-mails Using Outlook and Outlook Express
Using etoken for Securing E-mails Using Outlook and Outlook Express Lesson 15 April 2004 etoken Certification Course Securing Email Using Certificates Unprotected emails can be easily read and/or altered
More informationPractical Challenges in Adopting PIV/PIV-I
UNCLASSIFIED Practical Challenges in Adopting PIV/PIV-I Hank Morris UNCLASSIFIED 2 UNCLASSIFIED // FOUO Purpose and Agenda Purpose: Explore the policy, process, and mechanisms to securely leverage biometrics
More informationDigital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
More informationAchieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER
with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics
More informationX.509 Certificate Policy For The Federal Bridge Certification Authority (FBCA) Version 2.24
X.509 Certificate Policy For The Federal Bridge Certification Authority (FBCA) Version 2.24 February 25, 2011 Signature Page Chair, Federal Public Key Infrastructure Policy Authority DATE Revision History
More informationHSPD-12 Implementation Architecture Working Group Concept Overview. Version 1.0 March 17, 2006
HSPD-12 Implementation Architecture Working Group Concept Overview Version 1.0 March 17, 2006 Table of Contents 1 PIV Lifecycle... 3 2 High Level Component Interaction Diagram... 4 3 PIV Infrastructure
More information2007 Microsoft Office System Document Encryption
2007 Microsoft Office System Document Encryption June 2007 Table of Contents Introduction 1 Benefits of Document Encryption 2 Microsoft 2007 Office system Document Encryption Improvements 5 End-User Microsoft
More informationHow encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing
More informationConcept of Electronic Approvals
E-Lock Technologies Contact info@elock.com Table of Contents 1 INTRODUCTION 3 2 WHAT ARE ELECTRONIC APPROVALS? 3 3 HOW DO INDIVIDUALS IDENTIFY THEMSELVES IN THE ELECTRONIC WORLD? 3 4 WHAT IS THE TECHNOLOGY
More informationMicrosoft Identity Lifecycle Manager & Gemalto.NET Solutions. Jan 23 rd, 2007
Microsoft Identity Lifecycle Manager & Gemalto.NET Solutions Jan 23 rd, 2007 Microsoft ILM is a comprehensive, integrated, identity and access solution within the Microsoft system architecture. It includes
More informationDIGIPASS CertiID. Getting Started 3.1.0
DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express
More informationHuman Factors in Information Security
University of Oslo INF3510 Information Security Spring 2014 Workshop Questions Lecture 2: Security Management, Human Factors in Information Security QUESTION 1 Look at the list of standards in the ISO27000
More informationSP 800-130 A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter
SP 800-130 A Framework for Designing Cryptographic Key Management Systems 5/25/2012 Lunch and Learn Scott Shorter Topics Follows the Sections of SP 800-130 draft 2: Introduction Framework Basics Goals
More informationFICC Shared Service Provider (SSP) Industry Day, 3/11. Questions and Answers
FICC Shared Service Provider (SSP) Industry Day, 3/11 Questions and Answers A request to repeat the URL where the presentation and documents will be stored was made. -Judith Spencer repeated the URL, www.cio.gov/ficc/ssp_documents.htm,
More informationCA-DAY 2014. Michael Kranawetter, Chief Security Advisor (Tom Albertson, Security Program Manager) Microsoft
CA-DAY 2014 Michael Kranawetter, Chief Security Advisor (Tom Albertson, Security Program Manager) Microsoft Microsoft s Root Program in 2014 New Technical Requirements Published in November 2013 First
More informationMobile OTPK Technology for Online Digital Signatures. Dec 15, 2015
Mobile OTPK Technology for Online Digital Signatures Dec 15, 2015 Presentation Agenda The presentation will cover Background Traditional PKI What are the issued faced? Alternative technology Introduction
More informationWildcard and SAN: Understanding Multi-Use SSL Certificates
Wildcard and SAN: Understanding Multi-Use SSL Certificates LEVERAGING MULTI-USE DIGITAL CERTIFICATES TO SIMPLIFY CERTIFICATE MANAGEMENT AND REDUCE COSTS Wildcard and SAN: Understanding Multi-Use SSL Certificates
More informationIs Your SSL Website and Mobile App Really Secure?
Is Your SSL Website and Mobile App Really Secure? Agenda What is SSL / TLS SSL Vulnerabilities PC/Server Mobile Advice to the Public Hong Kong Computer Emergency Response Team Coordination Centre 香 港 電
More informationOffice of Inspector General
INFORMATION TECHNOLOGY: The Bureau of the Public Debt s Certificate Policy Statement Should Be Updated OIG-03-009 October 24, 2002 Office of Inspector General ******* The Department of the Treasury Contents
More informationDeveloping a Federal Vision for Identity Management
Developing a Federal Vision for Identity Management Duane Blackburn Office of Science and Technology Policy Executive Office of the President January 16, 2009 Height DNA Biometric Name Date of Birth SSN
More informationUsing PIV Smart Cards on Linux for Authentication to Windows Active Directory
Using PIV Smart Cards on Linux for Authentication to Windows Active Directory Douglas E. Engert Computing and Information Systems April 26, 2006 DOE Cyber Security Group Training Conference Dayton, Ohio
More informationHow to use Certificate in Outlook Express
How to use Certificate in Outlook Express Macau Post esigntrust Version. 2006-01.01p Agenda Configure Outlook Express for using esigntrust Certificate Use certificate to sign email Use Outlook Express
More informationGOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.
PERSONAL IDENTITY VERIFICATION (PIV) OVERVIEW INTRODUCTION (1) Welcome to the Homeland Security Presidential Directive 12 (HSPD-12) Personal Identity Verification (PIV) Overview module, designed to familiarize
More information