NATO. Identity Management PKI and Strong Authentication

Size: px
Start display at page:

Download "NATO. Identity Management PKI and Strong Authentication"

Transcription

1 NATO Identity Management PKI and Strong Authentication Snapshot May 2012

2 CONTENTS THE IDENTITY MANAGEMENT CHALLENGE...3 BACKGROUND INFORMATION ON NATO PKI...5 NATO PKI MANAGEMENT AUTHORITY...6 NPKI TIMELINE...8 NATO IDENTITY MANAGEMENT BACKGROUND...9 RELATED POLICIES, DIRECTIVES AND GUIDANCE

3 THE IDENTITY MANAGEMENT CHALLENGE The NATO Identity Management (IdM) vision is a federated, robust, trustworthy and interoperable Identity Management capability that supports the ability to correctly identify participants and Non- Human Entities of Alliance mission operations. But despite the numerous NATO efforts underway to establish and apply identification policies and mechanisms, NATO has not articulated the overarching requirement for and roadmap to implement and manage this activity as a whole. Implementing identity management implies establishment of frameworks, models, standards, protocols, processes and technology that enroll, register and un-register/retire identity assets across the enterprise. Managing these implementation efforts also requires a lead body with the ability and accountability to realize this potential within NATO. The following is a snapshot of current NATO efforts underway that exemplify the shortfalls within the Alliance on this issue. TECHNICAL & IMPLEMENTATION POLICY DEVELOPMENT The Bi-SC Secure Data Strategy (SDS) advocates moving along paths towards automated, protected and trusted core networking and data exchange leading to superior C2 arrangements. Key to pursuing these objectives is adaptation of policies and supporting directives and coordinated efforts among the Security Committee (IA), C3 Board, and the NPMA. The SDS shows that some technical policies and directives in their current state may hinder rather than enable the attainment of Alliance IdM goals. In some cases policies and roadmaps simply do not exist and will have to be drafted and approved. As an example, for trusted data exchange, metadata standards need to be finalized and metadata security standards and public key infrastructure need to be defined and implemented. With respect to identity management, minimum? identity attributes and privileges and the interoperability requirements must be established. Looking to the future, not only will NATO have to manage identities within its own mission and business environment, it must also be prepared to exchange identities across federated environments involving NATO nations, partner nations and non-nato nations and organizations. STRONG AUTHENTICATION & IDENTITY MANAGEMENT NATO s new cyber defense policy and an associated action plan contain the only actionable roadmap of IdM-related activities, namely the implementation of strong authentication to access NATO CIS. Nevertheless, the C3B (PS) has yet to provide clear guidance and tasking to its subordinate structure (Capability Panel and Teams) to carry out this work. This key challenge for the C3B (PS), - i.e., governance, management and oversight of enterprise wide technical implementations, is not limited to Identity Management. NATO is also struggling with the task of defining strong authentication in the context of the Cyber Defense Policy, a task for which the C3B exercises oversight. Most recently the Security Committee in IA format has tried to reconcile the DPPC-R (CD) developed requirement for strong authentication as an item to enhance NATO s cyber posture with a more specific meaning of the term.. Without a clear 3

4 understanding and definition of the term, relevant NATO bodies are reluctant to move forward and accept that stronger authentication or even multifactor authentication can be achieved. ELEMENTS FOR AN IDENTITY MANAGEMENT INFRASTRUCTURE While PKI is a fundamental element of an IdM infrastructure, the NATO PKI statement of requirements as approved in 2009 did not include, multifactor authentication nor strong authentication, nor is it predicated upon realizing a broader NATO identity management infrastructure. Neither were other elements such as the Cyber Defense Action Plan s call for strong authentication and the NATO enterprise directory service considered in a broader identity and access management context. These elements as a whole have not been organized into a coherent policy/management and technology/architecture roadmap. Assembling the identity-related information from existing NATO systems and joining them together so that the data associated with an individual is linked together, and then making that available to applications for authentication, access and privilege management, is precisely what constitutes an identity management infrastructure. These facts clearly expose the need for NATO to develop a prioritized timeline and tasking necessary to implement a robust NATO Identity Management service within a structure that provides oversight and governance, superior to but with ability to influence the execution and implementation of CDAP item #3. 4

5 BACKGROUND INFORMATION ON NATO PKI The initial NATO PKI SOR (Statement of operational Requirement) was approved in 1998, (static network implementation with 10k users). The capability package CP-0A155, NATO common funding source for INFOSEC, only identified funding for the PKI infrastructure not Enterprise Directory or functional area services, end-user application integration nor certificates or end entity user tokens. In 2006 mission/scope creep; SOR was re-written to support static and deployed implementation for 200k users. SOR was not finalized until mid Type-B cost estimate is yet to be completed. Although the SOR significantly expanded the scope, additional funding has not been identified; initial cost estimate 2.2M Euros re-scoped SOR TBCE ~11M Euros across all funding sources including full scope of new SOR and tokens/certificates which are included in CP0A0155. NC3A is currently working the TBCE to encompass the ACO re-scoped PKI requirement and encompass funding from CPA0155 and other sources, taking into consideration the existing interim solution as well as the additional requirement levied in CUR422 in support of the ISAF mission COMPOSITION OF NATO S PKI CAPABILITY Despite the numerous NATO efforts underway to establish and apply identification policies and mechanisms, NATO has not articulated the overarching requirement for, and strategy to, manage these activities as a whole. In June 2003, NATO developed a policy for the adoption of Public Key Infrastructure Technology by NATO Civil and Military Bodies. This policy states that NATO PKI shall be implemented by only one authority, the NATO PKI Management Authority (NPMA). The NMPA has only approved one NATO PKI which is described in NATO PKI Certificate Policy (AC/322(NPMA-PAC)WP(2005)0003). This approved NATO PKI can generate, distribute, and manage cryptographic keys, electronic certificates, and electronic Certificate Revocation Lists (CRL), which allows for securing the electronic IT environment for use in the NATO Alliance. Currently, NATO information is being protected at the system level. Trust to be based upon this information is out of (system) band and conducted in a procedural manner. The approved interim NATO PKI has been implemented at NATO Headquarters (NATO HQS entities), NATO C3 Agency (NC3A entities), and NATO CIS Services Agency (NCSA entities) on the NATO Unclassified/NATO Restricted 1domain. Additionally, the approved NATO PKI has also been implemented at NATO International Security Assistance Forces (ISAF entities) and NATO General Communication System Packet Transport Component Network 1 NATO Restricted, similar to but equal to the US U//FOUO. NR may not be transmitted over the internet in the clear. 5

6 Adaptation For Information exchange gateways (NGCS PTC NAFI 200 entities). Overall, approximately 600 hard tokens are in use. At the same time, other NATO organizations such as NATO Maintenance & Supply Agency (NAMSA) NATO Eurofighter & Tornado Management Agency (NETMA), NATO Battlefield Information Collection & Exploitation Systems (BICES), and NATO Information Assurance Technical Center (NIATC) have developed and implemented their own version of PKI. Due to their expanding operational environment, these organizations had an urgent need to establish a PKI solution rapidly; and could not wait for an enterprise wide NATO PKI capability. These version of PKI have a not been approved by the NPMA, therefore they are not compliant with NATO policy. NATO PKI MANAGEMENT AUTHORITY The NATO PKI Management Authority (NPMA) serves as the executive agent for the development and operation of the NPKI. Its primary focus is to establish and maintain the desired level of assurance when providing PKI services to NATO users and when defining the rules for interoperation with other PKIs, for example, when negotiating agreements with nations and other external certification authorities and PMAs. The NPMA acts as directed by, and under the control of, the NATO C3 Board (NC3B). When executing its mission, it remains responsive, through the NC3B, to the North Atlantic Council. MEMBERS Chairman: (NHQC3S Director) Secretary: NHQC3S IAB Staff Officer) Members: representatives from ACO, ACT, NATO HQ Executive Secretariat, NC3A, NCSA, NHQC3S, NOS, Infrastructure Committee, PAC Chairman. Representatives of other NATO agencies and national experts may also be invited to attend the meetings in an advisory capacity. NATO PKI ADVISORY Group The NATO PKI Advisory Group (NPAG) provides assistance and advice to the NPMA on legal issues, technical issues, and current NATO standard operating procedures. MEMBERS Chairman: (NHQC3S IAB Staff Officer) 6

7 Members: representatives from Strategic Commands, NATO Legal Advisor, NC3A, NCSA, NHQC3S, NOS, Nations (subject matter experts), DACAN, other NATO bodies. Representatives of other NATO agencies, national experts and industry representatives may also be invited to attend the meetings. MILITARY COMMITTEE DISTRIBUTION AND ACCOUNTING AGENCY The Military Committee Distribution and Accounting Agency (DACAN) arranges for the production, accounting, and distribution of all keying material used by NATO. DACAN serves as the trusted agent responsible for the management of keying material necessary to ensure the confidentiality, integrity, availability, and authenticity of NATO information, communications, and automated information systems. DACAN shall provide these services as the NPKI Root Certificate Authority and perform as the ultimate trust point in the NATO domain to enforce the NPKI Certificate Policies. EUROPEAN DISTRIBUTION AND ACCOUNTING AGENCY OF THE MILITARY COMMITTEE The European Distribution and Accounting Agency of the Military Committee (EUDAC) serves as the trusted agent, in co-operation with DACAN, for the distribution of NATO keying material. EUDAC shall serve as the NPKI Root CA backup site and shall assume the responsibilities of DACAN as the ultimate trust point in the NATO domain to enforce the NPKI Certificate Policies if necessary. DACAN will remain the primary point of contact for all issues related to the NPKI Root CA in the event that the backup site has been activated. NATO CIS SERVICES AGENCY The NATO CIS Services Agency (NCSA) and its subordinate elements manage operation and control, on behalf of all subscribers, the Communications and Information Systems (CIS) and installations assigned to it by the NC3B. In addition NCSA and its subordinate elements provide operational support comprising hardware and software maintenance, personnel training, installation and associated services including security for assigned CIS and authorized subscribers, NCSA is responsible for the management, operation and control of NPKI CA and RA systems supporting CIS assigned to NCSA (with the exception of the NPKI Root CA.) SECURITY ACCREDITATION AUTHORITY The Security Accreditation Authority (SAA) is the body responsible for approving the implementation of CIS within an organization. The SAA for the NPKI Root CA is the NATO Security Accreditation Board (NSAB). The NATO Office of Security (NOS) is the Compliance Auditor for the NPKI as defined by the NPKI Directive. The NOS is responsible for compliance audits and continued accreditation of the NPKI Root CA. 7

8 NPKI TIMELINE 8

9 NATO IDENTITY MANAGEMENT BACKGROUND The NATO Network Enabled Capability (NNEC) Feasibility Study (FS) endorsed by the NATO C3 Board highlights the challenges the Alliance faces with respect to the deployment of an Alliance-wide, interoperable Identity Management (IdM) scheme to support information sharing. FRAMEWORK - ORIGINS In response to the NNEC study and following coordination with the management teams of SC/4 and SC/5, NATO held a series of IdM Workshops in 2008 in order to develop a NATO IdM framework and to define a common structured IdM model and IdM plane within and across NATO and member nations. The NATO IdM Straw-man document produced did not address a holistic implementation of IdM but rather only addressed a narrowly focused aspect of messaging interoperability. A first version of this framework document is at Enclosure 1, and is now presented to SC/4, SC/5 and the NPMA on a request for comment basis. Despite the number of NATO efforts underway to establish and apply identification policies and mechanisms, NATO has not articulated the overarching requirement for, and strategy to, manage these activities as a whole. At the same time, the Alliance mission environment and associated identity management challenges are becoming more complex due to coalition operations in Afghanistan and elsewhere. Not only must NATO manage identities within its own mission and business environments, it must also exchange identities across federated environments involving NATO nations, partner nations and international organizations. NIDM GOVERNANCE, SCOPE CHALLENGES Discussions within SMI AHWG and the IdM Workshops led to a growing U.S. concern that NATO IdM was NOT TRACKING IN THE RIGHT DIRECTION. IN THE ABSENCE OF A GOVERNANCE FRAMEWORK OR EVEN AN AGREED SCOPE for IdM within the Alliance, any activities would essentially continue to move forward in parallel or even diverging directions. Within the U.S., this conclusion culminated in a break of silence on the draft IdM framework; relevant text from that document is below. US BREAK OF SILENCE 2009 "ID management goes way beyond security aspects. It means that there's frameworks, models, standards, protocols, processes and technology that enroll, register and un-register/retire assets across the enterprise, whether they are human or not." The U.S. therefore recommends standing up "a PKI Program Office that has a wider scope than the current NPMA and PAC because it could extend the role of the emerging PKI to take on a larger Identity Management role that will support both logical and physical access needs and therefore more effectively adapt the PKI to rapidly support emerging ID management needs." The U.S. proposals in the 2009 break of silence were a difficult sell in the current NATO resource environment. There were also concerns about focusing on a higher level strategic framework instead of 9

10 emerging, near-term operational requirements such as the TACTIC CUR for a common identity card in the ISAF Theater. Indeed, ACO J6 announced at the June 2010 SC/4 they had produced an IdM Strategy of their own addressing the how. NATO Identity Management will create the basis of a secure enterprise capability that will permit identity-sensitive applications to collect identity information, established & assign attributes to a digital identity, and connect that identity to an entity in support of mission objectives. 10

11 RELATED POLICIES, DIRECTIVES AND GUIDANCE NATO Cyber Defense Policy Cyber Defense Action Plan (AC/281-N(2012)0119-REV7, Cyber Defense Action Plan 12 Jan 2012) A DPPC working document current at REV 7 identifying actionable tasks to achieve the elements identified in the cyber defense policy. NPAG Terms of Reference (AC/322-D(2009)0048, 26 Nov 2009), written by NPAG and NHQC3S. The purpose of this document is to revise the NATO PKI Advisory Cell (PAC) Terms of Reference (TOR) and rename the PAC as the NATO PKI Advisory Group (NPAG). NATO Public Key Infrastructure (NPKI) HandBook (AC/322(NPMA)D(2006)0003-REV1, 28 Sep 2009) written by NPAG & NHQC3S. The purpose of this document is to establish the procedure for an applicant NATO entity to have its CA to be integrated in the NPKI architecture. The NATO Identity Management Framework (Multiref EAPC(AC/322-SC/4)N(2009)0002, EAPC(AC/322-SC/5)N(2009)0009, AC/322(NPMA)N(2009)0001, 11 Mar 2009) written by SC/5. This document describes a common, structured Identity Management Model and Identity Management Plane to be used within and across NATO and its member nations (federated approach, extending the specific definition of IDs within a single domain). ACP145 NPKI Supporting Document (AC/322(NPMA)WP(2008)0001, 15 Dec 2008) written by NC3A. This document defines the creation and management of Version 3 X.509 public-key certificates for use in supporting interoperability with ACP 145 Gateways and their associated PKIs. Certification Practice Statement For The NATO Root Certificate Authority (AC/322(NPMA)D(2006)0001-REV3, 27 Oct 2008) written by NC3A and DACAN. This document defines the practices under which the NATO PKI Root Certificate Authority (CA) operates. The NATO PKI (NPKI) implements a hierarchical trust model originating at this single Root CA operated by DACAN. This document defines the relationship of the NATO PKI Root Certificate Authority with other Certificate Authorities, both those that are sub-ordinate within its own domain, and those external to its hierarchy. Certification Practice Statement For The NATO Secret Certification Authority (AC/322(NPMA)D(2008)0001, 18 Sep 2008) written by NIATC. This document defines the 11

12 practices under which the NS CA operates and the manner in which the system complies with the NATO PKI Certificate Policy. NPKI Technical Characteristics (AC/322-N(2008)0004, 28 Jan 2008), written by NC3A and NPAG. The purpose of the Technical Characteristics document is to define the minimum requirements for the NATO Public Key Infrastructure required to support the protection of NATO CIS and NATO information processed or transmitted by the CIS. NATO Messaging System (AC/322(NPMA-PAC)L(2007)0002, 31 Jul 2007), written by Core Enterprise Services Working Group (CESWG) SC/5. The purpose of this document was to produce a strategy to map out the way ahead for high grade messaging' in response to an earlier tasking by the NC3B Certification Practice Statement For The NATO Unclassified/NATO Restricted Certification Authority (AC/322(NPMA)D(2006)0002, 09 Oct 2006), written by NC3A. This document is the Certification Practice Statement (CPS) for the NCSA NUNR CA. This document follows the structure defined in RFC2527, and defines CA functionality compliant with CertP V1.5. Revised NATO PKI Certificate Policy (RFC 3647 Framework, AC/322(NPMA-PAC)WP(2005)0003, 22 Sep 2005), written by NC3A. This document defines the creation and management of Version 3 X.509 public-key certificates for use in applications requiring security services. This Certificate Policy does not define a particular implementation of the NPKI, or the plans for future Certificate Policies. It is the intent of this Policy to identify the minimum requirements and procedures that are necessary to support trust in the NPKI, and to minimize imposition of specific implementation requirements on NPKI CAs, RAs, Subscribers, and relying parties. NPKI Root Certificate Authority Audit Checklists (AC/322(NPMA-PAC)WP(2005)0002, 09 August 2005), written by NC3A. The purpose of this checklist was to be used for the audit of the NPKI Root Certificate Authority. NATO Directive for NATO Public Key Infrastructure (NPKI) Interoperability with the Nations (AC/322(NPMA)WP(2005)0001, 04 Mar 2005), written by NPAG. The purpose of this directive is to define the necessary steps for the secure exchange of PKI information between NATO civil and military bodies, the nations, and partners for both classified and non-classified information. 12

13 NPKI Token Strategy Document (AC/322(NPMA-PAC)WP(2003)006-REV1, 19 Aug 2004), written by NPAG and NC3A. This document describes the technologies available for hardware tokens, the possible associated evaluation standards and proposes requirements for the implementation of hardware tokens in the frame of the NATO PKI. NATO Public Key Infrastructure (NPKI) Reference Architecture (AC/322(NPMA)WP(2003)002, 19 Dec 2003), written by NC3A. This document addresses public key technology functionality across the Operational, System, and Technical views of the NATO C3 Systems architecture at the Reference Architecture level of detail, per the guidance set down in the NATO Interoperability Management Plan (NIMP). Revised NPMA/PAC Program of Work (AC/322(NPMA-PAC)WP(2003)004, 28 Aug 2003), written by NHQC3S. The purpose of the document was to develop task sheets of the NPMA/PAC Program of Work. NATO Policy for the adoption of Public Key Infrastructure Technology by NATO Civil and Military Bodies (AC/322(NPMA)L(2003)001, 10 Jun 2003), written by NPAG and NHQC3S. The purpose of this document is to provide for effective management of all PKI initiatives within NATO by controlling and co-ordinating the implementation of a Public Key Infrastructure in support of NATO CIS. This document applies to all NATO civil and military bodies that implement, or are planning the implementation of, PKI techniques in NATO communication and information Systems. It is supported by implementation Directives and Guidance documents as required, approved by the NATO C3 Board. NATO Policy for the implementation of a PKI (C-M(2003)32, 03 Apr 2003), written by NPAG. The NATO C3 Board approved the NATO Policy for the Adoption of Public Key Infrastructure (PKI) Technology by NATO Civil and Military Bodies. This paper acts as an umbrella document for the implementation of the Public Key Infrastructure (PKI) within the Alliance that will be pursued and controlled by the NC3B. NPKI Concept of Operations (AC/322-D/0081, 18 Dec 2002), written by NPAG. The NATO Public Key Infrastructure (NPKI) Concept of Operations (CONOPS) provides the principles for NATO to deploy a PKI in order to enable PKI-derived security services. The NPKI CONOPS also describes the process to achieve interoperability between the NPKI and the PKIs of other organizations and countries, especially the NATO member nations. 13

14 Legal Aspects of the NPKI (AC/322-D/0080, 18 Dec 2002), written by NPAG and NHQC3S. The purpose of this task was to carefully examine the impact of NATO PKI implementation identifying legal aspects that needed to be solved prior to approving any policy, directive or guidance related to the fielding of NATO PKI. NPKI Awareness Strategy (AC/322(NPMA-PAC)-WP08, 21 Mar 2001), written by NPAG and NHQC3S. The purpose of this document is to select the targets of this awareness programme. In other words, to select the communities interested in the implementation of a PKI within NATO and to seek the best method to provide to each community the most efficient and effective information. NPMA Terms of Reference (AC/322-N-0641, 18 Dec 2000), written by NC3A and NHQC3S. The purpose of this document is to develop the NATO PKI Management Authority (NPMA) Terms of Reference (TOR). 14

NICE and Framework Overview

NICE and Framework Overview NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to

More information

Committee on National Security Systems

Committee on National Security Systems Committee on National Security Systems CNSS POLICY No.25 March 2009 NATIONAL POLICY FOR PUBLIC KEY INFRASTRUCTURE IN NATIONAL SECURITY SYSTEMS. 1 CHAIR FOREWORD 1. (U) The CNSS Subcommittee chartered a

More information

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 Product Support Matrix Following is the Product Support Matrix for the AT&T Global Network Client. See the AT&T Global Network

More information

NATO UNCLASSIFIED. 27 February 2012 DOCUMENT C-M(2012)0014 Silence Procedure ends: 16 Mar 2012 16:00

NATO UNCLASSIFIED. 27 February 2012 DOCUMENT C-M(2012)0014 Silence Procedure ends: 16 Mar 2012 16:00 27 February 2012 DOCUMENT Silence Procedure ends: 16 Mar 2012 16:00 Directive on the Management of Records Generated on Operational Deployment Note by the Secretary General 1. In June 2011 the NATO Records

More information

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS* COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun

More information

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS* COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun

More information

Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8

Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138 Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 2 of 138 Domain Name: CELLULARVERISON.COM Updated Date: 12-dec-2007

More information

THE MASTER PLAN CAMPAIGN. Workshop RPAS (WS 03) 22 January 2015

THE MASTER PLAN CAMPAIGN. Workshop RPAS (WS 03) 22 January 2015 THE MASTER PLAN CAMPAIGN Workshop RPAS (WS 03) 22 January 2015 Back-up The objectives of the campaign 2 Campaign objectives Following the endorsement from the PC, SPP and ADB of the PC Tiger Team recommendations

More information

This post Deputizes for the Strategic and International Affairs Advisor (A-7) in his absence.

This post Deputizes for the Strategic and International Affairs Advisor (A-7) in his absence. Vacancy Number: A13/0613 Post Number: OSC GSI 0020 Job Title: Special Advisor (Crisis Management and Ops) NATO Grade: A-5 Basic Monthly Salary (12 x per year): 8.071,11, tax free Closing Date: 04 August

More information

Department of Defense External Interoperability Plan Version 1.0

Department of Defense External Interoperability Plan Version 1.0 Department of Defense External Interoperability Plan Version 1.0 The Office of the Assistant Secretary of Defense for Networks and Information Integration/DoD Chief Information Officer 1 INTRODUCTION...

More information

Department of Defense INSTRUCTION. SUBJECT: Public Key Infrastructure (PKI) and Public Key (PK) Enabling

Department of Defense INSTRUCTION. SUBJECT: Public Key Infrastructure (PKI) and Public Key (PK) Enabling Department of Defense INSTRUCTION NUMBER 8520.2 April 1, 2004 SUBJECT: Public Key Infrastructure (PKI) and Public Key (PK) Enabling ASD(NII) References: (a) DoD Directive 8500.1, "Information Assurance

More information

Australian Government Cloud Computing Policy

Australian Government Cloud Computing Policy Australian Government Cloud Computing Policy Maximising the Value of Cloud VERSION 2.0 MAY 2013 AGIMO is part of the Department of Finance and Deregulation Contents Foreword 3 Introduction 4 Australian

More information

PKI Deployment Business Issues

PKI Deployment Business Issues An OASIS PKI White Paper PKI Deployment Business Issues By Amir Jafri and June Leung (FundSERV Inc.) For the Oasis PKI Member Section OASIS PKI White Paper OASIS (Organization for the Advancement of Structured

More information

Rights and Scheduling: Vision Broadcast Master. Lee Sheppard, Product Line Manager Client Conference, March 2013

Rights and Scheduling: Vision Broadcast Master. Lee Sheppard, Product Line Manager Client Conference, March 2013 Rights and Scheduling: Vision Broadcast Master Lee Sheppard, Product Line Manager Client Conference, March 2013 Broadcast Master and Vision Rights and Scheduling: Objectives Managing Rights Scheduling

More information

Ashley Institute of Training Schedule of VET Tuition Fees 2015

Ashley Institute of Training Schedule of VET Tuition Fees 2015 Ashley Institute of Training Schedule of VET Fees Year of Study Group ID:DECE15G1 Total Course Fees $ 12,000 29-Aug- 17-Oct- 50 14-Sep- 0.167 blended various $2,000 CHC02 Best practice 24-Oct- 12-Dec-

More information

NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich

NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems Samuel R. Ashmore Margarita Castillo Barry Gavrich CS589 Information & Risk Management New Mexico Tech Spring 2007

More information

Building an Effective Roadmap

Building an Effective Roadmap Building an Effective Roadmap Jason Tanner Senior Consultant, Enthiosys Motivated from Within Thank you to our sponsors 2 Agenda What is an effective roadmap? What are roadmap benefits? Why do roadmaps

More information

The ACO Model/Capabilities Framework and Collaborative. Wes Champion Senior Vice President Premier Healthcare Alliance

The ACO Model/Capabilities Framework and Collaborative. Wes Champion Senior Vice President Premier Healthcare Alliance The ACO Model/Capabilities Framework and Collaborative Wes Champion Senior Vice President Premier Healthcare Alliance Roadmaps to Serve as a Bridge from FFS to ACO Current FFS System What are the underpinning

More information

Audio: This overview module contains an introduction, five lessons, and a conclusion.

Audio: This overview module contains an introduction, five lessons, and a conclusion. Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules

More information

How To Evaluate A Dod Cyber Red Team

How To Evaluate A Dod Cyber Red Team CHAIRMAN OF THE JOINT CHIEFS OF STAFF MANUAL J-6 CJCSM 6510.03 DISTRIBUTION: A, B, C DEPARTMENT OF DEFENSE CYBER RED TEAM CERTIFICATION AND ACCREDITATION Reference(s): Enclosure F. 1. Purpose a. This manual,

More information

IFB Invitation for Bids

IFB Invitation for Bids DIRECTORATE INFRASTRUCTURE SERVICES 2015-2017 Core Enterprise Services 93.9M Network Infrastructure Services 2117.3M Cyber Security Services 68.7M IT Modernization 178M Total 2457.9M Core Enterprise Services

More information

Australian Government Cloud Computing Policy

Australian Government Cloud Computing Policy Australian Government Cloud Computing Policy Maximising the Value of Cloud VERSION 2.1 JULY 2013 AGIMO is part of the Department of Finance and Deregulation Contents Foreword 3 Introduction 4 Policy 5

More information

Analysis One Code Desc. Transaction Amount. Fiscal Period

Analysis One Code Desc. Transaction Amount. Fiscal Period Analysis One Code Desc Transaction Amount Fiscal Period 57.63 Oct-12 12.13 Oct-12-38.90 Oct-12-773.00 Oct-12-800.00 Oct-12-187.00 Oct-12-82.00 Oct-12-82.00 Oct-12-110.00 Oct-12-1115.25 Oct-12-71.00 Oct-12-41.00

More information

DEPARTMENTAL REGULATION

DEPARTMENTAL REGULATION U.S. DEPARTMENT OF AGRICULTURE WASHINGTON, D.C. 20250 DEPARTMENTAL REGULATION SUBJECT: Identity, Credential, and Access Management Number: 3640-001 DATE: December 9, 2011 OPI: Office of the Chief Information

More information

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions May 3, 2004 TABLE OF CONTENTS GENERAL PKI QUESTIONS... 1 1. What is PKI?...1 2. What functionality is provided by a

More information

BY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION 33-48 UNITED STATES TRANSPORTATION COMMAND 22 JUNE 2015

BY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION 33-48 UNITED STATES TRANSPORTATION COMMAND 22 JUNE 2015 BY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION 33-48 UNITED STATES TRANSPORTATION COMMAND 22 JUNE 2015 Communications and Information DATA MANAGEMENT POLICY AND RESPONSIBILITIES COMPLIANCE WITH THIS

More information

Department of Defense INSTRUCTION. Public Key Infrastructure (PKI) and Public Key (PK) Enabling

Department of Defense INSTRUCTION. Public Key Infrastructure (PKI) and Public Key (PK) Enabling Department of Defense INSTRUCTION NUMBER 8520.02 May 24, 2011 ASD(NII)/DoD CIO SUBJECT: Public Key Infrastructure (PKI) and Public Key (PK) Enabling References: See Enclosure 1 1. PURPOSE. This Instruction:

More information

SAP NetWeaver Identity Management Experiences from an Implementation at Colgate-Palmolive Company

SAP NetWeaver Identity Management Experiences from an Implementation at Colgate-Palmolive Company [ [ SAP NetWeaver Identity Management Experiences from an Implementation at Colgate-Palmolive Company Sarah Henriquez Senior Manager IT Risk Management, Colgate-Palmolive Kristian Lehment Product Manager

More information

THIRD REGIONAL TRAINING WORKSHOP ON TAXATION. Brasilia, Brazil, December 3 5, 2002. Topic 4

THIRD REGIONAL TRAINING WORKSHOP ON TAXATION. Brasilia, Brazil, December 3 5, 2002. Topic 4 THIRD REGIONAL TRAINING WORKSHOP ON TAXATION Brasilia, Brazil, December 3 5, 2002 Topic 4 INFORMATION TECHNOLOGY IN SUPPORT OF THE TAX ADMINISTRATION FUNCTIONS AND TAXPAYER ASSISTANCE Nelson Gutierrez

More information

Securing Information in an Outsourcing Environment (Guidance for Critical Infrastructure Providers) Executive Overview Supplement.

Securing Information in an Outsourcing Environment (Guidance for Critical Infrastructure Providers) Executive Overview Supplement. Securing Information in an Outsourcing Environment (Guidance for Critical Infrastructure Providers) Executive Overview Supplement June 2011 DISCLAIMER: This document is intended as a general guide only.

More information

Enhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017

Enhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017 From -JAN- To -JUN- -JAN- VIRP Page Period Period Period -JAN- 8 -JAN- 8 9 -JAN- 8 8 -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -FEB- : days

More information

Vacancy Number: A03/0516. Post Number: OCG COX 0030. Job Title: Engineer (Information Assurance) NATO Grade: A-2

Vacancy Number: A03/0516. Post Number: OCG COX 0030. Job Title: Engineer (Information Assurance) NATO Grade: A-2 Vacancy Number: A03/0516 Post Number: OCG COX 0030 Job Title: Engineer (Information Assurance) NATO Grade: A-2 Basic Monthly Salary (12 x per year): 5 102,13, tax free Closing Date: 15 July 2016 Duration

More information

INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456. Aristotle University of Thessaloniki PKI (www.pki.auth.gr) WHOM IT MAY CONCERN

INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456. Aristotle University of Thessaloniki PKI (www.pki.auth.gr) WHOM IT MAY CONCERN Title INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456 Customer Aristotle University of Thessaloniki PKI (www.pki.auth.gr) To WHOM IT MAY CONCERN Date 18 March 2011 Independent Audit

More information

ING Public Key Infrastructure Technical Certificate Policy

ING Public Key Infrastructure Technical Certificate Policy ING Public Key Infrastructure Technical Certificate Policy Version 5.1 - May 2010 Commissioned by ING PKI Policy Approval Authority (PAA) Additional copies Of this document can be obtained via the ING

More information

Danske Bank Group Certificate Policy

Danske Bank Group Certificate Policy Document history Version Date Remarks 1.0 19-05-2011 finalized 1.01 15-11-2012 URL updated after web page restructuring. 2 Table of Contents 1. Introduction... 4 2. Policy administration... 4 2.1 Overview...

More information

Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org

Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation

More information

MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory. Chapter 11: Active Directory Certificate Services

MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory. Chapter 11: Active Directory Certificate Services MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 11: Active Directory Certificate Services Objectives Describe the components of a PKI system Deploy the Active Directory

More information

NATIONAL DIRECTIVE FOR IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT CAPABILITIES (ICAM) ON THE UNITED STATES (US) FEDERAL SECRET FABRIC

NATIONAL DIRECTIVE FOR IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT CAPABILITIES (ICAM) ON THE UNITED STATES (US) FEDERAL SECRET FABRIC Committee on National Security Systems 1 CNSSD No. 507 January 2014 NATIONAL DIRECTIVE FOR IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT CAPABILITIES (ICAM) ON THE UNITED STATES (US) FEDERAL SECRET FABRIC

More information

DESIGN BUILD TEST TRAIN/DEPLOY MAINTENANCE

DESIGN BUILD TEST TRAIN/DEPLOY MAINTENANCE SOLUTION PLAN REQUIREMENTS ANALYSIS DESIGN BUILD TEST TRAIN/DEPLOY MAINTENANCE Executive Summary The project will document campus requirements for IAM functionality and select and procure one or more technology

More information

Cambridge for. exams officers. Cambridge Administrative Guide (UK) 2015. Guidance for exams officers administering Cambridge examinations

Cambridge for. exams officers. Cambridge Administrative Guide (UK) 2015. Guidance for exams officers administering Cambridge examinations Important information This guide was updated in January 2015. Changes are highlighted in red. Cambridge for exams officers Cambridge Administrative Guide (UK) 2015 Guidance for exams officers administering

More information

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software WHITE PAPER: COMPARING TCO: SYMANTEC MANAGED PKI SERVICE........ VS..... ON-PREMISE........... SOFTWARE................. Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

More information

TELSTRA RSS CA Subscriber Agreement (SA)

TELSTRA RSS CA Subscriber Agreement (SA) TELSTRA RSS CA Subscriber Agreement (SA) Last Revision Date: December 16, 2009 Version: Published By: Telstra Corporation Ltd Copyright 2009 by Telstra Corporation All rights reserved. No part of this

More information

State of Oregon. State of Oregon 1

State of Oregon. State of Oregon 1 State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information

More information

Process Validation Workshops. Overview Session

Process Validation Workshops. Overview Session Process Validation Workshops Overview Session 2 Session Objectives: Prepare staff for participating in a Process Validation Workshop Clarify the Purpose of Process Validation Workshops Clarify Expected

More information

Looking at the SANS 20 Critical Security Controls

Looking at the SANS 20 Critical Security Controls Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of

More information

SUBJECT: systems. in DoD. capabilities. d. Aligns identity. (Reference (c)). (1) OSD, the Staff and

SUBJECT: systems. in DoD. capabilities. d. Aligns identity. (Reference (c)). (1) OSD, the Staff and Department of Defense INSTRUCTION NUMBER 8520.03 May 13, 2011 ASD(NII)/DoDD CIO SUBJECT: Identity Authentication for Information Systems References: See Enclosure 1 1. PURPOSE. In accordance with the authority

More information

Proposal to Reduce Opening Hours at the Revenues & Benefits Coventry Call Centre

Proposal to Reduce Opening Hours at the Revenues & Benefits Coventry Call Centre Proposal to Reduce Opening Hours at the Revenues & Benefits Coventry Call Centre Proposal To change the opening hours of the Revenues & Benefits Call Centre to 9am until 5pm Monday to Friday with effect

More information

GOVERNING BODY MEETING held in public 29 July 2015 Agenda Item 4.4

GOVERNING BODY MEETING held in public 29 July 2015 Agenda Item 4.4 GOVERNING BODY MEETING held in public 29 July 2015 Agenda Item 4.4 APPENDIX A Strategic Planning Process 2016/17 Strategic Planning Process 2016/17 Interlocking processes 5 Year strategic process: reviewed

More information

Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org

Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation

More information

Choosing a Cell Phone Plan-Verizon

Choosing a Cell Phone Plan-Verizon Choosing a Cell Phone Plan-Verizon Investigating Linear Equations I n 2008, Verizon offered the following cell phone plans to consumers. (Source: www.verizon.com) Verizon: Nationwide Basic Monthly Anytime

More information

Active Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010

Active Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010 1 Modern security environment contains a broad and evolving set of challenges to the security of NATO s territory and populations. In order to assure their security, the Alliance must and will continue

More information

5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE

5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE 5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE 5 FAH-11 H-510 GENERAL (Office of Origin: IRM/IA) 5 FAH-11 H-511 INTRODUCTION 5 FAH-11 H-511.1 Purpose a. This subchapter implements the policy

More information

Neutralus Certification Practices Statement

Neutralus Certification Practices Statement Neutralus Certification Practices Statement Version 2.8 April, 2013 INDEX INDEX...1 1.0 INTRODUCTION...3 1.1 Overview...3 1.2 Policy Identification...3 1.3 Community & Applicability...3 1.4 Contact Details...3

More information

Public Key Infrastructure for a Higher Education Environment

Public Key Infrastructure for a Higher Education Environment Public Key Infrastructure for a Higher Education Environment Eric Madden and Michael Jeffers 12/13/2001 ECE 646 Agenda Architectural Design Hierarchy Certificate Authority Key Management Applications/Hardware

More information

Enterprise Security Tactical Plan

Enterprise Security Tactical Plan Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise

More information

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile

More information

Defense Information Systems Agency A Combat Support Agency. Identity and Access Management (IdAM): Consistent Access to Capability

Defense Information Systems Agency A Combat Support Agency. Identity and Access Management (IdAM): Consistent Access to Capability Defense Information Systems Agency Identity and Access Management (IdAM): Consistent Access to Capability 17 August 2011 Disclaimer The information provided in this briefing is for general information

More information

Creating Virtual Hierarchy in Peer-to-Peer PKI to Simplify Certificate Path Discovery

Creating Virtual Hierarchy in Peer-to-Peer PKI to Simplify Certificate Path Discovery Creating Virtual Hierarchy in Peer-to-Peer PKI to Simplify Certificate Path Discovery Balachandra Muniyal Dept. of Information and Communication Technology, Manipal Institute of Technology, Manipal University,

More information

Managing Users and Identity Stores

Managing Users and Identity Stores CHAPTER 8 Overview ACS manages your network devices and other ACS clients by using the ACS network resource repositories and identity stores. When a host connects to the network through ACS requesting

More information

CLOUD COMPUTING SERVICES CATALOG

CLOUD COMPUTING SERVICES CATALOG CLOUD COMPUTING SERVICES CATALOG... Including information about the FedRAMP SM authorized Unclassified Remote Hosted Desktop (URHD) Software as a Service solution CTC Cloud Computing Services Software

More information

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement

More information

National Initiative for Cyber Security Education

National Initiative for Cyber Security Education 2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women

More information

Meet The Family. Payment Security Standards

Meet The Family. Payment Security Standards Meet The Family Payment Security Standards Meet The Family Payment Security Standards Payment Processing Electronic payments are increasingly becoming part of our everyday lives. For most people, it can

More information

An Operational Architecture for Federated Identity Management

An Operational Architecture for Federated Identity Management An Operational Architecture for Federated Identity Management March 2011 Implementing federated identity management and assurance in operational scenarios Federated Identity Solution The Federated identity

More information

Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review

Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review Review Process The Knowledge Unit (KU) Review Calendar divides the entire CAE-C KU list into 12 months for the purposes of

More information

Business Plan Example. 31 July 2020

Business Plan Example. 31 July 2020 Business Plan Example 31 July Index 1. Business Overview 1.1Objectives 1.2Vision Mission and Values 1.3 Keys to Success 2. Business Management 3. Services 2.1 Company Summary 2.2 Company Ownership 2.3

More information

South Dakota Public Funds Investment Trust (FIT) Fixed Rate Investment Options & Services

South Dakota Public Funds Investment Trust (FIT) Fixed Rate Investment Options & Services South Dakota Public Funds Investment Trust (FIT) Fixed Rate Investment Options & Services FIT Fixed Rate Account Service Features Free multiple accounts Free electronic transfers Online access to account

More information

Public-Key Infrastructure

Public-Key Infrastructure Public-Key Infrastructure Technology and Concepts Abstract This paper is intended to help explain general PKI technology and concepts. For the sake of orientation, it also touches on policies and standards

More information

APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS

APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS Section 5123 of the Clinger-Cohen Act requires that the Department establish goals for improving the efficiency and effectiveness of agency operations

More information

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide How to use the National Cybersecurity Workforce Framework Your Implementation Guide A NATIONAL PROBLEM The Nation needs greater cybersecurity awareness. The US workforce lacks cybersecurity experts. Many

More information

Egypt s E-Signature & PKInfrastructure

Egypt s E-Signature & PKInfrastructure EGYPT-MCIT ITIDA Egypt s E-Signature & PKInfrastructure Seminar on Electronic Signature Algeria 8-9 Dec. 2009 By: Hisham Mohamed Abdel Wahab Head of the E-Signature CA Licensing ITIDA- MCIT EGYPT Email:

More information

SIGNIFICANT CHANGES DOCUMENT

SIGNIFICANT CHANGES DOCUMENT SIGNIFICANT CHANGES DOCUMENT Descriptive Title Schedule 70_MassModification_Health IT SIN Significant Changes Disclaimer Language DISCLAIMER: GSA FAS is posting this notification of a planned solicitation

More information

Frequently Asked Questions (FAQs) SIPRNet Hardware Token

Frequently Asked Questions (FAQs) SIPRNet Hardware Token Air Force Public Key Infrastructure System Program Office (ESC/HNCDP) Phone: 210-925-2562 / DSN: 945-2562 Web: https://afpki.lackland.af.mil Frequently Asked Questions (FAQs) SIPRNet Hardware Token Updated:

More information

BS EN 16001 Energy Management Systems VICTORIA BARRON, PRODUCT MARKETING MANAGER, BSI

BS EN 16001 Energy Management Systems VICTORIA BARRON, PRODUCT MARKETING MANAGER, BSI BS EN 16001 Energy Management Systems VICTORIA BARRON, PRODUCT MARKETING MANAGER, BSI Agenda Energy Management in context Why Energy Management? Business Needs How BS EN 16001 helps organisations meet

More information

Bridging the HIPAA/HITECH Compliance Gap

Bridging the HIPAA/HITECH Compliance Gap CyberSheath Healthcare Compliance Paper www.cybersheath.com -65 Bridging the HIPAA/HITECH Compliance Gap Security insights that help covered entities and business associates achieve compliance According

More information

Chief Review Services REVIEW OF DND/CF INFORMATION SECURITY. October 2002 7050-7 (CRS) Canada

Chief Review Services REVIEW OF DND/CF INFORMATION SECURITY. October 2002 7050-7 (CRS) Canada REVIEW OF DND/CF INFORMATION SECURITY October 2002 7050-7 (CRS) Canada TABLE OF CONTENTS OVERVIEW... 1 INTRODUCTION... 1 Comparative Assessment of the DND/CF Information Security Program... 1 RECOMMENDATIONS...

More information

Communication and Information Systems (CIS) Interoperability: Examples and Lessons Learned from Multi-National Projects and NATO Experience

Communication and Information Systems (CIS) Interoperability: Examples and Lessons Learned from Multi-National Projects and NATO Experience Communication and Information Systems (CIS) Interoperability: Examples and Lessons Learned from Multi-National Projects and NATO Experience Luigi Bella, Director of Production NC3A, 28 March 2011, Rome

More information

Mott Community College Job Description

Mott Community College Job Description Title: Department: Information Technology Services Reports To: Chief Technology Officer Date Prepared/Revised: May 2009/Revised July 2011 Purpose, Scope & Dimension of Job: The role of the Director of

More information

Recommendations for the PIA. Process for Enterprise Services Bus. Development

Recommendations for the PIA. Process for Enterprise Services Bus. Development Recommendations for the PIA Process for Enterprise Services Bus Development A Report by the Data Privacy and Integrity Advisory Committee This report reflects the consensus recommendations provided by

More information

Louisiana Department of Education 2013 Common District Charter Request for Applications

Louisiana Department of Education 2013 Common District Charter Request for Applications Louisiana Department of Education 2013 Common District Charter Request for Applications Table of Contents I. Introduction... 3 II. New and Experienced Operator Application Tracks... 4 III. Charter Application

More information

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION Department of Defense INSTRUCTION NUMBER 1400.25, Volume 1100 January 3, 2014 USD(P&R) SUBJECT: DoD Civilian Personnel Management System: Civilian Human Resources Management Information Technology Portfolio

More information

Department of Defense DIRECTIVE. SUBJECT: United States Security Authority for North Atlantic Treaty Organization Affairs (USSAN)

Department of Defense DIRECTIVE. SUBJECT: United States Security Authority for North Atlantic Treaty Organization Affairs (USSAN) Department of Defense DIRECTIVE NUMBER 5100.55 February 27, 2006 USD(P) SUBJECT: United States Security Authority for North Atlantic Treaty Organization Affairs (USSAN) References: (a) DoD Directive 5100.55,

More information

What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form. December 3, 2012

What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form. December 3, 2012 Federal CIO Council Information Security and Identity Management Committee IDManagement.gov What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form December 3, 2012 HSPD-12

More information

Coordination and air quality monitoring during emergencies. Colin Powlesland Environment Agency

Coordination and air quality monitoring during emergencies. Colin Powlesland Environment Agency Coordination and air quality monitoring during emergencies Colin Powlesland Environment Agency Contents h Introduction h What do we want to achieve? h Implementation programme h Incident timeline h Proposed

More information

ARTL PKI. Certificate Policy PKI Disclosure Statement

ARTL PKI. Certificate Policy PKI Disclosure Statement ARTL PKI Certificate Policy PKI Disclosure Statement Important Notice: This document (PKI Disclosure Statement, PDS) does not by itself constitute the Certificate Policy under which Certificates governed

More information

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas

More information

US Army Corps of Engineers. Vision Statement. Be the premier stewards of entrusted hydropower resources

US Army Corps of Engineers. Vision Statement. Be the premier stewards of entrusted hydropower resources Vision Statement Be the premier stewards of entrusted hydropower resources Mission Statement Provide reliable hydroelectric power services at the lowest possible cost, consistent with sound business principles,

More information

Certification Practice Statement

Certification Practice Statement FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification

More information

Gatekeeper PKI Framework. Archived. February 2009. Gatekeeper Public Key Infrastructure Framework. Gatekeeper PKI Framework.

Gatekeeper PKI Framework. Archived. February 2009. Gatekeeper Public Key Infrastructure Framework. Gatekeeper PKI Framework. Gatekeeper Public Key Infrastructure Framework 1 October 2007 Department of Finance and Deregulation Australian Government Information Management Office Commonwealth of Australia 2009 This work is copyright.

More information

Solvency II Preparation and IMAP James Latto

Solvency II Preparation and IMAP James Latto and James Latto Contents 2 1 Balancing priorities Insurers need to balance priorities over the next year: Main focus is often on Pillar 3 and external reporting needs sufficient focus Ensure smooth transition

More information