NATO. Identity Management PKI and Strong Authentication
|
|
|
- Felicity Pierce
- 9 years ago
- Views:
Transcription
1 NATO Identity Management PKI and Strong Authentication Snapshot May 2012
2 CONTENTS THE IDENTITY MANAGEMENT CHALLENGE...3 BACKGROUND INFORMATION ON NATO PKI...5 NATO PKI MANAGEMENT AUTHORITY...6 NPKI TIMELINE...8 NATO IDENTITY MANAGEMENT BACKGROUND...9 RELATED POLICIES, DIRECTIVES AND GUIDANCE
3 THE IDENTITY MANAGEMENT CHALLENGE The NATO Identity Management (IdM) vision is a federated, robust, trustworthy and interoperable Identity Management capability that supports the ability to correctly identify participants and Non- Human Entities of Alliance mission operations. But despite the numerous NATO efforts underway to establish and apply identification policies and mechanisms, NATO has not articulated the overarching requirement for and roadmap to implement and manage this activity as a whole. Implementing identity management implies establishment of frameworks, models, standards, protocols, processes and technology that enroll, register and un-register/retire identity assets across the enterprise. Managing these implementation efforts also requires a lead body with the ability and accountability to realize this potential within NATO. The following is a snapshot of current NATO efforts underway that exemplify the shortfalls within the Alliance on this issue. TECHNICAL & IMPLEMENTATION POLICY DEVELOPMENT The Bi-SC Secure Data Strategy (SDS) advocates moving along paths towards automated, protected and trusted core networking and data exchange leading to superior C2 arrangements. Key to pursuing these objectives is adaptation of policies and supporting directives and coordinated efforts among the Security Committee (IA), C3 Board, and the NPMA. The SDS shows that some technical policies and directives in their current state may hinder rather than enable the attainment of Alliance IdM goals. In some cases policies and roadmaps simply do not exist and will have to be drafted and approved. As an example, for trusted data exchange, metadata standards need to be finalized and metadata security standards and public key infrastructure need to be defined and implemented. With respect to identity management, minimum? identity attributes and privileges and the interoperability requirements must be established. Looking to the future, not only will NATO have to manage identities within its own mission and business environment, it must also be prepared to exchange identities across federated environments involving NATO nations, partner nations and non-nato nations and organizations. STRONG AUTHENTICATION & IDENTITY MANAGEMENT NATO s new cyber defense policy and an associated action plan contain the only actionable roadmap of IdM-related activities, namely the implementation of strong authentication to access NATO CIS. Nevertheless, the C3B (PS) has yet to provide clear guidance and tasking to its subordinate structure (Capability Panel and Teams) to carry out this work. This key challenge for the C3B (PS), - i.e., governance, management and oversight of enterprise wide technical implementations, is not limited to Identity Management. NATO is also struggling with the task of defining strong authentication in the context of the Cyber Defense Policy, a task for which the C3B exercises oversight. Most recently the Security Committee in IA format has tried to reconcile the DPPC-R (CD) developed requirement for strong authentication as an item to enhance NATO s cyber posture with a more specific meaning of the term.. Without a clear 3
4 understanding and definition of the term, relevant NATO bodies are reluctant to move forward and accept that stronger authentication or even multifactor authentication can be achieved. ELEMENTS FOR AN IDENTITY MANAGEMENT INFRASTRUCTURE While PKI is a fundamental element of an IdM infrastructure, the NATO PKI statement of requirements as approved in 2009 did not include, multifactor authentication nor strong authentication, nor is it predicated upon realizing a broader NATO identity management infrastructure. Neither were other elements such as the Cyber Defense Action Plan s call for strong authentication and the NATO enterprise directory service considered in a broader identity and access management context. These elements as a whole have not been organized into a coherent policy/management and technology/architecture roadmap. Assembling the identity-related information from existing NATO systems and joining them together so that the data associated with an individual is linked together, and then making that available to applications for authentication, access and privilege management, is precisely what constitutes an identity management infrastructure. These facts clearly expose the need for NATO to develop a prioritized timeline and tasking necessary to implement a robust NATO Identity Management service within a structure that provides oversight and governance, superior to but with ability to influence the execution and implementation of CDAP item #3. 4
5 BACKGROUND INFORMATION ON NATO PKI The initial NATO PKI SOR (Statement of operational Requirement) was approved in 1998, (static network implementation with 10k users). The capability package CP-0A155, NATO common funding source for INFOSEC, only identified funding for the PKI infrastructure not Enterprise Directory or functional area services, end-user application integration nor certificates or end entity user tokens. In 2006 mission/scope creep; SOR was re-written to support static and deployed implementation for 200k users. SOR was not finalized until mid Type-B cost estimate is yet to be completed. Although the SOR significantly expanded the scope, additional funding has not been identified; initial cost estimate 2.2M Euros re-scoped SOR TBCE ~11M Euros across all funding sources including full scope of new SOR and tokens/certificates which are included in CP0A0155. NC3A is currently working the TBCE to encompass the ACO re-scoped PKI requirement and encompass funding from CPA0155 and other sources, taking into consideration the existing interim solution as well as the additional requirement levied in CUR422 in support of the ISAF mission COMPOSITION OF NATO S PKI CAPABILITY Despite the numerous NATO efforts underway to establish and apply identification policies and mechanisms, NATO has not articulated the overarching requirement for, and strategy to, manage these activities as a whole. In June 2003, NATO developed a policy for the adoption of Public Key Infrastructure Technology by NATO Civil and Military Bodies. This policy states that NATO PKI shall be implemented by only one authority, the NATO PKI Management Authority (NPMA). The NMPA has only approved one NATO PKI which is described in NATO PKI Certificate Policy (AC/322(NPMA-PAC)WP(2005)0003). This approved NATO PKI can generate, distribute, and manage cryptographic keys, electronic certificates, and electronic Certificate Revocation Lists (CRL), which allows for securing the electronic IT environment for use in the NATO Alliance. Currently, NATO information is being protected at the system level. Trust to be based upon this information is out of (system) band and conducted in a procedural manner. The approved interim NATO PKI has been implemented at NATO Headquarters (NATO HQS entities), NATO C3 Agency (NC3A entities), and NATO CIS Services Agency (NCSA entities) on the NATO Unclassified/NATO Restricted 1domain. Additionally, the approved NATO PKI has also been implemented at NATO International Security Assistance Forces (ISAF entities) and NATO General Communication System Packet Transport Component Network 1 NATO Restricted, similar to but equal to the US U//FOUO. NR may not be transmitted over the internet in the clear. 5
6 Adaptation For Information exchange gateways (NGCS PTC NAFI 200 entities). Overall, approximately 600 hard tokens are in use. At the same time, other NATO organizations such as NATO Maintenance & Supply Agency (NAMSA) NATO Eurofighter & Tornado Management Agency (NETMA), NATO Battlefield Information Collection & Exploitation Systems (BICES), and NATO Information Assurance Technical Center (NIATC) have developed and implemented their own version of PKI. Due to their expanding operational environment, these organizations had an urgent need to establish a PKI solution rapidly; and could not wait for an enterprise wide NATO PKI capability. These version of PKI have a not been approved by the NPMA, therefore they are not compliant with NATO policy. NATO PKI MANAGEMENT AUTHORITY The NATO PKI Management Authority (NPMA) serves as the executive agent for the development and operation of the NPKI. Its primary focus is to establish and maintain the desired level of assurance when providing PKI services to NATO users and when defining the rules for interoperation with other PKIs, for example, when negotiating agreements with nations and other external certification authorities and PMAs. The NPMA acts as directed by, and under the control of, the NATO C3 Board (NC3B). When executing its mission, it remains responsive, through the NC3B, to the North Atlantic Council. MEMBERS Chairman: (NHQC3S Director) Secretary: NHQC3S IAB Staff Officer) Members: representatives from ACO, ACT, NATO HQ Executive Secretariat, NC3A, NCSA, NHQC3S, NOS, Infrastructure Committee, PAC Chairman. Representatives of other NATO agencies and national experts may also be invited to attend the meetings in an advisory capacity. NATO PKI ADVISORY Group The NATO PKI Advisory Group (NPAG) provides assistance and advice to the NPMA on legal issues, technical issues, and current NATO standard operating procedures. MEMBERS Chairman: (NHQC3S IAB Staff Officer) 6
7 Members: representatives from Strategic Commands, NATO Legal Advisor, NC3A, NCSA, NHQC3S, NOS, Nations (subject matter experts), DACAN, other NATO bodies. Representatives of other NATO agencies, national experts and industry representatives may also be invited to attend the meetings. MILITARY COMMITTEE DISTRIBUTION AND ACCOUNTING AGENCY The Military Committee Distribution and Accounting Agency (DACAN) arranges for the production, accounting, and distribution of all keying material used by NATO. DACAN serves as the trusted agent responsible for the management of keying material necessary to ensure the confidentiality, integrity, availability, and authenticity of NATO information, communications, and automated information systems. DACAN shall provide these services as the NPKI Root Certificate Authority and perform as the ultimate trust point in the NATO domain to enforce the NPKI Certificate Policies. EUROPEAN DISTRIBUTION AND ACCOUNTING AGENCY OF THE MILITARY COMMITTEE The European Distribution and Accounting Agency of the Military Committee (EUDAC) serves as the trusted agent, in co-operation with DACAN, for the distribution of NATO keying material. EUDAC shall serve as the NPKI Root CA backup site and shall assume the responsibilities of DACAN as the ultimate trust point in the NATO domain to enforce the NPKI Certificate Policies if necessary. DACAN will remain the primary point of contact for all issues related to the NPKI Root CA in the event that the backup site has been activated. NATO CIS SERVICES AGENCY The NATO CIS Services Agency (NCSA) and its subordinate elements manage operation and control, on behalf of all subscribers, the Communications and Information Systems (CIS) and installations assigned to it by the NC3B. In addition NCSA and its subordinate elements provide operational support comprising hardware and software maintenance, personnel training, installation and associated services including security for assigned CIS and authorized subscribers, NCSA is responsible for the management, operation and control of NPKI CA and RA systems supporting CIS assigned to NCSA (with the exception of the NPKI Root CA.) SECURITY ACCREDITATION AUTHORITY The Security Accreditation Authority (SAA) is the body responsible for approving the implementation of CIS within an organization. The SAA for the NPKI Root CA is the NATO Security Accreditation Board (NSAB). The NATO Office of Security (NOS) is the Compliance Auditor for the NPKI as defined by the NPKI Directive. The NOS is responsible for compliance audits and continued accreditation of the NPKI Root CA. 7
8 NPKI TIMELINE 8
9 NATO IDENTITY MANAGEMENT BACKGROUND The NATO Network Enabled Capability (NNEC) Feasibility Study (FS) endorsed by the NATO C3 Board highlights the challenges the Alliance faces with respect to the deployment of an Alliance-wide, interoperable Identity Management (IdM) scheme to support information sharing. FRAMEWORK - ORIGINS In response to the NNEC study and following coordination with the management teams of SC/4 and SC/5, NATO held a series of IdM Workshops in 2008 in order to develop a NATO IdM framework and to define a common structured IdM model and IdM plane within and across NATO and member nations. The NATO IdM Straw-man document produced did not address a holistic implementation of IdM but rather only addressed a narrowly focused aspect of messaging interoperability. A first version of this framework document is at Enclosure 1, and is now presented to SC/4, SC/5 and the NPMA on a request for comment basis. Despite the number of NATO efforts underway to establish and apply identification policies and mechanisms, NATO has not articulated the overarching requirement for, and strategy to, manage these activities as a whole. At the same time, the Alliance mission environment and associated identity management challenges are becoming more complex due to coalition operations in Afghanistan and elsewhere. Not only must NATO manage identities within its own mission and business environments, it must also exchange identities across federated environments involving NATO nations, partner nations and international organizations. NIDM GOVERNANCE, SCOPE CHALLENGES Discussions within SMI AHWG and the IdM Workshops led to a growing U.S. concern that NATO IdM was NOT TRACKING IN THE RIGHT DIRECTION. IN THE ABSENCE OF A GOVERNANCE FRAMEWORK OR EVEN AN AGREED SCOPE for IdM within the Alliance, any activities would essentially continue to move forward in parallel or even diverging directions. Within the U.S., this conclusion culminated in a break of silence on the draft IdM framework; relevant text from that document is below. US BREAK OF SILENCE 2009 "ID management goes way beyond security aspects. It means that there's frameworks, models, standards, protocols, processes and technology that enroll, register and un-register/retire assets across the enterprise, whether they are human or not." The U.S. therefore recommends standing up "a PKI Program Office that has a wider scope than the current NPMA and PAC because it could extend the role of the emerging PKI to take on a larger Identity Management role that will support both logical and physical access needs and therefore more effectively adapt the PKI to rapidly support emerging ID management needs." The U.S. proposals in the 2009 break of silence were a difficult sell in the current NATO resource environment. There were also concerns about focusing on a higher level strategic framework instead of 9
10 emerging, near-term operational requirements such as the TACTIC CUR for a common identity card in the ISAF Theater. Indeed, ACO J6 announced at the June 2010 SC/4 they had produced an IdM Strategy of their own addressing the how. NATO Identity Management will create the basis of a secure enterprise capability that will permit identity-sensitive applications to collect identity information, established & assign attributes to a digital identity, and connect that identity to an entity in support of mission objectives. 10
11 RELATED POLICIES, DIRECTIVES AND GUIDANCE NATO Cyber Defense Policy Cyber Defense Action Plan (AC/281-N(2012)0119-REV7, Cyber Defense Action Plan 12 Jan 2012) A DPPC working document current at REV 7 identifying actionable tasks to achieve the elements identified in the cyber defense policy. NPAG Terms of Reference (AC/322-D(2009)0048, 26 Nov 2009), written by NPAG and NHQC3S. The purpose of this document is to revise the NATO PKI Advisory Cell (PAC) Terms of Reference (TOR) and rename the PAC as the NATO PKI Advisory Group (NPAG). NATO Public Key Infrastructure (NPKI) HandBook (AC/322(NPMA)D(2006)0003-REV1, 28 Sep 2009) written by NPAG & NHQC3S. The purpose of this document is to establish the procedure for an applicant NATO entity to have its CA to be integrated in the NPKI architecture. The NATO Identity Management Framework (Multiref EAPC(AC/322-SC/4)N(2009)0002, EAPC(AC/322-SC/5)N(2009)0009, AC/322(NPMA)N(2009)0001, 11 Mar 2009) written by SC/5. This document describes a common, structured Identity Management Model and Identity Management Plane to be used within and across NATO and its member nations (federated approach, extending the specific definition of IDs within a single domain). ACP145 NPKI Supporting Document (AC/322(NPMA)WP(2008)0001, 15 Dec 2008) written by NC3A. This document defines the creation and management of Version 3 X.509 public-key certificates for use in supporting interoperability with ACP 145 Gateways and their associated PKIs. Certification Practice Statement For The NATO Root Certificate Authority (AC/322(NPMA)D(2006)0001-REV3, 27 Oct 2008) written by NC3A and DACAN. This document defines the practices under which the NATO PKI Root Certificate Authority (CA) operates. The NATO PKI (NPKI) implements a hierarchical trust model originating at this single Root CA operated by DACAN. This document defines the relationship of the NATO PKI Root Certificate Authority with other Certificate Authorities, both those that are sub-ordinate within its own domain, and those external to its hierarchy. Certification Practice Statement For The NATO Secret Certification Authority (AC/322(NPMA)D(2008)0001, 18 Sep 2008) written by NIATC. This document defines the 11
12 practices under which the NS CA operates and the manner in which the system complies with the NATO PKI Certificate Policy. NPKI Technical Characteristics (AC/322-N(2008)0004, 28 Jan 2008), written by NC3A and NPAG. The purpose of the Technical Characteristics document is to define the minimum requirements for the NATO Public Key Infrastructure required to support the protection of NATO CIS and NATO information processed or transmitted by the CIS. NATO Messaging System (AC/322(NPMA-PAC)L(2007)0002, 31 Jul 2007), written by Core Enterprise Services Working Group (CESWG) SC/5. The purpose of this document was to produce a strategy to map out the way ahead for high grade messaging' in response to an earlier tasking by the NC3B Certification Practice Statement For The NATO Unclassified/NATO Restricted Certification Authority (AC/322(NPMA)D(2006)0002, 09 Oct 2006), written by NC3A. This document is the Certification Practice Statement (CPS) for the NCSA NUNR CA. This document follows the structure defined in RFC2527, and defines CA functionality compliant with CertP V1.5. Revised NATO PKI Certificate Policy (RFC 3647 Framework, AC/322(NPMA-PAC)WP(2005)0003, 22 Sep 2005), written by NC3A. This document defines the creation and management of Version 3 X.509 public-key certificates for use in applications requiring security services. This Certificate Policy does not define a particular implementation of the NPKI, or the plans for future Certificate Policies. It is the intent of this Policy to identify the minimum requirements and procedures that are necessary to support trust in the NPKI, and to minimize imposition of specific implementation requirements on NPKI CAs, RAs, Subscribers, and relying parties. NPKI Root Certificate Authority Audit Checklists (AC/322(NPMA-PAC)WP(2005)0002, 09 August 2005), written by NC3A. The purpose of this checklist was to be used for the audit of the NPKI Root Certificate Authority. NATO Directive for NATO Public Key Infrastructure (NPKI) Interoperability with the Nations (AC/322(NPMA)WP(2005)0001, 04 Mar 2005), written by NPAG. The purpose of this directive is to define the necessary steps for the secure exchange of PKI information between NATO civil and military bodies, the nations, and partners for both classified and non-classified information. 12
13 NPKI Token Strategy Document (AC/322(NPMA-PAC)WP(2003)006-REV1, 19 Aug 2004), written by NPAG and NC3A. This document describes the technologies available for hardware tokens, the possible associated evaluation standards and proposes requirements for the implementation of hardware tokens in the frame of the NATO PKI. NATO Public Key Infrastructure (NPKI) Reference Architecture (AC/322(NPMA)WP(2003)002, 19 Dec 2003), written by NC3A. This document addresses public key technology functionality across the Operational, System, and Technical views of the NATO C3 Systems architecture at the Reference Architecture level of detail, per the guidance set down in the NATO Interoperability Management Plan (NIMP). Revised NPMA/PAC Program of Work (AC/322(NPMA-PAC)WP(2003)004, 28 Aug 2003), written by NHQC3S. The purpose of the document was to develop task sheets of the NPMA/PAC Program of Work. NATO Policy for the adoption of Public Key Infrastructure Technology by NATO Civil and Military Bodies (AC/322(NPMA)L(2003)001, 10 Jun 2003), written by NPAG and NHQC3S. The purpose of this document is to provide for effective management of all PKI initiatives within NATO by controlling and co-ordinating the implementation of a Public Key Infrastructure in support of NATO CIS. This document applies to all NATO civil and military bodies that implement, or are planning the implementation of, PKI techniques in NATO communication and information Systems. It is supported by implementation Directives and Guidance documents as required, approved by the NATO C3 Board. NATO Policy for the implementation of a PKI (C-M(2003)32, 03 Apr 2003), written by NPAG. The NATO C3 Board approved the NATO Policy for the Adoption of Public Key Infrastructure (PKI) Technology by NATO Civil and Military Bodies. This paper acts as an umbrella document for the implementation of the Public Key Infrastructure (PKI) within the Alliance that will be pursued and controlled by the NC3B. NPKI Concept of Operations (AC/322-D/0081, 18 Dec 2002), written by NPAG. The NATO Public Key Infrastructure (NPKI) Concept of Operations (CONOPS) provides the principles for NATO to deploy a PKI in order to enable PKI-derived security services. The NPKI CONOPS also describes the process to achieve interoperability between the NPKI and the PKIs of other organizations and countries, especially the NATO member nations. 13
14 Legal Aspects of the NPKI (AC/322-D/0080, 18 Dec 2002), written by NPAG and NHQC3S. The purpose of this task was to carefully examine the impact of NATO PKI implementation identifying legal aspects that needed to be solved prior to approving any policy, directive or guidance related to the fielding of NATO PKI. NPKI Awareness Strategy (AC/322(NPMA-PAC)-WP08, 21 Mar 2001), written by NPAG and NHQC3S. The purpose of this document is to select the targets of this awareness programme. In other words, to select the communities interested in the implementation of a PKI within NATO and to seek the best method to provide to each community the most efficient and effective information. NPMA Terms of Reference (AC/322-N-0641, 18 Dec 2000), written by NC3A and NHQC3S. The purpose of this document is to develop the NATO PKI Management Authority (NPMA) Terms of Reference (TOR). 14
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
Committee on National Security Systems
Committee on National Security Systems CNSS POLICY No.25 March 2009 NATIONAL POLICY FOR PUBLIC KEY INFRASTRUCTURE IN NATIONAL SECURITY SYSTEMS. 1 CHAIR FOREWORD 1. (U) The CNSS Subcommittee chartered a
AT&T Global Network Client for Windows Product Support Matrix January 29, 2015
AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 Product Support Matrix Following is the Product Support Matrix for the AT&T Global Network Client. See the AT&T Global Network
NATO UNCLASSIFIED. 27 February 2012 DOCUMENT C-M(2012)0014 Silence Procedure ends: 16 Mar 2012 16:00
27 February 2012 DOCUMENT Silence Procedure ends: 16 Mar 2012 16:00 Directive on the Management of Records Generated on Operational Deployment Note by the Secretary General 1. In June 2011 the NATO Records
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8
Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138 Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 2 of 138 Domain Name: CELLULARVERISON.COM Updated Date: 12-dec-2007
THE MASTER PLAN CAMPAIGN. Workshop RPAS (WS 03) 22 January 2015
THE MASTER PLAN CAMPAIGN Workshop RPAS (WS 03) 22 January 2015 Back-up The objectives of the campaign 2 Campaign objectives Following the endorsement from the PC, SPP and ADB of the PC Tiger Team recommendations
This post Deputizes for the Strategic and International Affairs Advisor (A-7) in his absence.
Vacancy Number: A13/0613 Post Number: OSC GSI 0020 Job Title: Special Advisor (Crisis Management and Ops) NATO Grade: A-5 Basic Monthly Salary (12 x per year): 8.071,11, tax free Closing Date: 04 August
Department of Defense External Interoperability Plan Version 1.0
Department of Defense External Interoperability Plan Version 1.0 The Office of the Assistant Secretary of Defense for Networks and Information Integration/DoD Chief Information Officer 1 INTRODUCTION...
Department of Defense INSTRUCTION. SUBJECT: Public Key Infrastructure (PKI) and Public Key (PK) Enabling
Department of Defense INSTRUCTION NUMBER 8520.2 April 1, 2004 SUBJECT: Public Key Infrastructure (PKI) and Public Key (PK) Enabling ASD(NII) References: (a) DoD Directive 8500.1, "Information Assurance
Australian Government Cloud Computing Policy
Australian Government Cloud Computing Policy Maximising the Value of Cloud VERSION 2.0 MAY 2013 AGIMO is part of the Department of Finance and Deregulation Contents Foreword 3 Introduction 4 Australian
PKI Deployment Business Issues
An OASIS PKI White Paper PKI Deployment Business Issues By Amir Jafri and June Leung (FundSERV Inc.) For the Oasis PKI Member Section OASIS PKI White Paper OASIS (Organization for the Advancement of Structured
Rights and Scheduling: Vision Broadcast Master. Lee Sheppard, Product Line Manager Client Conference, March 2013
Rights and Scheduling: Vision Broadcast Master Lee Sheppard, Product Line Manager Client Conference, March 2013 Broadcast Master and Vision Rights and Scheduling: Objectives Managing Rights Scheduling
Ashley Institute of Training Schedule of VET Tuition Fees 2015
Ashley Institute of Training Schedule of VET Fees Year of Study Group ID:DECE15G1 Total Course Fees $ 12,000 29-Aug- 17-Oct- 50 14-Sep- 0.167 blended various $2,000 CHC02 Best practice 24-Oct- 12-Dec-
NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich
NIST 800-53A: Guide for Assessing the Security Controls in Federal Information Systems Samuel R. Ashmore Margarita Castillo Barry Gavrich CS589 Information & Risk Management New Mexico Tech Spring 2007
Building an Effective Roadmap
Building an Effective Roadmap Jason Tanner Senior Consultant, Enthiosys Motivated from Within Thank you to our sponsors 2 Agenda What is an effective roadmap? What are roadmap benefits? Why do roadmaps
The ACO Model/Capabilities Framework and Collaborative. Wes Champion Senior Vice President Premier Healthcare Alliance
The ACO Model/Capabilities Framework and Collaborative Wes Champion Senior Vice President Premier Healthcare Alliance Roadmaps to Serve as a Bridge from FFS to ACO Current FFS System What are the underpinning
Audio: This overview module contains an introduction, five lessons, and a conclusion.
Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules
How To Evaluate A Dod Cyber Red Team
CHAIRMAN OF THE JOINT CHIEFS OF STAFF MANUAL J-6 CJCSM 6510.03 DISTRIBUTION: A, B, C DEPARTMENT OF DEFENSE CYBER RED TEAM CERTIFICATION AND ACCREDITATION Reference(s): Enclosure F. 1. Purpose a. This manual,
IFB Invitation for Bids
DIRECTORATE INFRASTRUCTURE SERVICES 2015-2017 Core Enterprise Services 93.9M Network Infrastructure Services 2117.3M Cyber Security Services 68.7M IT Modernization 178M Total 2457.9M Core Enterprise Services
Australian Government Cloud Computing Policy
Australian Government Cloud Computing Policy Maximising the Value of Cloud VERSION 2.1 JULY 2013 AGIMO is part of the Department of Finance and Deregulation Contents Foreword 3 Introduction 4 Policy 5
Analysis One Code Desc. Transaction Amount. Fiscal Period
Analysis One Code Desc Transaction Amount Fiscal Period 57.63 Oct-12 12.13 Oct-12-38.90 Oct-12-773.00 Oct-12-800.00 Oct-12-187.00 Oct-12-82.00 Oct-12-82.00 Oct-12-110.00 Oct-12-1115.25 Oct-12-71.00 Oct-12-41.00
DEPARTMENTAL REGULATION
U.S. DEPARTMENT OF AGRICULTURE WASHINGTON, D.C. 20250 DEPARTMENTAL REGULATION SUBJECT: Identity, Credential, and Access Management Number: 3640-001 DATE: December 9, 2011 OPI: Office of the Chief Information
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions May 3, 2004 TABLE OF CONTENTS GENERAL PKI QUESTIONS... 1 1. What is PKI?...1 2. What functionality is provided by a
BY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION 33-48 UNITED STATES TRANSPORTATION COMMAND 22 JUNE 2015
BY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION 33-48 UNITED STATES TRANSPORTATION COMMAND 22 JUNE 2015 Communications and Information DATA MANAGEMENT POLICY AND RESPONSIBILITIES COMPLIANCE WITH THIS
Department of Defense INSTRUCTION. Public Key Infrastructure (PKI) and Public Key (PK) Enabling
Department of Defense INSTRUCTION NUMBER 8520.02 May 24, 2011 ASD(NII)/DoD CIO SUBJECT: Public Key Infrastructure (PKI) and Public Key (PK) Enabling References: See Enclosure 1 1. PURPOSE. This Instruction:
SAP NetWeaver Identity Management Experiences from an Implementation at Colgate-Palmolive Company
[ [ SAP NetWeaver Identity Management Experiences from an Implementation at Colgate-Palmolive Company Sarah Henriquez Senior Manager IT Risk Management, Colgate-Palmolive Kristian Lehment Product Manager
THIRD REGIONAL TRAINING WORKSHOP ON TAXATION. Brasilia, Brazil, December 3 5, 2002. Topic 4
THIRD REGIONAL TRAINING WORKSHOP ON TAXATION Brasilia, Brazil, December 3 5, 2002 Topic 4 INFORMATION TECHNOLOGY IN SUPPORT OF THE TAX ADMINISTRATION FUNCTIONS AND TAXPAYER ASSISTANCE Nelson Gutierrez
Securing Information in an Outsourcing Environment (Guidance for Critical Infrastructure Providers) Executive Overview Supplement.
Securing Information in an Outsourcing Environment (Guidance for Critical Infrastructure Providers) Executive Overview Supplement June 2011 DISCLAIMER: This document is intended as a general guide only.
Enhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017
From -JAN- To -JUN- -JAN- VIRP Page Period Period Period -JAN- 8 -JAN- 8 9 -JAN- 8 8 -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -FEB- : days
Vacancy Number: A03/0516. Post Number: OCG COX 0030. Job Title: Engineer (Information Assurance) NATO Grade: A-2
Vacancy Number: A03/0516 Post Number: OCG COX 0030 Job Title: Engineer (Information Assurance) NATO Grade: A-2 Basic Monthly Salary (12 x per year): 5 102,13, tax free Closing Date: 15 July 2016 Duration
INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456. Aristotle University of Thessaloniki PKI (www.pki.auth.gr) WHOM IT MAY CONCERN
Title INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456 Customer Aristotle University of Thessaloniki PKI (www.pki.auth.gr) To WHOM IT MAY CONCERN Date 18 March 2011 Independent Audit
ING Public Key Infrastructure Technical Certificate Policy
ING Public Key Infrastructure Technical Certificate Policy Version 5.1 - May 2010 Commissioned by ING PKI Policy Approval Authority (PAA) Additional copies Of this document can be obtained via the ING
Danske Bank Group Certificate Policy
Document history Version Date Remarks 1.0 19-05-2011 finalized 1.01 15-11-2012 URL updated after web page restructuring. 2 Table of Contents 1. Introduction... 4 2. Policy administration... 4 2.1 Overview...
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory. Chapter 11: Active Directory Certificate Services
MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 11: Active Directory Certificate Services Objectives Describe the components of a PKI system Deploy the Active Directory
NATIONAL DIRECTIVE FOR IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT CAPABILITIES (ICAM) ON THE UNITED STATES (US) FEDERAL SECRET FABRIC
Committee on National Security Systems 1 CNSSD No. 507 January 2014 NATIONAL DIRECTIVE FOR IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT CAPABILITIES (ICAM) ON THE UNITED STATES (US) FEDERAL SECRET FABRIC
DESIGN BUILD TEST TRAIN/DEPLOY MAINTENANCE
SOLUTION PLAN REQUIREMENTS ANALYSIS DESIGN BUILD TEST TRAIN/DEPLOY MAINTENANCE Executive Summary The project will document campus requirements for IAM functionality and select and procure one or more technology
Cambridge for. exams officers. Cambridge Administrative Guide (UK) 2015. Guidance for exams officers administering Cambridge examinations
Important information This guide was updated in January 2015. Changes are highlighted in red. Cambridge for exams officers Cambridge Administrative Guide (UK) 2015 Guidance for exams officers administering
Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software
WHITE PAPER: COMPARING TCO: SYMANTEC MANAGED PKI SERVICE........ VS..... ON-PREMISE........... SOFTWARE................. Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software
TELSTRA RSS CA Subscriber Agreement (SA)
TELSTRA RSS CA Subscriber Agreement (SA) Last Revision Date: December 16, 2009 Version: Published By: Telstra Corporation Ltd Copyright 2009 by Telstra Corporation All rights reserved. No part of this
State of Oregon. State of Oregon 1
State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information
Process Validation Workshops. Overview Session
Process Validation Workshops Overview Session 2 Session Objectives: Prepare staff for participating in a Process Validation Workshop Clarify the Purpose of Process Validation Workshops Clarify Expected
Looking at the SANS 20 Critical Security Controls
Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of
SUBJECT: systems. in DoD. capabilities. d. Aligns identity. (Reference (c)). (1) OSD, the Staff and
Department of Defense INSTRUCTION NUMBER 8520.03 May 13, 2011 ASD(NII)/DoDD CIO SUBJECT: Identity Authentication for Information Systems References: See Enclosure 1 1. PURPOSE. In accordance with the authority
Proposal to Reduce Opening Hours at the Revenues & Benefits Coventry Call Centre
Proposal to Reduce Opening Hours at the Revenues & Benefits Coventry Call Centre Proposal To change the opening hours of the Revenues & Benefits Call Centre to 9am until 5pm Monday to Friday with effect
GOVERNING BODY MEETING held in public 29 July 2015 Agenda Item 4.4
GOVERNING BODY MEETING held in public 29 July 2015 Agenda Item 4.4 APPENDIX A Strategic Planning Process 2016/17 Strategic Planning Process 2016/17 Interlocking processes 5 Year strategic process: reviewed
Promoting Application Security within Federal Government. AppSec DC November 13, 2009. The OWASP Foundation http://www.owasp.org
Promoting Application Security within Federal Government AppSec DC November 13, 2009 Dr. Sarbari Gupta, CISSP, CISA Founder/President Electrosoft [email protected] 703-437-9451 ext 12 The Foundation
Choosing a Cell Phone Plan-Verizon
Choosing a Cell Phone Plan-Verizon Investigating Linear Equations I n 2008, Verizon offered the following cell phone plans to consumers. (Source: www.verizon.com) Verizon: Nationwide Basic Monthly Anytime
Active Engagement, Modern Defence - Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, 1010
1 Modern security environment contains a broad and evolving set of challenges to the security of NATO s territory and populations. In order to assure their security, the Alliance must and will continue
5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE
5 FAH-11 H-500 PERFORMANCE MEASURES FOR INFORMATION ASSURANCE 5 FAH-11 H-510 GENERAL (Office of Origin: IRM/IA) 5 FAH-11 H-511 INTRODUCTION 5 FAH-11 H-511.1 Purpose a. This subchapter implements the policy
Neutralus Certification Practices Statement
Neutralus Certification Practices Statement Version 2.8 April, 2013 INDEX INDEX...1 1.0 INTRODUCTION...3 1.1 Overview...3 1.2 Policy Identification...3 1.3 Community & Applicability...3 1.4 Contact Details...3
Public Key Infrastructure for a Higher Education Environment
Public Key Infrastructure for a Higher Education Environment Eric Madden and Michael Jeffers 12/13/2001 ECE 646 Agenda Architectural Design Hierarchy Certificate Authority Key Management Applications/Hardware
Enterprise Security Tactical Plan
Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile
Defense Information Systems Agency A Combat Support Agency. Identity and Access Management (IdAM): Consistent Access to Capability
Defense Information Systems Agency Identity and Access Management (IdAM): Consistent Access to Capability 17 August 2011 Disclaimer The information provided in this briefing is for general information
Creating Virtual Hierarchy in Peer-to-Peer PKI to Simplify Certificate Path Discovery
Creating Virtual Hierarchy in Peer-to-Peer PKI to Simplify Certificate Path Discovery Balachandra Muniyal Dept. of Information and Communication Technology, Manipal Institute of Technology, Manipal University,
Managing Users and Identity Stores
CHAPTER 8 Overview ACS manages your network devices and other ACS clients by using the ACS network resource repositories and identity stores. When a host connects to the network through ACS requesting
CLOUD COMPUTING SERVICES CATALOG
CLOUD COMPUTING SERVICES CATALOG... Including information about the FedRAMP SM authorized Unclassified Remote Hosted Desktop (URHD) Software as a Service solution CTC Cloud Computing Services Software
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement
National Initiative for Cyber Security Education
2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women
Meet The Family. Payment Security Standards
Meet The Family Payment Security Standards Meet The Family Payment Security Standards Payment Processing Electronic payments are increasingly becoming part of our everyday lives. For most people, it can
An Operational Architecture for Federated Identity Management
An Operational Architecture for Federated Identity Management March 2011 Implementing federated identity management and assurance in operational scenarios Federated Identity Solution The Federated identity
Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review
Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review Review Process The Knowledge Unit (KU) Review Calendar divides the entire CAE-C KU list into 12 months for the purposes of
Business Plan Example. 31 July 2020
Business Plan Example 31 July Index 1. Business Overview 1.1Objectives 1.2Vision Mission and Values 1.3 Keys to Success 2. Business Management 3. Services 2.1 Company Summary 2.2 Company Ownership 2.3
South Dakota Public Funds Investment Trust (FIT) Fixed Rate Investment Options & Services
South Dakota Public Funds Investment Trust (FIT) Fixed Rate Investment Options & Services FIT Fixed Rate Account Service Features Free multiple accounts Free electronic transfers Online access to account
Public-Key Infrastructure
Public-Key Infrastructure Technology and Concepts Abstract This paper is intended to help explain general PKI technology and concepts. For the sake of orientation, it also touches on policies and standards
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS Section 5123 of the Clinger-Cohen Act requires that the Department establish goals for improving the efficiency and effectiveness of agency operations
How to use the National Cybersecurity Workforce Framework. Your Implementation Guide
How to use the National Cybersecurity Workforce Framework Your Implementation Guide A NATIONAL PROBLEM The Nation needs greater cybersecurity awareness. The US workforce lacks cybersecurity experts. Many
Egypt s E-Signature & PKInfrastructure
EGYPT-MCIT ITIDA Egypt s E-Signature & PKInfrastructure Seminar on Electronic Signature Algeria 8-9 Dec. 2009 By: Hisham Mohamed Abdel Wahab Head of the E-Signature CA Licensing ITIDA- MCIT EGYPT Email:
SIGNIFICANT CHANGES DOCUMENT
SIGNIFICANT CHANGES DOCUMENT Descriptive Title Schedule 70_MassModification_Health IT SIN Significant Changes Disclaimer Language DISCLAIMER: GSA FAS is posting this notification of a planned solicitation
Frequently Asked Questions (FAQs) SIPRNet Hardware Token
Air Force Public Key Infrastructure System Program Office (ESC/HNCDP) Phone: 210-925-2562 / DSN: 945-2562 Web: https://afpki.lackland.af.mil Frequently Asked Questions (FAQs) SIPRNet Hardware Token Updated:
BS EN 16001 Energy Management Systems VICTORIA BARRON, PRODUCT MARKETING MANAGER, BSI
BS EN 16001 Energy Management Systems VICTORIA BARRON, PRODUCT MARKETING MANAGER, BSI Agenda Energy Management in context Why Energy Management? Business Needs How BS EN 16001 helps organisations meet
Bridging the HIPAA/HITECH Compliance Gap
CyberSheath Healthcare Compliance Paper www.cybersheath.com -65 Bridging the HIPAA/HITECH Compliance Gap Security insights that help covered entities and business associates achieve compliance According
Chief Review Services REVIEW OF DND/CF INFORMATION SECURITY. October 2002 7050-7 (CRS) Canada
REVIEW OF DND/CF INFORMATION SECURITY October 2002 7050-7 (CRS) Canada TABLE OF CONTENTS OVERVIEW... 1 INTRODUCTION... 1 Comparative Assessment of the DND/CF Information Security Program... 1 RECOMMENDATIONS...
Communication and Information Systems (CIS) Interoperability: Examples and Lessons Learned from Multi-National Projects and NATO Experience
Communication and Information Systems (CIS) Interoperability: Examples and Lessons Learned from Multi-National Projects and NATO Experience Luigi Bella, Director of Production NC3A, 28 March 2011, Rome
Mott Community College Job Description
Title: Department: Information Technology Services Reports To: Chief Technology Officer Date Prepared/Revised: May 2009/Revised July 2011 Purpose, Scope & Dimension of Job: The role of the Director of
Recommendations for the PIA. Process for Enterprise Services Bus. Development
Recommendations for the PIA Process for Enterprise Services Bus Development A Report by the Data Privacy and Integrity Advisory Committee This report reflects the consensus recommendations provided by
Louisiana Department of Education 2013 Common District Charter Request for Applications
Louisiana Department of Education 2013 Common District Charter Request for Applications Table of Contents I. Introduction... 3 II. New and Experienced Operator Application Tracks... 4 III. Charter Application
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 1400.25, Volume 1100 January 3, 2014 USD(P&R) SUBJECT: DoD Civilian Personnel Management System: Civilian Human Resources Management Information Technology Portfolio
Department of Defense DIRECTIVE. SUBJECT: United States Security Authority for North Atlantic Treaty Organization Affairs (USSAN)
Department of Defense DIRECTIVE NUMBER 5100.55 February 27, 2006 USD(P) SUBJECT: United States Security Authority for North Atlantic Treaty Organization Affairs (USSAN) References: (a) DoD Directive 5100.55,
What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form. December 3, 2012
Federal CIO Council Information Security and Identity Management Committee IDManagement.gov What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form December 3, 2012 HSPD-12
Coordination and air quality monitoring during emergencies. Colin Powlesland Environment Agency
Coordination and air quality monitoring during emergencies Colin Powlesland Environment Agency Contents h Introduction h What do we want to achieve? h Implementation programme h Incident timeline h Proposed
ARTL PKI. Certificate Policy PKI Disclosure Statement
ARTL PKI Certificate Policy PKI Disclosure Statement Important Notice: This document (PKI Disclosure Statement, PDS) does not by itself constitute the Certificate Policy under which Certificates governed
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems
Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems Energy Sector Control Systems Working Group Supporting the Electricity Sector Coordinating Council, Oil & Natural Gas
US Army Corps of Engineers. Vision Statement. Be the premier stewards of entrusted hydropower resources
Vision Statement Be the premier stewards of entrusted hydropower resources Mission Statement Provide reliable hydroelectric power services at the lowest possible cost, consistent with sound business principles,
Certification Practice Statement
FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification
Gatekeeper PKI Framework. Archived. February 2009. Gatekeeper Public Key Infrastructure Framework. Gatekeeper PKI Framework.
Gatekeeper Public Key Infrastructure Framework 1 October 2007 Department of Finance and Deregulation Australian Government Information Management Office Commonwealth of Australia 2009 This work is copyright.
Solvency II Preparation and IMAP James Latto
and James Latto Contents 2 1 Balancing priorities Insurers need to balance priorities over the next year: Main focus is often on Pillar 3 and external reporting needs sufficient focus Ensure smooth transition
