Developing a Federal Vision for Identity Management



Similar documents
Identity, Credential, and Access Management. Open Solutions for Open Government

Identity and Access Management Initiatives in the United States Government

The Government-wide Implementation of Biometrics for HSPD-12

Status: Final. Form Date: 30-SEP-13. Question 1: OPDIV Question 1 Answer: OS

Audio: This overview module contains an introduction, five lessons, and a conclusion.

Standard Government-Wide Senior Executive Service (SES) Performance Appraisal System

Government Smart Card Interagency Advisory Board Moving to SHA-2: Overview and Treasury Activities October 27, 2010

Identity, Credential, and Access Management. An information exchange For Information Security and Privacy Advisory Board

National Capital Region. Electronic Designation and Validation of Federal/Emergency Response Officials (F/EROs) in support of National Preparedness

Identity, Credential, and Access Management

OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION

REVISION: This directive supersedes TSA MD , Handling Sensitive Personally Identifiable Information, dated March 13, 2008.

I. U.S. Government Privacy Laws

Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance

PaperClip Incorporated 3/7/06; Rev 9/18/09. PaperClip Compliant Service Whitepaper

Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19

U.S. Office of Personnel Management Human Resources Line of Business. Federal Human Resources Process Model

Central Application Tracking System (CATS) Privacy Impact Assessment (PIA) Version 1.0. April 28, 2013

SYSTEM NAME: Digital Identity Access Management System (DIAMS) - P281. SYSTEM LOCATION: U.S. Department of Housing and Urban Development, 451 Seventh

ARC Outreach on HSPD 12 and Mandatory Use of ODIN

Life After PIV. Authentication In Federated Spaces. Presented to. Card Tech/Secure Tech. May By Lynne Prince Defense Manpower Data Center

NSF AuthentX Identity Management System (IDMS) Privacy Impact Assessment. Version: 1.1 Date: 12/04/2006. National Science Foundation

Cybersecurity and Data Breach: Mitigating Risk and How Government Policymakers Approach These Critical Issues

The Implementation of Homeland Security Presidential Directive 12

Interagency Advisory Board Meeting Agenda, May 27, 2010

State Identity Credential and Access Management (SICAM) Guidance and Roadmap

Good Afternoon! Since Yesterday we have been talking about threats and how to deal with those threats in order to protect ourselves from individuals

Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014

State Identity, Credential, and Access Management (SICAM) Roadmap and Implementation Guidance Version 2.0 October 14, 2013

Issuance and use of PIV at FAA

French Justice Portal. Authentication methods and technologies. Page n 1

ANNUAL REPORT TO CONGRESS: FEDERAL INFORMATION SECURITY MANAGEMENT ACT

Optical Memory Cards in Federal Government

Justice Management Division

Practical Challenges in Adopting PIV/PIV-I

GAO PERSONAL ID VERIFICATION. Agencies Should Set a Higher Priority on Using the Capabilities of Standardized Identification Cards

HSPD-12 Homeland Security Presidential Directive #12 Overview

A. SYSTEM DESCRIPTION 1. Enter the full name and acronym for the system, project, application and/or database. Withholding Compliance, WHCS

Working Group 5 Identity Management and Privacy Technologies within ISO/IEC JTC 1/SC 27 IT Security Techniques

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014

Privacy Impact Assessment

Actions and Recommendations (A/R) Summary

FCCX Briefing. Information Security and Privacy Advisory Board. June 13, 2014

White Paper 2 Factor + 2 Way Authentication to Criminal Justice Information Services. Table of Contents. 1. Two Factor and CJIS

2012 FISMA Executive Summary Report

PaperClip Incorporated 3/7/06; Rev 8/12/14. PaperClip Compliant Service Whitepaper

DBIDS/IACS PRIVACY IMPACT ASSESSMENT (PIA) 2. Name of IT System: Defense Biometric Identification System (DBIDS)

Information Technology Policy

Office of the Chief Information Officer Department of Energy Identity, Credential, and Access Management (ICAM)

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL

Briefing Outline. Overview of the CUI Program. CUI and IT Implementation

Federal Identity, Credentialing, and Access Management. Identity Scheme Adoption Process

December 8, Security Authorization of Information Systems in Cloud Computing Environments

Justice Management Division

Multi-Factor Authentication of Online Transactions

Personal Information Collection and the Privacy Impact Assessment (PIA)

Introduction to Online Identity Management By Thomas J. Smedinghoff 1

Smart Cards and Biometrics in Physical Access Control Systems

Identity Management for Interoperable Health Information Exchanges

DRAFT Pan Canadian Identity Management Steering Committee March 1, 2010

The Unique Alternative to the Big Four. Identity and Access Management

POSTAL REGULATORY COMMISSION

Derived credentials. NIST SP ( 5.3.5) provides for long term derived credentials

U.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE. Privacy Impact Assessment

Understanding the differences in PIV, PIV-I, PIV-C August 23, 2010

OWA/2-Factor Authentication VPN FAQ. Outlook Web Access (OWA) QUESTIONS

DCRI Standard Operating Procedure: NIH Clinical Center Standard Operating Procedures for Lost or Stolen CC IT Device(s)

DOE Joint ICAM Program - Unclass & Secret Fabrics

Mobile Driver s License Solution

Identity & Privacy Protection

Cloud Computing Best Practices. Creating Effective Cloud Computing Contracts for the Federal Government: Best Practices for Acquiring IT as a Service

Cloud Services The Path Forward. Mr. Stan Kaczmarczyk Acting Director - Strategic Solutions and Security Services FAS/ ITS, GSA

Glossary of Key Terms

ImageWare Systems, Inc.

Identity: The Key to the Future of Healthcare

Privacy Incident Handling Guidance

The Department of Health and Human Services Privacy Awareness Training. Fiscal Year 2015

Unique Challenges in Architecting a Healthcare PKI that Spans Public and Private Sectors

The Imperative for High Assurance Credentials: State Identity Credential and Access Management (SICAM) Guidance and Roadmap

Transcription:

Developing a Federal Vision for Identity Management Duane Blackburn Office of Science and Technology Policy Executive Office of the President January 16, 2009

Height DNA Biometric Name Date of Birth SSN Eye Color Shoe Size Building an IdM System Weight Sex Address Phone Number IP Address Password E-mail Mother s Maiden Name High School Mascot Favorites Birth Certificate Driver s License Passport PIV Card

DNA Biometric Name Date of Birth SSN Birth Certificate Driver s License Passport Address Phone Number IP Address Password E-mail Height Weight Eye Color Sex Mother s Maiden Name High School Mascot Favorites Shoe Size PIV Card

Height DNA Biometric Name Date of Birth SSN Eye Color Shoe Size Building an IdM System Weight Sex Address Phone Number IP Address Password E-mail Mother s Maiden Name High School Mascot Favorites Birth Certificate Driver s License Passport PIV Card

Identity Concentricity Root Core

Federal IdM Coordination Timeline EOP Meetings (2007) NSTC Task Force (2008) STPI Report Approval Report Release (Sep 2008) Inauguration Briefings (2008) Coordinated Action?

Task Force Composition Six month effort (January 1 July 2, 2008) Co-chairs Duane Blackburn (OSTP) Judy Spencer (GSA) Jim Dray (NIST) Working groups Drafting team Data Collection and Analysis Digital Identity Grid Privacy and Legal Participating agencies included DHS, DOD, DOS, DOJ, HHS, SSA, FTC, DOC, GSA, EOP, NSF, ODNI, NASA, FAA, VA, OMB

Task Force Charge Provide an assessment of the current state of IdM in the US Government; Develop a vision for how IdM should operate in the future; Develop first-step recommendations on how to advance towards this vision.

CIO Council Data Call First-order understanding of the IdM landscape Final Report Appendix G 18 responses covering 191 agencies/bureaus, 3400 individual systems The most common forms of information being collected for IdM are login alias, PIN/password, legal name, date of birth and social security number Few systems (~15%) or programs collect or use biometric-related data (e.g., fingerprints, iris or facial imaging) or use security questions or tokens

Key Findings of the NSTC IdM TF Report IdM is comprised of three elements: ID applications; Global telecommunications grid; Digital ID repositories of all kinds Within these, the latter two comprise the IT Utility Two gross processes of Screening and Access Controls coexist within the USG. Public messaging and social acceptance have sometimes been seen as sidebar issues in the USG s approach to IdM, with resultant negative consequences. PII may be segregated between application-specific data held inside applications, and that used to establish authentication of basic digital ID s. USG missions include extensive engagement with other jurisdictions of government, international partners, and the public. This underlines not only the criticality of treatment of PII, but also the need for federal processes to be attuned to commercial and emergent international IdM approaches, standards and systems.

Current Landscape

Future State Vision

Objective IdM Architectural Model ID-specific Privileges (s of ID in specific context), with data unique to each /user Interface Identity Management Utility Enterprise IT System Network of Networks Digital ID Data Federation

IdM Refocus CHARACTERISTIC: TODAY Future Focus: Challenges: Data sets Standards; Social acceptance s Scalability; Business models Controlling Equity: Cultural Character: Federal IT community Service-provider push Balanced equities - End users - sponsors/managers - Digital ID managers - Global grid/it managers User-demand pull Appearance : German watchmaker s Utility (elex pwr analogy) shop

Key recommendations 12 prioritized R&D recommendations Rationale: Tech base supporting IdM decomposed, with investments (hopefully) leading to process improvements proposed in each major area Complete the basic as-built research, in full detail s, processes, etc Conduct gap analysis, and from that, detailed strategy Architectural framework Singular, comprehensive, interoperable Standards-based Privacy-centric Security-conscious Advance the Global Grid agenda Next-generation network(s) Engage internationally Governance

TF Report Available online www.ostp.gov/nstc www.biometrics.gov www.idmanagement.gov

You are not alone President s Identity Theft Task Force NSTC, IdM Task Force CIO Council, Information Security and IdM Committee Information Sharing Environment, IdAM Framework National Security Telecommunications Advisory Committee, IdM Task Force HSPD 6, 11, 12 NSPD-59 Cybersecurity Initiative Organisation for Economic Co-operation and Development (OECD) International Telecommunication Union - Telecommunication Standardization Sector (ITU-T) International Organization for Standardization (ISO) Naval Post Graduate School, IdM degree program Many others

Duane s Key Take-Home Points Identity and appropriateness of IdM varies amongst individuals Numerous IdM activities in the USG Which represent a fraction of IdM activities in the US/World Activities in one impact others If we continue to build our systems as if it was to be the only system in existence, we are building our system to fail If we continue to build our system-of-systems as if our sector was the only one with identity issues, we are building our system-of-systems to fail How are we going to move forward?