The Rise of Identity Proofing Services in the Federal Government



Similar documents
FCCX Briefing. Information Security and Privacy Advisory Board. June 13, 2014

Privacy Impact Assessment for the. E-Verify Self Check. DHS/USCIS/PIA-030(b) September 06, 2013

Federal Identity, Credential, and Access Management Trust Framework Solutions. Overview

Identity, Credential, and Access Management. Open Solutions for Open Government

Privacy Impact Assessment for the. E-Verify Self Check. March 4, 2011

Federal Identity, Credential, and Access Management Trust Framework Solutions. Relying Party Guidance For Accepting Externally-Issued Credentials

Federal Identity, Credential, and Access Management Trust Framework Solutions

Can We Reconstruct How Identity is Managed on the Internet?

Department of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT

HSIN R3 User Accounts: Manual Identity Proofing Process

IDENTITY INFORMATION MANAGEMENT

E-Verify Program: Use of Commercial Data for Employer Verification

Online Identity Attribute Exchange Initiatives

DEPARTMENTAL REGULATION

Identity: The Key to the Future of Healthcare

Identity, Credential, and Access Management. An information exchange For Information Security and Privacy Advisory Board

NISTIC Pilot - Attribute Exchange Network. Biometric Consortium Conference

Automated Threat Prioritization Web Service

DHS / UKvisas Project

Online Identity Attribute Exchange Initiatives

Rich Furr Head, Global Regulatory Affairs and Chief Compliance Officer, SAFE-BioPharma Association. SAFE-BioPharma Association

M-775, E-Verify User Manual for Employers

Physical Access Control System

Status: Final. Form Date: 30-SEP-13. Question 1: OPDIV Question 1 Answer: OS

SYSTEM NAME: Digital Identity Access Management System (DIAMS) - P281. SYSTEM LOCATION: U.S. Department of Housing and Urban Development, 451 Seventh

Attribute-Based Access Control Solutions: Federating Authoritative User Data to Support Relying Party Authorization Decisions and Requirements

Hiring Information Tracking System (HITS)

Were there other system changes not listed above? No 3. Check the current ELC (Enterprise Life Cycle) Milestones (select all that apply)

Port Authority of New York/New Jersey Secure Worker Access Consortium Vetting Services

Crew Member Self Defense Training (CMSDT) Program

The system: does NOT contain PII. If this is the case, you must only complete Section 13.

Student Administration and Scheduling System

United States Trustee Program

REMEDY Enterprise Services Management System

Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19

Advanced Call Center Network Platform

Recommendations for the PIA. Process for Enterprise Services Bus. Development

Privacy Impact Assessment For Central Processing System (CPS) Date: March 25, 2013

A. SYSTEM DESCRIPTION

United States Citizenship and Immigration Services (USCIS) Enterprise Service Bus (ESB)

Canine Website System (CWS System) DHS/TSA/PIA-036 January 13, 2012

Item number 15 of Section C of the MOU Responsibilities of the Employer - reads as follows:

Identity and Access Management Initiatives in the United States Government

The Impact of NSTIC on the Internal Revenue Service. Economic Case Study: Planning Report 13-2

AN OPEN MARKET SOLUTION

U.S. Department of Energy Washington, D.C.

Compliance Tracking and Management System

Easy, Trusted Online Service Access

Bond Management Information System

US Federal Student Aid Datashare (SBU-PII) Application and Database

I. U.S. Government Privacy Laws

College Operating Procedures (COP)

Privacy Impact Assessment for Threat Assessments for Access to Sensitive Security Information for Use in Litigation December 28, 2006

Privacy Impact Assessment

Authentication, Authorization, and Audit Design Pattern: External User Authentication

Enforcement Integrated Database (EID) Criminal History Information Sharing (CHIS) Program

Privacy Impact Assessment

Privacy Policy Last Modified: April 3,

Deciphering the Legal Framework that Governs Online Identity Systems

Department of Veteran Affairs VA HANDBOOK 6510 VA IDENTITY AND ACCESS MANAGEMENT

Federal Identity, Credentialing, and Access Management. Identity Scheme Adoption Process

Department of Homeland Security Web Portals

NSF AuthentX Identity Management System (IDMS) Privacy Impact Assessment. Version: 1.1 Date: 12/04/2006. National Science Foundation

June 5, 2013 Ken Klingenstein. Identity Management, the Cloud, NSTIC and Accessibility

August Reviewing Official Karen L. Neuman Chief Privacy Officer Department of Homeland Security (202)

SECURE DIGITAL SIGNATURES FOR APPRAISERS

Cloud-Based Identity Services

Privacy Impact Assessment for the Disaster Assistance Improvement Program (DAIP)

Date: Wednesday March 12, 2014 Time: 10:00 am to 2:45 pm ET Location: Virtual Hearing

Authentication and Provisioning Services (APS)

Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance

RECOMMENDED CHARTER FOR THE IDENTITY ECOSYSTEM STEERING GROUP

Privacy Impact Assessment

Integrated Financial Management Information System (IFMIS) Merger

Privacy Impact Assessment

Medical Credentials Management System

Clearances, Logistics, Employees, Applicants, and Recruitment (CLEAR)

NOC Patriot Report Database

5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES

Trusted Identities for Electronic Health Records A National Strategy

Following is a discussion of the Hub s role within the health insurance exchanges, the results of our review, and concluding observations.

E-Verify Mobile App Usability Testing

Privacy Impact Assessment

U.S. Securities and Exchange Commission. Easy Lobby PRIVACY IMPACT ASSESSMENT (PIA)

Integration of Access Security with Cloud- Based Credentialing Services

I-9 COMPLIANCE TRAINING FOR HR CONTACTS AND HR CONTACT DELEGATES

E-VERIFY FAQ s. Background information

Privacy Statement. What Personal Information We Collect. Australia

Biometrics in Identity as a Service

Privacy Impact Assessment

Derived credentials. NIST SP ( 5.3.5) provides for long term derived credentials

SIGNIFICANT CHANGES DOCUMENT

Online Detainee Locator System

Audio: This overview module contains an introduction, five lessons, and a conclusion.

2. Privacy Policy Guidance Memorandum , OHS Policy Regarding Privacy Impact Assessments (December 30, 2008)

GUIDELINES FOR RESPONSIBLE USE OF IDENTITY MANAGEMENT SYSTEMS

Privacy Impact Assessment for the Volunteer/Contractor Information System

FOUR PILLARS FOR A SUCCESSFUL PIV ECOSYSTEM

Administrative Appeals Office (AAO) Case Management System

Privacy Impact Assessment (PIA) for the. Certification & Accreditation (C&A) Web (SBU)

Transcription:

The Rise of Identity Proofing Services in the Federal Government Jamie Danker, Verification Privacy Officer, Office of Privacy, U.S. Citizenship and Immigration Services Naomi Lefkovitz, Senior Privacy Advisor, Information Technology Lab, National Institute for Standards and Technology Dawn Wiggins, Deputy Executive Director, Office of Privacy & Disclosure, Social Security Administration E-Authentication Guidance For Federal Agencies M-04-04: OMB issued in December 2003 Objective is to ensure that agency authentication processes provide the appropriate level of assurance. It establishes and describes four levels of identity assurance for electronic transactions requiring authentication. Table 1 provides a risk assessment for potential impact categories for authentication errors 1

Trust Framework Solutions Leverages industry-based citizen credentials Identity Providers (IDPs) are certified using FICAM privacy security criteria http://www.idmanagement.gov/approved-identity-providers NIST LOA 1 Little or no confidence in asserted identity Approved IDPs: Google, PayPal, VeriSign NIST LOA 2 Some confidence in asserted identity Approved IDPs: Virginia Polytechnic Institute and State University (LOA 1 & 2) NIST LOA 3 High confidence in asserted identity Approved IDPs: Symantec, Verizon (LOA 1, 2 & non-pki 3) NIST LOA 4 Very high confidence in asserted identity Approved IDPs: PIV/ PIV-I Cards Why are We Doing This? Changing U.S. demographics with expectations of online service delivery Citizen benefit services moving online VA CMS SSA IRS Department of Education More Credential lifecycle management of the U.S. population, by USG is NOT sustainable 2

Challenges Agency requirements for Citizen Services typically start at LOA 2 LOA 2 requires ID Proofing (i.e. This does not come for free) Need an active eco-system of CSPs that meet government requirements for security and privacy What is a Trust Framework? Governance structure for a specific identity system consisting of: Technical and Operational Specifications that have been developed to define requirements for the proper operation of the identity system (i.e., so that it works), to define the roles and operational responsibilities of participants, and to provide adequate assurance regarding the accuracy, integrity, privacy and security of its processes and data (i.e., so that it is trustworthy); and Legal Rules that govern the identity system in order to regulate the content of the Technical and Operational Specifications, make the Technical and Operational Specifications legally binding on and enforceable against the participants, and define and govern the legal rights, responsibilities, and liabilities of the participants of the identity system. TFS > - American Bar Association's Federated Identity Management Legal Task Force 3

FICAM Trust Framework Solutions Privacy & Security OMB Requirements NIST Requirements GSA Requirements Comparability Assessment Assurance Processes Privacy Policy Audit & Certification Processes Auditor Qualifications Organizational Maturity Trust Framework Provider US Government Relying Party Approval Assessment Organizational Maturity Registration & Identity Proofing Processes Credential & Issuance Processes Privacy Policies IdP Citizens What are the expectations of Privacy? Privacy policy comparability using the following criteria: Opt In Identity Provider must obtain positive confirmation from the End User before any End User information is transmitted to any government applications. The End User must be able to see each attribute that is to be transmitted as part of the Opt In process. Identity Provider should allow End Users to opt out of individual attributes for each transaction. Minimalism Identity Provider must transmit only those attributes that were explicitly requested by the RP application or required by the Federal profile. RP Application attribute requests must be consistent with the data contemplated in their Privacy Impact Assessment (PIA) as required by the E- Government Act of 2002. Activity Tracking Commercial Identity Provider must not disclose information on End User activities with the government to any party, or use the information for any purpose other than federated authentication. RP Application use of PII must be consistent with RP PIA as required by the E- Government Act of 2002. Adequate Notice Identity Provider must provide End Users with adequate notice regarding federated authentication. Adequate Notice includes a general description of the authentication event, any transaction(s) with the RP, the purpose of the transaction(s), and a description of any disclosure or transmission of PII to any party. Adequate Notice should be incorporated into the Opt In process. Non Compulsory As an alternative to 3rd-party identity providers, agencies should provide alternative access such that the disclosure of End User PII to commercial partners must not be a condition of access to any Federal service. Termination In the event an Identity Provider ceases to provide this service, the Provider shall continue to protect any sensitive data including PII. 4

LOA 2 Agency Example: Self Check 2009: Requested by Congress, Self Check is a voluntary, fast and free service that allows an individual to make sure the employment eligibility records used by E-Verify are up to date and accurate. 2011: Self Check was launched in five states and D.C. o On August 15, 2011 the service was made available in Spanish and expanded to an additional 16 states. o On February 9, 2012 Self Check was made available nationwide. 2013: Over 181,000 individuals have used Self Check since its launch. E-Verify and Self Check Comparison E-Verify Program Self Check Service Audience U.S. businesses U.S. workers Purpose System Security Legislative Mandate Availability Verify employment eligibility of workforce Employer registration process and user accounts Required in certain states and for federal contractors 50 states and U.S. territories Check your own employment eligibility status Identity assurance process on each use Voluntary, cannot be required 50 states and U.S. territories 5

Self Check Process Overview 2 Identity Assurance: Identity assurance is performed by generating knowledge based questions using the personal information provided by the user 1 Self Check Overview: The Self Check website offers program information and links to E-Verify, USCIS and DHS sites Note on Fraud Prevention: A user is only able to use Self Check if his or her identity is successfully authenticated 3 Employment Eligibility Verification: A user s employment eligibility information is gathered and checked through by E-Verify against DHS and SSA records VIS 4 Self Check Results: User is notified of Self Check results and if applicable, receives guidance on how to correct any data mismatches in SSA or DHS records Self Check Results X Sample Sample Sample Sample User s View of the Self Check Process Step 1 - Enter ID Data Enter basic identifying information like name, address, date of birth, and Social Security number (SSN). Providing SSN is optional in Step 1. If not provided here, SSN will be required in Step 3. 6

User s View of the Self Check Process Step 1 - Enter ID Data Enter basic identifying information like name, address, date of birth, and Social Security number (SSN). Providing SSN is optional in Step 1. If not provided here, SSN will be required in Step 3. Self Check Terms of Use & Data Entry Screens 7

User s View of the Self Check Process Step 2 - Take a Quiz The info is sent to a third party identity assurance service to generate a quiz for user to prove identity. The government will have no knowledge of which questions are presented or how those questions are answered. Identity Proofing Quiz 8

User s View of the Self Check Process Step 3 Enter Document Data If successful in Step 2, go on to complete an employment eligibility query to determine work eligibility. Additional required info includes SSN, citizenship status, and details from immigration documentation (e.g., Green card, EA card, etc). User s View of the Self Check Process Step 4 - Get Results Information submitted is checked against Department of Homeland Security (DHS) and Social Security Administration (SSA) databases to determine work eligibility. A response is given indicating either that the user would likely be employment authorized in E-Verify (if an employer runs the employment authorization check), or that there is a mismatch between the data entered and the DHS and/or SSA databases. If there is a mismatch, user will be given information that outlines how to correct the records if desired. 9

Employment Authorization Response Screen Possible Mismatch Screens 10

Additional Privacy Considerations Redress What happens if a quiz cannot be generated for me? What happens if I cannot pass the quiz? What if I cannot pass the quiz, but I believe I answered the questions correctly (i.e., inaccurate commercial information)? Retention What does the IDP Retain? What does USCIS Retain? For the identity authentication USCIS receives a transaction ID, date/time of the transaction, pass/fail indicator, and any business rules triggered during the process to facilitate troubleshooting and system management and improvement. The IDP maintains a log of access to your information and the type of inquiry (i.e., identity check) and a log of all identity verification transactions to conduct system management and to generate customer usage statistics. For the E-Verify query, USCIS maintains a record including your name date of birth, work authorization documentation information, the query result, and an E- Verify case number. (The IDP does not have access to this part of the Self Check process). LOA 2 Example: mysocialsecurity Focus Today Online Registration In-Person 11

The 5 Steps of Registration Sign In or Create an Account 12

1. Overview and Accept Terms Identity Proofing 13

2. Identity Proofing Internal Records Check Name DOB SSN Address External Records Check Name DOB Address Phone number 2 7 3. Out of Wallet Quiz 14

4. User ID Setup Current Overview 15

My Profile Recommendations Assess your user population to determine whether knowledge based authentication is feasible. Have a plan to address individuals who are unable to electronically authenticate. Work with your vendor to monitor quiz generation and quiz pass rates and adjust your quiz strategy as appropriate. Work closely with your vendors to fully understand retention and use practices. Communicate clearly with your customer base about e- authentication practices. Use the PIA, privacy notices, and terms of service process to promote transparency. Consider data minimization for data collected for authentication 16

Resources Self Check http://www.uscis.gov/self-check PIA (http://www.dhs.gov/publication/dhsuscispia-030b-e-verify-selfcheck) SORN (http://edocket.access.gpo.gov/2011/2011-3490.htm, http://www.gpo.gov/fdsys/pkg/fr-2013-07-22/html/2013-17451.htm) mysocialsecurity http://ssa.gov/myaccount/ PIA (http://www.socialsecurity.gov/foia/piadocuments/fy11/e- Auth%20PIA%20May%2031%202011.htm) SORN (http://www.socialsecurity.gov/foia/bluebook/60-0373.htm) National Strategy For Trusted Identities in Cyberspace (NSTIC) VISION NSTIC Overview Individuals and organizations utilize secure, efficient, easy-to-use, and interoperable identity solutions to access online services in a manner that promotes confidence, privacy, choice, and innovation. NSTIC Objective 2.3: Implement the Federal Government Elements of the Identity Ecosystem - The Federal Government must continue to lead by example and be an early adopter of identity solutions that align with the Identity Ecosystem Framework. - The Federal Government must also continue to leverage its buying power as a significant customer of the private sector to motivate the supply of these solutions. 17

Solution Overview Federal Cloud Credential Exchange (FCCX) accelerates NSTIC and FICAM by allowing agencies to securely interact with a single broker to authenticate consumers Market Challenge The Solution (FCCX) Requires agencies to integrate with multiple Identity Service Providers (IDPs), each independently paying for authentication services Limited LOA 2 & 3 credentials due to limited demand Centralized interface between agencies and credential providers reduces costs and complexity, speeds up integration timeline for new IDPs Enhanced consumer privacy and experience; citizen does not have to get a new credential for each agency application Decreased Federal government authentication costs Privacy Architecture Phase I: The broker prevents the IDP from knowing at which agencies citizens are using their credentials, and can prevent the agencies from knowing which IDP supplied a citizen s credential Every user is represented by an internal identifier called an MBUN (i-mbun) Internal Meaningless, But Unique Number Internal mapping between the user identifier provided by a IDP and the internally generated MBUN that is sent to the RP. Phase II: Use of privacy-enhancing cryptography so citizens remain anonymous to the broker IDP User Id Bridge IDP User ID i-mbun Bridge i-mbun RP p-mbun RP P-MBUN RP User ID 18

High Level Process Flow and Key Decision Points for Release 1 Decision 1 How to present IDPs to users? Decision 2 Informed Consent Decision 3 What attributes are needed? Informed Consent Consent Model Options Informed consent (display attribute values / names ) Release consent (RP, scope) Implicit consent (scope, RP name in selector) Pass-thru consent (mapping only) By pressing continue you are consenting to release the following attributes to MyGov John Doe John@doe.com 123 anytown Rd. June 10, 1975 Release Consent Implicit Consent E-Benefits is requesting demographics information. Please select a sign-in partner to continue ACTION: Privacy working group team to recommend consent handling user experience at IDPs and within FCCX 38 19

Assurance Vs. Resolution Assurance The degree of confidence in the vetting process used to establish the identity of an individual to whom the credential was issued, and The degree of confidence that the individual who uses the credential is the individual to whom the credential was issued Resolution The degree of confidence in the vetting process used to establish the identity of an individual to whom the credential was issued, and The degree of confidence that the individual who uses the credential is the individual to whom the credential was issued ANSI/NASPO IDPV Standard Attribute bundles to resolve to single US Person Category Attribute Description Name Name (First Name) AND (Last Name) Attribute Bundle 1 2 3 4 5 Location Time Identifier Partial Address Place of Birth Partial Date of Birth Full Date of Birth Partial Social Security Number Full Social Security Number Postal Code OR (City and State) (City or County) AND (State or Foreign Country) (Month and Day) OR Year Last 4 Digits Full 9 Digits Each of the above attribute bundles equally RESOLVES TO ONE PERSON in the US Population 95% of the time (or greater) 20

QUESTIONS? Jamie Danker (jamie.danker2@uscis.dhs.gov) Naomi Lefkovitz (naomi.lefkovitz@nist.gov) Dawn Wiggins (dawn.wiggins@ssa.gov) Resources OMB E-Authentication Guidance for Federal Agencies (OMB-M-O4-O4) http://csrc.nist.gov/drivers/documents/m04-04.pdf NIST Electronic Authentication Guideline (NIST SP-800-63-2) http://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-63-2.pdf Trust Framework Provider Adoption Process (TFPAP) for Levels of Assurance 1, 2, 3 and 4 http://www.idmanagement.gov/sites/default/files/documents/ficam_tfs_tfpap_v1. 1.0.pdf Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance v2.0 http://www.idmanagement.gov/sites/default/files/documents/ficam_roadmap_and_ Implementation_Guidance_v2%200_20111202_0.pdf Federal ICAM Privacy Guidance for Trust Framework Assessors and Auditors http://www.idmanagement.gov/sites/default/files/documents/guidance_for_assessor s.pdf OMB Requirements for Accepting Externally-Issued Identity Credentials https://cio.gov/wpcontent/uploads/downloads/2012/09/ombreqforacceptingexternally_issuedidcred10-6-2011.pdf 21