Identity, Credential, and Access Management



Similar documents
Identity, Credential, and Access Management. Open Solutions for Open Government

Identity, Credential, and Access Management. An information exchange For Information Security and Privacy Advisory Board

Integration of Access Security with Cloud- Based Credentialing Services

Identity and Access Management Initiatives in the United States Government

Federal Identity, Credential, and Access Management Trust Framework Solutions. Relying Party Guidance For Accepting Externally-Issued Credentials

DEPARTMENTAL REGULATION

Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance

Federal PKI (FPKI) Community Transition to SHA-256 Frequently Asked Questions (FAQ)

from PKI to Identity Assurance

Department of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT

Federal Identity, Credential, and Access Management Trust Framework Solutions. Overview

Understanding the differences in PIV, PIV-I, PIV-C August 23, 2010

Office of the Chief Information Officer Department of Energy Identity, Credential, and Access Management (ICAM)

Interagency Advisory Board Meeting Agenda, May 27, 2010

U.S. Department of Energy Washington, D.C.

An Operational Architecture for Federated Identity Management

Federal Identity, Credentialing, and Access Management. Identity Scheme Adoption Process

State Identity Credential and Access Management (SICAM) Guidance and Roadmap

Federal Identity, Credential, and Access Management Trust Framework Solutions

Audio: This overview module contains an introduction, five lessons, and a conclusion.

What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form. December 3, 2012

5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES

GSA FIPS 201 Evaluation Program

State Identity, Credential, and Access Management (SICAM) Roadmap and Implementation Guidance Version 2.0 October 14, 2013

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, DC

Department of Defense INSTRUCTION. SUBJECT: Public Key Infrastructure (PKI) and Public Key (PK) Enabling

FOUR PILLARS FOR A SUCCESSFUL PIV ECOSYSTEM

Rich Furr Head, Global Regulatory Affairs and Chief Compliance Officer, SAFE-BioPharma Association. SAFE-BioPharma Association

Information Technology Policy

IDIM CORPORATE PROVISIONING ARCHITECTURE Architecture and Standards Branch Office of the CIO Province of BC People Collaboration Innovation

Federal PKI. Trust Infrastructure. Overview V1.0. September 21, 2015 FINAL

GAO PERSONAL ID VERIFICATION. Agencies Should Set a Higher Priority on Using the Capabilities of Standardized Identification Cards

NOAA HSPD-12 PIV-II Implementation October 23, Who is responsible for implementation of HSPD-12 PIV-II?

The Convergence of IT Security and Physical Access Control

E X E C U T I V E O F F I CE O F T H E P R E S I D EN T

I. U.S. Government Privacy Laws

Federal Identity Management Handbook

Commonwealth of Virginia Personal Identity Verification-Interoperable (PIV-I) First Responder Authentication Credential (FRAC) Program

GFIPM & NIEF Single Sign-on Supporting all Levels of Government

GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.

FEDERAL IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT AND PERSONAL IDENTITY VERIFICATION (PIV) SOLUTIONS

Identity Management & Digital Signatures in the BioPharmaceutical Industry John Hendrix; Program Director CTST 2009

Identity & Privacy Protection

Department of Defense SHA-256 Migration Overview

Can We Reconstruct How Identity is Managed on the Internet?

Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance

Department of Defense PKI Use Case/Experiences

The Government-wide Implementation of Biometrics for HSPD-12

X.509 Certificate Policy For The Federal Bridge Certification Authority (FBCA) Version 2.24

Introduction to SAML

Using FICAM as a model for TSCP Best Prac:ces in Physical Iden:ty and Access Management. TSCP Symposium November 2013

Attribute-Based Access Control Solutions: Federating Authoritative User Data to Support Relying Party Authorization Decisions and Requirements

NIST Cyber Security Activities

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

For Official Use Only (FOUO)

Federal Identity, Credentialing, and Access Management. Personal Identity Verification Interoperable (PIV-I) Test Plan. Version 1.1.

Justice Management Division

SIGNIFICANT CHANGES DOCUMENT

Practical Challenges in Adopting PIV/PIV-I

Government Smart Card Interagency Advisory Board Moving to SHA-2: Overview and Treasury Activities October 27, 2010

HSPD-12 Implementation Architecture Working Group Concept Overview. Version 1.0 March 17, 2006

A Smart Card Alliance Physical Access Council and Identity Council White Paper. Publication Date: January 2011 Publication Number: PAC-11001

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

ICAM Privileged User Instruction and Implementation Guidance. Version 1.0

IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Office of the CIO Province of BC People Collaboration Innovation

2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.

Entrust Secure Web Portal Solution. Livio Merlo Security Consultant September 25th, 2003

DOE Joint ICAM Program - Unclass & Secret Fabrics

Using FIPS 201 and the PIV Card for the Corporate Enterprise

Federal Identity, Credential, and Access Management Security Assertion Markup Language (SAML) 2.0 Web Browser Single Sign-on (SSO) Profile

Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1

GAO ELECTRONIC GOVERNMENT ACT. Agencies Have Implemented Most Provisions, but Key Areas of Attention Remain

1. The human guard at the access control entry point determines whether the PIV Card appears to be genuine and has not been altered in any way.

SUBJECT: systems. in DoD. capabilities. d. Aligns identity. (Reference (c)). (1) OSD, the Staff and

Public Key Infrastructure (PKI) Technical Troubleshooting Guide

Innovations in Digital Signature. Rethinking Digital Signatures

GOVERNMENT USE OF MOBILE TECHNOLOGY

Electronic Commerce Conference. PKI Sub-Group. Issue Paper

Federal Identity, Credentialing, and Access Management Security Assertion Markup Language (SAML) 2.0 Web Browser Single Sign-on (SSO) Profile

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

Enable Your Applications for CAC and PIV Smart Cards

US Security Directive FIPS 201

Department of Defense External Interoperability Plan Version 1.0

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)

Chapter 1: Introduction

Entrust Managed Services Non-Federal Public Key Infrastructure X.509 Certificate Policy

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

NSTIC National Program Office Discussion Draft STANDARDS CATALOG

INFORMATION PROCEDURE

E-Authentication Federation Adopted Schemes

Transcription:

NIST Privilege Management Workshop September 1, 2009 Federal CIO Council Information Security and Identity Management Committee Identity, Credential, and Access Management in and with The Federal Government Paul D. Grant Special Assistant, Federated IDM and External Partnering Office of the CIO DoD Paul.Grant@OSD.Mil Judith Spencer Agency Expert - IDM Office of Governmentwide Policy GSA Judith.Spencer@GSA.Gov http://www.idmanagement.gov

ICAM Scope Person and Non-Person Entities Logical Access and Physical Access All Four Segments Government to Citizen (G-C) Government to Business (G-B) Government to Government (G-G) Internal Effectiveness and Efficiencies (IEE) All Four Levels of Identity Assurance OMB M-04-04 Authentication Assurance Levels 1, 2, 3, 4 Alignment of Federal ICAM and CNSS Identity and Access Management (National Security Systems) Interagency Security Committee (Physical Access Control) Awareness to External Mission Partners for interoperable solutions 2

Presidents Budget for FY 2010 Extract from Section 9. LEVERAGING THE POWER OF TECHNOLOGY TO TRANSFORM THE FEDERAL GOVERNMENT To support this effort, the Federal Identity, Credential, and Access Management (ICAM) segment architecture provides Federal agencies with a consistent approach for managing the vetting and credentialing of individuals requiring access to Federal information systems and facilities The ICAM segment architecture will serve as an important tool for providing awareness to external mission partners and drive the development and implementation of interoperable solutions. 3

Enabling Policy and Guidance The E-Gov Act 0f 2002 The Government Paperwork Elimination Act 0f 1998 The Implementing Guidance: OMB M-04-04 December 16, 2003 The Technical Spec: SP 800-63 June 2004 The Implementing Guidance: OMB M-05-24 August 5, 2005 The Mandate: HSPD-12 August 27, 2004 The Implementing Guidance: OMB M-00-10 April 25, 2000 The Standard: FIPS-201 February 25, 2005 Special Publications Technical Specs. Federal Bridge Model Policy Federal PKI Common Policy Framework The Implementing Guidance: OMB M-05-05 December 20, 2004 4

Committee Structure CIO Council Architecture & Infrastructure Information Best Practices Security & Identity IT Workforce Privacy Management Security Program Management Identity, Credential, & Access Management Network & Infrastructure Security Security Acquisitions Roadmap Development Team Federal PKI Policy Authority Architecture Working Group Citizen Outreach Focus Group Federation Interoperability Working Group Logical Access Working Group 5

ICAM Mission Fostering effective government-wide identity and access management Enabling trust in online transactions through common identity and access management policies and approaches Aligning federal agencies around common identity and access management practices Reducing the identity and access management burden for individual agencies by fostering common interoperable approaches Ensuring alignment across all identity and access management activities that cross individual agency boundaries Collaborating with external identity management activities through inter-federation to enhance interoperability Co-Chairs: Paul D. Grant, DOD & Judith Spencer, GSA 6

4 Sectors for Government Interaction Government to Citizen Government to Business E-Authentication Guidance (M-04-04) Government to Government Internal Effectiveness and Efficiency 7

Identity Assurance Levels (IAL) M-04-04:E-Authentication Guidance for Federal Agencies OMB Guidance establishes 4 authentication assurance levels Level 1 Level 2 Level 3 Level 4 Little or no confidence in asserted identity Some confidence in asserted identity High confidence in asserted identity Very high confidence in asserted identity Self-assertion minimum standards On-line instant qualification, out-ofband follow-up On-line out-of-band verification for qualification Cryptographic Solution In person proofing Record a biometric Cryptographic solution Hardware Token 8

Increasing the Trusted Credential Community Back to Basics M-04-04 and NIST 800-63 are still the foundational policy/technical guidance for identity management in the Federal government. Establish a unified architecture for Identity Management Expand our use of Assertion-based solutions (Levels 1 & 2) Stronger industry alignment for trust and technology standards Federal Bridge interoperability will continue to play a role at Levels 3 & 4 Outreach to communities of interest Explore natural affinities 9

ICAM Roadmap and Implementation Guidance Segment Architecture, including tools, methodologies and transition plans, that address current ICAM needs and outlines a target future state ICAM priorities in sufficient detail to facilitate budgetary planning Guidance and best practices for agencies deploying ICAM solutions 10

Phase 1 The Federal ICAM Segment Architecture The Federal ICAM Segment Architecture was developed as Phase 1 of the FICAM Roadmap and Implementation Guidance Complied with Federal Segment Architecture Methodology (FSAM) Draft Completed Review Period on 15 July, 2009 Adjudication of Comments Underway Phase I ends with Public Release of the FICAM Roadmap Federal ICAM Segment Architecture Purpose: The purpose of the Federal Identity, Credential, and Access Management (ICAM) segment architecture is to provide federal agencies with a standardsbased approach for implementing government wide ICAM initiatives. The use of enterprise architecture techniques helped ensure alignment, clarity, and interoperability across agency ICAM initiatives and enable agencies to eliminate redundancies by identifying shared ICAM services across the Federal Government. 11

Goals Utilize new Federal Identity Credential (PIV Card) for Internal government identity management and access control Logical access to systems Physical Access to facilities Define PIV-Interoperability for external communities Leverage Open solutions for Government interaction with the American people Make it easier for American Public to access government information Avoid issuance of application-specific credentials Leverage Web 2.0 technologies 12

Governmentwide Transition Initiatives Augment policy and implementation guidance to agencies Develop digital identity data specification Develop implementation guidance for use of PIV card features Establish federated identity framework for the Federal Government Develop attribute exchange processes for sharing identity data Develop trust models for inter-organizational interoperability Enhance performance measurement and accountability within the ICAM initiatives Establish maturity models for ICAM transition activities Provide government-wide services for common ICAM requirements Establish criteria for inter-federation 13

Working Groups Federal PKI Policy Authority administers the policies of Federal PKI Roadmap Development Team Review team for the development and content of the ICAM Roadmap and Implementation Guidance (including Segment Architecture) Architecture Working Group develop the new ICAM technical architecture Citizen Outreach Focus Group to make recommendation concerning solution sets for government-to-citizen interaction (including G-G and G-B) Federation Interoperability Working Group determine business drivers and terms of engagement for inter-organizational trust. Logical Access Working Group - developing guidance/best practices to assist agencies in implementing log on/ authentication capabilities using PIV cards. 14

Federal Agency Initiatives Streamline collection and sharing of digital identity data Implement digital identity data standard once developed Use standardized attribute exchange processes Fully leverage PIV and PIV-interoperable credentials Reduce or eliminate issuance or maintenance of separate identity management processes (e.g. userid/password) within Federal community Adopt federated trust models exercising FedPKI capabilities Modernize PACS infrastructure Implement SP 800-116 for building access Modernize LACS infrastructure Enable systems for smart card log on Implement federated identity capability Participate in inter-federated environment 15

Phase 2 Implementation Guidance Phase 2 includes the development of ICAM best practices and implementation guidance. This work is the extension of the Phase 1, and will include sections on: Identity Proofing and Background Investigations Physical Access Logical Access Role of PKI Use of Digital Signatures Federation and Information Sharing Other Credential Types and Interoperability Acquisition Guidance Estimated Completion: December 2009 Product: Federal Identity, Credential and Access Management (FICAM) Roadmap and Implementation Guidance document 16

Services Framework Categorization Scheme Service Type Provides a layer of categorization that defines the context of a specific set of service components Service Component A self contained business process or service with predetermined and well-defined functionality that may be exposed through a well-defined and documented business or technology interface Service Type Service Component Service Component Service Component Service Component 17

Services Framework Digital Identity Credentialing Authentication Identity Proofing Sponsorship Credential Validation Cryptography Vetting Enrollment/Registration* Biometric Validation Encryption/Decryption Adjudication Issuance Session Management Digital Signature* Digital Identity Lifecycle Management Credential Lifecycle Management Federation Key Management Linking/Association* Self-Service* Authoritative Attribute Exchange Auditing and Reporting Privilege Management Account Management* Authorization and Access Backend Attribute Retrieval Audit Trail* Reports Management Bind/Unbind Policy Administration Provisioning Policy Decision Privilege Administration Policy Enforcement Resource Attribute/ Metadata Management 18

The Journey Continues Published Personal Identity Verification Interoperable Cards for Non- Federal Issuers (PIV-I for NFI) in May 2009 Published Initial Guidance for Validating Credentials of Non-Federal Issuers Promote activities of Citizen Outreach Focus Group Produce Solution Recommendation for the CIO Council (6 month effort Draft in End of August) Continue Outreach Activities Kantara (Liberty Alliance Partnership) Higgins Project OpenID Foundation Transglobal Secure Collaboration Program (Aero/Defense) Secure Access for Everyone (Bio/Pharma) Educause (post-secondary education) AFEI Identity Protection and Privilege Management Forum 19

Federal PKI Trust Framework DHS SSA Treasury NASA Illinois Treasury DOJ Legacy Agencies in Peer-to-Peer relationship with FBCA USPS GPO Federal Common Policy CA DOD Shared Service Providers subordinated to Federal Root cross-certified USPTO Entrust Federal Bridge CA DOS GSA MSO Verisign ORC Verizon Business GPO Other Federal Agencies SAFE Other Bridges Certipath Verisign Verizon Business 20 Commercial CSPs

Federal Common Policy Root DHS SSA Treasury GPO Entrust Verisign GSA MSO ORC NASA Federal Common Policy CA Verizon Business Federal Root CA Per M-05-05 Agencies should acquire PKI credentials from PKI service Providers Per FIPS-201 PIV Authentication certificates must conform to the Federal Common Policy Common Policy Root is in the Microsoft Store, negotiations under way to include in other major browser stores. Working with Adobe to include in Adobe White List Other Federal Agencies 21

Federal Bridge CA Peer-to-Peer interoperability mechanism for PKI Acts as a trust facilitator Operates at multiple layers of assurance Chief mechanism for enabling trust between industry (external) PKI and Federal (internal) PKI implementations Undergoing upgrade and redesign to be completed this year Illinois Federal Bridge CA Treasury DOJ Legacy Agencies in Peer-to-Peer relationship with FBCA USPS DOD USPTO DOS GPO SAFE Other Bridges Certipath Verisign Verizon Business 22

Identity Federations (PKI Based) Shared Service Providers VeriSign, Inc. Verizon Business Operational Research Consultants, Inc. The Department of the Treasury Entrust Managed Services U.S. Government Printing Office Federal Common Policy Root Cross Certified: D of Defense D of Justice Gov Printing Office D of State D of Treasury USPS Patent & Trademark Ofc DHS State of Illinois DEA CSOS Credential Svc Providers: VeriSign Verizon Business DoD ECAs (ORC, IdenTrust, VeriSign) ACES (IdenTrust & ORC) Participants Cross Certified: Boeing Lockheed Martin Northrop Grumman Raytheon EADS/Airbus BAE Systems Credential Svc Providers: Exostar, SITA, ARINC, CitiBank Pending: MoDUK Rolls Royce Finmechannica May 2009 Certipath (Aero/Def) PKI Bridges Higher Education Federal Bridge Interoperable @ test level; HE Bridge dormant Cross Certified at Commercial Best Practices Level SAFE (Bio/Pharma) Fed Bridge Status: http://www.cio.gov/fpkia/crosscert.htm Participants: AstraZeneca Bristol-Myers-Squibb Genzyme GlaxoSmithKline Johnson & Johnson Merck Nektar Organon Pfizer Procter & Gamble Roche Sanofi-Aventis Red: eauth Level 4 Memo- July 22, 2008 PIV Fielding Status: http://www.idmanagement.gov/drilldown.cfm?action=agency_hspd12_impl_rpt 23

Personal Identity Verification (PIV) Cards for Non-Federal Issuers Basis for PIV Card Trust Well-defined standards A compliance regimen that ensures parties adhere to the well-defined standards Relying Party verification that allows relying parties to verify compliance when trusting and Secure components inherent to the PIV Card Situation PIV Cards, by definition, are issued only to/by the Federal Government Organizations external to the U.S. Federal government have expressed a desire to establish identity credentials that are interoperable with the Federal PIV card. They want a card that is: Technically compatible / interoperable with the PIV system Capable of Trust in the Federal environment 24

Published PIV Interoperability for Non-Federal Issuers (NFI) Guidance (May 2009) PIV Interoperable Card an identity card that meets the PIV technical specifications to work with PIV infrastructure elements such as card readers, and is issued in a manner that allows Federal government relying parties to trust the card at AAL-4. PIV Compatible Card an identity card that meets the PIV technical specifications so that PIV infrastructure elements such as card readers are capable of working with the card, but the card itself has not been issued in a manner that assures it is trustworthy by Federal government relying parties. Available at: http://www.idmanagement.gov 25

Initial Guidance for Validating Credentials of Non-Federal Issuers Leverage Industry credentials for Government use Make Government more transparent to the Public Make it easier for American Public to access government information Avoid issuance of application-specific credentials Leverage Web 2.0 technologies Demonstrate feasibility with application(s) assessed at Assurance Level 1 Support applications at higher assurance levels as appropriate 26

Approach Adopt technologies in use by industry (Scheme Adoption)... Adopt industry Trust Models (Trust Framework Adoption)...... While ensuring the principles of M-04-04 and SP 800-63 are observed and...... In a manner that promotes individual privacy protections 27

Scheme Adoption Federal ICAM Identity Scheme Adoption Process, July 8, 2009. Scheme specific type of authentication token and associated protocols (e.g. user ID & password; PKI; SAML assertion) Adoption requires reviewing technical processes of an identified scheme and developing a Profile for use with government. The Federal Profile defines MUSTs, SHOULDs, SHOULD nots, etc. for identity providers and relying parties Does not change the existing technical standard 28

Trust Framework Adoption Federal ICAM Trust Framework Provider Adoption Process for Levels of Assurance 1, 2, and Non-PKI 3, July 8, 2009 Trust Framework Provider organization engaged in the assessment of identity providers to determine assurance level(s) inherent the identity credentials offered and conformance to Federal Scheme Profile Establishes the ground-rules for industry self-certification Federal community will recognize assessor organizations through Trust Framework Adoption Considers requirements of NIST SP 800-63 Identity Providers approved via this process will be placed on a certified identity provider list 29

Summary & Conclusions Strong Identity and Access Management Are Foundational to Secure Information Sharing and Collaboration Shared Guidance is Improving: Much Room for More Improvement Clear, Concise, Consistent, Credible For Ourselves and Our Mission Partners Federal Identity, Credential, and Access Management (ICAM) is providing this consistent approach (with your help) Mission Partners are Fielding Strong Identity Credentials (PKI) as well as Creating Federations for Sharing & Collaboration Progress Depends on Public-Private Partnering Domestically and Internationally 30

31

Key Conceptual Threads for Secure Information Sharing and Collaboration Source: DoD Information Sharing Strategic Plan Extended Enterprise All Internal and External Participants Required for Mission Success Facilitates Collaborative and Coordinated Decision Making Shared Situational Awareness and Improved Knowledge Federation Autonomous Organizations Operating Under a Common Rule Set for a Common Purpose Legally Binding Framework Policies, Standards and Protections to Establish and Maintain Trust Information Mobility Dynamic Availability of Information. Enhanced or Impeded by Culture, Policy, Governance, Economics and Resources and Technology and Infrastructure Trust / Trustworthiness Cornerstone of Information Sharing is Trust in Partner Enterprises Trusting Policies, Procedures, Systems, Networks, and Data Threads permeate Assured Information Sharing activities 32

Expansion of DoD Approved External PKI Memo of July 22, 2008 The following PKIs are approved for use with DoD information systems upon successful completion of interoperability testing. FBCA member PKIs cross certified at Medium Hardware or High Assurance Levels (= AAL-4) PKI members of other PKI Bridges that are cross certified at FBCA Medium Hardware or High Assurance Levels PKIs that Assert the Federal PKI Common Policy Medium Hardware or High Assurance Levels Also, Approved Foreign, Allied, Coalition partner and other External PKIs (described in attachment to memo) 33

Dynamic Attribute-Based Access Management is Policy Compliant Sharing & Collaboration Crypto Key Mgt User/Device Policy Enforcement Point (PEP) Resource Authenticate Policy Decision Point (PDP) Policy Store Policy-Based Authorization Services Environmental Factors (e.g., DEFCON, INFOCON, Etc.) Identity Management Resource Management Identity Management Credential Management Attribute Management Digital Policy Management Configuration Management Metadata Management Audit Management Policy Management POLICY 34