Understanding the differences in PIV, PIV-I, PIV-C August 23, 2010



Similar documents
Federal PKI (FPKI) Community Transition to SHA-256 Frequently Asked Questions (FAQ)

GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.

What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form. December 3, 2012

Federal Identity, Credentialing, and Access Management. Personal Identity Verification Interoperable (PIV-I) Test Plan. Version 1.1.

An Operational Architecture for Federated Identity Management

Interagency Advisory Board Meeting Agenda, September 27, 2010

Federal PKI. Trust Infrastructure. Overview V1.0. September 21, 2015 FINAL

For Official Use Only (FOUO)

Identity, Credential, and Access Management. Open Solutions for Open Government

NOAA HSPD-12 PIV-II Implementation October 23, Who is responsible for implementation of HSPD-12 PIV-II?

NIST Test Personal Identity Verification (PIV) Cards

Operational Research Consultants, Inc. Non Federal Issuer. Certificate Policy. Version 1.0.1

X.509 Certificate Policy For The Federal Bridge Certification Authority (FBCA) Version 2.24

2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.

Announcing Approval of Federal Information Processing Standard (FIPS) Publication 201-2,

Entrust Managed Services Non-Federal Public Key Infrastructure X.509 Certificate Policy

Driving Safely on Information Highway. April 2006

Department of Defense External Interoperability Plan Version 1.0

The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions

Identity, Credential, and Access Management

Practical Challenges in Adopting PIV/PIV-I

TELSTRA RSS CA Subscriber Agreement (SA)

The Convergence of IT Security and Physical Access Control

Interagency Advisory Board Meeting Agenda, July 28, 2010

Identity, Credential, and Access Management. An information exchange For Information Security and Privacy Advisory Board

DigiCert. Certificate Policy. DigiCert, Inc. Version 4.03 May 3, 2011

SYMANTEC NON-FEDERAL SHARED SERVICE PROVIDER PKI SERVICE DESCRIPTION

NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics

HSPD-12 Implementation Architecture Working Group Concept Overview. Version 1.0 March 17, 2006

DEPARTMENTAL REGULATION

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, DC

The Convergence of IT Security and Physical Access Control

Office of the Chief Information Officer Department of Energy Identity, Credential, and Access Management (ICAM)

Identity & Privacy Protection

1. The human guard at the access control entry point determines whether the PIV Card appears to be genuine and has not been altered in any way.

NSF AuthentX Identity Management System (IDMS) Privacy Impact Assessment. Version: 1.1 Date: 12/04/2006. National Science Foundation

Conclusion and Future Directions

What s it all about? SAFE-BioPharma Association

INFORMATION SHARING ENVIRONMENT GUIDANCE (ISE-G) IDENTITY AND ACCESS MANAGEMENT FRAMEWORK FOR THE ISE VERSION 1.0

The Government-wide Implementation of Biometrics for HSPD-12

STATEMENT OF WORK. For

Department of Defense PKI Use Case/Experiences

Committee on National Security Systems

GAO PERSONAL ID VERIFICATION. Agencies Should Set a Higher Priority on Using the Capabilities of Standardized Identification Cards

Interagency Advisory Board Meeting Agenda, March 5, 2009

Class 3 Registration Authority Charter

Entrust Managed Services PKI

Commonwealth of Virginia Personal Identity Verification-Interoperable (PIV-I) First Responder Authentication Credential (FRAC) Program

Test Plan for Department of Defense (DoD) Public Key Infrastructure (PKI) Interagency/Partner Interoperability. Version 1.0.3

GSA FIPS 201 Evaluation Program

No additional requirements to use the PIV I card for physical facility access have been identified.

Derived credentials. NIST SP ( 5.3.5) provides for long term derived credentials

ING Public Key Infrastructure Technical Certificate Policy

Justice Management Division

Adobe PDF for electronic records

FOUR PILLARS FOR A SUCCESSFUL PIV ECOSYSTEM

Integration of Access Security with Cloud- Based Credentialing Services

Financial Security Symposium Singapore

Government Smart Card Interagency Advisory Board Moving to SHA-2: Overview and Treasury Activities October 27, 2010

Frequently Asked Questions (FAQs) SIPRNet Hardware Token

Architecture for Issuing DoD Mobile Derived Credentials. David A. Sowers. Master of Science In Computer Engineering

Certification Practice Statement

FICC Shared Service Provider (SSP) Industry Day, 3/11. Questions and Answers

5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES

Federal Identity, Credential, and Access Management Trust Framework Solutions. Relying Party Guidance For Accepting Externally-Issued Credentials

Transnet Registration Authority Charter

Department of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT

I N F O R M A T I O N S E C U R I T Y

RAPIDPIV-I Credential Service Certification Practice Statement Redacted

CMS Operational Policy for VPN Access to 3-Zone Admin and Development /Validation Segments

Certificate Policy for the United States Patent and Trademark Office November 26, 2013 Version 2.5

Interagency Advisory Board Meeting Agenda, August 25, 2009

Securing Administrator Access to Internal Windows Servers

Federal Public Key Infrastructure (FPKI) Compliance Audit Requirements

Enrolling with PIV and PIV-I Velocity Enrollment Manager

Symantec Trust Network (STN) Certificate Policy

Eskom Registration Authority Charter

Velocity 3.1 KB640 Release Notes

Public Key Infrastructure Defence Public Key Infrastructure Levels of Assurance Requirements Certificate Policy Object Identifiers (OIDs)

Exchanging Medical Records Online with Direct

HEALTH INFORMATION TECHNOLOGY EXCHANGE OF CONNECTICUT

Interagency Advisory Board Meeting Agenda, May 27, 2010

U.S. Department of Housing and Urban Development

Cross-Certification and PKI Policy Networking

US Security Directive FIPS 201

I N F O R M A T I O N S E C U R I T Y

CoSign by ARX for PIV Cards

Status: Final. Form Date: 30-SEP-13. Question 1: OPDIV Question 1 Answer: OS

GFIPM Supporting all Levels of Government Toward the Holy Grail of Single Sign-on

Moving to Multi-factor Authentication. Kevin Unthank

Interagency Advisory Board Meeting Agenda, Wednesday, February 22, 2012

Life After PIV. Authentication In Federated Spaces. Presented to. Card Tech/Secure Tech. May By Lynne Prince Defense Manpower Data Center

RSA Digital Certificate Solution

Issuance and use of PIV at FAA

Federal Identity Management Handbook

Public Key Infrastructure (PKI) Technical Troubleshooting Guide

The Commercial Identity Verification (CIV) Credential Leveraging FIPS 201 and the PIV Specifications: Is the CIV Credential Right for You?

Small Business Administration Privacy Impact Assessment

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)

Mobile Device as a Platform for Assured Identity for the Federal Workforce

Transcription:

Federal CIO Council Information Security and Identity Management Committee Identity, Credential, and Access Management Understanding the differences in PIV, PIV-I, PIV-C August 23, 2010 Tim Baldridge AWG Co-Chair Office of the CIO NASA tim.baldridge@nasa.gov

Non-Federal Issuer (NFI) Trust Governance The Federal Bridge Certification Authority (FBCA) Certifies NFIs For Use By Federal Relying Parties The FBCA Certificate Policy (CP) Contains The Detailed Requirements That Those NFIs Must Meet There Is No Intent Or Expectation For Trust By Federal Departments And Agencies Of Cards Or Tokens Where Certificates Are Issued Outside The Federal PKI Policy Authority 2

Normative PIV-I and PIV-C Reference Documents http://www.idmanagement.gov/fpkipa/documents/fbca_cp_rfc3647.pdf http://www.idmanagement.gov/fpkipa/documents/pivi_certificate_crl_profile.pdf http://www.idmanagement.gov/documents/piv_io_nonfed_issuers.pdf http://www.idmanagement.gov/documents/piv-i_faq.pdf http://csrc.nist.gov/publications/drafts/800-63-rev1/sp800-63-rev1_dec2008.pdf 3

PIV Cards Identity, Credential, and Access Management Personal Identification Verification Cards Cornerstone Credential For All Security Controls For Both Information Resources And Facilities Protection In HSPD-12 Federal Departments And Agencies Are Required To Issue PIV Cards to Permanent Government Personal And Contractors Issued ONLY By Federal Entities May Be Relied On By Federal And Non-Federal Entities Background Investigation Minimum NACI Assert Federal Common Policy Framework (FCPF) Certificate Policy OIDs for PIV 4

PIV-I PIV Interoperable Cards Personal Identification Verification Interoperable (by Non-Federal Issuers NFI) Cards Cornerstone Credential For All Security Controls For Both Information Resources And Facilities Protection Intended Primarily For Issuance By Non-Federal Entities May Be Relied On By Federal And Non-federal Entities Identity and Affiliation Certainty Equivalent to PIV No Issuer Background Investigation of Cardholders Asserts Federal Bridge Certificate Authority (FBCA) Certificate Policy OIDs for PIV-I 5

PIV-C PIV Compatible Cards A PIV-C (Personal Identity Verification Compatible) Card meets the PIV technical specifications so that PIV infrastructure elements such as card readers are capable of working with the card, but the card itself has not been issued in a manner that assures it is trustworthy by Federal government Relying Parties (RPs). Sole Allowance To Trust Existing Legacy Issuance By Non-Federal Entities Who Otherwise Meet FBCA CP Requirements Except PIV-I May Be Relied On By Federal And Non-federal Entities Up To The Extent Permitted By FBCA CP For Hardware Tokens No Issuer Background Investigation Of Cardholders By Definition PIV-C Must Not Assert or Map to FCPF PIV or FBCA PIV-I Certificate Policy OIDs 6

PIV Interoperable for Non-Federal Issuers Is not a replacement for PIV Requires the same enrollment process as PIV Does not assert any level of individual trustworthiness No Background Investigation Only I-9 Document Verification In a three factor (have, know, are) authentication PIV-I is a very high confidence identity assertion (Level 4) No need to revoke cards when individuals leave an Agency, thus relieving the relying Agencies of temporary credential costs and the need to recover credentials at contract completion or other separating events 7

PIV-I Hardware Subject DN PIV-I Hardware certificates shall indicate whether or not the Subscriber has an Organizational Affiliation by taking one of the following forms: For certificates with an Organizational Affiliation: cn=subscriber's full name, ou=affiliated Organization Name,{Base DN} For certificates with no Organizational Affiliation: cn=subscriber's full name, ou=unaffiliated, ou=entity CA s Name,{Base DN} 8

PIV-I Card Authentication Subject DN PIV-I Card Authentication certificates shall indicate whether or not the Subscriber has an Organizational Affiliation by taking one of the following forms: For certificates with an Organizational Affiliation: serialnumber=uuid, ou=affiliated Organization Name,{Base DN} For certificates with no Organizational Affiliation: serialnumber=uuid, ou=unaffiliated, ou=entity CA s Name,{Base DN} 9

One Note NIST 800 76-2 Biometric Data Specification for Personal Identity Verification Revision is in work at NIST Public Draft expected. Normative Specification for inclusion of UUID in CBEFF header 10

The Realized Value of Federal PKI Infrastructure https://www.idmanagement.gov/documents/realizedvaluefederalpki.pdf Hitchhiker s Guide to PKI Evaluate forward Trust Path Certificate Policies Policy Mapping Check for Revocation of each Certificate in Chain Evaluate Root Certificate Assurance Level (Certificate Issuance Policy) Purpose ( Certificate Application Policy EKU) Cache Results 11

http://csrc.nist.gov/groups/st/crypto_apps_infra/csor/pki_registration.html 2.16.840.1.101.3.2.1.3.1 id-fpki-certpcy-rudimentaryassurance 2.16.840.1.101.3.2.1.3.2 id-fpki-certpcy-basicassurance 2.16.840.1.101.3.2.1.3.3 id-fpki-certpcy-mediumassurance 2.16.840.1.101.3.2.1.3.4 id-fpki-certpcy-highassurance 2.16.840.1.101.3.2.1.3.5 id-fpki-certpcy-testassurance 2.16.840.1.101.3.2.1.3.12 id-fpki-certpcy-mediumhardware 2.16.840.1.101.3.2.1.3.14 id-fpki-certpcy-medium-cbp 2.16.840.1.101.3.2.1.3.15 id-fpki-certpcy-mediumhw-cbp 2.16.840.1.101.3.2.1.3.18 id-fpki-certpcy-pivi-hardware 2.16.840.1.101.3.2.1.3.19 id-fpki-certpcy-pivi-cardauth 2.16.840.1.101.3.2.1.3.20 id-fpki-certpcy-pivi-contentsigning 2.16.840.1.101.3.2.1.3.6 id-fpki-common-policy 2.16.840.1.101.3.2.1.3.7 id-fpki-common-hardware 2.16.840.1.101.3.2.1.3.8 id-fpki-common-devices 2.16.840.1.101.3.2.1.3.13 id-fpki-common-authentication 2.16.840.1.101.3.2.1.3.16 id-fpki-common-high 2.16.840.1.101.3.2.1.3.17 id-fpki-common-cardauth 12

Example Forward Trust Path Policy Identifier- Leaf 2.16.840.1.101.2.1.11.9 id-us-dod-mediumhardware Policy Mapping Issuer Domain 2.16.840.1.101.3.2.1.3.12 id-fpki-certpcy-mediumhardware Subject Domain 2.16.840.1.101.2.1.11.9 id-us-dod-mediumhardware Policy Identifier Root 2.16.840.1.101.3.2.1.3.7 id-fpki-common-hardware 13

Federal Departments and Agencies as RPs are solely responsible for discriminating between PIV, PIV-I and Medium Hardware PKI certificates issued under FCPF and FBCA in determining access to information resources and facilities. PIV, PIV-I and Medium Hardware PKI certificates issued under FCPF and FBCA are intended to provide the highest practical remote network authentication assurance (Level 4 NIST SP 800-63-1 draft) 14

Mapping Certificate Policy to Access Control http://technet.microsoft.com/en-us/library/dd378897(ws.10).aspx Authentication Mechanism Assurance Feature of Windows Server 2008 R2 Directory Services When a certificate-based logon method (for example, smart-card logon) is used, and authentication mechanism assurance is enabled, an additional group membership is added to the user s access token during logon HSPD-12 Logical Access Authentication and Active Directory Domains.doc http://www.microsoft.com/downloads/details.aspx?displaylang=en&familyid=b86 d8fe2-a76a-4692-9983-5ee65f0f4e88 15

Take Home PIV and PIV-I Assurance More Than Some Confidence IF You Validate Digitally Signed Objects Validate Certificates to a Qualified Trust Anchor Validate All Certificates In Trust Path Are Not Revoked Satisfactory Dept. & Agency Initial or Reciprocal BI Check for PIV-I 16

Take Home (continued) Important PIV-I Internal Efficiency Gains Reliable, Effective And Convenient Enrollment And Card Issuance For Transient Personnel To Establish Identity Certainty For Both Federal And Non-federal Relying Parties The Rigor Followed For Single Card Issuance Permits Card Use For A Multitude Of Federal And Non-federal Applications And Facilities Access Departments And Agencies Use Of OPM For Background Investigations And Reporting Adjudication Results To The Opm Central Verification System (CVS) Offers A Central Repository For Reciprocity Reduces Bi Cost And Time As Individuals Move Among Departments And Agencies 17

QUESTIONS 18