SecurityManager. Enterprise Personnel & Physical Security Case Management Solution for Federal Agencies



Similar documents
GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.

HSPD-12 Implementation Architecture Working Group Concept Overview. Version 1.0 March 17, 2006

Integrated Security Management System (ISMS)

How To Get A Piv Credential

~ Final Credentialing Standards for Issuing Personal Identity Verification Cards under HSPD-12

DEPARTMENTAL REGULATION

NOAA HSPD-12 PIV-II Implementation October 23, Who is responsible for implementation of HSPD-12 PIV-II?

Status: Final. Form Date: 30-SEP-13. Question 1: OPDIV Question 1 Answer: OS

FEDERAL CLOUD COMPUTING SUMMIT

1. The human guard at the access control entry point determines whether the PIV Card appears to be genuine and has not been altered in any way.

E X E C U T I V E O F F I CE O F T H E P R E S I D EN T

DEPARTMENTAL DIRECTIVE

United States Public Health Service (USPHS) Social Work Career Map & Mentoring Guide

Audio: This overview module contains an introduction, five lessons, and a conclusion.

HSPD-12 Homeland Security Presidential Directive #12 Overview

U.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE. Privacy Impact Assessment

Justice Management Division

IDaaS: Managed Credentials for Local & State Emergency Responders

Department of Veterans Affairs VA Directive 0710 PERSONNEL SECURITY AND SUITABILITY PROGRAM

The Government-wide Implementation of Biometrics for HSPD-12

US Security Directive FIPS 201

The Social Security Administration s Internal Controls over Issuing and Monitoring Contractors Homeland Security Presidential Directive-12 Credentials

NSF AuthentX Identity Management System (IDMS) Privacy Impact Assessment. Version: 1.1 Date: 12/04/2006. National Science Foundation

Derived credentials. NIST SP ( 5.3.5) provides for long term derived credentials

Federal Identity Management Handbook

Background Check Service

Department of Defense INSTRUCTION

U.S. Department of Energy Washington, D.C.

Department of Homeland Security

DEPARTMENT OF DEFENSE GUIDEBOOK FOR CAC-ELIGIBLE CONTRACTORS FOR UNCLASSIFIED NETWORK ACCESS

Biometrics in Identity as a Service

Defense Security Service

NEIS HELP DESK FAQS. HSPD-12 Policy/Business Process. General HSPD-12 FAQs can be found online at:

OFFICE OF THE SECRETARY Office of the Secretary s Working Capital Fund Billing Control Issues Resulted in Incorrect Charges

STATEMENT OF WORK. For

GAO PERSONAL ID VERIFICATION. Agencies Should Set a Higher Priority on Using the Capabilities of Standardized Identification Cards

2. APPLICABILITY AND SCOPE

PRIME IDENTITY MANAGEMENT CORE

Department of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT

2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.

One Research Court, Suite 200 Rockville, MD Tel: Fax:

SIGNIFICANT CHANGES DOCUMENT

Life After PIV. Authentication In Federated Spaces. Presented to. Card Tech/Secure Tech. May By Lynne Prince Defense Manpower Data Center

U.S. Department of Housing and Urban Development

Identity Verification Program Guide

ATLANTA. May U.S. Public Health Service Scientific and Training Symposium. Sheraton, Atlanta, Georgia.

Announcing Approval of Federal Information Processing Standard (FIPS) Publication 201-2,

Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust

An Operational Architecture for Federated Identity Management

U.S. Nuclear Regulatory Commission

Evaluation of DHS' Information Security Program for Fiscal Year 2015

TOP MANAGEMENT CHALLENGES MOST FREQUENTLY IDENTIFIED December 2000

Department of Homeland Security Office of Inspector General

NASA DESK GUIDE FOR SUITABILITY AND SECURITY CLEARANCE PROCESSING. Version 2

Capabilities Briefing 2015

Small Business Administration Privacy Impact Assessment

Department of Homeland Security

Using FICAM as a model for TSCP Best Prac:ces in Physical Iden:ty and Access Management. TSCP Symposium November 2013

For Official Use Only (FOUO)

Enrolling with PIV and PIV-I Velocity Enrollment Manager

Privacy Impact Assessment of. Personal Identity Verification Program

CoSign by ARX for PIV Cards

STATEMENT OF CHARLES EDWARDS DEPUTY INSPECTOR GENERAL U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE

Personal Identity Verification (PIV) of Federal Employees and Contractors

AML.ms. Management System. Case Study by AML.ms, LLC. Anti-Money Laundering / Combating the Financing of Terrorism (AML/CFT)

Personal Identity Verification

ACI - NA PUBLIC SAFETY & SECURITY FALL CONFERENCE 2012 AVIATION BADGING EFFICIENCIES

STATEMENT OF JOHN E. MCCOY II DEPUTY ASSISTANT INSPECTOR GENERAL FOR AUDITS U.S. DEPARTMENT OF HOMELAND SECURITY BEFORE THE

What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form. December 3, 2012

Integration of Access Security with Cloud- Based Credentialing Services

Single Sign-On. Security and comfort can be friend. Arnd Langguth. September, 2006

National Security Adjudicator Training Program

OFFICE OF THE GENERAL COUNSEL HONORS ATTORNEY PROGRAM AND SUMMER LAW INTERN PROGRAM for 2011

The Security Clearance and Investigation Process

emipp Extending Medicaid Connectivity for Managing EHR Incentive Payments Overview

PRIVACY IMPACT ASSESSMENT

Identity, Credential, and Access Management. An information exchange For Information Security and Privacy Advisory Board

DHS Trusted Identity Exchange

1. First, how familiar are you with Master of Public Administration (MPA) and Master of Public Policy (MPP) degrees?

Financial Procedure Note FPN 13. Financial Conflict of Interest Policy

Security Language for IT Acquisition Efforts CIO-IT Security-09-48

Office of Inspector General

DHS DIRECTIVES INSTRUCTION HANDBOOK DHS INSTRUCTION HANDBOOK THE DEPARTMENT OF HOMELAND SECURITY PERSONNEL SUITABILITY AND SECURITY PROGRAM

Physical Access Control System

Enterprise IT. Aligning Strong Solutions, Assuring Enterprise Strength

OFFICE OF INSPECTOR GENERAL DEPARTMENT OF HOMELAND SECURITY

GSA FIPS 201 Evaluation Program

Identity - Privacy - Security

Taking Adverse Actions Based on Suitability or Security Issues

Canine Website System (CWS System) DHS/TSA/PIA-036 January 13, 2012

Agency Information Collection Activities: REAL ID: Minimum Standards for Driver s

Evaluation of DHS' Information Security Program for Fiscal Year 2015

AIRSPACE WAIVERS AND FLIGHT AUTHORIZATIONS FOR CERTAIN AVIATION OPERATIONS (INCLUDING DCA) (Amended)

ARC Outreach on HSPD 12 and Mandatory Use of ODIN

FEDERAL IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT AND PERSONAL IDENTITY VERIFICATION (PIV) SOLUTIONS

IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO TABLE OF CONTENTS

Understanding the differences in PIV, PIV-I, PIV-C August 23, 2010

This directive establishes the Department of Homeland Security (DHS) Security Education, Training, and Awareness (SETA) Program.

DS-2019 is controlled by the U.S. Department of State.

Appendix -- Homeland Security Mission Funding by Agency and Budget Account (budget authority in millions of dollars)

Transcription:

SecurityManager Enterprise Personnel & Physical Security Case Management Solution for Federal Agencies SecurityManager is THE CENTECH GROUP, Inc s (CENTECH s) Web-based enterprise case management solution providing workflow and process support functions that address the needs of Federal Department/Agency Personnel and Physical Security divisions. Capabilities SecurityManager s application suite provides the industry s most advanced configurable and customizable rule-based workflow processes to streamline and automate Personnel Security and Physical Security tasks related to: Pre-Appointment / Entry-on-Duty Suitability Security Clearance Adjudication Associating Contractors to Contracts DD 254 Automation Classified Visit Management Information Security Foreign National Visitor Management SMartPIV Identity Management System (IDMS) SMartPIV Card Management System (CMS) Benefits Supports Executive Order (EO) 13467 eligibility determination process reform goals All transactions audit logged Extensive automation through system interfaces and data import/export edelivery upload and context sensitive association with subject, case, investigation eadjudication for low risk non-issue cases Task workflow queue management for effective management of workforce/workload Supports timeliness goals of the Performance Accountability Council (PAC) Interfaces with Office of Personnel Management (OPM) Personnel Investigation Processing System (PIPS), OPM Central Verification System (CVS), National Finance Center (NFC) and others Complete integration between the adjudicative system and the IDMS/CMS IDMS/CMS - CENTECH s SMartPIV is one of only nine GSA FIPS-201 certified CMSs (APL#1215) SecurityManager supports Homeland Security Presidential Directive (HSPD)-12 mandates through our Federal Information Processing Standards (FIPS)-201 General Services Administration (GSA) approved SMartPIV IDMS and CMS. Our comprehensive workflow and business rules ensure successful navigation of FIPS-201 while maintaining the biometric chain of trust, investigative data and credential history. The integration between the SecurityManager personnel security processes (adjudication of trust) and physical security IDMS/CMS (identity proofing and card issuance/ maintenance) provide a robust integrated solution that eliminates duplicate data entry, streamlines adjudicative and card issuance decisions, ensures adherence to FIPS-201 standards, and provides for adjudication and card life cycle management and auditing. For more information, contact: THE CENTECH GROUP, Inc. 6402 Arlington Blvd., 10th Floor Falls Church, VA 22042 (P) 703.525.4444

Personnel and Physical Security / FIPS-201 / HSPD-12 Personnel Security (PerSec) Rule-based, workflow driven, case management system to manage the life cycle of federal employee and contractor pre-appointment, suitability and security clearance processing Automated interfaces, imports and exports with OPM, CVS, NFC, Scattered Castles, human resource (HR) systems, IDMS, CMS, and others edelivery with automatic parsing, upload and attachment to person, case and investigation eadjudication with automatic task completion and adjudication for issue-free cases Supports multi-tenancy, multiple positions, cases and investigations Attached documents and electronic email notifications for maintaining communications audit trail National Institute of Standards and Technology (NIST) 800-53 security control compliant for High and Moderate risk systems Contracts & DD 254 Supports the association, management and tracking of contracts to contractors; automatic generation of DD 254 forms, and links to the PerSec module to support contractor personnel management. Visitor Management Manages incoming and outgoing visitors enforcing clearance level requirements; records sponsor and sponsoring entity, point of contact, etc. Generates outgoing and revocation visitor letters Allows for incoming letter upload and attachment to the person Information Security Rules-based management of classified documents, containers, rooms, facilities and related audits. Integrates with PerSec enforcing custodial clearance requirements and asset reassignment before separation. Foreign National Visitor Manages visitor approval adjudication process including index checks with Federal Bureau of Investigation s ( FBI s) III and Central Intelligence Agency s (CIA s) Scattered Castles Enforces rules for country relationship of visitor, visit length, sponsor and others SMartPIV IDMS Biometric collection and management supporting FIPS-201 workflow for enrollment and registration SMartPIV Card Management System (CMS) FIPS-201 approved for HSPD-12 Personal Identity Verification (PIV) card personalization and FIPS-201 card life cycle workflow Personalizes and encodes PIV, PIV-I, and other smart cards formats according to client needs Interfaces with IDMS, Certificate Authorities (CAs) and public key infrastructure (PKI) certificate providers 2

Personnel Security (PerSec) Module The PerSec Module is the core of SecurityManager, providing the capability to manage all aspects of personnel security including enforcing business rules; workflow driven processes; generation of automated forms, letters and reports; electronic notifications; productivity metrics on processes and people; automated import/export and web services to/from other systems/agencies; and auditable records meeting NIST 800-53 and FIPS-201 compliance mandates. Specific processes include: Employee/Contractor Pre-Employment/Entry on Duty (EOD) º º Interfaces with CMS to authorize creation of a PIV credential case Employee/Contractor Suitability includes FIPS-201 compliant steps for fingerprint check, credit check, FBI name check º º Interfaces with CMS to provide adjudication results; approval or revocation º º Contractors can be associated with contracts/task orders to better manage separation, PIV collection accountability and Physical Access Control System (PACS) deprovisioning Employee/Contractor Security Clearance º º Special Access º º Suspension/Denial/Revocation º º Appeals º º Security Re-Briefing º º Periodic Re-Investigation Incoming/Outgoing Classified Visit Request Management Import/Exports OPM PIPS, OPM CVS, NFC, and other systems edelivery Automatic file parsing and attachment upload to the Person, Case, and/or Investigation record eadjudication Automatic Personnel and Security Research Center (PERSEREC) rule evaluation and adjudication for no issue cases Contract Module The Contract Module is included with the core SecurityManager. It enables the definition and management of contracts and contractors. It enables linkage and rule enforcement of contractor personnel processed in PerSec to the contracts and task orders of contracts for which suitability can be approved. It also allows for the creation and management of DD 254 documents for contracts, and can enforce the dependency of contractor suitability and security clearance processing in PerSec on current DD 254 authorization. Creation of solicitation, initiation, revision & final DD 254 Select and assign pre-defined standard text inserts from field specific lists Select and assign contractor address information from contractor record Auto fill Commercial and Government Entity (CAGE) Code and Cognizant Security Office (CSO) information for contractor & address selected Manage contract data, including related prime & subcontractors Manage task order data, including task order specific subcontractors Enforce DD 254 authorization in adding subcontractors to a contract or task order 3

Credentialing Module The Credentialing Module is an optional module that integrates with the PerSec Module and allows for the enrollment and/or enrollment data import from external enrollment systems consistent with PIV enrollment data standards of NIST 800-76-1. When integrated with the PerSec Module, it will provide the agency the ability to meet FIPS- 201 Appendix A identity proofing and registration requirements, enabling authorization messages and identity information passage to card management systems, and accepting messages confirming card issuance from the card management system. Processes - When interfaced with a card management system, SecurityManager will provide the process management capabilities for: PIV Credential Issuance Authorization including: Ability to import and view identity documents, photos & fingerprints Ability to export identity information to a PIV credential station Satisfies FIPS 201 PIV 1 process related requirements PIV Credential Revocation Authorization PIV Credential Re-issuance Authorization External Interfaces SecurityManager has an interface capability for receiving PIV identity information (including fingerprints and photo) from external enrollment systems as well as a corresponding interface for sending identity information to external systems. The standard external interfaces include Web services, Extensible Markup Language (XML) schemas and/or direct file uploads. Information Security (InfoSec) Module The InfoSec Module is an optional feature that integrates with the PerSec Module to enable management and audits of secure buildings, rooms, containers, documents and custodial responsibilities. It can enforce custodial security clearance requirements, require custodial transfer of all documents and storage/room/building responsibilities before separation and other business rules. Classified Document Management & Inspections Secure Container Management & Inspections Host Facility Management & Inspections Host Facility Locations (Rooms) Management & Inspections Foreign National Visitor (FNV) Module The FNV Module is an optional feature that integrates with the PerSec Module for sponsorship and processing of foreign national visitor requests. It enforces business rules for country relationship of visitor, length of visit, sponsor and other factors. Additional modules including Investigation & Intelligence Module, Emergency Management Module, Anti-Terrorism Module, etc. have been developed for custom contracts and are available upon request. 6

SMartPIV IDMS/CMS provides strong workflow support for credential verification and card operations with enforcement of FIPS-201 roles; provides fully integrated end-to-end establishment and management of employee and contractor trust level and PIV card access rights when used with the SecurityManager suite. Available to be configured as a stand-alone IDMS/CMS with integration with your existing adjudication system, SMartPIV provides: Enrollment Identity Proofing Biometrics Capture, Management & Transmission to OPM/Integrated Automated Fingerprint Identification System (IAFIS) Automated Approval Checks & Adjudication Approvals Card Personalization, Encoding, Issuance & Activation Card Maintenance & Life Cycle Management SMartPIV and SecurityManager with its cutting edge e-delivery technology, team up to create a comprehensive process that follows a subject through enrollment, credentialing, adjudication, card management, card maintenance and post-employment activities. With automated and manual data collection options at almost every step of the way, everything flows together and assembles into the complete view of a subject s trust relationship with your agency. Subject Information eqip Enrollment Package Identity Proofing Documents Investigation Requests Investigation Status Updates Investigation Documents Fingerprint Submission Fingerprint Response Employment Status Adjudicative Decisions Miscellaneous Attachments PIV Card Status (Logical and Physical) Automatic Live Transactions Import Export Manual Entry IN OUT 7

Federal Government Implementations of SecurityManager U. S. Department of Homeland Security (DHS) Headquarters U.S. Customs and Border Protection (CBP) Federal Emergency Management Agency (FEMA) Federal Law Enforcement Training Center (FLETC) U. S. Immigration and Customs Enforcement (USCIS) U. S. Citizenship and Immigration Services (USCIS) U. S. Secret Service (USSS) Transportation Security Administration (TSA) U.S. Coast Guard (USCG) U. S. Department of Commerce Headquarters Bureau of economic Analysis (BEA) Bureau of Industry and Security (BIS) U. S. Census Bureau (CENSUS) Economic Development Administration (EDA) Economics and Statistics Administration (ESA) International Trade Administration (ITA) Minority Business Development Agency (MBDA) National Oceanic and Atmospheric Administration (NOAA) National Telecommunications and Information Administration (NTIA) National Institute of Standards and Technology (NIST) National Technical Information Services (NTIS) U. S. Patent and Trademark Office (USPTO) U. S. Department of Education U. S. Department of Veterans Affairs U. S. Health and Human Services Headquarters Centers for Medicare & Medicaid Services (CMS) Administration for Children and Families (ACF) Administration for Community Living (ACL) Agency for Healthcare Research and Quality (AHRQ) Agency for Toxic Substances and Disease Registry (ATSDR) Centers for Disease Control and Prevention (CDC) Food and Drug Administration (FDA) Health Resources and Services Administration (HRSA) Indian Health Service (IHS) National Institutes of Health (NIH) Substance Abuse and Mental Health Services Administration (SAMHSA) Since 1988, THE CENTECH GROUP, Inc. (CENTECH) has become a leader in performance based contracting, program management, as a provider of systems and solutions for numerous federal government agencies and as a an excellent place to expand your career objectives. We have the experience, skills, systems and processes to deliver customer satisfaction on every project and an unrivaled history in delivering ON TIME, ON BUDGET, IN THE FIELD, EVERY TIME. CENTECH has technical solutions in the areas of: Program & Acquisition Management Support Services Systems Engineering/Technical Assistance (SETA) Web Solutions & Services Business Operations Support Computer Data Center Operations Engineering Services Help Desk Systems & Services Logistics Support Systems & Services Network & Infrastructure Services Security Systems & Services Software Development & Maintenance Test & Evaluation Services Training/Knowledge Transfer Systems & Services For more information, contact: THE CENTECH GROUP, Inc. 6402 Arlington Blvd., 10th Floor Falls Church, VA 22042 (P) 703.525.4444 121_0314