Emergency Response Official Credentials A Smart Card Alliance White Paper. Salvatore D Agostino CEO, IDmachines LLC sal@idmachines.



Similar documents
Using FIPS 201 and the PIV Card for the Corporate Enterprise

The Commercial Identity Verification (CIV) Credential Leveraging FIPS 201 and the PIV Specifications: Is the CIV Credential Right for You?

For Official Use Only (FOUO)

HSPD-12 Implementation Architecture Working Group Concept Overview. Version 1.0 March 17, 2006

GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.

Smart Cards and Biometrics in Physical Access Control Systems

IDaaS: Managed Credentials for Local & State Emergency Responders

Interagency Advisory Board Meeting Agenda, September 27, 2010

Commonwealth of Virginia Personal Identity Verification-Interoperable (PIV-I) First Responder Authentication Credential (FRAC) Program

Strong Authentication for PIV and PIV-I using PKI and Biometrics

GSA FIPS 201 Evaluation Program

NOAA HSPD-12 PIV-II Implementation October 23, Who is responsible for implementation of HSPD-12 PIV-II?

JEM Establishing identity during a disaster: The Emergency Management Assistance Compact and the First Responder Authentication Credential

STATEMENT OF WORK. For

Secure Personal Identification Systems:

Enrolling with PIV and PIV-I Velocity Enrollment Manager

Identity, Credential, and Access Management. An information exchange For Information Security and Privacy Advisory Board

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

Understanding the differences in PIV, PIV-I, PIV-C August 23, 2010

Information Technology Policy

Framework for Emergency Response Officials (ERO) Authentication and Authorization Infrastructure

Audio: This overview module contains an introduction, five lessons, and a conclusion.

What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form. December 3, 2012

Life After PIV. Authentication In Federated Spaces. Presented to. Card Tech/Secure Tech. May By Lynne Prince Defense Manpower Data Center

GAO PERSONAL ID VERIFICATION. Agencies Should Set a Higher Priority on Using the Capabilities of Standardized Identification Cards

An Operational Architecture for Federated Identity Management

Status: Final. Form Date: 30-SEP-13. Question 1: OPDIV Question 1 Answer: OS

Enabling Security, Compliance and Efficiency: Achieve Your Federal Identification Credentialing Goals

Issuance and use of PIV at FAA

Federal PKI (FPKI) Community Transition to SHA-256 Frequently Asked Questions (FAQ)

Practical Challenges in Adopting PIV/PIV-I

U.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE. Privacy Impact Assessment

NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics

The Convergence of IT Security and Physical Access Control

Justice Management Division

1. The human guard at the access control entry point determines whether the PIV Card appears to be genuine and has not been altered in any way.

INTRODUCTION AND HISTORY

Identity and Access Management Initiatives in the United States Government

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

Federal Identity, Credentialing, and Access Management. Personal Identity Verification Interoperable (PIV-I) Test Plan. Version 1.1.

IQS Identity and Access Management

The Government-wide Implementation of Biometrics for HSPD-12

Department of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT

STATE OF LOUISIANA STANDARD OPERATING PROCEDURE. Statewide Credentialing/Access Program. All Hazards Access

FEDERAL IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT AND PERSONAL IDENTITY VERIFICATION (PIV) SOLUTIONS

HSPD-12 Homeland Security Presidential Directive #12 Overview

National Incident Management System (NIMS) Communications and Information Management Standards

U.S. Department of Housing and Urban Development

E X E C U T I V E O F F I CE O F T H E P R E S I D EN T

Multi-Factor Authentication Protecting Applications and Critical Data against Unauthorized Access

A Smart Card Alliance Physical Access Council and Identity Council White Paper. Publication Date: January 2011 Publication Number: PAC-11001

Final Exam for: IS-700.a: National Incident Management System (NIMS) An Introduction

Moving to Multi-factor Authentication. Kevin Unthank

DEPARTMENTAL REGULATION

Interagency Advisory Board Meeting Agenda, March 5, 2009

Personal Identity Verification

The Convergence of IT Security and Physical Access Control

Smart Card Technology and the National Strategy for Trusted Identities in Cyberspace (NSTIC)

FOUR PILLARS FOR A SUCCESSFUL PIV ECOSYSTEM

Identity Management An Executive Perspective

Integrated Identity Management Whitepaper

53784 Federal Register / Vol. 72, No. 182 / Thursday, September 20, 2007 / Notices

RAPIDS Self Service User Guide

SOLUTIONS FOR HEALTHCARE PROFESSIONALS AND GOVERNMENTS

NATIONAL INCIDENT MANAGEMENT SYSTEM

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

DEPARTMENT OF DEFENSE GUIDEBOOK FOR CAC-ELIGIBLE CONTRACTORS FOR UNCLASSIFIED NETWORK ACCESS

U.S. Department of Agriculture HSPD 12 Program. USDA HSPD-12 Implementing PIV USDA

I N F O R M A T I O N S E C U R I T Y

Converged Smart Card for Identity Assurance Solutions. Crescendo Series Smart Cards

Strong Authentication for Healthcare

Strong Identity Authentication for First Responders

I N F O R M A T I O N S E C U R I T Y

Federal Identity Management Handbook

NSF AuthentX Identity Management System (IDMS) Privacy Impact Assessment. Version: 1.1 Date: 12/04/2006. National Science Foundation

US Security Directive FIPS 201

The Implementation of Homeland Security Presidential Directive 12

MAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013

Required changes to Table 6 2 in FIPS 201

Derived credentials. NIST SP ( 5.3.5) provides for long term derived credentials

A Uniform Identification Badge for Medical and Emergency Workers: Managing a Regional Personal Identification Verification Program

Single Sign-On. Security and comfort can be friend. Arnd Langguth. September, 2006

Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014

Government Smart Card Interagency Advisory Board Moving to SHA-2: Overview and Treasury Activities October 27, 2010

The Global Unique ID (GUID)

Department of Veteran Affairs. Fred Catoe Office of Cyber and Information Security AAIP Project Manager March 2004

2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.

Online Gaming: Legalization with Protection for Minors, Adult Players, Problem Gamers

A Guide to EMV. Version 1.0 May Copyright 2011 EMVCo, LLC. All rights reserved.

The following NIMS FAQ was prepared by NIMS on-line, which has additional information at

Announcing Approval of Federal Information Processing Standard (FIPS) Publication 201-2,

Page 1. Smart Card Applications. Lecture 7: Prof. Sead Muftic Matei Ciobanu Morogan. Lecture 7 : Lecture 7 : Smart Card Applications

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

Smart Cards and Biometrics

ITTF POLICY STATEMENT 2010 (6)

Chapter 15 User Authentication

Driving Safely on Information Highway. April 2006

Entrust IdentityGuard

Fundamentals of EMV. Guy Berg Senior Managing Consultant MasterCard Advisors

Architecture for Issuing DoD Mobile Derived Credentials. David A. Sowers. Master of Science In Computer Engineering

Transcription:

Emergency Response Official Credentials A Smart Card Alliance White Paper Salvatore D Agostino CEO, IDmachines LLC sal@idmachines.com

Smart Card Alliance Broad collection of professionals working with all kinds of smart card technology. Members from public and private sectors Made up of industry councils Identity Physical Access Contactless and Mobile Payments Transportation Healthcare Industry events and educational programs www.smartcardalliance.org

Identity and Physical Access Council Effort Consuelo Bangs, Sagem Morpho Ben Black, BearingPoint Kirk Brafford, Cogent Systems Kathleen Carroll, HID Global Nathan Cummings, HID Global Sal D'Agostino, IDmachines Tony Damalas, Diebold Walter Hamilton, IDTP Steve Howard, Thales e-security Lolie Kull, EDS LaChelle LeVan, Probaris Gilles Lisimaque, IDTP Ola Martins, Oberthur John McGeachie, CoreStreet Cathy Medich, Smart Card Alliance Bob Merkert, CardLogix Neville Pattinson, Gemalto Dwayne Pfeiffer, Northrop Grumman Roger Roehr, Tyco International Steve Rogers, IQ Devices John Santisteban, Fargo Electronics Dan Schleifer, CoreStreet Mike Sulak, Department of State Lars Suneborn, Hirsch Electronics Mike Zercher, HID Global Tony Cieri, consultant, Tom Lockwood, Deb Sottile, Craig Wilson, Department of Homeland Security

Standard Strong Identity Smart Card Alliance presents a strong recommendation to follow a FIPS 201 model Leverage commercially available products Leverage US Government investment Flexible adaptable platform Driven by high assurance, high availability and interoperability

Identity as a Utility Something you use every day Widely available Easy to use Safe Same as electricity, roads or plumbing FIPS 201 is a multi-billion dollar identity infrastructure investment Smart credentials enable a wide range of applications that leverage this infrastructure and related products

What is being put in place? Federal Infrastructure to Support Identity and Typing Process for Establishing Trust of Identity and Typing Funding for Programs Choosing to Issue FIPS- 201 Credentials (e.g. UASI funding in National Capitol Region) On-going demonstrations to expand community of interest and demonstrate applications Production ready, highly available and scalable Response to HR 1 (post 9-11 recommendations), Katrina

Two Questions?? Who are you? Authentication Trusted Multiple factors What are you allowed to do? Attributes Privileges/Authorization

What is a FIPS 201 credential? Integrated circuit chip (ICC): Four PKI digital certificates (PIV authentication, card authentication, digital signature and encryption) Two interoperable fingerprint templates Signed digital photo Contactless interface Physical Access, Payments, Optional Biometrics Basis for strong assurance and interoperability Other aspects: Cardholder Unique Identifier (CHUID) including organization affiliation, agency affiliation, department affiliation, and expiration date. Optional Bar Codes to store key personal or other information (available in future releases), including: Magnetic Stripe

What is a FIPS 201 credential? Compliant Federal employees and their contractors Interoperable Certificates are cross-certified to the Federal Bridge Certificate Authority Assurance level agreed by policy a priori Follows the standard for activation and lifecycle management of the credential Compatible Follows the technical standards FIPS 201 in the production of the credential

Credentialing Process Sponsorship Enrollment Adjudication Credential Production Issuance and Activation Use

Credentialing Process

Benefits of the Approach Credential capable of strong authentication Essential first step to high assurance enterprise security Commercially available smart tokens use the FIPS 201 standard Enterprise logical and physical access can use same identity infrastructure Same infrastructure can be applied to devices

Benefits of FIPS 201 Interoperability Defined Process for Credential Security Level Strong Authentication Information Privacy Multi-Application Support Standards Wide range of suppliers

Use Cases Physical Access Use it every day! Allowing access to facilities within the ERO's home jurisdiction, providing return on investment if the ERO credential is used as the primary identification credential or building pass Authenticating identity for access to secure facilities owned and operated by multiple entities Establishing inventory control

Use Cases Identity and Attribute Management Fast identification of individuals and their capabilities, using an efficient, objective, and standardized electronic process Incident scene access permissions that are based on electronic identity authentication and defined trusted attributes Management and tracking of human resources, especially those with critical attributes, at an incident scene Provision of records for personnel who respond to an incident for post-event reconstruction and liability issue assessment

Use Cases Emergency Response High Assurance and Trusted Identity Incident Scene Access Situational Awareness and Incident Scene Management and Tracking Just-in-Time Credentials

Use Cases Continuity of Operations & Continuity of Government Different from Mutual Aid Security Operations Centers Network Operations Centers Evacuation, Airlift, etc. Critical Infrastructure Enduring Constitutional Government (ECG) HSPD 20/NSDP 51 Relying parties at disaster response and recovery scenes to make authorization decisions Those doing post-event reconstruction (Stafford Act reimbursement) Forensic evidence of those entering hazardous areas Use to improve training for disaster response and recovery in the future.

Emergency Response Official (ERO) Credentials Leverage FIPS 201 Interoperable across jurisdictions Multi-use Part of a growing population outside of Federal Employees and Contractors How to issue a credential What it s used for Some examples

Logical Access Control FIPS 201 supports a wide range of applications Identity Certificate (~PIV Auth) Network Log-on Secure Web-Sites Situational Awareness, Command and Control Card Authentication Digital Signature Encryption

DHS and FEMA Growing communities of interest Growing number of use cases Infrastructure for answering the questions based on a FIPS 201 interoperable credential FPKI Policy Trust anchor of FBCA The challenge /response routine enabled by public/ private key technology application The linkage of the PIV credential PAK with attributes assigned that select individual Routine update

State and Local VA Part of initial National Capitol Region deployment Next phase, broader state deployment CO, et al One of several states looking to achieve appropriate security assurance by verifying the claimed identity of individuals seeking access to all-hazard incidents Secondarily, to communicate the qualifications, skills and training of first responder personnel to the Receiving Authority Incident Command. Base the program upon recognized standards, opensystem architectures, and non-proprietary technologies.