Identity - Privacy - Security



Similar documents
GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.

NOAA HSPD-12 PIV-II Implementation October 23, Who is responsible for implementation of HSPD-12 PIV-II?

Audio: This overview module contains an introduction, five lessons, and a conclusion.

Announcing Approval of Federal Information Processing Standard (FIPS) Publication 201-2,

1. The human guard at the access control entry point determines whether the PIV Card appears to be genuine and has not been altered in any way.

Smart Cards and Biometrics in Physical Access Control Systems

GSA FIPS 201 Evaluation Program

2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.

Personal Identity Verification (PIV) of Federal Employees and Contractors

GAO PERSONAL ID VERIFICATION. Agencies Should Set a Higher Priority on Using the Capabilities of Standardized Identification Cards

Personal Identity Verification (PIV) of Federal Employees and Contractors DRAFT

Justice Management Division

Small Business Administration Privacy Impact Assessment

Personal Identity Verification (PIV) of Federal Employees and Contractors

NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics

The Adoption of EMV Technology in the U.S. By Dave Ewald Global Industry Sales Consultant Datacard Group

US Security Directive FIPS 201

The Canadian Migration to EMV. Prepared By:

I N F O R M A T I O N S E C U R I T Y

NSF AuthentX Identity Management System (IDMS) Privacy Impact Assessment. Version: 1.1 Date: 12/04/2006. National Science Foundation

Transaction Security. Advisory Services

IDENTIFICATION Morpho Driver s license Solution for governments and road traffic authorities

For Official Use Only (FOUO)

HSPD-12 Implementation Architecture Working Group Concept Overview. Version 1.0 March 17, 2006

The Government-wide Implementation of Biometrics for HSPD-12

NIST Test Personal Identity Verification (PIV) Cards

HSPD-12 Homeland Security Presidential Directive #12 Overview

Personal Identity Verification (PIV) of Federal Employees and Contractors

I N F O R M A T I O N S E C U R I T Y

Department of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT

What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form. December 3, 2012

Federal PKI (FPKI) Community Transition to SHA-256 Frequently Asked Questions (FAQ)

BALI MINISTERIAL CONFERENCE AD HOC EXPERTS' GROUP II REGIONAL WORKSHOP IDENTITY MANAGEMENT: CHALLENGES AND OPPORTUNITIES FOR COOPERATION

Status: Final. Form Date: 30-SEP-13. Question 1: OPDIV Question 1 Answer: OS

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

OFFICE OF THE INSPECTOR GENERAL SOCIAL SECURITY ADMINISTRATION

2012 FISMA Executive Summary Report

U.S. Department of Housing and Urban Development

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:

No additional requirements to use the PIV I card for physical facility access have been identified.

Identity, Credential, and Access Management. An information exchange For Information Security and Privacy Advisory Board

Personal Identity Verification

eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke

We believe First Data is well positioned to take advantage of all of these trends given the breadth of our solutions and our global operating

Practical Challenges in Adopting PIV/PIV-I

Cryptographic and Security Testing Laboratory. Deputy Laboratory Director, CST Laboratory Manager

Steps for staying PCI DSS compliant Visa Account Information Security Guide October 2009

CoSign by ARX for PIV Cards

DEPARTMENTAL REGULATION

Life After PIV. Authentication In Federated Spaces. Presented to. Card Tech/Secure Tech. May By Lynne Prince Defense Manpower Data Center

SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES

FIME SECURITY OFFER. PCI PTS POI security evaluation process

Electronic Prescribing of Controlled Substances: Establishing a Secure, Auditable Chain of Trust

Moving to Multi-factor Authentication. Kevin Unthank

PCI Data Security Standards. Presented by Pat Bergamo for the NJTC February 6, 2014

E X E C U T I V E O F F I CE O F T H E P R E S I D EN T

Federal Identity Management Handbook

PCI DSS Overview. By Kishor Vaswani CEO, ControlCase

U.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE. Privacy Impact Assessment

THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP

FEDERAL IDENTITY, CREDENTIAL, AND ACCESS MANAGEMENT AND PERSONAL IDENTITY VERIFICATION (PIV) SOLUTIONS

Transaction Security. Test & Certification and Security Evaluation

Worldpay s guide to the Payment Card Industry Data Security Standard (PCI DSS)

SOLUTIONS FOR HEALTHCARE PROFESSIONALS AND GOVERNMENTS

Visa Inc. PIN Entry Device Requirements

Privacy by Design The case of Automated Border Control. Authors: Pagona Tsormpatzoudi, Diana Dimitrova, Jessica Schroers and Els Kindt

OpenEdge Research & Development Group April 2015

JCB Terminal Requirements

A RE T HE U.S. CHIP RULES ENOUGH?

PIV Data Model Test Guidelines

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

SIGNIFICANT CHANGES DOCUMENT

Your Reference Guide to EMV Integration: Understanding the Liability Shift

Making Cloud-Based Mobile Payments a Reality with Digital Issuance, Tokenization, and HCE WHITE PAPER

Optical Memory Cards in Federal Government

The Convergence of IT Security and Physical Access Control

EMV Frequently Asked Questions for Merchants May, 2014

EMV : Frequently Asked Questions for Merchants

Agent Registration. Program Guide. (For use in Asia Pacific, Central Europe, Middle East, Africa)

Identity, Credential, and Access Management. Open Solutions for Open Government

Visa Recommended Practices for EMV Chip Implementation in the U.S.

EESTEL. Association of European Experts in E-Transactions Systems. Apple iphone 6, Apple Pay, What else? EESTEL White Paper.

INTRODUCTION AND HISTORY

Registry of Service Providers

Card Payment Solutions for Taxis

ARC Outreach on HSPD 12 and Mandatory Use of ODIN

FITSP-Auditor Candidate Exam Guide

Biometrics for Public Sector Applications

An Operational Architecture for Federated Identity Management

Page 1. Smart Card Applications. Lecture 7: Prof. Sead Muftic Matei Ciobanu Morogan. Lecture 7 : Lecture 7 : Smart Card Applications

Credit Card Processing Overview

PCI Security Compliance

Product Testing Programs

Information Technology Policy

Payments Transformation - EMV comes to the US

DHS / UKvisas Project

Transcription:

Identity - Privacy - Security Systems Security Engineering and Privacy Privacy and Security Workshop 3 Nov 2006 Toronto

Recent Digital FIPS Border 201 Motivation Identity Security for Security Privacy Convergence Overview ISSEA in Smart Guidance Financial / ISTPA Cards for Sector an Systems Project enabling Security technology Key ISTPA Framework References Framework Engineering related to the ISTPA SSE-CMM Network Common ISO/IEC Policy Driven TR Applications Criteria ISO 19791 Security IEC/DIS ISO Security Consortium Architecture 15408 21827 Assessment Enterprise of Security Operational Architecture Purpose Privacy of Impact Guidance Assessments Document Systems

Identity Management The Tipping Point for Security and Privacy in support of the North American Security and Prosperity Partnership Program? Identity Privacy Security

Personal Identity Verification Program National Institute of Standards and Technology

Presidential Policy Driver Homeland Security Presidential Directive 12 HSPD-12: Policy for a Common Identification Standard for Federal Employees and Contractors (8/27/04) http://www.whitehouse.gov/news/releases/2004/08/20040827-8.html

Federal Information Processing Standards (FIPS) Mandatory FISMA removed the waiver option In recent history, only two waivers had ever officially been requested and approved Technology advancements have contributed to the removal of waivers as more product developers are implementing the standards, increasing availability of compliant products especially in the area of encryption

HSPD #12 Key PIV Documents HSPD-12, Policy for a Common Identification Standard for Federal Employees and Contractors OMB M-05-24, Implementation of HSPD 12 - Policy for a Common Identification Standard for Federal Employees and Contractors FIPS 201, Personal Identity Verification for Federal Employees and Contractors SP 800-73, Interfaces for Personal Identity Verification SP 800-76, Biometric Data Specification for Personal Identity Verification SP 800-78, Cryptographic Algorithms and Key Sizes for Personal Identity Verification SP 800-79, Guidelines for the Certification and Accreditation of PIV Card Issuing Organizations SP 800-85, PIV Middleware and PIV Card Application Conformance Test Guidelines (Revision to permit transitional and end-point issuance system conformance certification) NISTIR 7284, Personal Identity Verification Card Management Report

Federal Information Processing Standard 201 Personal Identity Verification for Federal Employees and Contractors Part I Common Identification and Security Requirements - HSPD 12 Control Objectives Examples: Identification shall be issued based on strong Government-wide criteria for verifying an individual employee s identity The identification shall be capable of being rapidly authenticated electronically Government-wide - Identity Proofing Requirements - Effective October 2005 Part II Common Interoperability Requirements - Specifications - Most provisions effective October 27, 2006 - Implementation Timeframes IAW Agency Implementation Plans and OMB Memorandum M-05-24 of August 5, 2005

FIPS 201: Personal Identity Verification (PIV) Issued February 25, 2005 Mandatory Prerequisites for Personal Identity Verification (PIV) Card Issuance Mandatory and Optional PIV Card Visual Data Mandatory and Optional PIV Card Electromagnetic Elements Mandatory and Optional PIV Electronically Stored Data Minimal Card Information Available for Free Read Large population affects every Federal government employee and eligible contractors (~ 10M+)

FIPS 201 REQUIREMENTS PIV Card Visual Data Mandatory Name Employee Affiliation Card Expiration Date Card Serial Number (Unique to Issuer) Issuer Identification Optional Card Holder s Written Signature Pay Grade Rank Agency Name and/or Department Agency Seal Issue Date Information for Returning Lost Card Color codes Federal Emergency Official Designation

HSPD #12 PIV Document Relationships Policy M-05-24 (Director OMB) Driver 8/05 Date HSPD 12 (Presidential) FIPS 201 (Secretary of Commerce) 8/04 2/05 FIPS 201-1 (Secretary of Commerce) (2/06) SP 800-73 (NIST) SP 800-76 (NIST) SP 800-78 (NIST) SP 800-79 (NIST) SP 800-87 (NIST) 4/05 (2/06) 4/05 7/05 10/05 SP 800-85 (NIST) 10/05 SP 800-85A (NIST) SP 800-85B (NIST) (2/06) (2/06) Revise 06 Dynamic Standards Implementation Guidelines Test Guidelines

North USCIS TSA Border Integrated America Visit Passenger Transformation (USA) (USA) Security Automated security Fingerprint screening process (USA) Global Identification Initiatives Global RealtimeIdentification National (IAFIS) Case (USA) Routing Management System (Can) System Facial Transportation TSA International CANPASS Registered Recognition Workers Traveler System Identity (USA) (Can) Nexus(Can/US) (Can) Registered Traveler Credential USA/Netherlands (TWIC) Secure Western (SENTRI) (US Pass Electronic Hemisphere (US (Mexico-USA) PASS) Network Travel (USA) for Passenger Initiative Traveler (USA) Accelerated Rapid Inspection Service

Europe SchengenInformation Visa EURODAC ebordersuk (EU) System II (VIS II II) (SIS EUII) EU Security Global Initiatives IRIS Semaphore Rail GardaNational Passenger Recognition UK Screening Immigration System (IRIS) UK Bureau UK Pegase France Privium Netherlands Simplified Ireland Passenger Travel Interest System Group (SPTIG) (GNIB) Frankfurt UK National Airport ID UK Germany EU France False and National Authentic ID France Documents (FADO EU)

Asia Advanced DIMIA Border Electronics Pacific Immigration Passenger Processing (APP) Australia Security Travel Authority Biometrics Integration Global System (ETAS) Initiatives Advanced Border Passenger Crossing Screening New (APS) APC Zealand HongKong New Zealand Australia Automated Japan Fully Visit Japan MyKad-Malaysia Automated e-airport Biometrics Japan Seamless Clearance Travel Pilot (FAST) Japan Singapore

PCI Payment program requirements to Card meet Industry Visa, MasterCard (PCI) PIN Entry and JCB Device (PED)- Financial Data Security Global markets Sector Standard (DSS) Initiatives MasterCard merchants cardholder and vendors who process, aimed transmit at members, Program (PTS) data Point -program Global of Sale markets (POS) aimed Terminal at devices Security with or TCP/IP store ISO protocols devices organization 15408 to and meet Common security Protection services Criteria Profiles (CC) Global defined evaluations markets association) and such BITS as APACS Financial (the Services UK payment Roundtable by of Interac targeted financial Device sector) at the Certification Canadian Test Mark Market program for ATM and POS devices (US

Smart Card Technology International Smart Card Industry Association 2.6 billion cards shipped in 2005 and shipments of nearly 3 billion are expected for 2006 Smart Cards in Government and Health grew by 25% Financial Services, retail and loyalty grew 20% Telecom sector grew 19%

Smart Cards an enabling technology for Digital Identity * Smart cards can provide authenticated and authorized information access, implementing a personal firewall for the individual and releasing only the information required when the card is presented. Smart card technology provides strong privacy-enabling features for ID system designers, including the ability to: Support anonymous and pseudonymous schemes Segregate multiple applications on the card Support multiple single-purpose IDs Provide authentication of other system components Provide on-card matching of cardholder verification information Implement strong security for both the ID card and personal data Smart cards provide solutions that can enhance privacy protection and guard against identity theft in different ID system architectures. *Smart Card Alliance

Operation of Interac - CA EWA-Canada Ltd. is pleased to announce that we have been selected by Interac Association to establish and operate an EMV-compliant Certificate Authority (CA) in Canada to support the Interac Shared Services in a new Chip environment. Additionally, we will assist Interac Association with the establishment of a Registration Authority (RA) to be operated by the Association for Issuers. Operating together, the CA and RA will contribute to the proper management of the Public Key Certificates required for the Interac Shared Cash Dispensing at ABMs and Interac Direct Payment at Points-of-Sale in a Chip environment. EWA-Canada was selected following a competitive process in part because of our extensive background in this field and our credentials as a Trusted Third Party service provider.

Operation of Interac - CA EWA-Canada Ltd. is pleased to announce that we have been selected by Interac Association to establish and operate an EMV-compliant Certificate Authority (CA) in Canada to support the Interac Shared Services in a new Chip environment. Additionally, we will assist Interac Association with the establishment of a Registration Authority (RA) to be operated by the Association for Issuers. Operating together, the CA and RA will contribute to the proper management of the Public Key Certificates required for the Interac Shared Cash Dispensing at ABMs and Interac Direct Payment at Points-of-Sale in a Chip environment. EWA-Canada was selected following a competitive process in part because of our extensive background in this field and our credentials as a Trusted Third Party service provider. EWA-Canada Proprietary

Operation of Interac - CA EWA-Canada Ltd. is pleased to announce that we have been selected by Interac Association to establish and operate an EMV-compliant Certificate Authority (CA) in Canada to support the Interac Shared Services in a new Chip environment. Additionally, we will assist Interac Association with the establishment of a Registration Authority (RA) to be operated by the Association for Issuers. Operating together, the CA and RA will contribute to the proper management of the Public Key Certificates required for the Interac Shared Cash Dispensing at ABMs and Interac Direct Payment at Points-of-Sale in a Chip environment. EWA-Canada was selected following a competitive process in part because of our extensive background in this field and our credentials as a Trusted Third Party service provider. EWA-Canada Proprietary

Guidance for Application of Systems Security Engineering to the ISTPA Privacy Framework Purpose: how the systems security engineering base The purpose of this document is to provide a security engineering perspective of the privacy services how practices develop, with defined by the SSE-CMM can be used to and capabilities defined by the ISTPA framework assessed the all relevant resulting deliver and policies; operate anda system to comply document to provide system assurance architecture can be and demonstrate: and privacy requirements have that been both met. security

Privacy & Security Convergence ISSEA? Who s Terminology? SSE-CMM Privacy Framework ISTPA Metrics Services & Capabilities Security Community Security Services Guidance for Application Systems Security Engineering to the ISTPA Privacy Framework PIA s Privacy Community ESA Policy Automation Model NAC Security Services Security Related System Level Accreditation Privacy Related Product Evaluations ISO Standards

Objectives Framework describing of and NAC senterprise Template for Policy-Driven Security Architecture: Security: A ESA within framework enterprise that security serves architecture as a common and technology reference for both - and Background Provide elements tailor them a of template between to enterprise their that needs. organizations. security allows user architecture organizations they require to select and the to

Best Security Specific Architecture

Challenges The search for a common language security services no common definition Emotional baggage related to security and Privacy Value of deliverable Needs to be of use to systems engineers who need to understand scope, context and issues related to legacy systems and new systems Need relevant examples (use-cases) that relate to international audience and their priorities Digital Identities the virtual border

Identity Management The time has come the Walrus said to talk of many things, of shoes and ships and sealing way and whether pigs have wings US could shut Canada border over bird flu the journal of Commerce 4 May, 2006 Tipping Point is that magic moment when an idea, trend or social behavior crosses the threshold, tips and spreads like wildfire

Identity Management The Tipping Point for Security and Privacy in support of the North American Security and Prosperity Partnership Program? Identity Privacy Security

Questions jrobbins@ewa-canada.com