Smart Card Alliance Comments and Considerations on Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance

Size: px
Start display at page:

Download "Smart Card Alliance Comments and Considerations on Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance"

Transcription

1 Smart Card Alliance Comments and Considerations on Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance This document offers Smart Card Alliance comments on the "Federal Identity, Credential and Access Management (FICAM) Roadmap and Implementation Guidance" document content and perspectives on the challenges in the next step of developing detailed Part B implementation guidance. The Smart Card Alliance Identity Council and Physical Access Council have provided these comments on the FICAM document in support of the Identity, Credential and Access Management Steering Committee's (ICAMSC) efforts in finalizing Part B, Implementation Guidance. Comments range from privacy implications, unique identifier objects, and standards and certifications to authentication factors and assurance levels, with use case examples. Finally, comments relative to improving physical access control system (PACS) operational efficiency and ease of use are provided, along with recommendations for the development of a design reference model that would facilitate greater PACS interoperability. 1 Specific Comments on the "Federal Identity, Credential and Access Management (FICAM) Roadmap and Implementation Guidance" Document The following are general comments on the full document, "Federal Identity, Credential and Access Management (FICAM) Roadmap and Implementation Guidance," and comments on specific document sections. General Comment - Privacy The FICAM roadmap for identity and credentialing requires changes to agency processes that collect and/or use personally identifiable information (PII). The FICAM implementation guidance addresses security and can address privacy concerns. However, the ICAMSC should consider and provide guidance on the privacy implications of the recommended target architecture and use cases. Privacy officers should be included in the development of implementation guidance. General Comment - Unique Identifier and PACS In order for interoperability with external users as depicted in the original FICAM document Section , "Target Conceptual Diagrams," Figure 13, "Federal Enterprise Target Conceptual Diagram, Citizen Access," a unique identifier must be adopted that spans internal and external name spaces for the federal government. FASC-N is only for internal use. PIV interoperable (PIV-I) and PIV compatible (PIV-C) cards must use the Global Unique Identifier (GUID) or similar. Physical access control systems (PACS) being deployed today don t support GUID at reader or controller because the field is not populated on most PIV cards due to the fact that it is optional by FIPS 201. General Comment - Applications ICAM focuses on applications that rely on the PIV card for authentication. Physical access and network access are the predominant ones described in the document. It is important to recognize the other applications, as grouped in the FICAM document Chapter 3, "ICAM Segment Architecture." The description of applications should be expanded so that the reader understands that applications include PACS, logical access control systems (LACS) and all other applications that can use PIV for authentication. General Comment - Facility Security and ICAM Physical security systems go beyond the segment architecture described in ICAM. In particular, ICAM should consider an overall approach to facility security, including integrated video, access, intrusion and communications management. ICAM should point to other authoritative sources for facility security design guidance. Page 1

2 General Comment - Non-Person Entities ICAM references the concept of non-person entities. Further definition of this concept and its implication for physical and logical access control are needed. Section , "Create and Maintain Digital Identity Record for External User -- Target Analysis, Process Flow, Part 1," page 57 FICAM document states: "An Applicant for a government service requests an account and provides identity information to an application, usually accessible via the Internet." Comment: ICAM implementation should consider leveraging existing government resources and facilities. As an example, the U.S. Postal Service can provide resources to fill the role of enrollment and issuance officers to check credentials and documents in the external user application process. This provides a means and method of verifying documents and capturing biometrics for a high assurance interoperable credential. Use of power of law and Federal prosecution are key components for validating the external user credential. Section 4.3.2, "Perform Background Investigation for Federal Applicant -- Target Analysis," page 67 FICAM document states: "Sharing information between related databases to reduce administrative burden on Applicants, especially when updating background information or transferring between departments or agencies." Comment: Sharing of information by and between databases is an extremely sensitive area due to the privacy laws. Legal liability issues are of concern here. Guidance should define specific data that could be shared and how it would be transitioned, stored and protected. In essence, an update is needed to the Privacy Impact Assessment (PIA) and System of Records Notices (SORN) for data sharing. In addition, ICAM implementation should make use of standards (such as the National Information Exchange Model (NIEM)) for data exchange among departments and agencies. 2 Considerations for Moving Forward with ICAM Part B: Implementation Guidance Whether planning for ICAM Part B, or making recommendations for Part A today, there remain significant issues in defining end points for commercial off-the-shelf (COTS) offerings. The following challenges and recommendations are offered for consideration in developing in FICAM Part B. 2.1 Standards and Certifications ICAM identifies a cornucopia of standards, which subtly add requirements and constraints to ICAM implementation. These standards should be read and researched. However, it is some of the more obvious standards that create the greatest questions. Below are questions and comments that need to be addressed. Will FIPS 201-2, expected later this year, and after ICAM Part B, change the rules? Will FIPS add new restrictions or eliminate some restrictions? Will FIPS change in ways that allow more freedom for the Special Publication documents to better accommodate physical access and good practice for physical access? Good practice is a broad term, but includes, for example, concepts that recognize the following: - Physical access control systems and intrusion systems converged decades ago so that PACS can provide access and alarm point monitoring for secure access points. To do this requires distributed control and autonomy. - Physical access control is not simply middleware that can reside in the cloud. Page 2

3 - There are various Underwriter Laboratory (UL) listings that must be obtained by a PACS without which the fire marshal will not grant a certificate of occupancy. These listings are often systems listings. - There are both an attack side and a secure side for each access point that is protected by the PACS or intrusion detection system, and a minimum number of components must be installed on the attack side. - PACS readers are located outdoors and in other environments subject to weather (e.g., salt spray), environment (e.g., coke dust), vandalism (e.g., screwdrivers). This creates a need for contactless interfaces that support high security applications (which are not allowed by FIPS 201 at present for HIGH or VERY HIGH assurance) - High throughput portals require a fast, secure authentication process, currently not available with FIPS 201. SP established the concept that all revisions following the base publication are options, presumably to avoid recalling and reissuing cards. This makes it very difficult for the PACS and PACS readers to support the "not yet" published options, in addition to the published options. The current variations in PIV card implementations that resulted from optional components have created a challenge for PACS, which if not addressed, can impact security and life safety functions. These variations also make interoperability a challenge. The Federal Information Security Management Act (FISMA) now includes PACS as part of the information technology (IT) inventory and, therefore, requires certification and accreditation for PACS prior to official use. This may require additional work and investment prior to granting approval for official use and may contribute to the need to upgrade existing PACS. UL 2050 and other existing regulations continue to be required of security management systems. This topic is not included in ICAM. The Security Industry Association (SIA) has recently introduced the Open, Systems Integration and Performance Standards (OSIPS) for PACS. It will take time before OSIPS standards are applied to all new PACS. FIPS 140-2/3 will place new cost burdens on PACS components implementing cryptography for certificate processing. FICAM Part B development must consider the changes that are expected to impact standards and remain flexible to accommodate future changes to standards such as FIPS (which is expected to be published months after ICAM Part B). 2.2 Authentication Factors and Assurance Levels There is a lot of confusion on authentication factors and assurance levels. FIPS 201 and SP need to provide examples of use cases with the different authentication factors and should consider allowing and acknowledging other non-card-related authentication mechanisms (e.g., PACS PIN where the PIN is kept private). In addition, the GSA FIPS 201 Evaluation Program test procedures should specifically state the authentication factors and levels of assurance that are being tested. Page 3

4 Figure 1: Access, Authentication Factors and Authentication Mechanisms 1 Figure 1 shows the four areas defined in SP regarding controlled access 2. Controlled access goes from open (uncontrolled) to very restricted (exclusion). The figure also shows how many independent authentication factors (what you have, what you know and who you are) are provided by the various PIV authentication methods. It does not explicitly mention the OMB assurance levels (NONE, SOME, HIGH and VERY HIGH) but a parallel between the areas to control and the assurance level is drawn easily. Instead of defining an assurance level for each factor (for example BIO is HIGH but Bio-A is VERY HIGH), SP assumes the physical area access rule is mapped on the identity assurance level, which can be a combination of one, two or three factors, each of which may have a different individual assurance level. The figure also shows how it is possible to combine "independent" authentication factors to get a higher assurance level. For example, VIS or CHUID individually are very low assurance, but combined they provide an acceptable single factor (what you have). BIO-A is considered two factor because the attendant is able to verify that a card (and not a bogus device) is present and a real live biometric scan is made; therefore, BIO-A provides what you have and who you are. Combining BIO (one factor) and PKI (two factors) provides a three factor authentication level, which can be done in two separate steps (one zone entered at a time) or in one step (if the subject goes directly from unrestricted to exclusion). Finally, the figure shows the possible use of the PACS PIN as one of three authentication factors (what you know), in addition to the card authentication factors. For example, a scenario not shown in this figure could be three factors combining a CAK (what you have), BIO (who you are) and PACS PIN (what you know). In order for the PACS PIN factor to provide an acceptable level of assurance, the length of the PIN should be large enough, the PIN should be protected in the PACS independently of any other secrets the user may know, and the PIN should be different from the PIN used to protect the PIV card private keys. 1 Figure1 was provided by Identification Technology Partners. 2 See Table 7-1 in NIST SP , "A Recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS)." Page 4

5 The following discusses detailed use cases that are derived from the SP definitions. These define alternative authentication factors that a PACS could use that are not documented in current specifications. Use Case 1: Read user's picture from PIV card with authentication by a remote attendant. One factor authentication not in SP (who you are - photo) For a genuine PIV card, the terminal needs to get the PIN from the user and present it to the card before being able to read the user's picture. The picture information is signed by the issuer. The terminal can verify the digital signatures attached to the picture and to the identifier (FASC-N or UUID) come from a trusted source (the card issuer). If the picture matches the user, the biometric verification is done. This is one factor. This provides only one factor because the terminal cannot determine that the information comes from a true PIV card. A false PIV card could be presented which does not verify the PIN and which has a copy of the correct user's information. Since the terminal cannot verify the PIN was presented correctly, the PIN does not count as a factor. In this case, the PIN only provides privacy protection for the user, and cannot be used as an authentication factor for the terminal. The card also does not count as a factor since there is no way for the terminal to verify that the information comes from a card. IFor example, if a cell phone uses the Near Field Communication (NFC) protocol, the terminal would not see a difference from the card's contactless interface. For a contact interface, the person attempting access could have a paddle connected to a mobile device which is emulating a card; an unattended terminal would not be able to verify this situation. However, if a PIN had been presented to be verified by the PACS, the PIN would be considered another authentication factor in addition to the picture. Also, if the terminal is attended, the VIS + CHUID authentication mechanisms would count as a (weak assurance level) factor. This could result in three factors: the picture coming from the card, the PIN presented to the PACS, and the attendant verifying the transaction is from a PIV card that looks valid. Since PACS PIN is not included in SP , this use case is not taken into account. If the attendant is local and can verify that the PIN was presented to the card, the use case would provide two factor authentication similar to BIO-A. Use Case 2: Read fingerprints and read CHUID with unattended biometric reader verification. One factor authentication (who you are - fingerprint) This use case is similar to Use Case 1 since it only verifies that the token provided (which could be anything since it is not authenticated) contains two pieces of information, both correctly signed and containing the same identifier (FASC-N or UUID). Since the CHUID is public information that can be read on any interface with or without the user's consent, the CHUID alone provides no authentication factor. The CHUID is only required to verify that the signature on the other elements comes from a trusted source. As in Use Case 1, there is no cryptographic proof that the card is genuine so the presentation of the PIN is not a trusted authentication factor. Even though a PIN is presented to the card, the card could be counterfeit, accepting any PIN and providing correct cardholder information (which could have been copied from the genuine card in previous transactions). This use case is similar to the BIO case from SP However, doing the path validation using the CHUID provides the correct level of assurance for the use case. Use Case 3: PIV PKI key verification. Two factor authentication (what you know - PIN, what you have - valid PIV authentication key). In order to execute a PIV PKI authentication response challenge, the user must present the PIN to the card. The terminal then executes the response challenge and verifies the card is indeed genuine. This provides two authentication factors since the card is verified as being genuine and this happens only when a good PIN is presented to a good card. No false PIN presentation will Page 5

6 make this work with a good or bad card, and no bad card will be authenticated. In this use case, the terminal can indeed verify that the card is genuine and that the PIN was good (indirect proof that the PIN was good, transferred by a trusted element, the card). Use Case 4: PIV PKI key verification plus PACS PIN. Two independent factors (what you have - card; what you know - PACS PIN, PIV PIN) This use case is not in SP since the PACS PIN is not included in the current version. The use case illustrates the impact of factors on level of assurance. In this situation, the two factors from the card (PIN + PKI) are the same as the previous use case. The PIN PACS, however, provides another independent factor. Since the card PIN to card verification already provides the "what you know" factor, the use case still only has two factors (what you know + what you have). However, the PACS PIN verification provides a higher level of assurance in the "what you know" factor. This use case illustrates a scenario that is equivalent to increasing the number of digits required on a PIN, but not providing a new factor. Use Case 5: Card Authentication Key (CAK) + BIO attended. Three factors according to SP (what you have - CAK; what you know - card PIN; who you are - BIO) The SP position on this use case is unclear. The use and verification of the CAK mean that the card is genuine. The CAK can be verified by the terminal and provides one factor. The fact that the terminal is attended means the guard is able to verify that the cardholder is using a true physical PIV card (visual verification) and that the user presents the PIN to that specific card. The card then responds with biometric information which can be verified by the terminal, providing the "who you are" second factor. The assumption made in this use case is that SP assumes that the PIN is considered as a factor. The terminal has no real proof that the PIN was indeed presented but, as the card has been authenticated (with the CAK), an attendant is able to verify that the card was not replaced by a counterfeit card between exchanges. Because the PIN is required to access the BIO information on the card, SP must consider use of the PIN as providing three factors. Further clarification from NIST on how CAK + BIO-A achieve three authentication factors is needed. Use Case 6: Bio attended. Two factors according to SP (what you have - visuallyvalidated card; who you are - BIO) This use case has similar logic to Use Case 5. The attendant is able to verify that the card is indeed a PIV card (using visual verification), counting as the "what you have" factor. This may be a weak assurance level, but it is a factor. However, the PIV card chip is not challenged and, as such, whatever comes from the card may not be what the guard verified. For example, the chip of one PIV card could have been attached to another card; in this scenario, even though the PIN needs to be presented to a good PIV card, the chip on this "good looking" card may not be the valid PIV card chip. As a result, PIN presentation does not count as a factor, since there is no cryptographic proof that the PIN was correctly presented. (In Use Case 5, the CAK had provided trusted proof that the chip was valid.) As the biometric is verified, the guard is able to verify the user is not using a gummy finger or other artifacts to fake the verification, providing a high level of trust in the biometric verification. As a result, this use case supports only two factors. Use Case 7: BIO only (unattended). One factor (who you are - BIO) This use case provides only one factor, but does not have a high confidence level. As stated in previous use cases, PIN presentation cannot be verified by the terminal. Since the biometric terminal is not attended, there is no verification by the terminal that the live biometric scan is really from a live person. The terminal could be verifying a gummy finger, or even a photocopy of a fingerprint. If the biometric industry were able to guarantee verification of the subject's "liveness," this use case would provide a higher level of assurance, but still only one factor. The PIN is a privacy tool in this scenario, rather than an available terminal authentication tool. Page 6

7 Use Case 8: PIV Auth + BIO unattended. Three factors (what you have - PIV PKI key verification; what you know - PIN; who you are - BIO) This combination is not explicitly described in the SP , but should not be controversial. BIO is a one factor (see Use Case 6) and PIV Auth is two factors, as indicated in Use Case 3. They both require the PIN to be presented to the card, but as described before, the PIN counts as one factor for two reasons: it is the same PIN presented in both cases and, in the case of PIN protection of the BIO, there is no transfer of trust for the PIN presentation. Use Case 9: PIV Auth + BIO unattended (fingerprint + picture). Three factors (what you have - PIV PKI key verification; what you know - PIN; who you are - two BIOs) This use case is clear. It clearly provides three factor authentication, just as before, even though there are two biometric verifications. Fingerprint and picture are both biometric authentication methods and they count as one factor (who you are). This use case provides a higher level of assurance, because it uses multi-modal biometric verification for that specific factor, but still results in only three factors. Use Case 10: PIV Auth + BIO attended. Three factors according to SP (what you have - PIV PKI key verification; what you know - PIN; who you are - BIO) This use case once again provides three factors. The PIN (what you know) is accepted because of the PIV Auth verification (second factor). The fact the verification is attended provides a higher level of assurance (not another factor) that the card is genuine (which was already very high because of the PIV Auth), and also provides higher assurance for the biometric factor. If the picture is added to the fingerprint for this last use case (as in Use Case 9), the level of assurance is increased for the "who you are" factor, but the use case still results in three factors. Note for all use cases: All signed data objects must be validated (signature and trusted origin validation); otherwise there is no trust anchor. The validation method could be by validating individual objects or by using the security data object (SDO). Using the SDO is much faster when multiple data objects must be validated at the same time. Note for use cases using the card PIN: Use cases involving card PIN presentation use the contact interface only. 2.3 Leveraging Registered Cards in PACS for Operational Efficiency An aspect to consider for PACS implementation is the difference in the level of assurance when the physical access control system sees a PIV card the first time versus subsequent times. PACS do register cards. They store card information in the secure area of the system (for example, in the PACS database) when it is first presented. For example, during the registration phase (on a specific registration terminal), it would be normal to store card information and verify all signatures and the trust validation path for the card. This process could add the CAK, BIO or other factor or store any other information that needs to be collected once, such as writing the expiration date of the credential in the PACS. After a card is registered with the PACS, the next time the card is presented on a "normal" access control terminal, all signatures on the card may not need to be verified if the card number (FASC-N or UUID) has been stored in a secure PACS "white list." White list information is functionally equivalent to information with a verified digital signature and path. Using this process would save time, not change the level of assurance, and not require a sophisticated terminal to be used all of the time. It is also perfectly acceptable for the PACS, at time of card registration, to store the hash of the various containers/data objects in the card in addition to the card identifier. The hash is not personally identifiable information and, as such, does not create any privacy issues. Hash values are found in the security data object or could be recalculated for the data objects at the time the card is registered or enrolled. The following use case illustrates this process. When a registered card is used with a biometric terminal that does not have any cryptographic functions (i.e., not tested to FIPS 140 specifications), a high level of assurance is still possible provided that the hash of the information used by the terminal has been previously stored in the PACS database (e.g., on the white list). Page 7

8 Use Case Example. (One factor - BIO) The following exchange shows the benefits of this scenario. When the PACS sees a card for the first time, the PACS verifies the card and registers it: Read CHUID + verification signature + path validation + expiration date. Extract FASC-N (or UUID) and expiration date. Read the Security Data Object. Verify its signature. Get the biometric hash information from the Security Data Object. Store the following in the PACS data base: - Card identifier (FASC-N or UUID) - Expiration date - The hash of the biometric information read from the Security Data Object or calculated from the data object itself. It is important to note that this process does require the PACS, or the terminal on which these verifications are done, to be able to do some cryptography (i.e., verification of signatures and path validation). When the card is later presented to a PACS terminal without any cryptographic functions (except hash), the following process would be used: Read the CHUID and send the identifier (FASC-N or UUID) to the PACS. If the identifier is in the PACS database (e.g., on the white list), this can be considered as good as a signature validation. The identifier is valid and has been verified before. (It could be cloned, but it is the same risk as with the signature attached.) The user is then asked to present the PIN in order for the terminal to get the biometric information. (This is not a factor since the terminal cannot verify that the result of the PIN presentation is from a trusted card.) The terminal reads the biometric information from the card and verifies it matches the live scan from the user (but is not able to verify the signature). The terminal calculates the hash of the biometric information it used (not requiring any cryptographic key) and sends it to the PACS database along with the result of the live scan verification (good or bad). The PACS can verify that the hash is correct, resulting in two factor authentication (even if the CHUID provides a low level of assurance) without any cryptography involved (except hashing). This process should be acceptable because the card identifier and the biometric hash that were stored in the PACS database are verified as being good. This provides a white list verification and is equivalent digital signature verification (which was done during registration). This scenario shows that one-factor biometric assurance is possible even with a terminal that is not able to execute any cryptography (except hash functions). Of course the scenario may be clumsy to implement since the biometric is only accessible from the PIV card's contact interface; nevertheless, the use case is valid and provides biometric support from simple terminals. 2.4 Transformation of PACS A FIPS 201 end-point PACS may well be one that implements all traditional physical access control system functions, plus leverages the public key infrastructure for strong authentication introduced by FIPS 201 and identity assurance levels defined in OMB M The revised PACS architecture resides in the ICAM segment workflow (which includes automated provisioning and deprovisioning). As a result, the end-point PACS becomes part of the broader ICAM solution and must support an overall end-to-end FIPS 201/ICAM implementation. Page 8

9 Accomplishing this expanded role within the overall enterprise target architecture and thus become an end-point PACS to an end-point enterprise ICAM solution will require a different physical access architecture development process than current PACS deployments employ. Understanding the technology changes, subsequent guidance needs to consider the impact that such PKI and strong authentication/assurance processes and associated technical requirements will have on the overall effort to transition from a traditional PACS to the more complex end-point PACS. ICAM guidance should build on the progress that has been made in FIPS 201 deployments so far, and consider the architectural implications of new requirements for PACS. 2.5 Suggestions for Easier Use of PIV with PACS Education will be key to proper implementation. As suggested in Section 3.2, additional use cases should be included in the guidance document. Guidance should also consider alternative authentication mechanisms and combinations and expanded use of the contactless interface. PACS PIN is essential to and required by the intelligence community. It has previously been out of scope for FIPS 201, but not specifically disallowed. This needs to be addressed for proper guidance. PACS PIN should be allowed as a trusted factor. Transparent or "CHUID readers" provide low assurance and the risk of using them should be carefully considered unless used with other components that provide authentication methods that support higher assurance. There is no contactless, interoperable authentication method that can be used for PACS in a FIPS 201 implementation. ICAM will struggle with good practice physical access usage until a contactless, mandatory HIGH and/or VERY HIGH assurance requirement emerges. HIGH assurance currently requires the PIN to be presented over the contact interface, which presents challenges for PACS systems in many environments (e.g., weather, throughput, hackers). BIO is also only available from the contact interface. The Card Authentication Key (Certificate) should be mandatory on the PIV card and asymmetric to provide interoperability for both the contact and contactless interfaces (especially for PACS use since it doesn't require the card PIN). This also aligns with new PIV-interoperable specifications, which require an asymmetric CAK. For the agency issuing the card, a second, symmetric CAK should be allowed by the specification (as an option) to enable fast operation in their PACS (but not intended for interoperable use). Additional use cases combining PACS PIN and other authentication factors should be provided for guidance. For example, PACS PIN + CAK is equivalent in terms of assurance level to a PKI PIV Card Auth verification. This would provide two factor authentication over the contactless interface for physical access. Additional use cases combining BIO and other authentication factors should be provided for guidance. For example, BIO + PKI clearly make the most sense for VERY HIGH assurance as only BIO will bind the person to the card. If FIPS Level 2 certification is required for PACS components, implementation cost will increase and time-to-market will be lengthened for compliant readers. Future specifications and guidance should take this into strong consideration. Requiring all terminals to provide all algorithms allowed by FIPS 201 is expensive and will create a problem when a future document release introduces a new algorithm. The system architecture design should allow a minimum set for interoperable implementation. A layered system architecture approach could significantly reduce cost and improve overall security implementation for high assurance processes. PACS architectures need to be able to support the continuous changes to standards without having to visit readers for upgrades. Interoperability is difficult to achieve because of the variety of options and the continuous changes in the multitude of standards. Page 9

10 2.6 Suggestion for Easier PACS Architecture Design and Implementation PACS and supporting infrastructure have typically been designed for year operation and should now be able to evolve instead of being replaced. This requires a layered approach with stable end-point design for each layer. An approach defining each component individually is not viable as they are part of a complex, dynamic system. Defining clear use cases is important for education, understanding and correct implementation. The Smart Card Alliance suggests a design model that builds on previous work with growing maturity and one that can be referenced over an extended period of time and that anticipates continuous development and advancement in both technology and data handling. Taking into consideration that PACS are now considered information systems and implementation is becoming more IT-centric, it bears noting that a standard model for networking protocols and distributed applications is already in place for IT systems. This may be worth considering as a possible guide to the development of a similar model for next generation PACS designs. This IT reference model is commonly known as the OSI Model and stands for the Open Systems Interconnection Reference Model. It is an abstract seven-layered computer network protocol design of network communications. The model was designed to create common network interconnection standards and its primary purpose was to facilitate multi-vendor interoperability among various network devices and software communication systems. The model was created by the International Organization for Standardization (ISO) and was intended to help vendors create interoperable network devices and software in the form of protocols. It is a conceptual blueprint of how communication should take place and provides a great tool for investigating network errors. As the OSI Reference Model was introduced in 1984 by ISO in order to provide a reference model to ensure products of different vendors would interoperate in the network communications world, so too comes the need to establish a set of reference models that can address the PAC systems of today and tomorrow. Current and future PACS need to work in the context of identity, credential and access management along with the stringent standards governing e-authentication and HSPD-12 / FIPS 201 compliance. Such a model could include layers governing card-to-reader communications, reader-toaccess control panel communications, reader/control panel PKI communications, and PACS-to-IDMS communications. The OSI model has been a resounding success and drives manufacturing and implementation designs to the level of industry-wide acceptance and interoperability never before experienced. Part B should consider the benefits to the expanded use and interoperability of networks that came about with the adoption of this model. As PACS become enterprise IT applications, the benefits of this approach could be leveraged. If the growing adoption of ICAM is to lead to the tight integration and use of more PACS that leverage smart cards and the digital identity objects created and provisioned by third party systems, then it is imperative that future PACS architectures also follow a systems architecture design driven by reference models that can foster interoperability. 2.7 Summary The Smart Card Alliance has provided these comments on the Federal Identity, Credential and Access Management (FICAM) Roadmap and Implementation Guidance document in support of the committee s efforts in finalizing Part B, Implementation Guidance. Comments range from privacy implications, unique identifier objects, standards and certifications to authentication factors and assurance levels, with use case examples. Finally, comments relative to improving PACS operational efficiency and ease of use are provided, along with recommendations for the development of a design reference model that would facilitate greater PACS interoperability. This document is submitted with the desired goal of helping to achieve an overall set of interoperable solutions that supports an integrated physical and logical access framework that can operate effectively and efficiently within the Federal ICAM environment. Page 10

11 3 Acknowledgements This commentary was developed by the Smart Card Alliance Identity Council and Physical Access Council to support the ICAMSC's efforts in finalizing Part B, Implementation Guidance. Publication of this document by the Smart Card Alliance does not imply the endorsement of any of the member organizations of the Alliance. The Smart Card Alliance wishes to thank the Identity Council and Physical Access Council members for their contributions. Participants involved in the development of this summary included: AMAG Technology; Booz Allen Hamilton; Datawatch; Deloitte; Diebold; GSA; HID Global; Hirsch Electronics; HP Enterprise Services; Identification Technology Partners; IDmachines; IQ Devices: Nagra ID; Northrop Grumman Corporation; Probaris; Technica; U.S. Department of State; XTec, Inc. Special thanks go to Tony Damalas, Diebold, who led the project, and to the following Identity Council and Physical Access Council members who developed draft content and who participated in reviewing and commenting on the document: Dave Adams, HID Global LJ Neve, Booz Allen Hamilton Ben Black, Deloitte Dwayne Pfeiffer, Northrop Grumman Sal D'Agostino, IDmachines Rod Pieper, HP Enterprise Services Mark Dale, HP Enterprise Systems Rick Pratt, XTec, Inc. Tony Damalas, Diebold Kenneth Reed, Datawatch Marty Frary, Independent Consultant Steve Rogers, IQ Devices Daryl Hendricks, GSA Dan Schleifer, IDmachines Russ Kent, HP Enterprise Services Adam Shane, AMAG Technology Lolie Kull, HP Enterprise Services Mike Sulak, U.S. Dept. of State LaChelle LeVan, Probaris Lars Suneborn, Hirsch Electronics Gilles Lisimaque, ID Technology Partners Rick Uhrig, XTec, Inc. Don Malloy, Nagra ID Robert Wilberger, Technica Cathy Medich, Smart Card Alliance Rob Zivney, Hirsch Electronics About the Smart Card Alliance Identity Council The Smart Card Alliance Identity Council is focused on promoting the need for technologies and usage solutions regarding human identity information to address the challenges of securing identity information and reducing identity fraud and to help organizations realize the benefits that secure identity information delivers. The Council engages a broad set of participants and takes an industry perspective, bringing careful thought, joint planning, and multiple organization resources to bear on addressing the challenges of securing identity information for proper use. About the Smart Card Alliance Physical Access Council The Smart Card Alliance Physical Access Council is focused on accelerating widespread acceptance, use, and application of smart card technology for physical access control. The Council brings together leading users and technologists from both the public and private sectors in an open forum and works on activities that are important to the physical access industry and address key issues that end user organizations have in deploying new physical access system technology. The Physical Access Council includes participants from across the smart card and physical access control system industry, including end users; smart card chip, card, software, and reader vendors; physical access control system vendors; and integration service providers. About the Smart Card Alliance The Smart Card Alliance is a not-for-profit, multi-industry association working to stimulate the understanding, adoption, use and widespread application of smart card technology. Through specific projects such as education programs, market research, advocacy, industry relations and open forums, the Alliance keeps its members connected to industry leaders and innovative thought. The Alliance is the Page 11

12 single industry voice for smart cards, leading industry discussion on the impact and value of smart cards in the U.S. and Latin America. For more information please visit Page 12

Interagency Advisory Board Meeting Agenda, Wednesday, February 27, 2013

Interagency Advisory Board Meeting Agenda, Wednesday, February 27, 2013 Interagency Advisory Board Meeting Agenda, Wednesday, February 27, 2013 1. Opening Remarks 2. Discussion on Revisions Contained in Draft SP 800-63-2 (Bill Burr, NIST) 3. The Objectives and Status of Modern

More information

State of the Industry and Councils Reports. Access Control Council

State of the Industry and Councils Reports. Access Control Council State of the Industry and Councils Reports Access Control Council Chairman: Lars R. Suneborn, Sr. Manager, Technical Marketing, Government ID, Oberthur Technologies Property of the Smart Card Alliance

More information

Considerations for the Migration of Existing Physical Access Control Systems to Achieve FIPS 201 Compatibility

Considerations for the Migration of Existing Physical Access Control Systems to Achieve FIPS 201 Compatibility Considerations for the Migration of Existing Physical Access Control Systems to Achieve FIPS 201 Compatibility A Smart Card Alliance Physical Access Council White Paper Publication Date: September 2006

More information

Strategies for the Implementation of PIV I Secure Identity Credentials

Strategies for the Implementation of PIV I Secure Identity Credentials Strategies for the Implementation of PIV I Secure Identity Credentials A Smart Card Alliance Educational Institute Workshop PIV Technology and Policy Requirements Steve Rogers President & CEO 9 th Annual

More information

Recommendation on the Credential Numbering Scheme for the FIPS 201 PIV Card Global Unique Identifier

Recommendation on the Credential Numbering Scheme for the FIPS 201 PIV Card Global Unique Identifier Recommendation on the Credential Numbering Scheme for the FIPS 201 PIV Card Global Unique Identifier A Smart Card Alliance Physical Access Council White Paper Publication Date: March 2009 Publication Number:

More information

FIPS and NIST Special Publications Update. Smart Card Alliance Webinar November 6, 2013

FIPS and NIST Special Publications Update. Smart Card Alliance Webinar November 6, 2013 FIPS 201-2 and NIST Special Publications Update Smart Card Alliance Webinar November 6, 2013 Today s Webinar Topics & Speakers Introductions: Randy Vanderhoof, Executive Director, Smart Card Alliance FIPS

More information

Multiple Credential formats & PACS Lars R. Suneborn, Director - Government Program, HIRSCH Electronics Corporation

Multiple Credential formats & PACS Lars R. Suneborn, Director - Government Program, HIRSCH Electronics Corporation Multiple Credential formats & PACS Lars R. Suneborn, Director - Government Program, HIRSCH Electronics Corporation Insert Company logo here A Smart Card Alliance Educational Institute Course Multiple credential

More information

Securing Federal Government Facilities A Primer on the Why, What and How of PIV Systems and PACS

Securing Federal Government Facilities A Primer on the Why, What and How of PIV Systems and PACS Securing Federal Government Facilities A Primer on the Why, What and How of PIV Systems and PACS Introduction The expectations and requirements on government contracts for safety and security projects

More information

Interagency Advisory Board Meeting Agenda, February 2, 2009

Interagency Advisory Board Meeting Agenda, February 2, 2009 Interagency Advisory Board Meeting Agenda, February 2, 2009 1. Opening Remarks (Tim Baldridge, NASA) 2. Mini Tutorial on NIST SP 800-116 AND PIV use in Physical Access Control Systems (Bill MacGregor,

More information

Interagency Advisory Board Meeting Agenda, Wednesday, May 23, 2012

Interagency Advisory Board Meeting Agenda, Wednesday, May 23, 2012 Interagency Advisory Board Meeting Agenda, Wednesday, May 23, 2012 1. Opening Remarks (Mr. Tim Baldridge, IAB Chair) 2. Revision of the Digital Signature Standard (Tim Polk, NIST) 3. Update on Content

More information

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008 Interagency Advisory Board HSPD-12 Insights: Past, Present and Future Carol Bales Office of Management and Budget December 2, 2008 Importance of Identity, Credential and Access Management within the Federal

More information

Physical Access Control Systems and FIPS 201 Physical Access Council Smart Card Alliance December 2005

Physical Access Control Systems and FIPS 201 Physical Access Council Smart Card Alliance December 2005 Physical Access Control Systems and FIPS 201 Physical Access Council Smart Card Alliance December 2005 Copyright 2006 Smart Card Alliance, Inc. All rights reserved. 1 Topics Introduction: PACS Overview

More information

Transportation Worker Identification Credential (TWIC) Steve Parsons Deputy Program Manager, TWIC July 27, 2005

Transportation Worker Identification Credential (TWIC) Steve Parsons Deputy Program Manager, TWIC July 27, 2005 Transportation Worker Identification Credential (TWIC) Steve Parsons Deputy Program Manager, TWIC July 27, 2005 Who Am I? How do you know? 2 TWIC Program Vision A high-assurance identity credential that

More information

FIPS 201 PIV II Card Use with Physical Access Control Systems: Recommendations to Optimize Transaction Time and User Experience May 2007

FIPS 201 PIV II Card Use with Physical Access Control Systems: Recommendations to Optimize Transaction Time and User Experience May 2007 FIPS 201 PIV II Card Use with Physical Access Control Systems: Recommendations to Optimize Transaction Time and User Experience May 2007 Developed by: Smart Card Alliance Physical Access Council 1 About

More information

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop PACS Integration into the Identity Infrastructure Salvatore D Agostino CEO, IDmachines LLC 8 th Annual

More information

TWIC / CAC Wiegand 58 bit format

TWIC / CAC Wiegand 58 bit format This document was developed by the Smart Card Alliance Physical Access Council to respond to requests for sample Wiegand message formats that will handle the additional fields of the Federal Agency Smart

More information

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop. Scalability: Dimensions for PACS System Growth

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop. Scalability: Dimensions for PACS System Growth Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop Scalability: Dimensions for PACS System Growth Tony Damalas VP Technology, Diebold Security 8 th Annual

More information

Revision 2 of FIPS 201 and its Associated Special Publications

Revision 2 of FIPS 201 and its Associated Special Publications Revision 2 of FIPS 201 and its Associated Special Publications Hildegard Ferraiolo PIV Project Lead NIST ITL Computer Security Division Hildegard.ferraiolo@nist.gov IAB meeting, December 4, 2013 FIPS 201-2

More information

Will Federated Cross Credentialing Solutions Accelerate Adoption of Smart Card Based Identity Solutions?

Will Federated Cross Credentialing Solutions Accelerate Adoption of Smart Card Based Identity Solutions? Will Federated Cross Credentialing Solutions Accelerate Adoption of Smart Card Based Identity Solutions? Jack Radzikowski,, Northrop Grumman & FiXs Smart Card Alliance Annual Meeting La Jolla, California

More information

PKI and FICAM Overview and Outlook

PKI and FICAM Overview and Outlook PKI and FICAM Overview and Outlook Stepping Stones 2001 FPKIPA Established Federal Bridge CA established 2003 E-Authentication Program Established M-04-04 E-Authentication Guidance for Federal Agencies

More information

IMPLEMENTING AN HSPD-12 SOLUTION

IMPLEMENTING AN HSPD-12 SOLUTION IMPLEMENTING AN HSPD-12 SOLUTION PAVING THE PATH TO SUCCESS Prepared by: Nabil Ghadiali 11417 Sunset Hills Road, Suite 228 Reston, VA 20190 Tel: (703)-437-9451 Fax: (703)-437-9452 http://www.electrosoft-inc.com

More information

Biometric Use Case Models for Personal Identity Verification

Biometric Use Case Models for Personal Identity Verification Biometric Use Case Models for Personal Identity Verification Walter Hamilton International Biometric Industry Association & Saflink Corporation Smart Cards in Government Conference Arlington, VA April

More information

HITPC Stage 3 Request for Comments Smart Card Alliance Comments January, 14, 2013

HITPC Stage 3 Request for Comments Smart Card Alliance Comments January, 14, 2013 HITPC Stage 3 Request for Comments Smart Card Alliance Comments January, 14, 2013 The Smart Card Alliance hereby submits the following comments regarding the Health Information Technology Policy Committee

More information

Leveraging HSPD-12 to Meet E-authentication E

Leveraging HSPD-12 to Meet E-authentication E Leveraging HSPD-12 to Meet E-authentication E Policy and an update on PIV Interoperability for Non-Federal Issuers December 2, 2008 Chris Louden IAB 1 Leveraging HSPD-12 to Meet E-Authentication E Policy

More information

An Overview of Draft SP Derived PIV Credentials and Draft NISTIR 7981 Mobile, PIV, and Authentication

An Overview of Draft SP Derived PIV Credentials and Draft NISTIR 7981 Mobile, PIV, and Authentication An Overview of Draft SP 800-157 Derived PIV Credentials and Draft NISTIR 7981 Mobile, PIV, and Authentication Hildegard Ferraiolo PIV Project Lead NIST ITL Computer Security Division Hildegard.ferraiolo@nist.gov

More information

Unified PACS with PKI Authentication, to Assist US Government Agencies in Compliance with NIST SP (HSPD 12) in a Trusted FICAM Platform

Unified PACS with PKI Authentication, to Assist US Government Agencies in Compliance with NIST SP (HSPD 12) in a Trusted FICAM Platform Unified PACS with PKI Authentication, to Assist US Government Agencies in Compliance with NIST SP 800 116 (HSPD 12) in a Trusted FICAM Platform In Partnership with: Introduction Monitor Dynamics (Monitor)

More information

FICAM in Brief: A Smart Card Alliance Summary of the Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance

FICAM in Brief: A Smart Card Alliance Summary of the Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance FICAM in Brief: A Smart Card Alliance Summary of the Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance A Smart Card Alliance Identity Council and Physical

More information

Helping Meet the OMB Directive

Helping Meet the OMB Directive Helping Meet the OMB 11-11 Directive March 2017 Implementing federated identity management OMB Memo 11-11 Meeting FICAM Objectives Figure 1: ICAM Conceptual Diagram FICAM Targets Figure 11: Federal Enterprise

More information

Identiv FICAM Readers

Identiv FICAM Readers Identiv FICAM Readers Ordering Guide August 2017 Table of Contents Overview.....1 Basic FICAM Implementation.....3 Migration Strategies... 4 Perimeter Access... 4 Update Readers and Controllers... 4 Ad

More information

Single Secure Credential to Access Facilities and IT Resources

Single Secure Credential to Access Facilities and IT Resources Single Secure Credential to Access Facilities and IT Resources HID PIV Solutions Securing access to premises, applications and networks Organizational Challenges Organizations that want to secure access

More information

Secure Government Computing Initiatives & SecureZIP

Secure Government Computing Initiatives & SecureZIP Secure Government Computing Initiatives & SecureZIP T E C H N I C A L W H I T E P A P E R WP 700.xxxx Table of Contents Introduction FIPS 140 and SecureZIP Ensuring Software is FIPS 140 Compliant FIPS

More information

(PIV-I) Trusted ID across States, Counties, Cities and Businesses in the US

(PIV-I) Trusted ID across States, Counties, Cities and Businesses in the US (PIV-I) Trusted ID across States, Counties, Cities and Businesses in the US Brian A. Kowal, cryptovision cv cryptovision GmbH T: +49 (0) 209.167-24 50 F: +49 (0) 209.167-24 61 info(at)cryptovision.com

More information

Physical Access Control Systems and FIPS 201

Physical Access Control Systems and FIPS 201 Physical Access Control Systems and FIPS 201 Physical Access Council Smart Card Alliance December 2005 1 This presentation was developed by the Smart Card Alliance Physical Access Council. The goals of

More information

Leveraging the LincPass in USDA

Leveraging the LincPass in USDA Leveraging the LincPass in USDA Two Factor Authentication, Digital Signature, Enterprise VPN, eauth Single Sign On February 2010 USDA Takes Advantage of the LincPass USDA is taking advantage of the LincPass

More information

Identity Assurance Framework: Realizing The Identity Opportunity With Consistency And Definition

Identity Assurance Framework: Realizing The Identity Opportunity With Consistency And Definition Identity Assurance Framework: Realizing The Identity Opportunity With Consistency And Definition Sept. 8, 2008 Liberty Alliance 1 Welcome! Introduction of speakers Introduction of attendees Your organization

More information

000027

000027 000026 000027 000028 000029 000030 EXHIBIT A 000031 Homeland Security Presidential Directive/Hspd-12 For Immediate Release Office of the Press Secretary August 27, 2004 Homeland Security Presidential Directive/Hspd-12

More information

Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance

Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance November 10, 2009 Powered by the Federal Chief Information Officers Council and the Federal Enterprise Architecture

More information

Non Person Identities After all, who cares about me? Gilles Lisimaque & Dave Auman Identification technology Partners, Inc.

Non Person Identities After all, who cares about me? Gilles Lisimaque & Dave Auman Identification technology Partners, Inc. Identities Non Person Identities After all, who cares about me? Gilles Lisimaque & Dave Auman Identification technology Partners, Inc. Device Identifiers Most devices we are using everyday have (at least)

More information

g6 Authentication Platform

g6 Authentication Platform g6 Authentication Platform Seamlessly and cost-effectively modernize a legacy PACS to be HSPD-12 compliant l l l l Enrollment and Validation Application Authentication Modules Readers HSPD-12 Enrollment

More information

Interagency Advisory Board Meeting Agenda, Wednesday, April 24, 2013

Interagency Advisory Board Meeting Agenda, Wednesday, April 24, 2013 Interagency Advisory Board Meeting Agenda, Wednesday, April 24, 2013 1. Opening Remarks 2. A Security Industry Association (SIA) Perspective on the Cost and Methods for Migrating PACS Systems to Use PIV

More information

FiXs - Federated and Secure Identity Management in Operation

FiXs - Federated and Secure Identity Management in Operation FiXs - Federated and Secure Identity Management in Operation Implementing federated identity management and assurance in operational scenarios The Federation for Identity and Cross-Credentialing Systems

More information

Strong Security Elements for IoT Manufacturing

Strong Security Elements for IoT Manufacturing Strong Security Elements for IoT Manufacturing LANCEN LACHANCE VICE PRESIDENT PRODUCT MANAGEMENT GLOBALSIGN WHAT YOU WILL LEARN TODAY 1 2 3 Examining of security risks with smart connected products Implementing

More information

The Leader in Unified Access and Intrusion

The Leader in Unified Access and Intrusion Unified PACS with PKI Authentication, to Assist US Government Agencies in Compliance with NIST SP 800-116, FIPS 201 and OMB M 11-11 in a High Assurance Trusted FICAM Platform In Partnership with: The Leader

More information

Smart Card Alliance Member Webinar: Mission Expansion and Name Change. February 22, 2017

Smart Card Alliance Member Webinar: Mission Expansion and Name Change. February 22, 2017 Smart Card Alliance Member Webinar: Mission Expansion and Name Change February 22, 2017 Agenda The Changes Ahead Randy Vanderhoof Industry and Market Impact Brian Russell, Board Chair Industry Councils

More information

TWIC Implementation Challenges and Successes at the Port of LA. July 20, 2011

TWIC Implementation Challenges and Successes at the Port of LA. July 20, 2011 TWIC Implementation Challenges and Successes at the Port of LA 1 July 20, 2011 Agenda Port of LA TWIC Field Test Background Objectives Approach Results Implementation Challenges and Successes! Recommendations

More information

Secure Solutions. EntryPointTM Access Readers TrustPointTM Access Readers EntryPointTM Single-Door System PIV-I Compatible Cards Accessories

Secure Solutions. EntryPointTM Access Readers TrustPointTM Access Readers EntryPointTM Single-Door System PIV-I Compatible Cards Accessories Secure Solutions l l l l BridgePointTM solutions that will take your security system to the next level EntryPointTM Access Readers TrustPointTM Access Readers EntryPointTM Single-Door System PIV-I Compatible

More information

TRUST IDENTITY. Trusted Relationships for Access Management: AND. The InCommon Model

TRUST IDENTITY. Trusted Relationships for Access Management: AND. The InCommon Model TRUST. assured reliance on the character, ability, strength, or truth of someone or something - Merriam-Webster TRUST AND IDENTITY July 2017 Trusted Relationships for Access Management: The InCommon Model

More information

Cryptologic and Cyber Systems Division

Cryptologic and Cyber Systems Division Cryptologic and Cyber Systems Division OVERALL BRIEFING IS Someone Scraped My Identity! Is There a Doctrine in the House? AF Identity, Credential, and Access Management (ICAM) August 2018 Mr. Richard Moon,

More information

Interagency Advisory Board Meeting Agenda, Wednesday, June 29, 2011

Interagency Advisory Board Meeting Agenda, Wednesday, June 29, 2011 Interagency Advisory Board Meeting Agenda, Wednesday, June 29, 2011 1. Opening Remarks (Mr. Tim Baldridge, IAB Chair) 2. Using PKI to Mitigate Leaky Documents (John Landwehr, Adobe) 3. The Digital Identity

More information

PKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006

PKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006 PKI-An Operational Perspective NANOG 38 ARIN XVIII October 10, 2006 Briefing Contents PKI Usage Benefits Constituency Acceptance Specific Discussion of Requirements Certificate Policy Certificate Policy

More information

Using PIV Technology Outside the US Government

Using PIV Technology Outside the US Government Using PIV Technology Outside the US Government Author: Bob Dulude Publishing: 10/19/15 Introduction A common perception of many who have heard of the US Government s Personal Identity Verification (PIV)

More information

Interagency Advisory Board Meeting Agenda, April 27, 2011

Interagency Advisory Board Meeting Agenda, April 27, 2011 Interagency Advisory Board Meeting Agenda, April 27, 2011 1. Open Remarks (Mr. Tim Baldridge, IAB Chair) 2. FICAM Plan for FIPS 201-2 (Tim Baldridge, IAB Chair and Deb Gallagher, GSA) 3. NSTIC Cross-Sector

More information

Interagency Advisory Board Meeting Agenda, Tuesday, November 1, 2011

Interagency Advisory Board Meeting Agenda, Tuesday, November 1, 2011 Interagency Advisory Board Meeting Agenda, Tuesday, November 1, 2011 1. Opening Remarks (Mr. Tim Baldridge, IAB Chair) 2. FIPS 201-2 Update and Panel Discussion with NIST Experts in Q&A Session (Bill MacGregor

More information

MIS Week 9 Host Hardening

MIS Week 9 Host Hardening MIS 5214 Week 9 Host Hardening Agenda NIST Risk Management Framework A quick review Implementing controls Host hardening Security configuration checklist (w/disa STIG Viewer) NIST 800-53Ar4 How Controls

More information

The Benefits of Strong Authentication for the Centers for Medicare and Medicaid Services

The Benefits of Strong Authentication for the Centers for Medicare and Medicaid Services The Benefits of Strong Authentication for the Centers for Medicare and Medicaid Services This document was developed by the Smart Card Alliance Health and Human Services Council in response to the GAO

More information

FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication

FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication Jeremy Grant Managing Director, Technology Business Strategy Venable LLP jeremy.grant@venable.com @jgrantindc Digital: The Opportunity

More information

CertiPath TrustVisitor and TrustManager. The need for visitor management in FICAM Compliant PACS

CertiPath TrustVisitor and TrustManager. The need for visitor management in FICAM Compliant PACS CertiPath TrustVisitor and TrustManager The need for visitor management in FICAM Compliant PACS CertiPath TrustMonitor CertiPath TrustVisitor and TrustManager The need for visitor management in FICAM Compliant

More information

NFC Identity and Access Control

NFC Identity and Access Control NFC Identity and Access Control Peter Cattaneo Vice President, Business Development Agenda Basics NFC User Interactions Architecture (F)ICAM Physical Access Logical Access Future Evolution 2 NFC Identity

More information

Mobile: Purely a Powerful Platform; Or Panacea?

Mobile: Purely a Powerful Platform; Or Panacea? EBT: The Next Generation 2017 Mobile: Purely a Powerful Platform; Or Panacea? Evan O Regan, Director of Product Management Authentication & Fraud Solutions Entrust Datacard POWERFUL PLATFORM OR PANACEA

More information

Implementing Electronic Signature Solutions 11/10/2015

Implementing Electronic Signature Solutions 11/10/2015 Implementing Electronic Signature Solutions 11/10/2015 Agenda Methodology, Framework & Approach: High-Level Overarching Parameters Regarding Electronic Service Delivery Business Analysis & Risk Assessment

More information

IAB Minutes Page 1 of 6 April 18, 2006

IAB Minutes Page 1 of 6 April 18, 2006 IAB Minutes Page 1 of 6 The Interagency Advisory Board (IAB) meeting convened on Tuesday, April 17, 2006 at 9:15 AM at the Sheraton National Hotel in Arlington. After opening remarks by Randy Vanderhoof

More information

The Open Protocol for Access Control Identification and Ticketing with PrivacY

The Open Protocol for Access Control Identification and Ticketing with PrivacY The Open Protocol for Access Control Identification and Ticketing with PrivacY For Secure Contactless Transactions and Enabling Logical and Physical Access Convergence October 2010 Actividentity 2 OPACITY

More information

The HITRUST CSF. A Revolutionary Way to Protect Electronic Health Information

The HITRUST CSF. A Revolutionary Way to Protect Electronic Health Information The HITRUST CSF A Revolutionary Way to Protect Electronic Health Information June 2015 The HITRUST CSF 2 Organizations in the healthcare industry are under immense pressure to improve quality, reduce complexity,

More information

Guidelines for the Use of PIV Credentials in Facility Access

Guidelines for the Use of PIV Credentials in Facility Access NIST Special Publication 800-116 Revision 1 Guidelines for the Use of PIV Credentials in Facility Access Hildegard Ferraiolo Ketan Mehta Nabil Ghadiali Jason Mohler Vincent Johnson Steven Brady This publication

More information

2016 Global Identity Summit Pre-Conference Paper Hardening Authentication Technologies

2016 Global Identity Summit Pre-Conference Paper Hardening Authentication Technologies 2016 Global Identity Summit Pre-Conference Paper Hardening Authentication Technologies Paper development coordinated by Cathy Tilton, CSRA This is a community-developed document. Information and viewpoints

More information

August, Actividentity CTO Office

August, Actividentity CTO Office The Open Protocol for Access Control Identification and Ticketing with PrivacY For the Secure Enablement of converged Access and Contactless Transactions August, 2010 Actividentity CTO Office 2 What is

More information

U.S. E-Authentication Interoperability Lab Engineer

U.S. E-Authentication Interoperability Lab Engineer Using Digital Certificates to Establish Federated Trust chris.brown@enspier.com U.S. E-Authentication Interoperability Lab Engineer Agenda U.S. Federal E-Authentication Background Current State of PKI

More information

MAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013

MAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013 MAESON MAHERRY 3 Factor Authentication and what it means to business. Date: 21/10/2013 Concept of identity Access Control User Self-Service Identity and Access Management Authoritive Identity Source User

More information

Interagency Advisory Board Meeting Agenda, August 25, 2009

Interagency Advisory Board Meeting Agenda, August 25, 2009 Interagency Advisory Board Meeting Agenda, August 25, 2009 1. Opening Remarks 2. Policy, process, regulations, technology, and infrastructure to employ HSPD-12 in USDA (Owen Unangst, USDA) 3. Policy and

More information

Introduction of the Identity Assurance Framework. Defining the framework and its goals

Introduction of the Identity Assurance Framework. Defining the framework and its goals Introduction of the Identity Assurance Framework Defining the framework and its goals 1 IAEG Charter Formed in August of 07 to develop a global standard framework and necessary support programs for validating

More information

Biometrics. Overview of Authentication

Biometrics. Overview of Authentication May 2001 Biometrics The process of verifying that the person with whom a system is communicating or conducting a transaction is, in fact, that specific individual is called authentication. Authentication

More information

No More Excuses: Feds Need to Lead with Strong Authentication!

No More Excuses: Feds Need to Lead with Strong Authentication! No More Excuses: Feds Need to Lead with Strong Authentication! Dr. Sarbari Gupta sarbari@electrosoft-inc.com Annual NCAC Conference on Cybersecurity March 16, 2016 Electrosoft Services, Inc. 1893 Metro

More information

Trusted Computing Group

Trusted Computing Group Trusted Computing Group Backgrounder May 2003 Copyright 2003 Trusted Computing Group (www.trustedcomputinggroup.org.) All Rights Reserved Trusted Computing Group Enabling the Industry to Make Computing

More information

Interagency Advisory Board Meeting Agenda, March 5, 2009

Interagency Advisory Board Meeting Agenda, March 5, 2009 Interagency Advisory Board Meeting Agenda, 1. Opening Remarks (Tim Baldridge, NASA) 2. Federal Identity, Credential, and Access Management (ICAM) The Future of the Government s IDM Strategy (Judy Spencer,

More information

Interagency Advisory Board Meeting Agenda, December 7, 2009

Interagency Advisory Board Meeting Agenda, December 7, 2009 Interagency Advisory Board Meeting Agenda, December 7, 2009 1. Opening Remarks 2. FICAM Segment Architecture & PIV Issuance (Carol Bales, OMB) 3. ABA Working Group on Identity (Tom Smedinghoff) 4. F/ERO

More information

FedRAMP Digital Identity Requirements. Version 1.0

FedRAMP Digital Identity Requirements. Version 1.0 FedRAMP Digital Identity Requirements Version 1.0 January 31, 2018 DOCUMENT REVISION HISTORY DATE VERSION PAGE(S) DESCRIPTION AUTHOR 1/31/2018 1.0 All Initial document FedRAMP PMO i ABOUT THIS DOCUMENT

More information

Interagency Advisory Board Meeting Agenda, December 7, 2009

Interagency Advisory Board Meeting Agenda, December 7, 2009 Interagency Advisory Board Meeting Agenda, December 7, 2009 1. Opening Remarks 2. FICAM Segment Architecture & PIV Issuance (Carol Bales, OMB) 3. ABA Working Group on Identity (Tom Smedinghoff) 4. F/ERO

More information

Assuring Identity. The Identity Assurance Framework CTST Conference, New Orleans, May-09

Assuring Identity. The Identity Assurance Framework CTST Conference, New Orleans, May-09 Assuring Identity The Identity Assurance Framework CTST Conference, New Orleans, May-09 Brett McDowell, Executive Director, Liberty Alliance email@brettmcdowell +1-413-652-1248 1 150+ Liberty Alliance

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE Digital Policy Management consists of a set of computer programs used to generate, convert, deconflict, validate, assess

More information

How to Plan, Procure & Deploy a PIV-Enabled PACS

How to Plan, Procure & Deploy a PIV-Enabled PACS How to Plan, Procure & Deploy a PIV-Enabled PACS Access Control Council Webinar Series Session Two: Facility Characteristics & Risk Assessment Introductions Randy Vanderhoof, Secure Technology Alliance

More information

ENTERPRISE ARCHITECTURE

ENTERPRISE ARCHITECTURE ENTERPRISE ARCHITECTURE Executive Summary With more than $1 billion in information technology investments annually, the Commonwealth of Pennsylvania has evolved into the equivalent of a Fortune 20 organization,

More information

Dissecting NIST Digital Identity Guidelines

Dissecting NIST Digital Identity Guidelines Dissecting NIST 800-63 Digital Identity Guidelines KEY CONSIDERATIONS FOR SELECTING THE RIGHT MULTIFACTOR AUTHENTICATION Embracing Compliance More and more business is being conducted digitally whether

More information

Mandate. Delivery. with evolving. Management and credentials. Government Federal Identity. and. Compliance. using. pivclasss replace.

Mandate. Delivery. with evolving. Management and credentials. Government Federal Identity. and. Compliance. using. pivclasss replace. Simplifying Compliance with the U.S. Government Federal Identity Mandate The first in a series of papers on HID Global ss Federal Identity Initiative and Delivery Strategy U.S. government agencies are

More information

Unlocking The CHUID. Practical Considerations and Lessons Learned for PIV Deployments. Eric Hildre 07/18/2006

Unlocking The CHUID. Practical Considerations and Lessons Learned for PIV Deployments. Eric Hildre 07/18/2006 Unlocking The CHUID Practical Considerations and Lessons Learned for PIV Deployments Eric Hildre 07/18/2006 Purpose Provide practical considerations and lessons learned to the IAB from the Access Card

More information

Introduction to the Federal Risk and Authorization Management Program (FedRAMP)

Introduction to the Federal Risk and Authorization Management Program (FedRAMP) Introduction to the Federal Risk and Authorization Management Program (FedRAMP) 8/2/2015 Presented by: FedRAMP PMO 1 Today s Training Welcome! This training session is part one of the FedRAMP Training

More information

EU Passport Specification

EU Passport Specification Biometrics Deployment of EU-Passports EU Passport Specification (EN) 28/06/2006 (As the United Kingdom and Ireland have not taken part in the adoption of this measure, an authentic English version of the

More information

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop Total Operational Security Roger Roehr Executive Director, Roehr Consulting 8 th Annual Smart Cards

More information

Building an Assurance Foundation for 21 st Century Information Systems and Networks

Building an Assurance Foundation for 21 st Century Information Systems and Networks Building an Assurance Foundation for 21 st Century Information Systems and Networks The Role of IT Security Standards, Metrics, and Assessment Programs Dr. Ron Ross National Information Assurance Partnership

More information

A NEW MODEL FOR AUTHENTICATION

A NEW MODEL FOR AUTHENTICATION All Rights Reserved. FIDO Alliance. Copyright 2016. A NEW MODEL FOR AUTHENTICATION ENABLING MORE EFFICIENT DIGITAL SERVICE DELIVERY Jeremy Grant jeremy.grant@chertoffgroup.com Confidential 5 The world

More information

PKI is Alive and Well: The Symantec Managed PKI Service

PKI is Alive and Well: The Symantec Managed PKI Service PKI is Alive and Well: The Symantec Managed PKI Service Marty Jost Product Marketing, User Authentication Lance Handorf Technical Enablement, PKI Solutions 1 Agenda 1 2 3 PKI Background: Problems and Solutions

More information

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Standardization of Entity Authentication Assurance 5th ETSI Security Workshop 20-2222 January 2010 ETSI, Sophia Antipolis, France Erika McCallister, Esq.,

More information

Natural Security Alliance

Natural Security Alliance Natural Security Alliance Business model and pilot projects ITU 14 & 15 October 2014 Philippe'Batard' Batard&&&Partners' Summary Natural Security Alliance: an initiative from retailers and banks The solution

More information

FICAM Configuration Guide

FICAM Configuration Guide UTC Fire & Security Americas Corporation, Inc. 1212 Pittsford-Victor Road Pittsford, New York 14534 USA Tel 866.788.5095 Fax 585.248.9185 www.lenel.com Overview FICAM Configuration Guide The instructions

More information

Physical Access Control System (PACS) in a Federal Identity, Credentialing and Access Management (FICAM) Framework

Physical Access Control System (PACS) in a Federal Identity, Credentialing and Access Management (FICAM) Framework Physical Access Control System (PACS) in a Federal Identity, Credentialing and Access Management (FICAM) Framework PACS Best Practices using PKI-Authentication A SIA White Paper Security Industry Association

More information

The Benefits of EPCS Beyond Compliance August 15, 2016

The Benefits of EPCS Beyond Compliance August 15, 2016 The Trusted Source for Secure Identity Solutions The Benefits of EPCS Beyond Compliance August 15, 2016 Presenters Sheila Loy Director Healthcare Solutions HID Global Joe Summanen Technical Architect Nemours

More information

Secure Lightweight Activation and Lifecycle Management

Secure Lightweight Activation and Lifecycle Management Secure Lightweight Activation and Lifecycle Management Nick Stoner Senior Program Manager 05/07/2009 Agenda Problem Statement Secure Lightweight Activation and Lifecycle Management Conceptual Solution

More information

Approved 10/15/2015. IDEF Baseline Functional Requirements v1.0

Approved 10/15/2015. IDEF Baseline Functional Requirements v1.0 Approved 10/15/2015 IDEF Baseline Functional Requirements v1.0 IDESG.org IDENTITY ECOSYSTEM STEERING GROUP IDEF Baseline Functional Requirements v1.0 NOTES: (A) The Requirements language is presented in

More information

Strong Authentication for Physical Access using Mobile Devices

Strong Authentication for Physical Access using Mobile Devices Strong Authentication for Physical Access using Mobile Devices DoD Identity Protection and Management Conference May 15-17, 2012 Dr. Sarbari Gupta, CISSP, CISA sarbari@electrosoft-inc.com 703-437-9451

More information

HID goid Mobile ID Solution

HID goid Mobile ID Solution HID goid Mobile ID Solution Citizen ID Solutions Introducing HID goid for Citizen IDs on Smartphones HID goid platform for mobile IDs delivers the secure infrastructure to allow citizen ID s to be safely

More information

Interagency Advisory Board Meeting Agenda, July 28, 2010

Interagency Advisory Board Meeting Agenda, July 28, 2010 Interagency Advisory Board Meeting Agenda, July 28, 2010 1. Opening Remarks 2 Research Collaboration in the Cloud: How NCI and Research Partners Are Improving Business Processes using Digital Identities

More information