TWIC Transportation Worker Identification Credential. Overview

Similar documents
Office of Transportation Vetting and Credentialing. Transportation Worker Identification Credential (TWIC)

TWIC Program Overview for the Smart Cards in Government Conference March 10, 2004

Transportation Worker Identification Credential (TWIC) Steve Parsons Deputy Program Manager, TWIC July 27, 2005

FiXs - Federated and Secure Identity Management in Operation

Securing Federal Government Facilities A Primer on the Why, What and How of PIV Systems and PACS

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008

TWIC Next Generation Card Design

Credentialing Project Technical Architecture

Will Federated Cross Credentialing Solutions Accelerate Adoption of Smart Card Based Identity Solutions?

Strategies for the Implementation of PIV I Secure Identity Credentials

DATA SHEET. ez/piv CARD KEY FEATURES:

National Transportation Worker ID Card (TWIC) Credentialing Direct Action Group Functional Requirements DRAFT

Multiple Credential formats & PACS Lars R. Suneborn, Director - Government Program, HIRSCH Electronics Corporation

TWIC Readers What to Expect

Interagency Advisory Board Meeting Agenda, February 2, 2009

Single Secure Credential to Access Facilities and IT Resources

Version 3.4 December 01,

Interagency Advisory Board Meeting Agenda, Wednesday, May 23, 2012

June 17, The NPRM does not satisfy Congressional intent

Helping Meet the OMB Directive

Emergency Response Official Credentials: An Approach to Attain Trust in Credentials across Multiple Jurisdictions for Disaster Response and Recovery

000027

TWIC Implementation Challenges and Successes at the Port of LA. July 20, 2011

Secure Government Computing Initiatives & SecureZIP

IMPLEMENTING AN HSPD-12 SOLUTION

TWIC / CAC Wiegand 58 bit format

FIPS and NIST Special Publications Update. Smart Card Alliance Webinar November 6, 2013

CIP Cyber Security Personnel & Training

Using the Prototype TWIC for Access A System Integrator Perspective

CBEFF. Common Biometric Exchange Formats Framework. Catherine Tilton. 6 March W3C Workshop on SIV

Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance

TWIC Update to Sector Delaware Bay AMSC 8 June 2018

Physical Access End-to-End Security

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES

December 8, The Honorable John D. Rockefeller, IV Chairman Committee on Commerce, Science, and Transportation United States Senate

CIP Cyber Security Personnel & Training

TWIC or TWEAK The Transportation Worker Identification Credential:

Interagency Advisory Board Meeting Agenda, Wednesday, February 27, 2013

CertiPath TrustVisitor and TrustManager. The need for visitor management in FICAM Compliant PACS

Keith Ward Northrop Grumman IT Smart Card Security Solutions June 04, 2002

Executive Order 13556

NMSAC. Industry update. AAPA Security & Safety Seminar Wade Battles Managing Director Port of Houston Authority

(PIV-I) Trusted ID across States, Counties, Cities and Businesses in the US

CYBER SECURITY POLICY REVISION: 12

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES

DFARS Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017

National Biometric Security Project

Mandate. Delivery. with evolving. Management and credentials. Government Federal Identity. and. Compliance. using. pivclasss replace.

Smart Cards & Credentialing in the Federal Government

Responsible Officer Approved by

Published Privacy Impact Assessments on the Web. ACTION: Notice of Publication of Privacy Impact Assessments (PIA).

TWIC Reader Technology Phase

Biometric Use Case Models for Personal Identity Verification

INFORMATION TECHNOLOGY POLICY

Using PIV Technology Outside the US Government

This draft standard is being posted for an initial comment and ballot. The draft includes modifications to meet the directives of FERC Order No. 791.

Considerations for the Migration of Existing Physical Access Control Systems to Achieve FIPS 201 Compatibility

A. Introduction 1. Title: 2. Number: 3. Purpose: 4. Applicability: 4.1. Functional Entities: Balancing Authority Distribution Provider

University of Pittsburgh Security Assessment Questionnaire (v1.7)

Unified PACS with PKI Authentication, to Assist US Government Agencies in Compliance with NIST SP (HSPD 12) in a Trusted FICAM Platform

DoD & FiXs : Identity Superiority

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

Interagency Advisory Board Meeting Agenda, December 7, 2009

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

DoD Common Access Card Convergence of Technology Access/E-Commerce/Biometrics

Match On Card MINEX 2

Mobile Validation Solutions

The European Union approach to Biometrics

Federated Access. Identity & Privacy Protection

Mobile Derived Credentials Purebred Information Brief

Kansas City s Metropolitan Emergency Information System (MEIS)

Interagency Advisory Board Meeting Agenda, April 27, 2011

FICAM in Brief: A Smart Card Alliance Summary of the Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance

Why is the CUI Program necessary?

PKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006

An Overview of Draft SP Derived PIV Credentials and Draft NISTIR 7981 Mobile, PIV, and Authentication

Biometrics & Smart Cards In Use Today

State of Colorado Cyber Security Policies

CIVIL AVIATION REQUIREMENT SECTION 2 - AIRWORTHINESS SERIES E PART XII EFFECTIVE : FORTHWITH

Guide to Understanding FedRAMP. Version 2.0

Policy Document. PomSec-AllSitesBinder\Policy Docs, CompanyWide\Policy

FedRAMP: Understanding Agency and Cloud Provider Responsibilities

Policy on Standardization of Airport Access Security 14.May.2008

There is an increasing desire and need to combine the logical access and physical access functions of major organizations.

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard CIP Cyber Security Critical Cyber Asset Identification

Applying biometric authentication to physical access control systems

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop

Face recognition for enhanced security.

Higher Education PKI Initiatives

Global Reference Architecture: Overview of National Standards. Michael Jacobson, SEARCH Diane Graski, NCSC Oct. 3, 2013 Arizona ewarrants

The Common Controls Framework BY ADOBE

ACF Interoperability Human Services 2.0 Overview. August 2011 David Jenkins Administration for Children and Families

INNOMETRIKS INC. Rhino Quick Start Guide

Marine Security Overview

Guardium UI Login using a Smart card

Hong Kong Access Federation (HKAF) Identity Management Practice Statement (IMPS)

1. Post for 45-day comment period and pre-ballot review. 7/26/ Conduct initial ballot. 8/30/2010

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS

Transcription:

TWIC Transportation Worker Identification Credential Overview

TWIC Program Vision Goals Improve the security of identity management by establishing a system-wide common credential, universally acceptable across all transportation modes, for all personnel whose duties require unescorted physical and/or logical access to secure areas of the transportation system. Improve security Enhance commerce Protect personal privacy TWIC Overview Brief 2.0 May 2006 2

Scope of TWIC The TWIC is designed to be a tool for identity authentication. Possession of a valid TWIC allows the holder access only into areas where they have been granted privileges by the local asset owner. Only individual facilities grant access through their access control systems. Facilities control who is granted access to secure areas at their site and what level of access is granted. The TWIC program will provide an alert to facilities concerning card holders who have had their credential revoked and are no longer be eligible for unescorted access in secure areas. TWIC Overview Brief 2.0 May 2006 3

Driven by Legislation & Standards The TWIC Program provides a standards-based technical infrastructure for implementing requirements of legislation Aviation and Transportation Security Act (ATSA); Section 106 - Improved Airport Perimeter Access Security Maritime Transportation Security Act of 2002 (MTSA); Section 70105 Transportation Security Cards Homeland Security Presidential Directive 12 (HSPD-12) Common Standard for Federal Employees/Contractors NIST Federal Information Processing Standards Publication -- FIPS 201 Personal Identification Verification of Fed Employees/Contractors used by industry TWIC Overview Brief 2.0 May 2006 4

TWIC Solution Robust system design using commercial applications Enhanced Security Easy-to-recognize on-card security features Allows facilities to tailor solution to meet their needs Compliance with established standards (Ex/FIPS 201) Revocation alerts Facilitates Commerce Single credential to access multiple facilities Interfaces with existing security systems Protects Personal Privacy Limited personal information stored on the credential Security policies conform with Privacy Act Information securely encrypted in transit & in storage TWIC Overview Brief 2.0 May 2006 5

TWIC Process Transportation Workers 1 Enrollment / Eligibility 2 Vetting / Data Management Vetting: Terrorism Databases Criminal History Record Check Immigration Record Check Database Management: Record Storage Biometric Template Creation / One-to-Many Check Card Management 3 Card Production TSA Contractor 4 Card Issuance Government Card Production Facility Transportation Workers Local Facilities 5 Interoperable Access Control Government Responsibility Government Responsibility Facility Operator Responsibility Facility Operator Responsibility (Numbers Indicate Work-Flow) (Numbers Indicate Work-Flow) TWIC Overview Brief 2.0 May 2006 6

Card Security Features Sample prototype card shown, production card will differ in appearance Memory chip carries individual s unique biometric for identity match at reader. If the secured data doesn t match the individual s fingerprint, or the facility has not opened access to the individual the card cannot be used. TWIC Overview Brief 2.0 May 2006 7

TWIC Schedule 2004 2005 2006 2007 2008 Jan Apr Apr Jul Jul Oct Oct Jan Apr Jan Jul Apr Jul Oct Jan Jan Apr Apr Jul Jul Oct Oct Jan Apr Jan Jul Apr Jul Phase III: Prototype 11/17/04 Initial Operating Capability (IOC) 2/05 Full Operating Capability (FOC) Vendor Prototype Report Program Prototype Analysis and recommendations Request for Proposals Pre-Production Contract Award Production Phase IV: Production Maritime Mode First Maritime Implementation Period (18 months) Financial Structure Prototype / Sustainment = Appropriated / Carryover Implementation = User Fee Funded TWIC Overview Brief 2.0 May 2006 8

For additional information www.tsa.gov/twic or E-mail the TWIC Program Office at Credentialing@dhs.gov TWIC Overview Brief 2.0 May 2006 9