1 / 5

Spring 2013 ICAM Day

Spring 2013 ICAM Day. Opening Remarks. Tackling Pressing Implementation Priorities. In the past year, the ICAMSC has tackled numerous challenges to help agencies comply with ICAM requirements and cybersecurity priorities. . Work Item. Description. ICAM Value.

hua
Download Presentation

Spring 2013 ICAM Day

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Spring 2013 ICAM Day Opening Remarks

  2. Tackling Pressing Implementation Priorities In the past year, the ICAMSC has tackled numerous challenges to help agencies comply with ICAM requirements and cybersecurity priorities. • Work Item • Description • ICAM Value • Supports compliance with the cybersecurity CAP goals and measures progress. • Reflects the use of PIV credentials for strong authentication and provides visibility into agency resources being accessed. • SLATT Metrics/MPAWG FISMA Metrics • Defines the security controls for a target state PACS and authentication patterns using PIV and PIV-I credentials. • PIV for Enterprise PACS Guidance • Supports mandatory agency use of PIV for PACS. • A technical specification for implementing and deploying derived PIV credentials to mobile IT platforms that do not support a smartcard. • Reflects the ICAMSC’s point of view for a secure, reliable, and interoperable identity credential. • Draft Inputs to SP 800-157 • Relying Party Guidance for Accepting Externally-Issued Credentials • Promotes agency use of externally-issued credentials per OMB policy. • Supplemental guidance to the FICAM Roadmap on federation planning, architecture, and implementation. • Supports buy-in for continued implementation of HSPD-12 and cost-saving ICAM solutions. • Extensive slide presentation outlining the intent and value of investment in ICAM to garner leadership buy-in • Leadership Communication Materials • A standardized approach to govern attribute management and exchange and support access control policy decisions. • Supports the NSISS, mission needs to share identity data, and the use of ABAC. • FICAM Attribute Management Roadmap • Operational capability with common attribute and metadata services compliant with the BAE specification. • Supports flexible information sharing across organizational boundaries. • Backend Attribute Exchange Capability

  3. Program of Work Review The goal of the Program of Work Review is to facilitate frequent and consistent coordination across ICAMSC working group leadership and OMB to foster transparency in the direction of the ICAMSC and drive towards agreed upon work products. • Status: • The last program of work review was held in February 2012 • During the year, additional work products were assigned when requested by OMB/NSS and others (FISMA metrics for PACs and CAP goals) • A survey was sent to the ICAMSC in May to solicit feedback • As new work priorities are established the working groups will be reconvened • Stay tuned for updates and encourage your agency’s participation • Participation of appropriate personnel at ICAM SC • Areas of Focus • Identify FY14 ICAMSC priorities and associated docket items • Review agency membership and solicit participation from under represented agencies • Consider structural changes to enhance participation

  4. ICAMSC Strategic Priorities Promote PIV use for strong authentication when accessing federally-controlled facilities and federal information systems Address emerging challenges and technologies to enhance ICAM value (e.g., mobile devices, cloud computing) and measure government-wide implementation Enable identity federation and attribute exchange capabilities to support mission collaboration and information sharing Maintain the ICAM architecture and support government-wide implementation and performance

More Related