Spring 2013 icam day
This presentation is the property of its rightful owner.
Sponsored Links
1 / 5

Spring 2013 ICAM Day PowerPoint PPT Presentation


  • 45 Views
  • Uploaded on
  • Presentation posted in: General

Spring 2013 ICAM Day. Opening Remarks. Tackling Pressing Implementation Priorities. In the past year, the ICAMSC has tackled numerous challenges to help agencies comply with ICAM requirements and cybersecurity priorities. Work Item. Description. ICAM Value.

Download Presentation

Spring 2013 ICAM Day

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Spring 2013 icam day

Spring 2013 ICAM Day

Opening Remarks


Tackling pressing implementation priorities

Tackling Pressing Implementation Priorities

In the past year, the ICAMSC has tackled numerous challenges to help agencies comply with ICAM requirements and cybersecurity priorities.

  • Work Item

  • Description

  • ICAM Value

  • Supports compliance with the cybersecurity CAP goals and measures progress.

  • Reflects the use of PIV credentials for strong authentication and provides visibility into agency resources being accessed.

  • SLATT Metrics/MPAWG FISMA Metrics

  • Defines the security controls for a target state PACS and authentication patterns using PIV and PIV-I credentials.

  • PIV for Enterprise PACS Guidance

  • Supports mandatory agency use of PIV for PACS.

  • A technical specification for implementing and deploying derived PIV credentials to mobile IT platforms that do not support a smartcard.

  • Reflects the ICAMSC’s point of view for a secure, reliable, and interoperable identity credential.

  • Draft Inputs to SP 800-157

  • Relying Party Guidance for Accepting Externally-Issued Credentials

  • Promotes agency use of externally-issued credentials per OMB policy.

  • Supplemental guidance to the FICAM Roadmap on federation planning, architecture, and implementation.

  • Supports buy-in for continued implementation of HSPD-12 and cost-saving ICAM solutions.

  • Extensive slide presentation outlining the intent and value of investment in ICAM to garner leadership buy-in

  • Leadership Communication Materials

  • A standardized approach to govern attribute management and exchange and support access control policy decisions.

  • Supports the NSISS, mission needs to share identity data, and the use of ABAC.

  • FICAM Attribute Management Roadmap

  • Operational capability with common attribute and metadata services compliant with the BAE specification.

  • Supports flexible information sharing across organizational boundaries.

  • Backend Attribute Exchange Capability


Program of work review

Program of Work Review

The goal of the Program of Work Review is to facilitate frequent and consistent coordination across ICAMSC working group leadership and OMB to foster transparency in the direction of the ICAMSC and drive towards agreed upon work products.

  • Status:

  • The last program of work review was held in February 2012

  • During the year, additional work products were assigned when requested by OMB/NSS and others (FISMA metrics for PACs and CAP goals)

  • A survey was sent to the ICAMSC in May to solicit feedback

  • As new work priorities are established the working groups will be reconvened

    • Stay tuned for updates and encourage your agency’s participation

  • Participation of appropriate personnel at ICAM SC

  • Areas of Focus

  • Identify FY14 ICAMSC priorities and associated docket items

  • Review agency membership and solicit participation from under represented agencies

  • Consider structural changes to enhance participation


Icamsc strategic priorities

ICAMSC Strategic Priorities

Promote PIV use for strong authentication when accessing federally-controlled facilities and federal information systems

Address emerging challenges and technologies to enhance ICAM value (e.g., mobile devices, cloud computing) and measure government-wide implementation

Enable identity federation and attribute exchange capabilities to support mission collaboration and information sharing

Maintain the ICAM architecture and support government-wide implementation and performance


  • Login