1 / 12

Office of the Chief Technology Officer Citywide IT Security (CWITS)

Office of the Chief Technology Officer Citywide IT Security (CWITS). State of Maryland Digital Government Summit. Identity Management June 25, 2004. AGENDA. Security Architecture Principles What is an Identity? n-Factor Authentication Identity Management Convergence

Download Presentation

Office of the Chief Technology Officer Citywide IT Security (CWITS)

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Office of the Chief Technology Officer Citywide IT Security (CWITS) State of Maryland Digital Government Summit Identity Management June 25, 2004

  2. AGENDA • Security Architecture Principles • What is an Identity? • n-Factor Authentication • Identity Management Convergence • What is Identity Management? • Effective Identity Management Program • Points of Contact • Questions & Answers 1

  3. Authentication Auditing Authorization Availability Confidentiality/ Privacy Non-repudiation Integrity Identification Security Architecture Principals 1

  4. What is an Identity? Identity - Is the fundamental concept of uniquely identifying an object (person, computer, application, service, etc.) as contained within an boundary (department, banking account, etc.). Digital Identity - The ability to assign a computerized identifier with or to a person, computer, component, or service. It is critical to determine the items of information required to collect. Digital Identity Lifecycle – Creation, Maintenance, and Removal/Destruction of Identity Information. 1

  5. Driver License Number Date of Birth Social Security Number Patient Account Number Employee Number Mother’s Name (Maiden) Job Title Identity Information Business Address Purchasing Authority Name Credit Card Home Address HIPAA - Protect Health Information (PHI) very critical data!

  6. N-Factor Authentication Methods(Use of Identity Information) Something that you HAVE (Token, Smart Card). Something that you ARE (Biometrics). Something that you NEED (Joint Signatures). Something that you KNOW (Password, PIN) Someplace where you are located (Computer, SITE). HANKS 1

  7. Identity Challenges • Identity Theft • Disclosure of Identity Information • Multiple Identity Islands • Mismanagement of Identity during Lifecycle 1

  8. Identity Management Convergence Business Requirements Information Technology Success

  9. Identity Management What is Identity Management? Access Management Rights Management Permission Management Directory Services Management Policy Management User/System Account Management Provisioning Management Password Management Certificate Management

  10. Effective Identity Management Program The 4 P’s Policies People/Organization Processes/ Procedures Products/ Technologies 1

  11. CWITS : Contact Information Terrence Lillard, CWITS Associate Director Terrence.Lillard@dc.gov (202) 727-8796 1

  12. Questions Answers 1

More Related