NMFS FIS ER eSignature Project Risk Analysis October 1, 2008.

Slides:



Advertisements
Similar presentations
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Advertisements

NMFS FIS ER eSignature Project Risk Analysis October 1, 2008.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Public Key Infrastructure (PKI) Hosting Services.
Identity Assurance at Virginia Tech CSG January 13, 2010 Mary Dunker
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
Information Security Policies Larry Conrad September 29, 2009.
1 Trust Framework Portable Identity Schemes Trust Framework Portable Identity Schemes NIH iTrust Forum December 10, 2009 Chris Louden.
Introduction to the State-Level Mitigation 20/20 TM Software for Management of State-Level Hazard Mitigation Planning and Programming A software program.
Social Engineering Jero-Jewo. Case study Social engineering is the act of manipulating people into performing actions or divulging confidential information.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
Complying With The Federal Information Security Act (FISMA)
National Smartcard Project Work Package 8 – Security Issues Report.
Information Asset Classification
Chapter 10: Authentication Guide to Computer Network Security.
Information Security Technological Security Implementation and Privacy Protection.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
NMFS FIS ER eSignature Project Risk Analysis October 1, 2008.
Applied Technology Services, Inc. Your Partner in Technology Applied Technology Services, Inc. Your Partner in Technology.
HQ Expectations of DOE Site IRBs Reporting Unanticipated Problems and Review/Approval of Projects that Use Personally Identifiable Information Libby White.
PRIVACY AND INFORMATION SECURITY ESSENTIALS Information Security Policy Essentials Melissa Short, IT Specialist Office of Cyber Security- Policy.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
NMFS FIS ER eSignature Project Risk Analysis October 1, 2008.
Product Documentation Chapter 5. Required Medical Device Documentation  Business proposal  Product specification  Design specification  Software.
ITU-T X.1254 | ISO/IEC An Overview of the Entity Authentication Assurance Framework.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
Levels of Assurance in Authentication Tim Polk April 24, 2007.
U.S. Department of Agriculture eGovernment Program July 9, 2003 eAuthentication Initiative Update for the eGovernment Working Group eGovernment Program.
NIST E-Authentication Technical Guidance Bill Burr Manager, Security Technology Group National Institute of Standards and Technology
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
E-Authentication Overview & Technical Approach Scott Lowery Technical Track Session.
Innovation Software Corporation's Cultural Awareness Training Program Presentation by:
Innovation Software Corporation's Cultural Awareness Training Program Presentation by:
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
Internal Audit Section. Authorized in Section , Florida Statutes Section , Florida Statutes (F.S.), authorizes the Inspector General to review.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
E-Authentication Guidance Jeanette Thornton, Office of Management and Budget “Getting to Green with E-Authentication” February 3, 2004 Executive Session.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
How to Stay Out of Jail as an Entrepreneur
Audit Trail LIS 4776 Advanced Health Informatics Week 14
Auditing Concepts.
ITIL: Service Transition
How Can NRCS Clients Use the Conservation Client Gateway
Identity on the Internet
To the ETS – Accounts Setup and Preferences Online Training Course
Chapter 5: The Art of Ensuring Integrity
Authentication.
Service Organization Control (SOC)
Electronic Prescriptions for Controlled Substances
Red Flags Rule An Introduction County College of Morris
Confidentiality and Privacy Controls
E-Authentication: What Technologies Are Effective?
County HIPAA Review All Rights Reserved 2002.
HIMSS National Conference New Orleans Convention Center
Module 2 OBJECTIVE 14: Compare various security mechanisms.
To the ETS – Accounts Setup and Preferences Online Training Course
Appropriate Access InCommon Identity Assurance Profiles
Government Data Practices & Open Meeting Law Overview
HQ Expectations of DOE Site IRBs
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Colorado “Protections For Consumer Data Privacy” Law
Presentation transcript:

NMFS FIS ER eSignature Project Risk Analysis October 1, 2008

9/19/20082 NMFS eSignature Project Timeline Preliminary Schedule 7/25/08-- Stakeholder Communication Plan, which identifies stakeholders, the nature of their interest in NFMS eSignature solutions, their issues or concerns, points of contact and methods for keep relevant stakeholders informed and engaged. 8/27/08--Alternatives Analysis for technical approaches to eSignatures 10/1/08--Risk Assessment of pilots and assignment of assurance levels for pilots 10/15 Business plan (i.e., cost/benefit analysis) and implementation template drafted for Hawaii non-commercial bottomfish e-logbook and West Coast Groundfish logbook according to NMFS procedural directive /29/08-Capstone meeting to review draft business plan and implementation plan template prepared according to NMFS procedural directive with the intent to discuss:  Lessons learned  Next steps for remaining three pilots 12/5/2008--Presentation of preliminary results to stakeholders 12/19/2008--Critique of final project documents.

Table of Contents Legal and Policy Context  GPEA  OMB Policy  NIST Technical Guidance  Commerce/NOAA/NMFS policies E-Authentication/e-signature Risk Assessment Process National Marine Fisheries Service Pilot Systems Summary assessment of E-signature pilots based on the risk assessment process Next Steps

Legal and Policy Context for Electronic Authentication The Electronic Signatures in Global and National Commerce (E-SIGN) Act:  legitimates legal standing of e-signatures and contracts and transactions signed electronically. Technology neutral on e- signatures Government Paperwork Elimination Act--Section 1709(1) of GPEA reads:  “electronic signature” means a method of signing an electronic message that—(A) identifies and authenticates a particular person as the source of the electronic message; and (B) indicates such person’s approval of the information contained in the electronic message. E-Government Act of 2002—mostly emphasis on Privacy Impact Assessments

OMB e-Authentication Policy: OMB 04-04, December 6, 2003 Does not proscribe technologies or even assurance levels Definitions from NRC’s Who Goes There? Privacy Implications of Authentication. Attribute describes a property associated with an individual an identity of X” is the set of information about an individual X associated with that individual in a particular identity system Y Identification is the process of using claimed or observed attributes of an individual to infer who the individual is Authentication-- is the process of establishing confidence in the truth of some claim  Individual authentication is the process of establishing an understood level of confidence that an identifier refers to a specific individual  Attribute authentication is the process of establishing an understood level of confidence that an attribute applies to a specific individual  Identity Authentication is the process of establishing an understood level of confidence that an identifier refers to an identity Authorization is the process of deciding what an individual ought to be allowed to do

Commerce/NOAA/NMFS policy & guidelines Department of Commerce, National Oceanic & Atmospheric Administration, National Marine Fisheries Service NATIONAL MARINE FISHERIES SERVICE POLICY DIRECTIVE PD , September 7, 2006, Information Management : USE AND IMPLEMENTATION OF ELECTRONIC SIGNATURES NATIONAL MARINE FISHERIES SERVICE INSTRUCTION , JUNE 25, 2007, Information Management: Use and Implementation of Electronic Signatures, NMFSPD EVALUATION AND IMPLEMENTATION OFELECTRONIC SIGNATURES –PROCEDURAL DIRECTIVE

Five Step Process for Determining Desired Assurance Level (OMB Policy) First two steps are the primary focus for this presentation  Conduct risk assessment  Map identified risks to assurance level (Four levels outlined in next four pages)  Select technology based on NIST technical guidance  Validate that implemented system has achieved desired assurance level  Periodically reassess system to assure solution produces desired assurance.

4 Levels of Assurance—Level 1 (examples from OMB 04-04) Little or no confidence--A user presents a self-registered user ID or password to the U.S. Department of Education web page, which allows the user to create a customized “My.ED.gov” page. A third party gaining unauthorized access to the ID or password might infer personal or business information about the individual based upon the customization, but absent a high degree of customization however, these risks are probably very minimal. Some confidence High confidence Very high confidence

4 Levels of Assurance—Level 2 (examples from OMB 04-04) Little or no confidence Some confidence--An agency employee has access to potentially sensitive personal client information. She authenticates individually to the system at Level 2, but technical controls (such as a virtual private network) limit system access to the system to the agency premises. Access to the premises is controlled, and the system logs her access instances. In a less constrained environment, her access to personal sensitive information would create moderate potential impact for unauthorized release, but the system’s security measures reduce the overall risk to low. High confidence Very high confidence

4 Levels of Assurance—Level 3 (examples from OMB 04-04) Little or no confidence Some confidence High confidence—alternate examples from OMB  A patent attorney electronically submits confidential patent information to the US Patent and Trademark Office. Improper disclosure would give competitors a competitive advantage. (I would like to amend this one to be similar to level 2 where we say that additional controls bring this down to moderate)  First Responder accesses a disaster management reporting website to report an incident, share operational information, and coordinate response activities. Very high confidence

4 Levels of Assurance—Level 4 (examples from OMB 04-04) Little or no confidence Some confidence High confidence Very high confidence--A law enforcement official accesses a law enforcement database containing criminal records. Unauthorized access could raise privacy issues and/or compromise investigations.

Risk Assessment Process (Criteria from OMB 04-04, but range for likelihood proposed) Two criteria for risk assessment process:  Potential harm or impact (Selected examples to follow) Low Moderate High  Likelihood of harm or impact Low < 30 percent Moderate >30 and < 70 percent High > 70 percent

Categories of Harm and Impact from Risk Assessment Inconvenience, distress or damage to standing or reputation Financial loss Agency liability Harm to agency programs or public interest Unauthorized release of sensitive information Civil or criminal violations

Impact Examples for NMFS Potential impact of unauthorized release of sensitive information:  Low—at worst, a limited release of personal, U.S. government sensitive, or commercially sensitive information to unauthorized parties resulting in a loss of confidentiality with a low impact (i.e., limited adverse effect on organizational operations if one fishers’ logbook is accessed by another unauthorized fisher)  Moderate—at worst, a release of personal, U.S. government sensitive, or commercially sensitive information to unauthorized parties resulting in loss of confidentiality with a moderate impact (i.e., serious adverse impact on organizational operations if fishers become less compliant with reporting requirements if believe that their competitive information will be released accidently).  High—a release of personal, U.S. government sensitive, or commercially sensitive information to unauthorized parties resulting in loss of confidentiality with a high impact (i.e., severe or catastrophic adverse effect on organizational operations, which might include compromising future law enforcement activities).

Impact Examples for NMFS Potential impact of inconvenience, distress, or damage to standing or reputation:  Low—at worst, limited, short-term inconvenience, distress or embarrassment to any party, where NMFS and one or two parties know of a problem, but is not known to the general public.  Moderate—at worst, serious short term or limited long-term inconvenience, distress or damage to the standing or reputation of any party, which might involve one-time negative press reports for the agency.  High—severe or serious long-term inconvenience, distress or damage to the standing or reputation of any party (ordinarily reserved for situations with particularly severe effects or which affect many individuals, like when NFMS loses credibility across a whole region or for stewarding a particular species of fish.)

Impact Examples for NMFS The potential impact of civil or criminal violations is:  Low—at worst, a risk of civil or criminal violations of a nature that would not ordinarily be subject to enforcement efforts. This might include failure to report or under-reporting or misreporting catch.  Moderate—at worst, a risk of civil or criminal violations that may be subject to enforcement efforts. Example include impersonation in e-logbook transactions and repudiation of the transaction or signature to escape accountability.  High—a risk of civil or criminal violations that are of special importance to enforcement programs. No known NMFS example.

Assurance Level Impact Profiles Potential Impact Categories for Authentication Errors Inconvenience, distress or damage to standingLow Mod Mod High or reputation Financial loss or agency liability Low Mod Mod High Harm to agency programs or public interests N/A Low Mod High Unauthorized release of sensitive information N/A Low Mod High Civil or criminal violations N/A Low Mod High *Potential Impact Categories for Authentication Errors: OMB * Risk analysis is to some extent a subjective process, in which agencies must consider harms that might result from, among other causes, technical failures, malevolent third parties, public misunderstandings, and human error. Once risks have been identified, there may also be ways to adjust the business process to mitigate particular risks by reducing the likelihood that they will occur. (page 8, OMB M 04-04)

NIST Special Publication : Electronic Authentication Guideline Authentication technology works with policy and process to produce authentication solution Totality of authentication solution mitigates risks Does not proscribe technical solutions, but provides an array of options for each level of assurance

NIST Special Publication Authentication solutions for specified assurance levels Level 1  No identity proofing requirement at this level  Anonymous credential OK  Some assurance that the same claimant is accessing the protected transaction or data.  Wide range of available authentication technologies to be employed and allows any of the token methods of Levels 2, 3 or 4, including PINS.  May also use tunneled passwords and challenge/response protocols

NIST Special Publication Level 2  Identify proofing and registration provides sufficient assurance for relatively low risk business transactions with low probabilities of moderate impact from risk assessment.  Anonymous credential OK  A wide range of available authentication technologies can be employed at Level 2.  Any of the token methods of Levels 3 or 4, including passwords, are allowable  Successful authentication requires that the claimant prove through a secure authentication protocol (i.e., tunneled password protocol like SSL or TLS) that he or she controls the token.

NIST Special Publication Level 3  Multi-factor remote network authentication.  Identity proofing procedures require verification of identifying materials and information.  Level 3 authentication is based on proof of possession of a key or a one-time password through a cryptographic protocol.  Requires cryptographic strength mechanisms that protect the primary authentication token  A minimum of two authentication factors is required.  Requires that the claimant prove through a secure authentication protocol that he or she controls the token, and must first unlock the token with a password or biometric, or must also use a password in a secure authentication protocol

NIST Special Publication Level 4  Based on proof of possession of a key through a cryptographic protocol.  Level 4 is similar to Level 3 except that only “hard” cryptographic tokens are allowed  FIPS cryptographic module validation requirements are strengthened, and subsequent critical data transfers must be authenticated via a key bound to the authentication process.  By requiring a physical token, which cannot readily be copied and since FIPS requires operator authentication at Level 2 and higher, this level ensures good, two factor remote authentication.  Strong cryptographic authentication of all parties and all sensitive data transfers between the parties.

NIST Special Publication Tokens are something that the user possesses and controls that may be used to authenticate the claimant’s identity. The user authenticates to a system or application over a network. A token shall include some secret information and it is important to provide security for the token. The three factors often considered as the cornerstones of authentication:  Something you know (for example, a password)  Something you have (for example, a cryptographic key or smart card)  Something you are (for example, a voice print or other biometric)

NIST Special Publication Hard token – a hardware device that contains a protected cryptographic key. Authentication is accomplished by proving possession of the device and control of the key. Soft token – a cryptographic key that is typically stored on disk or some other media. Authentication is accomplished by proving possession and control of the key. The soft token shall be encrypted under a key derived from a password known only to the user, so knowledge of a password is required to activate the token. One-time password device token - a personal hardware device that generates “one time” passwords for use in authentication. Password token – a secret character string that a claimant memorizes and uses to authenticate his or her identity.

NIST Authentication Mapping (Token Type) Level 1Level 2Level 3Level 4 Hard crypto token √√√√ Soft crypto token √√√ Zero knowledge password √√√ One-time password device √√√ Strong password √√ PIN √ Note: This is not the assurance level for the authentication solution; just the token

Thoughts on Strong Passwords “People either choose not to use or make errors in systems that are not designed with their limits in mind; this can result in compromises to privacy.” (NRC Report Finding 4.1)

National Permits Systems: Summary Risk Assessment Users and functionality  Range from large multinational corporations to small family businesses.  Generally technologically sophisticated,  Technology presumably makes record-keeping and reporting less burdensome Transactions  Data sensitivity-varied by can include Privacy Act data and business confidential data Mitigating control processes  both parties to the transaction (typically the fisher and the fish processor) are permitted entities and each has some responsibility for accurate and complete record-keeping and reporting  Verification of name and Tax Identification Number, required by Debt Collection Improvement Act, provides significant confidence that the party is who they claim to be.  Existing permit holders may have considerable value in the system; for example, they may own fisheries quota that has significant market value that they will not want to jeopardize. but renewals are processed in the context of a rich ongoing relationship among the permit holder, the permit holder's partners in business transactions, and the agency, and deceptions with respect to an individual's identity would be difficult to sustain in this context.  New permit applications generally involve processing rigor commiserate with the value of the permit. This may involves confirming vessel ownership with the US Coast Guard, verifying participation in prior fisheries through previously submitted state or federal fish tickets or logbooks, confirmation of business ownership, etc. Potential impact:  Inconvenience, distress or damage to standing or reputation √ low to moderate  Financial loss or agency liability: √ low to moderate  Harm to agency programs or public interest: √ low to moderate  Unauthorized release of sensitive information: √ low to moderate  Civil or criminal violations: √ low to moderate Likelihood of harm or impact : Generally low to moderate Presumed Assurance level : 2

Hawaii Non-Commercial Bottomfish Logbook: Summary Risk Assessment Users and functionality  Non-commercial means recreational and subsistence.  No commercial software vendors are currently addressing this market.  NMFS is developing a web-based application for online reporting at the end of a day-trip.  Users are expected to report at the end of the day when they return to a place where they have computer/internet access. Transactions  Data sensitivity-varied by can include Privacy Act data and confidential data as defined by the Magnuson- Stevens Fishery Conservation and Management Reauthorization Act  Volume–users might range from 50 to 5,000 vessels with the potential of multiple reports per vessels and an unknown number of trips per year Mitigating control processes  It may be possible to validate some registrants through NPS.  There is a strong need for the information and little leverage for enforcement. Potential impact:  Inconvenience, distress or damage to standing or reputation √ low  Financial loss or agency liability: √ low  Harm to agency programs or public interest: √ low to moderate  Unauthorized release of sensitive information: √ low  Civil or criminal violations: √ low to moderate Likelihood of harm or impact: low Presumed Assurance level: 1

Hawaii Longline Logbook: Summary Risk Assessment Users and functionality  Mid-size vessels (vicinity of 70ft) that have GPS, VMS, and sophisticated fish-finding technology where the operator of the fishing vessel is the end-user.  Some have e-logbook software onboard integrated with track plotting systems.  This e-logbook application includes a unique identifier via a hardware dongle which could be used to identify data from the vessel.  E-Logbook Vendor Certification Guidelines are in the approval process that would allow a vendor to promote an e-logbook application as NMFS-approved for e-logbook compliance.  Functionality would be creation/maintenance of the e-logbook record, storage of the e-logbook records on portable media (floppy, cd, memory stick), and physical transfer of the portable media to NMFS... or, alternatively, transmission of e-logbook records to NMFS Transactions  Data sensitivity requirements include the Privacy Act, Magnuson-Stevens Fishery Conservation and Management Reauthorization Act, FOIA, Halibut Act and the Trade Secrets Act  Up to 200 vessels with the possibility of daily reporting per vessel over time. Might start with reporting with each landing, about every several week per vessel. Mitigating control processes  Both parties to the transaction (typically the fisher and the fish processor) are permitted entities and each has some responsibility for accurate and complete record-keeping and reporting  Verification of name and Tax Identification Number, required by Debt Collection Improvement Act, provides significant confidence that the party is who they claim to be. Potential impact:  Inconvenience, distress or damage to standing or reputation √ low  Financial loss or agency liability: √ low  Harm to agency programs or public interest: √ low  Unauthorized release of sensitive information: √ low  Civil or criminal violations: √ low to moderate Likelihood of harm or impact : low Presumed Assurance level: 1

West Coast Federal Fixed Gear Logbook: Summary Risk Assessment Users and functionality  Some technologically advanced vessels in the foot range, but also some small vessels, perhaps as small as sixteen feet, fishing with rod and reel and potentially no technology aboard.  Current conceptual design anticipates vessels hosting e-logbook software on a PC onboard the vessel and reporting as required (at the end of a day or trip) via from the vessel, or alternatively, reporting by from home after completion of a day-trip.  Combinations might be accommodated; perhaps capturing the data on a PC, saving it to portable media such as a memory stick, taking the memory stick home after the day-trip, and transmitting the file from home via .  Near to real-time information on catch and bycatch is required as an element of National Standard 1 (NS1). Transactions  Data sensitivity requirements include the Privacy Act, Magnuson-Stevens Fishery Conservation and Management Reauthorization Act, FOIA, Halibut Act and the Trade Secrets Act  Approximately 500 vessels. Conceptual design would have these vessels reporting daily when they fish. These vessels may fish for up to nine months per year, so transactions volumes could approach 500/day and 135,000/year. Mitigating control processes  Both parties to the transaction (typically the fisher and the fish processor) are permitted entities and each has some responsibility for accurate and complete record-keeping and reporting  Verification of name and Tax Identification Number, required by Debt Collection Improvement Act, provides significant confidence that the party is who they claim to be.  Users have "trusted relationship" with NMFS based on prior relationship that involves confirming vessel ownership with the US Coast Guard, verifying participation in prior fisheries through previously submitted state or federal fish tickets or logbooks, confirmation of business ownership, etc. Potential impact:  Inconvenience, distress or damage to standing or reputation √ low  Financial loss or agency liability: √ low  Harm to agency programs or public interest: √ low  Unauthorized release of sensitive information: √ low  Civil or criminal violations: √ low Likelihood of harm or impact: low Presumed Assurance level: 1

West Coast E-Fish Ticket: Summary Risk Assessment Users and functionality  The trawl fleet (whiting) is most technology sophisticated fleet in the Northwest Region, but, by regulation fish tickets are reported by processors.  Whiting processors are large permanent shoreside facilities which will be completely comfortable with this type of technology. If/when e-ticket technology expands to other fisheries it is important to recognize that some processors are in the "white van fleet", without a fixed base of operations or any technology beyond a cell phone.  Near to real-time information on catch and bycatch is required as an element of National Standard 1 (NS1). Transactions  Data sensitivity requirements include the Privacy Act, Magnuson-Stevens Fishery Conservation and Management Reauthorization Act, FOIA, Halibut Act and the Trade Secrets Act  In the Northwest Region the states have existing fish ticket programs (actually 26 of them). These were originally developed for revenue purposes, but the fish tickets have become multi-purpose documents, functioning as a receipt between buyer and seller, as a record of catch (and sometimes of effort) for fisheries management, as documentation of participation in a fishery, as a record of gross profit for calculation of crew shares, as documentation of value for economic analysis, and of course the original purpose of government tax records.  The current whiting fishery fish ticket volume is 40 boats for up to 20 days of fishing, for a ceiling of approximately 800 transactions. The potential of e-ticket transactions would eventually approach the total volume of fish tickets on the West Coast. (which is ????). Mitigating control processes  Both parties to the transaction (typically the fisher and the fish processor) are permitted entities and each has some responsibility for accurate and complete record-keeping and reporting  Verification of name and Tax Identification Number, required by Debt Collection Improvement Act, provides significant confidence that the party is who they claim to be.  Users have "trusted relationship" with NMFS based on prior relationship that involves confirming vessel ownership with the US Coast Guard, verifying participation in prior fisheries through previously submitted state or federal fish tickets or logbooks, confirmation of business ownership, etc. Potential impact:  Inconvenience, distress or damage to standing or reputation √ low  Financial loss or agency liability: √ low  Harm to agency programs or public interest: √ low  Unauthorized release of sensitive information: √ low  Civil or criminal violations: √ low Likelihood of harm or impact: low Presumed Assurance level: 1

NMFS Risk Mitigation Through E-Authentication (in process) Policy  A  B Business process  ID proofing through NPS registration process  Mitigating controls from pilot section of wiki Technology  Data encryption (SSL or VPN) for confidentiality  User name/password to validate user identity May combine technologies or all three above to increase assurance level of solution

Recommended eSignature Solution Framework for NMFS (in process) NMFS policy, processes and technology provide a strong foundation for eSignature solutions eSignature technology does not assume all risk mitigation, as existing policy and process create a comprehensive authentication solution. Assuming any E-Authentication solution will work within existing risk mitigation processes,NMFS can use PIN and/or password for eSignature and E- Authentication for level 2 assurance for:  NPS  E-logs  Trip/Fish Tickets  Planned systems (subject to possible reanalysis) ?

Next Steps for Analysis (in process) This report contains a set of recommendation for assurance levels and potential e-authentication solutions Per OMB policy, check periodically that eSignature and e- authentication solutions provide desired assurance level Review and revise risk assessment for e-government applications as necessary when impact or probability of risks change Next Steps for Team  ?