1 HSPD-12 Compliance: The Role of Federal PKI Judith Spencer Chair, Federal Identity Credentialing Office of Governmentwide Policy General Services Administration.

Slides:



Advertisements
Similar presentations
June 27, 2005 Preparing your Implementation Plan.
Advertisements

JCAHO –A HIPAA Business Associate National HIPAA Summit
Cerner Presentation to S&I esMD Workgroup – Industry Scan
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
1 U.S. General Services Administration E-Government Procurement: Standard Transactions and Interoperability David Temoshok Director, Federal Identity Management.
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
The Legal Foundation TRICARE Management Activity HEALTH AFFAIRS 2009 Data Protection Seminar TMA Privacy Office.
FIPS 201 Framework: Special Pubs ,76,78 Jim Dray HSPD-12 Workshop May 4/5, 2005.
Status of U.S. Smart Card Deployment Jim Dray Porvoo 7/ World eID Meeting May 2005.
Single Sign-On and Federated Authentication at NIH and Beyond
Appropriate Access InCommon Identity Assurance Profiles David L. Wasley Campus Architecture and Middleware Planning workshop February 2008.
Overview of US Federal Identity Management Initiatives Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority and Asst. CIO E-Authentication, NIH.
Brian Epley, VA PIV Program Manager
Institutional Transformation of Government in the Network Society Jane E. Fountain Director, National Center for Digital Government Harvard University.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
The Federation for Identity and Cross-Credentialing Systems (FiXs) FiXs ® - Federated and Secure Identity Management in Operation Implementing.
15June’061 NASA PKI and the Federal Environment 13th Fed-Ed PKI Meeting 15 June ‘06 Presenter: Tice DeYoung.
1 1 A Synopsis of Federal Information Processing Standard (FIPS) 201 for Personal Identity Verification (PIV) of Federal Employees and Contractors Presentation.
Public Key Infrastructure (PKI) Hosting Services.
Department of Health and Human Services Personal Identity Verification Training APPLICANT.
1 Federal Identity Management and Homeland Security Presidential Directive 12 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide.
Identity Assurance at Virginia Tech CSG January 13, 2010 Mary Dunker
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
Federal Identity Management
“Personal Identity Verification (PIV) of Federal Employees and Contractors” October 27, 2005 Homeland Security Presidential Directive 12 (HSPD-12)
Department of Labor HSPD-12
National Institute of Standards and Technology 1 NIST Guidance and Standards on System Level Information Security Management Dr. Alicia Clay Deputy Chief.
Security Controls – What Works
Federal Information Processing Standard (FIPS) 201, Personal Identity Verification for Federal Employees and Contractors Tim Polk May.
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Office of the Chief Information Officer EFCOG Annual Meeting Fred Catoe (IM-32) U.S. Department of Energy.
PIV Data Model Testing Ketan Mehta March 3, 2006.
E-Authentication: What Technologies Are Effective? Donna F Dodson April 21, 2008.
1 Implementation of Homeland Security Presidential Directive 12 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide FED/ED.
The E-Authentication Initiative: A Status Report Presented at Educause Meeting June 16, 2004 The E-Authentication Initiative.
NASA Personal Identity Verification (PIV) NASA Personal Identity Verification (PIV) High Level System Overview Tice F. DeYoung, PhD 14th Fed/Ed Workshop.
Complying With The Federal Information Security Act (FISMA)
Federal CIO Council Information Security and Identity Management Committee IDManagement.gov FICAM Testing Program and Approved Products List (APL) Overview.
IdM Identity Proofing & Registration Gary Chapman David Millman September 2006.
E-Authentication: The Need for Open-Standards in Implementing E-Government October 6, 2004 The E-Authentication Initiative.
HSPD-12 and FIPS-201 Overview v Learning Objectives At the end of this course, you will be able to: Describe Homeland Security Presidential Directive.
Special Publication : Interfaces for Personal Identity Verification Jim Dray NIST NPIVP Workshop March 3, 2006.
1 The Government-wide Implementation of Homeland Security Presidential Directive 12 (HSPD-12) David Temoshok Director, Identity Policy and Management GSA.
U.S. General Services Administration Federal Technology Service November 9, 1999 Judith Spencer Director, Center for Governmentwide Security Office of.
E-Authentication: The Need for Public and Private Sector Trust David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Business and Systems Aligned. Business Empowered. TM Federal Identity Management Handbook May 5, 2005.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
Levels of Assurance in Authentication Tim Polk April 24, 2007.
Non-Employee Identity System (NEIS) Adjudicator Training.
Non-Employee Identity System (NEIS) Adjudicator Training.
HSPD-12 Identity Management Initiative Carol Bales Senior Policy Analyst United States Office of Management and Budget North American Day 2006.
NIST E-Authentication Technical Guidance Bill Burr Manager, Security Technology Group National Institute of Standards and Technology
E-Authentication Overview & Technical Approach Scott Lowery Technical Track Session.
1 Federal Identity Management Initiatives Federal Identity Management Initatives David Temoshok Director, Identity Policy and Management GSA Office of.
Fax: (703) DoD BIOMETRICS PROGRAM DoD Biometrics Management Office Phone: (703)
1 Federal Identity Management Infrastructure and Policy David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide August 15,
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
E-Authentication Guidance Jeanette Thornton, Office of Management and Budget “Getting to Green with E-Authentication” February 3, 2004 Executive Session.
Transforming the Business of Government Through Shared Services JOHN SINDELAR Deputy Associate Administrator United States General Services Administration.
NAAS 2.0 Features and Enhancements
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
E-Authentication: What Technologies Are Effective?
HIMSS National Conference New Orleans Convention Center
Preparing your Implementation Plan
NASA Personal Identity Verification (PIV) High Level System Overview Tice F. DeYoung, PhD 14th Fed/Ed Workshop December 14, 2006.
E-Government Procurement: Standard Transactions and Interoperability David Temoshok Director, Federal Identity Management GSA Office of Governmentwide.
A Quick Tour of the FIPS 201 Revision
Presentation transcript:

1 HSPD-12 Compliance: The Role of Federal PKI Judith Spencer Chair, Federal Identity Credentialing Office of Governmentwide Policy General Services Administration

2 Genesis July 2001 – Presidential commitment to moving E-Government forward February 2002 – E-Authentication Initiative launched April 2003 – CIO Council charters Federal Identity Credentialing Committee December 2003 – E-Authentication Guidance to Federal Agencies issued August 2004 – HSPD-12 Issued

3 1. Federal Asset Sales 2. Online Rulemaking Management 3. Simplified and Unified Tax and Wage Reporting 4. Consolidated Health Informatics 5. Business Compliance 1 Stop 6. Int’l Trade Process Streamlining Government to Govt. Internal Effectiveness and Efficiency 1. e-Vital (business case) 2. e-Grants 3. Disaster Assistance and Crisis Response 4. Geospatial Information One Stop 5. Wireless Networks 1. e-Training 2. Recruitment One Stop 3. Enterprise HR Integration 4. e-Travel 5. e-Clearance 6. e-Payroll 7. Integrated Acquisition 8. e-Records Management PMC E-Government Agenda Government to BusinessGovernment to Citizen 1. USA Service 2. EZ Tax Filing 3. Online Access for Loans 4. Recreation One Stop 5. Eligibility Assistance Online

4 The Mandate Home Security Presidential Directive 12 (HSPD-12): “Policy for a Common Identification Standard for Federal Employees and Contractors” Dated: August 27, 2004

5 The Control Objectives Secure and reliable forms of personal identification that are: Based on sound criteria to verify an individual employee’s identity Strongly resistant to fraud, tampering, counterfeiting, and terrorist exploitation Rapidly verified electronically Issued only by providers whose reliability has been established by an official accreditation process

6 Applicability & Use Applicable to all government organizations and contractors (except identification associated with National Security Systems) Used for access to Federally-controlled facilities and logical access to Federally-controlled information systems Flexible in selecting appropriate security level – includes graduated criteria from least secure to most secure Implemented in a manner that protects citizens’ privacy

7 Sound Criteria to Verify an Individual Employee’s Identity Organization shall use an approved identity proofing and registration process including: ― Require two identity source documents in original form from the list associated with Form I-9, Employment Eligibility Verification. At least one document shall be a valid State or Federal government-issued picture identification ― National Agency Check with Written Inquiries (NACI) or equivalent. ― FBI National Criminal History Fingerprint Check completion before credential issuance. ― In-person appearance at least once before credential issuance Controls must ensure that no single individual can authorize issuance of a PIV credential Standardize the Identity Credential Issuance Process as follows:

8 Strongly resistant to fraud, tampering, counterfeiting, and terrorist exploitation Mandatory Electronic Data All data from Topology PIN Cardholder Unique Identifier (CHUID) PIV Authentication Data (asymmetric key pair and corresponding PKI certificate) Two biometric fingerprints Optional Electronic Data: Asymmetric key pair and corresponding certificate for digital signatures Asymmetric key pair and corresponding certificate for key management Asymmetric or symmetric card authentication keys for supporting confidentiality (encryption) Additional biometrics Minimum Cryptographic mechanisms specified in SP

9 FIPS-201 Requirements (Section 4.3) The PIV Card has a single mandatory key and four types of optional keys: + The PIV authentication key shall be an asymmetric private key supporting card authentication for an interoperable environment, and it is mandatory for each PIV Card. + The card authentication key may be either a symmetric (secret) key or an asymmetric private key for physical access, and it is optional. + The digital signature key is an asymmetric private key supporting document signing, and it is optional. + The key management key is an asymmetric private key supporting key establishment and transport, and it is optional. This can also be used as an encryption key. + The card management key is a symmetric key used for personalization and post- issuance activities, and it is optional. All PIV cryptographic keys shall be generated within a FIPS validated cryptomodule with overall validation at Level 2 or above. In addition to an overall validation of Level 2, the PIV Card shall provide Level 3 physical security to protect the PIV private keys in storage.

10 Determining Assurance Levels E-Authentication Guidance for Federal Agencies, issued by the Office of Management & Budget, Dec. 16, 2003 — — About identity authentication, not authorization or access control — Incorporates Standards for Security Categorization of Federal Information and Information Systems (FIPS-199) NIST SP800-63: Recommendation for Electronic Authentication — Companion to OMB e-Authentication guidance — — Covers conventional token based remote authentication

11 M-04-04:E-Authentication Guidance for Federal Agencies OMB Guidance establishes 4 authentication assurance levels Level 4Level 3Level 2Level 1 Little or no confidence in asserted identity Some confidence in asserted identity High confidence in asserted identity Very high confidence in the asserted identity Assurance Levels Self-assertion minimum records On-line, instant qualification – out-of- band follow-up On-line with out-of- band verification for qualification Cryptographic solution In person proofing Record a biometric Cryptographic Solution Hardware Token

12 Assurance Level Impact Profiles Potential Impact Categories for Authentication Errors 1234 Inconvenience, distress or damage to standing or reputation LowMod High Financial loss or agency liabilityLowMod High Harm to agency programs or public interestsN/ALowModHigh Unauthorized release of sensitive informationN/ALowModHigh Personal SafetyN/A LowMod High Civil or criminal violationsN/ALowModHigh Maximum Potential Impacts

13 Implementing PKI in accordance with FIPS-201 X.509 Certificate Policy for the Federal Common Policy Framework –Provides minimum requirements for Federal agency implementation of PKI –Operates at FBCA Medium Assurance/E-Authentication Levels 3 and 4 –Cross-certified with the FBCA –Governing policy for the Shared PKI Service Provider program Certified PKI Shared Service Provider Program –Evaluates services against the Common Policy Framework –Conducts Operational Capabilities Demonstrations –Populates Certified Provider List with service providers who meet published criteria –Agencies not operating an Enterprise PKI must buy PKI services from certified providers

14 Approved Shared Service Providers Verisign, Inc Cybertrust Operational Research Consultants USDA/National Finance Center Agencies operating an Enterprise PKI cross-certified with the FBCA at Medium Assurance or higher are considered compliant with FIPS-201. In January 2008, these Enterprise PKIs will start including the Common Policy OIDs in their certificates.

15 Acquisition Policy Strategy Two new FAR Rules FAR Case –Addresses HSPD-12 requirements –Interim rule issued end of CY-05 FAR Case –Directs agencies to acquire only approved products –Interim Rule in Committee awaiting final approval OMB Guidance designates GSA as the “executive agent for Government-wide acquisitions of information technology" for the products and services required by HSPD-12 Acquisition services will be offered via GSA Schedule Contracts

16 For More Information Supporting Publications — FIPS-201 – Personal Identity Verification for Federal Employees and Contractors — SP – Interfaces for Personal Identity Verification — SP – Biometric Data Specification for Personal Identity Verification — SP – Recommendation for Cryptographic Algorithms and Key Sizes — SP – Issuing Organization Accreditation Guideline — SP – PIV Middleware and PIV Card Application Conformance Test Guidelines NIST PIV Website ( Federal Identity Credentialing Website (