240 likes | 316 Views
Identity: Setting the Larger Context, Achieving the Right Outcomes. 2006 CACR Privacy and Security Conference November 3, 2006. Identity: Outline. Introduction Context Way Forward Outputs Summary. Identity: Introduction. Identity: Clients & Outcomes.
E N D
Identity:Setting the Larger Context, Achieving the Right Outcomes 2006 CACR Privacy and Security Conference November 3, 2006
Identity: Outline • Introduction • Context • Way Forward • Outputs • Summary
Identity: Clients & Outcomes External Clients: Individuals and Businesses • Improved delivery of government services • Increased safety and security • Enhanced human rights and freedoms Internal Clients: GC Employees and Contractors • Increased productivity • Decreased time to on-board, off-board personnel • Increased compliance with security, privacy and IM policies
Identity: Objectives • Bridge the gap between the many service and security communities • Engage stakeholders and gain consensus • Develop a conceptual framework that can be used for: • Developing and aligning to a single GC-wide vision • Developing GC-wide identity principles • Establishing a common view of identity and compatible program and project approaches
Identity: Approach Inputs Steps Key Questions Work Products Outputs Existing IDM Products GC-Specific IDM Products ProjectCharter Mandate/Priorities How do we use identity to fulfiillour mandate and address our priorities? RelevantPrinciples IDM Policy, Directives, Standards Needs & Outcomes Clients &Stakeholders Who are our clients and stakeholders; what do they need? Policy Guidance Lexicon Principles Principles/Policies What is our scope and how do we align to the relevant principles and policies? IDM Guidelines,Tools, Best Practices TechnicalGuidance Risk-Event Model Risk Analysis What are our risks with respect to identity? Standards AssuranceModel Assurances What assurances do we provide or require? IDM Enterprise Architecture Practices ServiceAgreements How do we plan to deliver services or deploy our capabilities Services/Capabilities IDM Solutions BusinessArchitecture Solutions BusinessProcesses How must we organize ourselves and what process must we use? TechnicalCriteria Technologies/Solutions What are our options for technologies or solutions Technologies
Identity: Government Context Government Context: Working together in the public interest to ensure that we uphold what we believe and value as a society. Identity is critical to our society, our governments and institutions
Identity: Drivers • Privacy & Security Drivers: • Economic: Identity Theft/Fraud • Public Safety: Law Enforcement • National Security: Anti-Terrorism, Border Security • Citizen-Focused Drivers • Citizen-Centred Service Delivery • Increasing Client Satisfaction • Ensuring Rights of Citizens • Integrity and Accountability Drivers: • Program and Service Integrity • Transparency • Organizational Transformation Drivers: • Rethinking of Government as a Single Enterprise • Shared Services Model • Inter-Agency and Inter-jurisdictional Collaboration
Identity: Roles of Government Ideal Roles… Establishing Identity CommunicatingIdentity Authenticating Identity Current Roles… • Shared jurisdiction: • Federal role: for those arrivingin Canada • Provincial / Territorial role: with Vital Statistics - born in Canada • Based on relativelystandard set of coreattributes including: • Name • Place of Birth • Date of Birth • Gender • Citizenship • Numerous organizationsinvolved at all levels ofgovernment, for example: • Federally issued.. • Social Insurance Number (SIN) • Passport • Provincially issued.. • Birth registration # • Birth certificate • Health card • Driver’s license • Most organizations require a similar base of information to provide identification • Some additional needs specific to the organization • Separate stand-alone processes by department or program for authentication: • Epass • CRA • Service CanadaEtc. • Many different functions for • validation or verification • for clients’ identity • Many enabling technologies: • PKI, biometrics, tokens
Identity Management Today • Government departments/agencies have similar needs with respect to identifying individuals and request similar information • Purpose – primarily Security and/or Service delivery • Same or similar information collected, and then shared in ad hoc and disparate ways: • Clients provide same information – different times, different formats • Complex network of information sharing agreements between federal government and other jurisdictions • Many bilateral agreements with provinces and territories related to the use of personal information • Integrity varies, depending on source and on associated program/service risk
Identity: Defining the Opportunity ‘The Government of Canada’s ability to fulfill its mandate can be greatly improved through a common understanding of identity. A whole of government approach to identity is a critical requirement to the integrity of government programs and services.’ As approved by ADM Identity Committee, Mar 3, 2006
Identity: Defining the Issue ‘Making sure you are dealing with the right person’
Identity: Defining the Concepts Identity: a reference or designation used to distinguish a unique and particular individual (organization or device). Identity Management: the set of principles, practices, policies, processes and procedures used to realize the desired outcomes related to identity.
Identity: Strategy Statement Develop a common approach consisting of: • A common understanding of key identity concepts and principles; • A single view that promotes a consistent application while enabling transparency and accountability; and • A comprehensive action plan appropriate to the many systems, programs and government organizations that depend upon identity.
Identity: Draft Principles • Justify the Use of Identity. • Identify with Specific Reason. • Use Appropriate Methods. • Enhance Public Trust. • Use a Risk-Based Approach. • Be Collectively Responsible. • Uphold the Rights and Values of Canadians. • Ensure Equity. • Enable Consistency, Availability, and Interoperability. • Maintain Accuracy and Integrity. • Preserve Proportionality. Draft as approved by TBS CIO
Identity: Evidence & Assurance Evidence of Identity(EOI) Evidence that the individual is really who they claim to be - their ‘true’ identity as required by law. Evidence of Control(EOC) Evidence that the individual has control over what has been entrusted to them. Evidence of Integrity(EOI) Assurance as a whole, pertaining to a system, process, token (physical or electronic), etc. + + Assured by: Assured by: Assured by: • Assurance of Identity • Level 1: Little or no confidence in validity of claimant’s identity • Level 2: Some confidence in validity of claimant’s identity • Level 3: High confidence in validity of claimant’s identity • Level 4: Very high confidence in claimant’s identity • Assurance of Control • Level 1: Little or no confidence that claimant has control over what has been issued to them (e.g. token/identifier) • Level 2: Some confidence that claimant has control over what has been issued to them • Level 3: High confidence that claimant has control over what has been issued to them • Level 4: Very high confidence that claimant has control over what has been issued to them Assurance of Integrity TBD
Evidence-Assurance Functions 1. Evidence Gathering 2. Validation, Verification, Vetting 3. Adjudication Evidence-Assurance functions are specific to the program or mandate.
Identity: Draft Framework Legislative and Policy Context Justified Use Authorization Identity Principles Assurances Access Service Delivery Processes EstablishingIdentity CommunicatingIdentity AuthenticatingIdentity Security Evidence Assurance Functions Grant of Status/Authority EvidenceAssurance EvidenceAssurance EvidenceAssurance Enforcement Lexicon Audit/Compliance Technology Enablers Currently being developed by the TBS CIOB Identity Team
Identity: Summary • A single GC-wide approach that: • Recognizes common requirements throughout government • Leverages current investments and accomplishments: • Independent of technology or solution This is a journey in progress….