110 likes | 201 Views
Emergence of Identity Management: A Federal Perspective. Dr. Peter Alterman Chair, Federal PKI Policy Authority. Background. The Drive for e-Government Automation of the government workplace and opening of Internet to commercial entities
E N D
Emergence of Identity Management: A Federal Perspective Dr. Peter Alterman Chair, Federal PKI Policy Authority
Background • The Drive for e-Government • Automation of the government workplace and opening of Internet to commercial entities • National Performance Review, Government Paperwork Elimination Act of 1998, eSign Act, Electronic Commerce Act, the Quicksilver Initiatives and e-Gov • Mirrors the emergence of e-Commerce • The Drive for Digital Security • Viruses, Trojan horses, spoofing, spamming, DoS attacks, phishing, hostile international exploits, takedown of DOD websites (oh, my!), HSPD-12 Wilmington, NC November 2005
Identity Requirements for e-Gov • Need: To Know who you’re doing business (or government) with over the Internet • Assumptions: • No national ID card, number or account • Privacy maintenance to the extent possible with positive identity authentication • Levels of identity assurance commensurate with risk • Implications: • Federated identity providers • Policy reasserts itself over technology as the controlling factor in IT communications Wilmington, NC November 2005
The Bureaucracy Responds • Quicksilver initiative spawns list of 24 e-Gov applications and 2 infrastructure support programs (enterprise architecture and e-authentication) • No additional funds • Targets citizen to government applications • E-Gov apps farmed out to Agencies • Infrastructure support programs held by Office of Management and Budget with it’s faithful servant Igor.. the General Services Administration Wilmington, NC November 2005
Current Status of E-Authentication Program Management Office • Substantial accomplishments in policy and procedures • A “full operational architecture” supporting four levels of identity assurance • Levels 1 and 2 assertion-based, Levels 3 and 4 crypto based • Search for government applications leads to requirement for each Agency to offer up one online application for e-authentication enablement in 2005 and one more in 2006 • Aggressive recruitment of credential services providers in private sector • Acknowledgement that the government is setting up an identity federation – and outreach to interoperate with other identity federations Wilmington, NC November 2005
And Then There’s The Enemy Out There • Precursor Initiatives included • FIPS 199, NIST SP 800-63, NIST SP 800-53, Common Policy Framework, FICC work, OMB M-04-04 and 05-05, etc. • Homeland Security Presidential Directive #12: • Spawns FIPS-201, SPs 800-73, -76, -78 • Mandates (for Federal employees and contractors) creation of a positive ID proofing and interoperable PKI-on-a-shingle • To control physical and logical access to resources (buildings, networks, applications) Wilmington, NC November 2005
Raising the Stakes: Everything’s Gone Global • International Collaborative Identity Management Forum (US-NATO Joint Strike Fighter) • Transatlantic Secure Collaboration Project (“reinventing the wheel, one spoke at a time”) • Global PKI Bridge Mesh Forming – Grids and Defense establishments’ PKIs do secure electronic collaborative work (like fighting wars) • Who Owns Chrysler? Who Owns Volvo? Who Owns Mazda? Who owns that green jacket over there? Wilmington, NC November 2005
Summary Before Going On • Governments at all levels want to do electronic transactions with their customers (citizens) securely over the internet. • This requires governments to know with whom they are doing business at levels of assurance justified by structured risk assessments and mitigated by proven procedures and technologies • Without issuing identity credentials, governments rely on the thousands of credential services providers currently out there. Wilmington, NC November 2005
Some Animals Are More Equal Than Others • Identity for security purposes is a straightforward requirement for knowing the sack o’ cells logging on to that secure data network. Authorization follows. Or doesn’t: still a local decision (the good news). • Identity for e-commerce and the civil side of e-government requires much more. Enter attributes: roles, memberships in categories, even portable authorizations. Wilmington, NC November 2005
We’re All Animals • Feds and contractors – a gimme. • Any corporate entity, including institutions of higher education, doing business with the government will have to adopt FIPS-201 identity proofing sooner or later. • Any entity that issues electronic identity credentials (hello – network logons) may experience pressure from their customers to use those credentials for other purposes, like accessing a government online application. Wilmington, NC November 2005
Questions? Disputes? • altermap@mail.nih.gov • www.cio.gov/fpkipa • http://csrc.nist.gov/ • www.cio.gov/eauthentication Wilmington, NC November 2005