210 likes | 285 Views
Learn about the value and importance of the PIV credential for federal agencies, addressing challenges, successes, and cost savings. Discover the USAccess Program, FICAM goals, and agency accomplishments in identity management.
E N D
The PIV Credential:Expanding Its Value Stephen DuncanGSAHSPD-12 MSOJune 21-24, 20102010 Network Services ConferencePower in Partnerships
Agenda • Challenges • USAccess Program • Agency Successes • PIV Interoperable
The Cost of Identity Theft in the US • In 2009 ID fraud cost around $54B up from $48B in 2008 • In 2009 the average data breach cost the affected business $6.75M, up from $6.65M in 2008 Source: Forbes.com, 02/10/10
Protecting Data in Cyberspace Causes of data breaches on government computer systems in past 10 years. Source: Washington Post Capital Business & Open Source Foundation, 05 /1010
Where do we go? The Federal government… • following the guidance of Homeland Security Presidential Directive 12 (HSPD-12), is seeking to leverage the federal interoperable identity credentialing mechanism across the federal enterprise. • should ensure resources are available for full federal implementation of HSPD-12. • should consider extending the availability of federal identity management systems to operators of critical infrastructure and to private-sector emergency response and repair service providers for use during national emergencies. May 2009
FICAM Goals • Comply with Federal Laws, Regulations, Standards and Governance relevant to ICAM • Facilitate e-Government by streamlining access to services • Improve security posture across the Federal enterprise • Enable trust and interoperability • Reduce costs and increase efficiency associated with ICAM
USAccess Program – Achieving the Objectives • Allows agencies to share a common identity and PIV credential management infrastructure • Provides FIPS 201 compliant Federal credentials through uniform issuance processes and enrollment services • Leverages a central infrastructure for enrollment and activation, PKI and credential personalization • Built on a robust and secure standards-based architecture with high availability and disaster recovery capabilities
Over 80 customer agencies representing 490,000+ enrollments Over 340 Enrollment stations deployed with another 10+ scheduled Cooperative customer mobile station deployment covering over 350 remote locations, reaching over 50,000 people 110 classes held with over 850 trained registrars Progress & Major Accomplishments Data as of 5/10/10
Managed Services Office Vision • PIV Credential is the only credential federal employees and contractors use to access federal facilities, information systems, and networks • PIV Credential Issuance and Lifecycle Management is and shall remain the core service offered by the MSO • MSO will explore peripheral service offerings with the goals of adding “value” to the credential • Expand the total customer base to maximize economies of scale
Continue to enable trust and interoperability • Expand Credential Issuance and Management services to state, local, tribal, and commercial businesses by leveraging ACES precedent • Enable MSO to provide usage (PACS/LACS/Apps) services to customer base – particularly small agencies
Near term - Light Enrollment • From an enrollment station, allows direct connectivity to the USAccess central infrastructure via a public internet connection • Reduces or eliminates: • Physical space • Set up costs • # of peripherals • Dedicated hardware and VPN • Station certification
Station 1 GSA Shared Service Components Station 2 • Card Management • ID Management systems Add. NeedsStations Extending the Business Model Enrollment Broker Station 3 Station 4 Station 5 Station 6 Other HSPD-12 Centralized Solutions Station “n” The Enrollment Broker feeds data from hundreds of enrollment stations into multiple identity management systems.
Agency Successes • Password Resets and Management • PKI Realized Value • Help Desk Efficiencies • Single Sign-on benefits • Workflow and Digital Signature • Physical and Logical Security • Agency specific ROI studies • (DOE, DoS, and DoD)
Information on security benefits from use of CACs and PKI to access DoD IT assets: • Successful intrusions have declined 46% because of the requirement that all DOD personnel log on to unclassified networks using Common Access Cards (CAC). • It is essential to use CACs, which electronically verify a user’s identity, to access unclassified DOD networks because 75% of that traffic moves across the public Internet. • Use of CACs and PKI tokens eliminates the need to use passwords... the major problem in protecting DOD networks. Passwords can be harvested automatically by keyloggers or from notes people stick on their computers. • The number of successful socially engineered e-mail attacks against DOD users has declined 30% due to increased security awareness training. Source: FCW article from 1/25/2007
DOE reduced/eliminated token usage • ~120,000 employees/contractors • Widespread use of two factor authentication tokens to provide remote access to systems identified as moderate or high risk • Average annual cost per user is $110, which includes the cost of a 4-year license for token at $40 • Separate infrastructures for 2-factor authentication for a 10,000 user base is $1.1M • Agency had numerous implementations presenting interoperability challenges across the enterprise. • Solution: Implementation of PIV Credential to eliminate costs and minimized the number of credentials for requiring lifecycle management
Eliminating manual password management payoff • State Department experienced a 50% reduction in help desk tickets with PKI implementation • Estimated savings in Year 1 was ~$10.3M
Beyond the enterprise - other PIV cards • PIV Interoperable Card(PIV-i) – an identity card that meets the PIV technical specification to with PIV infrastructure elements and is issued in a manner that allows Federal government online services to trust the card • Users: state & local government, first responders and federal contractors
What’s different with PIV-i • Identity Proofing • Identity Proofing requirement only (not suitability) • Based on SP 800-63 Assurance Level 4 • Unique Identifier • FASC-N is problematic for non-Federal entities • Use of UUID in lieu of FASC-N (See 800-73-3) • Digital Credentials • PIV cards require Federal PKI Common Policy compliance • PIV-I requires trust relationship via Federal Bridge
Expanding PIV Value • Shared services model: • Delivers trust, efficiency and effectiveness • Increases protection of PII by consolidating and securing identity data • Improves interoperability between agencies and their business partners • Robust identity and access management are fundamental to secure information sharing and collaboration across government • Increased security correlates to a reduction in identity theft, data breaches and trust violations The Federal government’s identity management strategy relies heavily on successful implementation of PIV Credentials
Further Information Steve Duncan Program Manager HSPD-12 MSO Stephen.Duncan@gsa.gov P: 703-306-6096 C: 703-350-6840 www.fedidcard.gov