Document Revision Progress - HSPD-12

advertisement
Interagency Advisory Board (IAB)
Meeting
February 15, 2006
Agenda
• First Responder Partnership in National Capital Region
(NCR) – Tom Lockwood (DHS) and Regional Partners
• Handheld RFI Update - Frank Jones (DoD)
• FIPS-201 Evaluation Program Progress – Judy Spencer
(GSA)
• Physical Access Synergy – Tony Cieri
• Status Training Modules – Andrew Goldsmith (DOI)
• Backend Authentication Scheme Working Group
(BASWG) – TBD
• Document Revision Progress – Curt Barker (NIST)
• Cryptographic Migration Plan – Tim Polk (NIST)
• Press Wrap-up
First Responder Partnership
Initiative
Planning Approach for Trust & Verification of
Identity and Role Across Multi-Jurisdictions
Mr. Tom Lockwood/NCR FRPI
Planning Approach
Trust & Verification of identity & role across multi-jurisdictions
Federal
DOJ DHS
HHS
Strategic
EPA
Strategic
Strategic
Strategic Plan Plan
Plan Plan
HSPD
NIMS/NRP
State
Local
State
Strategic
Plan
Local
Strategic
Plan
NIPP
Guidance
Template
Private Sector
Regional
Profit
Critical
Infrastructure
Associations
Chambers
NCR
Strategic Plan
Regional
Orgs
&
Hosted
International
Private Sector
WashCOG REG-ECP (2002)
8 Commitments to Action (2002)
UASI Strategy CAO-SPG Priorities
Not-For-Profit
Community
Round Table
Organizations
(Detailed Objectives)
Regional Emergency Support Functions
#1
Trans
#2
Comm
#9
Urban
S&R
#3
PW/
Engin
#10
Hazmat
#4
Fire
#11
Agric
#5
Emerg
Mgmt
#12
Energy
#13
Public
Safety
#6
Mass
Care
#7
Res
Supp
#14
Recov
& Mitig
#8
Health
#15
Ext
Affairs
Planning Approach
Trust & Verification of identity & role across multi-jurisdictions
“What are we doing?”
Incident Management:
To get the right people with the right attributes to the right places at the right
times thus reducing response/recovery times and promoting restoration to preincident quality of life conditions
Planning Approach
Trust & Verification of identity & role across multi-jurisdictions
Strategic Objectives
1.
Establishment of a multi-jurisdictional identity trust model in
accordance with existing standards and technology that enables
interoperability for dynamic identity and emergency attribute
management
2.
Categorize all emergency response or critical infrastructure
support personnel in accordance with the National Response Plan
(NRP) or National Infrastructure Protection Plan (NIPP)
3.
Integrate identity and NRP/NIPP category information into existing
authoritative human resources databases/directories for use with
current technology tool sets that support the electronic proliferation of
trusted and secure information for access decisions
4.
Standardize NRP/NIPP occupation sub-categories and
qualifications in accordance with national and international personnel
qualification standards as appropriate
5.
Conduct exercises to integrate use with response requirements
and applications development for trusted and secure electronic
incident management with accountability
Planning Approach
Trust & Verification of identity & role across multijurisdictions
Goal: Multi-jurisdictional Identity Interoperability
To demonstrate multi-jurisdictional identity interoperability by electronically
binding personalized First Responder Authentication Cards (FRACs), that
were issued from different back-end infrastructures, to authorized responder in
a communication-in or out environment
Disaster recovery
area
DOD
within
Planning Approach
Trust & Verification of identity & role across multijurisdictions
Common Process
1) Applicant - Existing, or new enrollee
2) Sponsor - Practitioner/stakeholder community authoritative official
3) Enrollment Official - PIV data and documents collection/verification
4) Registrar - PIV data and documents validation/confirmation
5) Issuance Official - PKI certificate download and card distribution
6) Validation & Revocation Authority – Sponsor’s authoritative
database/directories trigger for OCSP distribution
Planning Approach
Trust & Verification of identity & role across multi-jurisdictions
“HSPD – 12”
Logical access
Physical access
Preparedness Identity Management
“FRAC”
Planning Approach
Trust & Verification of identity & role across multi-jurisdictions
PC
Federal
DOJ DHS
HHS
Strategic
EPA
Strategic
Strategic
Strategic Plan Plan
Plan Plan
HSPD…
H.R. 418
NRP
NIPP
NCRC
Provide a continual process
improvement loop to
incorporate best practices across
jurisdictions and ensure
continued architectural alignment
and interoperability.
FIPS-201
Private Sector
Regional
Virginia
D.C.
Strategic
Strategic
Plan
Plan
Regional
Orgs
&
Hosted
International
Maryland
Strategic
Plan
Profit
Critical
Infrastructure
Associations
Chambers
UASI Funded
Private Sector
County & Local
PM
County
Strategic
Plan
County
Strategic
Plan
County
Strategic
Plan
Not-For-Profit
Community
Round Table
Organizations
Planning Approach
Trust & Verification of identity & role across multi-jurisdictions
Partnership Members
Federal - Lemar Jones, Director, Antiterrorism/Force Protection Directorate,
Pentagon Force Protection Agency
– Gordon Woodrow, Regional Director, Region 3 U.S. Department of Health and
Human Services
NCR - Robert LeGrande, Deputy Director, Office of the Chief Technology Officer,
District of Columbia
Virginia - Mike McAllister, Deputy State Director, Security and Emergency
Management, Virginia Department of Transportation
Maryland - Brad Jewitt, Director, Office of the Fleet, Facilities and Administrative
Services, Maryland Department of Transportation
Private – John N. Petrie, Assistant Vice President for Public Safety & Emergency
Management, The George Washington University
NCR Data Interoperability Communications
Architecture
Data Exchange Hub Concept
of Operations
ESF-1..N USERS
FEDERAL USERS
EXECUTIVE USERS
EXECUTIVE
ADMIN
PUBLIC USERS
ARCHITECTURE
REVIEW BOARD
ADMIN UI
CREDENTIALING
DATA
DATA
EXCHANGE
EXCHANGE
DATA
SEARCH
HUB
APPLICATION
ACCESS
FEDERAL SOURCES
FEDERAL INFORMATION
ESF-2
ESF-1
ESF-1
ESF-2
Jurisdiction - 1
Jurisdiction - 3
ESF-2
Jurisdiction - 2
ESF-1
ESF-1
ESF-2
Jurisdiction - N
Goal: Standardized Incident
Identity Management
PKI identity smart card will provide the relying party
with machine-read information to determine access
privileges for granting access into, out of, and within
various areas as required
Disaster Recovery
Area
Multi-Jurisdictional Recognition
(mobile identity management)
INFORMATION FEED:
FEDERAL
STATE
LOCAL
PRIVATE
First Responder Validation Authority
(Produced and Synchronized Nightly)
PDA INFORMATION FORMAT:
• DATA
• TEXT
• IMAGE
Proposed Implementation Timeline
Phase I:
Regional “as-is” and “to be” analysis
Limited implementation for interface analysis
Mobile device and interoperability analysis
01/03/06 - 02/28/06
01/03/06 - 02/28/06
01/03/06 - 02/28/06
Phase II:
NCR sponsored pilot exercises
Commence regional implementation
NCR sponsored exercises
FEMA sponsored Forward Challenge 06
03/15/06 - 03/30/06
04/01/06 - 07/30/06
04/03/06 - 04/27/06
06/19/06 - 06/22/06
Phase III:
Complete implementation
NCR sponsored exercises
07/30/06 - 09/30/08
09/04/06 - 09/30/08
NCR Program Deliverables
Pilot Objectives: Leverage existing technologies to better define long
term solutions.
I-Net Project
BB Project
EOC Int
Project
DEH Project
High level Pilot
plans
High level Pilot
plans
High level Pilot
plans
High level Tech
assessments
Light up at least 4 regional
fiber connections
(Locations TBD)
External to District Pilots,
but interoperable to DC
• 1x EVDO –RE-A
• WI MAX
• 4.9 GHz
• WI FI
• Flarion
• Mesh
• Web EOC to Web EOC
Pilot
• Web EOC to/from other
CIMS
(DC-Montgomery)
• Federal (TBD)
• Web EOC to/from DEH
Tech Assessment of
Existing Solutions
• CAPWIN
• CAP STAT
• HSIN
• SHIELD
• Research Other Options
May ‘05
NCR
Requirements
Efforts
NCR Design
Effort
Requirements and
design SOW Awarded
Requirements and design
SOW Awarded
Req. RFP Due out 9-10
Design SOW TBD.
Depends on completion
of requirements work
Awarded
Design SOW TBD
Depends on completion
of requirements
Interoperability Program summary
Interoperability
Imperatives
Task Description
Project Benefit to the National
Capital Region
Offices Operational
Centers
Connect Emergency Operations Center s(EOCs).
Leverage existing off-the-shelf solutions to seamlessly
integrate the Emergency Operations Centers. Select a
jurisdiction to develop a pilot application and serve as an
NCR model. This will facilitate testing and validation of the
EOC interoperability solution
This integration will allow for increased
coordination, faster regional response times ,
and backup in case of system failure or center
outages.
Field Mobile
Operations
Design and procure the physical pathways (I-Net)
necessary for interconnection among regional public
network. Engineer and procure an integrated solution for
interoperable interconnection. Develop pilot application for
incident command and control management and sharing o
public safety resources related to E9-1-1, and protocols for
interoperating in a regional crisis.
Specific benefits of private network
interconnections (I-Nets) include the ability to
interconnect the region’s 9-1-1 Centers, and to
create an interoperable regional
communications fabric supporting public safety
broadband wireless systems.
Field Mobile
Operations
Design a regional interoperable /interconnected
broadband wireless network providing outdoor coverage
for the NCR. Collect NCR first responder broadband
application security, functional and performance
requirements.
A regional wireless broadband network will
significantly enhance first responder
communication capabilities, and will provide
the infrastructure to enable true voice/data
interoperability via voice over IP technology.
Data &
Applications
Deploy a high performance search capability (neutral host)
to allow authorized users access to data housed in
individual jurisditions’ locations. This functionality will be
available to any browser-based user whether connected
throught eh Internet (VPN), or through a browsercompatible wireless service. A centrlized security model
will insure authorized access. All data will remain under
the administrative and technical control fo the owner
jurisdiction
By allowing real-time electronic exchange of
data for public safety, emergency
preparedness officials at all levels should
realize immediate improvements and cost
reductions in Homeland Security data
communication activities.
FRAC Implementation &
Strategic Objectives
Presenter: W. Duane Stafford
Agency: Virginia Department of Transportation
Office: Security & Emergency Management Division
Date: February 15, 2006
Virginia & DHS Partnership
● The Commonwealth of Virginia is
currently issuing First Responder
Authentication Cards (FRACs) to
Federal, State and local
governments.
● Virginia is working with DHS to
implement FIPS 201 as a part of its
FRAC Initiative.
FRAC Credential
● VDOT’s Security and Emergency
Management Division (SEMD)
Transportation Protective Security
Section (TPS) is currently
responsible for:
- FRAC development
- Testing
- Implementation
- Maintenance of the FRAC
credentials and policies.
VDOT has adopted a standard FRAC
for use in :
● Identifying a person’s status within
the Agency (Employee or
Contractor)
● Gaining physical access
● Site access to identified critical
incident areas as an Emergency
Responder.
VDOT FRAC Design
FRAC Policy & Procedures
● VDOT has developed a FRAC
policy which establishes:
Procedures regarding the
issuance and use of VDOT
FRAC.
Clarification regarding FRAC
eligibility
● The policy embraces and supports
both HSPD-12 and FIPS PUB 201.
● VDOT has developed a FRAC
Usage Policy which establishes
expectations for FRAC Holders.
● The policy explains:
Uses of the FRAC
Care and display of the FRAC
Fraudulent use/abuse of the FRAC
FRAC restrictions.
FRAC Request Form
● VDOT, in conjunction with
DHS, has developed a
standard “First Responder
Authentication Card (FRAC)
Request” Form (SEMD 20105).
● VDOT is currently
anticipating converting the
SEMD 201-05 paper form to
an electronic form.
Note: The FRAC Request Form was derived
originally from the Personal Identity
Verification (PIV) Request for USDA ID
Badge Form
FRAC Marketing & Training
● VDOT has developed a FRAC
“Frequently Asked Questions”
brochure to hand out to all First
Responders who are issued a
FRAC through VDOT.
● The brochure explains to the FRAC
holder what the FRAC is and how it
is different from their regular Access
Control and Identification Card.
Post Winter Fox
● Further develop PIV Roles
and pre-register individuals.
● Develop, test and implement
Logical and Physical Access
Control System (Pegasys)
enhancements to track FRAC
credentials with reports and
management.
● Develop and implement a
structured way of identifying
First Responders requiring
FRACs throughout the
Commonwealth of Virginia.
FRAC Issues to Resolve
● The cardholder’s digital photo must be accessible
prior to PIN input.
● Approved Products/Vendor Lists and Accreditation
(GSA).
● NACI requirement solution for State governments.
● Cardholder Naming convention must be clarified.
● Color-Coding for Employee Affiliation must be
clarified.
Post Winter Fox
● Further develop PIV Roles
and pre-register individuals.
● Develop, test and implement
Logical and Physical Access
Control System (Pegasys)
enhancements to track FRAC
credentials with reports and
management.
● Develop and implement a
structured way of identifying
First Responders requiring
FRACs throughout the
Commonwealth of Virginia.
FRAC Issues to Resolve
● The cardholder’s digital photo must be accessible
prior to PIN input.
● Approved Products/Vendor Lists and Accreditation
(GSA).
● NACI requirement solution for State governments.
● Cardholder Naming convention must be clarified.
● Color-Coding for Employee Affiliation must be
clarified.
Status Brief: IAB Meeting 2/15/2006
Maryland First Responder Authentication Card
• Port of Baltimore ACS Upgrade
• Partnership with Baltimore Metro First Responders
• Alpha Testing Phase: 2000 FRAC Seats (Mobile Solution)
– Winter Fox Demonstration 2/23/2006
– Concept of Operations / Business Rules
• Beta Testing: Brick and Mortar Site
• Penetration:
– MD National Guard
– Coast Guard
– 8 of 23 Counties and Baltimore City (After Alpha Testing)
• NCR / Baltimore
• Future:
– Strategic implementation plan for State across all ESFs
The George Washington University
Private Sector Credentialing
• Public sector may not be able to sustain needs of private
entities such as GW with population of 20,000+ members
and over 125 facilities.
• Allows for continuous provision of critical services and
access to sensitive facilities or research centers.
• Promotes self sufficiency and less reliance on first
responders and public sector thus allowing resources to be
utilized elsewhere.
• Provides creditability to private sector responders/incident
teams by using universally recognized credentials.
• Eases access for thousands of employees commuting from
MD, VA, WV, and PA who are separated by layers of local,
state, and federal law enforcement agencies each with
control points or perimeters.
Agenda
• First Responder Partnership in National Capital Region
(NCR) – Tom Lockwood (DHS) and Regional Partners
• Handheld RFI Update - Frank Jones (DoD)
• FIPS-201 Evaluation Program Progress – Judy Spencer
(GSA)
• Physical Access Synergy – Tony Cieri
• Status Training Modules – Andrew Goldsmith (DOI)
• Backend Authentication Scheme Working Group
(BASWG) – TBD
• Document Revision Progress – Curt Barker (NIST)
• Cryptographic Migration Plan – Tim Polk (NIST)
• Press Wrap-up
DM DC
Information and Technology for Better Decision Making
Information and Technology for Better Decision Making
Joint Program Handheld/Mobile
Device Status for
Government Smart Card
Interagency Advisory Board (IAB)
Presented by
Frank Jones
DoD Access Card Office
February 15, 2006
February 2006
February 2006
33
33
DM DC
Information and Technology for Better Decision Making
Plan of Action
8/03/2005
 Gather Requirements from User Community
8/03/2005
9/30/2005
 Consider DBIDS Lessons Learned
10/26/2005
 Finalize Consolidated Requirements
10/26/2005
 Market Survey of Products Capable of Customization and
Modularity
12/16/2005
 Release Request for Information (RFI)
1/18/2006
 RFI Vendor Responses Received
3/21/2006
 RFI Summary Report
February 2006
 Contract for Handheld Expertise Support
34
34
DM DC
Information and Technology for Better Decision Making
Questions?
Frank Jones
(703) 696-0179
Francis.Jones@osd.pentagon.mil
February 2006
35
35
Agenda
• First Responder Partnership in National Capital Region
(NCR) – Tom Lockwood (DHS) and Regional Partners
• Handheld RFI Update - Frank Jones (DoD)
• FIPS-201 Evaluation Program Progress – Judy Spencer
(GSA)
• Physical Access Synergy – Tony Cieri
• Status Training Modules – Andrew Goldsmith (DOI)
• Backend Authentication Scheme Working Group
(BASWG) – TBD
• Document Revision Progress – Curt Barker (NIST)
• Cryptographic Migration Plan – Tim Polk (NIST)
• Press Wrap-up
FIPS 201 Evaluation Program
Office of Governmentwide Policy
Office of Technology Strategy
Judith Spencer
15 February 2006
Presentation Agenda
• Card/Reader Interoperability Task
• Lab Development Task
• Call for Industry Support
Card/Reader Interoperability Task
• Update
– 66% complete
– FIPS 201 Category List revised
• 19 remaining categories
• Categories Mapped to Requirements Traceability Matrix
• Reader categories by use case
– Test fixture prototype developed
– Card/reader requirements nearing completion
• Next major milestone
– Card/reader interoperability requirement validation
Lab Development Task
• Update
–
–
–
–
20% complete
CONOPS completed
Configuration Management Plan completed
Approval Procedure Template completed
• Next major milestone
– Web enabled information source review
Looking for Assistance from Industry
• Evaluation Program Technical Working Group
(EPTWG)
– More technical input from reader & card manufacturers
desired
– Starting Subgroup for reader & card technical
representatives
•
•
•
•
Weekly, in person, whiteboard meetings
March thru end of April
Review/comment/revise reader & card test procedures
Engineers preferred
Questions ?
April Giles
Contact information:
Email:
april.giles@gsa.gov
Website: http://www.smart.gov/fips201apl
Phone:
1.202.501.1123
RFI Results
• 71 Unique Responses
• ~13 Indicated Turnkey Service Capability
• General consistency in the cost data
– Some questions concerning what is included
• Conclusion – Industry is prepared to provide the services
required by FIPS-201 for Enrollment and Card
Management.
Next Steps
• Develop High Level Architectural Concept
• Start tightening up the technical specifications and
requirements definitions (including business requirements)
for a managed solution
• Recognize differences between the ‘ramp up’ and the
‘normalized’ activities
• Awaiting results from two agency data calls – due Feb 24,
2006.
• Update Performance Metrics based on RFI feedback
Agenda
• First Responder Partnership in National Capital Region
(NCR) – Tom Lockwood (DHS) and Regional Partners
• Handheld RFI Update - Frank Jones (DoD)
• FIPS-201 Evaluation Program Progress – Judy Spencer
(GSA)
• Physical Access Synergy – Tony Cieri
• Status Training Modules – Andrew Goldsmith (DOI)
• Backend Authentication Scheme Working Group
(BASWG) – TBD
• Document Revision Progress – Curt Barker (NIST)
• Cryptographic Migration Plan – Tim Polk (NIST)
• Press Wrap-up
Physical Access Synergy
46
Physical Access Control System
(PACS)
PAIIWG
Synergy in Federal
Requirements &
Industry
Standards
SIA
SCA
PACS
Objective
• No conflict or ambiguity in FIPS-201 or related
documentation as they apply to PACS
• Ensure that Industry Standards are developed by
SIA that are in synergy to Federal Requirements
PACS
PAIIWG
M. Butler
IAB Chair
A. Cieri
Coordinator
SCA
SIA
M. Sulak
C. Medich
R. Zivney
T. Baldridge
D. Pfeiffer
S. D’Agostino
S. Howard
R. Vanderhoof
K. Kozlowski
M. Regelski
L.J. Neve
R. Merkert
L. Kull
E. Widlitz
D. Vanderweele
T. Damalos
J. Zok
K. Stewart
R. Martin
B. Gilson
Agenda
• First Responder Partnership in National Capital Region
(NCR) – Tom Lockwood (DHS) and Regional Partners
• Handheld RFI Update - Frank Jones (DoD)
• FIPS-201 Evaluation Program Progress – Judy Spencer
(GSA)
• Physical Access Synergy – Tony Cieri
• Status Training Modules – Andrew Goldsmith (DOI)
• Backend Authentication Scheme Working Group
(BASWG) – TBD
• Document Revision Progress – Curt Barker (NIST)
• Cryptographic Migration Plan – Tim Polk (NIST)
• Press Wrap-up
HSPD-12/FIPS 201
TRAINING MODULES
UPDATE
Introduction
Continuing development of a series of webbased training modules and assessment
tools to assist management, administrators
and users in complying with FIPS 201
 The series will assist in the consistent
implementation of HSPD-12/FIPS 201 across
the Federal Government

Timelines and Modules

Delivery on 10/03/2005 included:
– Module 1: PIV Overview
– Module 2: PIV Roles and Responsibilities

Delivery in Spring 2006 includes:
– Module 3: Privacy Awareness
– Module 4: Administrator (technical
explanation)
– Module 5: Appropriate Uses
Hosting of Modules


Working with USALearning to host all five
modules
There may be two versions of each module:
1. Base module-meeting a baseline set of
specifications from OPM so every department may
access the training
2. Secondary module-will utilize a multi-media
approach, including streaming
Modules Format

Modules include three windows:
–
–
–
Video streaming, including interviews with
government officials
PowerPoint slides
Transcript with hyperlinks to important topics for
more details
Module 1 and 2
Module 1-Overview is available on USA
Learning
(http://www.usalearning.gov/coursecatalo
g/index.cfm?fuseaction=oltovervie)
 Module 2 is available from your agency
HSPD-12 representative
(www.vodium.com/goto/blm/hspd12.asp)

Modules 3-5
In the process of finalizing Power Point
slides and narration
 Video shoot week of March 6th

– Scheduling Subject Matter Experts to
interview on camera
– Preparing for video shoots throughout
Washington, DC
Module 3-Privacy Awareness

Objectives for module:
– Explanation of individual’s privacy and means
taken to secure information
– Explanation of information collected and how
it is protected
Module 3-Privacy Awareness,
cont.

The training will answer the following questions:
– What technology innovations on the PIV Card
itself help protect both my identity and my
privacy?
– What information about me is on the PIV
Card?
– What information is collected – and why – in
order to get a PIV Card?
Module 3-Privacy Awareness,
cont.
– How will my information be safeguarded, and
what controls are in place?
– Who can I talk to if I have questions or
concerns?
Module 4 – Administrator

Objectives for module:
– Users will understand the components within
the technical infrastructure and all of the
dependencies at the 1000 foot level ( not the
1 foot level)
– Explains what is needed to issue a PIV
Credential
Module 4 – Administrator,
cont.

The training will answer the following
questions:
What are all of the components of a credential?
 What personal data is needed and how will the
data be saved or deleted?

Module 4 – Administrator,
cont.
How does issuance of the credential work?
 How is data stored on a card?
 How is the credential configured with PKI and
biometrics to enable it to be used for physical
and logical access?

Module 5 –Uses of the
Credential

Objectives for module:
– Explains migration from flash pass and
passwords to electronic verification
– Explains the physical and logical use of the
credential across domains (across entire
federal enterprise)
– Explains Public Key Enabling
Module 5 –Uses, cont.

The training will answer the following
questions:
– What are the primary credential uses?
 How will physical and logical access work?
 What is OMB Memorandum 04-04 and 05-05?
– What are other uses for the credential?
Agenda
• First Responder Partnership in National Capital Region
(NCR) – Tom Lockwood (DHS) and Regional Partners
• Handheld RFI Update - Frank Jones (DoD)
• FIPS-201 Evaluation Program Progress – Judy Spencer
(GSA)
• Physical Access Synergy – Tony Cieri
• Status Training Modules – Andrew Goldsmith (DOI)
• Backend Authentication Scheme Working Group
(BASWG) – TBD
• Document Revision Progress – Curt Barker (NIST)
• Cryptographic Migration Plan – Tim Polk (NIST)
• Press Wrap-up
Backend Authentication Work
Group (BAS WG)
15 February 2006
Status
• Membership has met several times over the last
month as government only
• Expanding membership to include other interested
parties (Industry or government):
Meeting Type: Conference Call
Date:
Tuesday, 28 February
Time:
2-4pm EST
• All interested parties should provide contact
information to jonathan.baldwin.ctr@osd.pentagon.mil
Agenda
• First Responder Partnership in National Capital Region
(NCR) – Tom Lockwood (DHS) and Regional Partners
• Handheld RFI Update - Frank Jones (DoD)
• FIPS-201 Evaluation Program Progress – Judy Spencer
(GSA)
• Physical Access Synergy – Tony Cieri
• Status Training Modules – Andrew Goldsmith (DOI)
• Backend Authentication Scheme Working Group
(BASWG) – TBD
• Document Revision Progress – Curt Barker (NIST)
• Cryptographic Migration Plan – Tim Polk (NIST)
• Press Wrap-up
HSPD #12
Document Revision Status
National Institute of Standards and Technology
February 15, 2006
Current Activities
• FIPS 201-1 accommodation of OMB
Memorandum M-05-24
• Special Publication 800-73 adjustments to
accommodate Special Publication 800-76
• Reformatting of Special Publication 800-85 to
separate card command conformance testing from
data model conformance testing
• Federal Register Notice request for
recommendations for revision of FIPS 201-1 and
associated guidelines
FIPS 201-1 Accommodation of
OMB Memorandum M-05-24
• Provides for interim issuance of credentials
based on National Criminal History Check
and requires electronic indication of interim
issuance on the PIV card.
• FIPS 201-1 signed by the NIST Director
and forwarded to DoC for signature.
• Awaiting signature of the Secretary of
Commerce.
Special Publication 800-73
Adjustments to Accommodate
Special Publication 800-76
• Biometric storage format changes
• Incorporation of previously posted errata
• Elimination of requirement to provide user
PIN before permitting access to public PKI
certificate information
• Proposed changes posted for public
comment (comments before March 2006)
Reformatting of Special
Publication 800-85
• Separates card command conformance
testing from data model conformance
testing
• SP 800-85A to be posted February 16 at
http://csrc.nist.gov/piv-program
• SP 800-76 data model conformance
requirements being included in SP 800-85B
Revision of FIPS 201-1 and
Associated Guidelines
• Federal Register Notice requesting change
recommendations being staffed
• Anticipate posting shortly
• Plan workshops to discuss recommended
changes
– Need for change
– Impact on standards stability
– Priority and schedule determination
Agenda
• First Responder Partnership in National Capital Region
(NCR) – Tom Lockwood (DHS) and Regional Partners
• Handheld RFI Update - Frank Jones (DoD)
• FIPS-201 Evaluation Program Progress – Judy Spencer
(GSA)
• Physical Access Synergy – Tony Cieri
• Status Training Modules – Andrew Goldsmith (DOI)
• Backend Authentication Scheme Working Group
(BASWG) – TBD
• Document Revision Progress – Curt Barker (NIST)
• Cryptographic Migration Plan – Tim Polk (NIST)
• Press Wrap-up
HSPD #12
Cryptographic Migration Plan
Tim Polk
National Institute of Standards and Technology
February 15, 2006
Relevant Specifications
• FIPS 201 does not explicitly specify key
sizes or cryptographic algorithms
• FIPS 201 incorporates NIST Special
Publication 800-78 and the FPKI Common
Policy by reference
– Both specifications stated requirements for
algorithms and key sizes
– Requirements for public key algorithms were
stated inconsistently
Rationale for Cryptographic
Specifications, Part One
• Moore’s Law is not negotiable!
– 80 bit cryptography is mostly dead
• 1024 bit RSA and 160 bit ECC can not be relied
upon for cryptographic services to achieve HSPD
#12’s goals after 2010
• For authentication keys, 80 bit strength is
fine through 2010
• For signatures and confidentiality, need to
transition before 2010
Rationale for Cryptographic
Specifications, Part Two
• Protect Legacy Implementations
– 80 bit strong RSA (1024 bit keys) is widely use,
so it is permitted by the Common Policy and
NIST SP 800-78
• Avoid Unnecessary Transitions
– 80 bit strong ECC (160 bit keys) is not widely
used, so force ECC implementers to curves
with 224+ bits
Common Policy
• Common Policy predates FIPS 201, and has a
broader scope
– Version 1 recognized only RSA
• 1024 bit RSA, SHA-1 acceptable
• Established migration timelines for 2048 bit RSA and SHA256 based on certificate issuance date
– ECC added in 3/05 to support FIPS 201
• 163 bit through 283 bit keys
• SHA-1 and SHA-224 may be used with 163 and 224 bit keys
• Migration timelines consistent with RSA
NIST SP 800-78
• Supports FIPS 201 and only 201
– Developed after FIPS 201, published 4/05
• Established migration timelines based on
certificate expiration date
– More forgiving, since agencies can issue short
lifetime certs after dates in Common Policy
– More consistent with Moore’s Law since it
focuses directly on usage period for the key
Summary
• HSPD #12 Cryptographic Migration
timeline is as pragmatic as possible, but our
options are constrained by Moore’s Law
• The Common Policy and SP 800-78 state
migration timelines differently
– Consistency is being pursued by NIST
Questions?
Agenda
• First Responder Partnership in National Capital Region
(NCR) – Tom Lockwood (DHS) and Regional Partners
• Handheld RFI Update - Frank Jones (DoD)
• FIPS-201 Evaluation Program Progress – Judy Spencer
(GSA)
• Physical Access Synergy – Tony Cieri
• Status Training Modules – Andrew Goldsmith (DOI)
• Backend Authentication Scheme Working Group
(BASWG) – TBD
• Document Revision Progress – Curt Barker (NIST)
• Cryptographic Migration Plan – Tim Polk (NIST)
• Press Wrap-up
Press Wrap-up
86
Download