SDM Newswire

Obama Administrations National Strategy for Trusted Identities in Cyberspace Supported by The Smart Card Alliance; Up for Review

The Smart Card Alliance endorsed the Obama Administration’s National Strategy for Trusted Identities in Cyberspace (NSTIC), developed under the auspices of the president’s Cyberspace Policy Review by the National Security Staff and an interagency writing team.

 

The NSTIC initiative correctly recognizes that there are very real problems of identity management, privacy and security in our society today, and brings a much needed focus on solving the problems, said the Smart Card Alliance in a press release.  Although its scope is limited to cyberspace, the Framework it outlines would also establish essential foundational elements that could help to strengthen identity, privacy and security in healthcare, social security administration, immigration reform and other programs in the physical world.

 

The NSTIC Framework draft is intentionally broad in scope, providing a wide range of trusted identity constructs and identity protection technologies.  There is recognition that many different public and private stakeholders will be involved in working out the specifics of the Framework and ultimately, using it.

 

The Healthcare and Identity Councils of the Smart Card Alliance, a non-profit public/private partnership organization whose members include healthcare providers, financial institutions, payment brands, enterprises, government users and technology providers, prepared specific comments on the NSTIC Framework draftcomments on the NSTIC Framework draft.  Some points are:

 

·         The Alliance strongly agrees with the ideas of using federal, state and local government and academia programs to accelerate development of the Identity Ecosystem, while leveraging existing procedures, standards and technologies such as FIPS 201 and the Federal Identity, Credentialing and Access Management Roadmap used to achieve Personal Identity Verification (PIV) and interoperability (PIV-I) in Homeland Security Presidential Directive (HSPD)-12.

·         The highest priority should be first defining the Identity Ecosystem for the most trusted digital transactions based on an identity medium, because it can have the greatest positive impact on identity, security and privacy and it is also the least developed commercially.

·         A suggested idea to make high-value identity transactions both secure and easy to use is the familiar approach of a card and PIN as an identity medium; however, to achieve high levels of security, the card must include smart card technology to carry PKI credentials, biometrics and other security features. This would also create a portable identity medium, and provide a secure environment that is independent from the PC, thereby side-stepping issues involved with PC, website and service provider hacker threats.

 

The current final draft is available for public review and input.  The document will be posted until July 19, 2010.

 

 

Did you enjoy this article? Click here to subscribe to SDM Magazine. 

You must login or register in order to post a comment.

Multimedia

Videos

Image Galleries

AiN Group 2014 Live & Learn Conference

AiN (Authorized Integrators Network) Group, now in its 13th year, held its first stand-alone conference in late January at the Sandpearl Resort in Clearwater Beach, Fla. AiN is the managing partner of GE Home and Security Technologies (GEHT), a network of about 200 dealers who are authorized to sell and install GE-branded security systems from Interlogix, as well as sound systems, lighting, home automation, central vacuum, and other technologies from approximately 30 approved vendors.

Podcasts

Diebold Security added more than 30 new national and global commercial customers in 2013. Bill Fitzhenry, vice president of Commercial Sales for North America, Diebold Security, discusses what led to such growth and describes Diebold Security’s strategy going forward.

More Podcasts

SDM Magazine

SDM March 2015 isue cover

2015 March

Find out what's happening this year for the access control market in the March 2015 issue of SDM. Learn why wireless access is the next big thing and watch exactly how these products work with several videos gathered by our staff. Also, we tell you why you should consider 4k ultra HD.

Table Of Contents Subscribe

Access Control in 2015

Which of the following do you expect will have the biggest impact on your access control business in 2015?
View Results Poll Archive

THE SDM STORE

SDM 100 Report Logo
SDM 100 Report
The SDM 100 Report ranks U.S. companies that earn their revenues from the sale, installation, service and monitoring of electronic security systems - such as intrusion and fire alarm, access control, video surveillance, and related low-voltage systems - to residential and non-residential customers.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook logo 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.