SDM Newswire

Obama Administrations National Strategy for Trusted Identities in Cyberspace Supported by The Smart Card Alliance; Up for Review

July 16, 2010
/ Print / Reprints /
ShareMore
/ Text Size+

The Smart Card Alliance endorsed the Obama Administration’s National Strategy for Trusted Identities in Cyberspace (NSTIC), developed under the auspices of the president’s Cyberspace Policy Review by the National Security Staff and an interagency writing team.

 

The NSTIC initiative correctly recognizes that there are very real problems of identity management, privacy and security in our society today, and brings a much needed focus on solving the problems, said the Smart Card Alliance in a press release.  Although its scope is limited to cyberspace, the Framework it outlines would also establish essential foundational elements that could help to strengthen identity, privacy and security in healthcare, social security administration, immigration reform and other programs in the physical world.

 

The NSTIC Framework draft is intentionally broad in scope, providing a wide range of trusted identity constructs and identity protection technologies.  There is recognition that many different public and private stakeholders will be involved in working out the specifics of the Framework and ultimately, using it.

 

The Healthcare and Identity Councils of the Smart Card Alliance, a non-profit public/private partnership organization whose members include healthcare providers, financial institutions, payment brands, enterprises, government users and technology providers, prepared specific comments on the NSTIC Framework draftcomments on the NSTIC Framework draft.  Some points are:

 

·         The Alliance strongly agrees with the ideas of using federal, state and local government and academia programs to accelerate development of the Identity Ecosystem, while leveraging existing procedures, standards and technologies such as FIPS 201 and the Federal Identity, Credentialing and Access Management Roadmap used to achieve Personal Identity Verification (PIV) and interoperability (PIV-I) in Homeland Security Presidential Directive (HSPD)-12.

·         The highest priority should be first defining the Identity Ecosystem for the most trusted digital transactions based on an identity medium, because it can have the greatest positive impact on identity, security and privacy and it is also the least developed commercially.

·         A suggested idea to make high-value identity transactions both secure and easy to use is the familiar approach of a card and PIN as an identity medium; however, to achieve high levels of security, the card must include smart card technology to carry PKI credentials, biometrics and other security features. This would also create a portable identity medium, and provide a secure environment that is independent from the PC, thereby side-stepping issues involved with PC, website and service provider hacker threats.

 

The current final draft is available for public review and input.  The document will be posted until July 19, 2010.

 

 

Did you enjoy this article? Click here to subscribe to SDM Magazine. 

You must login or register in order to post a comment.

Multimedia

Videos

Image Galleries

AiN Group 2014 Live & Learn Conference

AiN (Authorized Integrators Network) Group, now in its 13th year, held its first stand-alone conference in late January at the Sandpearl Resort in Clearwater Beach, Fla. AiN is the managing partner of GE Home and Security Technologies (GEHT), a network of about 200 dealers who are authorized to sell and install GE-branded security systems from Interlogix, as well as sound systems, lighting, home automation, central vacuum, and other technologies from approximately 30 approved vendors.

Podcasts

Diebold Security added more than 30 new national and global commercial customers in 2013. Bill Fitzhenry, vice president of Commercial Sales for North America, Diebold Security, discusses what led to such growth and describes Diebold Security’s strategy going forward.

More Podcasts

Transferring Video

What is your preferred way to transfer video footage?
View Results Poll Archive

SDM Magazine

August 2014

2014 August

In the August issue of SDM Magazine, find out how you can find success in the residential security market as well as the best selling products for residential customers. Read about the 2014 CSAA Awards, how to re-invent the Intrusion Panel, and how to price and sell cloud video storage to your customers. Read up on the latest news in the security industry as well as this month's popular products and resources to help your enterprise succeed.
Table Of Contents Subscribe

Clear Seas Research

Clear Seas logoWith access to over one million professionals and more than 60 industry-specific publications, Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

THE SDM STORE

SDM Top Systems Integrators Report
2010 Top Systems Integrators Report
The SDM Top Systems Integrators Report ranks, by total annual revenue, the largest U.S. firms that contract electronic security projects for commercial, industrial, institutional, government, and other non-residential markets.
More Products

SDM Green Page

Green leaves

Click here to visit the SDM Green page!

STAY CONNECTED

Facebook logo 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+