Federal Identity

Federal Identity

Achieve compliance without a rip-and-replace investment

When the Homeland Security Presidential Directive-12 (HSPD-12) was enacted in August 2004, government agencies embarked on the challenging task of complying with an evolving set of standards designed to ensure that all federal employees and contractors have secure and reliable forms of identification.

Agencies were given more specific deadline information in February 2011. The Department of Homeland Security and the Office of Management and Budget issued a memorandum stating that, beginning in the government’s fiscal 2012—that is, Oct. 1, 2011—all existing physical and logical access control systems must be upgraded to implement Personal Identification Verification (PIV) credentials before federal agencies can use development and technology refresh funds to complete other activities. These access control systems must use smart card and biometric technology and support identification credentials in compliance with National Institute of Standards and Technology (NIST) guidelines, which are embodied in Federal Information Processing Standards Publication 201 (FIPS-201).

Complying with these guidelines has generally been a costly and complex process that has required agencies to gather, organize and deploy a variety of technologies. Agencies have also frequently needed to hire experts and third-party suppliers to assist with their upgrades and to establish a migration path from existing credentials. Too often, agencies have been required to completely replace their physical access control head-end servers, panels and door control hardware. With proper planning and a modular, turnkey approach, however, FIPS-201 compliance can be accomplished at a significantly lower cost while preserving investments in the existing access control infrastructure.

Compliance Requirements and Deadlines

HSPD-12 is intended to enhance security, increase government efficiency, reduce identity fraud and protect personal privacy. It requires agencies to follow specific technical standards and business processes for the issuing and routine use of secure and reliable forms of identification in compliance with FIPS-201.

The FIPS-201 document, titled “Personal Identity Verification (PIV) of Federal Employees and Contractors,” defines the multi-factor authentication, digital signature and encryption capabilities required for standardized PIV smart card credentials. Federal employees and contractors must use these cards to gain access to all government facilities and disaster response sites. FIPS- 201 compliance is expected to create a standardized infrastructure of interoperable access control products across a wide range of facilities belonging to disparate agencies and partners. This will lead to reduced overall costs while improving the government’s ability to leverage its buying power. All new systems under development will need to support PIV credentials and physical building access modifications according to NIST guidelines.

One of the most important documents issued by the government is SP800- 116, which introduces the concept of controlled, limited and exclusion areas, to which agencies must tailor risk-based PIV authentication mechanisms. The document also proposes a PIV Implementation Maturity Model (PIMM) to measure the progress of facility and agency implementations. Finally, it recommends to federal agencies an overall strategy for the implementation of PIV authentication mechanisms within a facility’s physical access control system (PACS).

Compliance Best Practices

Using fully interoperable, simple-to-deploy and cost-effective products and technologies that have been tested and validated as part of a complete, turnkey solution is the best way to streamline FIPS- 201 compliance. The most successful upgrade programs also provide agencies with a single point of deployment responsibility, and they ensure that compliance is achieved quickly, effectively and with all necessary audit support, on an incremental, pay-as-you-go basis, so agencies can retain much of their existing infrastructure. Compliance programs should:

  • Enable the authentication of credentials across the full range of assurance levels;
  • Deliver compliance without requiring a wholesale rip-andreplacement of existing equipment;
  • Offer the option of implementing a converged physical and logical security solution as envisioned by HSPD-12;
  • Provide a single solution for both FIPS-201 and SP 800-116 compliance; and
  • Meet all security, compliance and ROI objectives by enabling the full range of PIV, PIV-I and CAC card access.

Achieving these objectives requires a modular approach using a new generation of more flexible and secure reader platforms combined with modular compliance hardware.

Leveraging Reader Advances for FIPS-201 Compliance

The latest reader technology reduces the complexity of the compliance process significantly by employing better-protected architectures that significantly enhance access-control security and deployment flexibility. These reader platforms employ EAL5+ secure element hardware that ensures tamper-proof protection of keys and cryptographic operations. They also use the industry-standard open supervised device protocol (OSDP) communications standard to establish a seamless and secure, bidirectional link between the reader and today’s easy-to-deploy FIPS-201 compliance hardware modules.

Next-generation reader technology also enhances security by using a new, portable credential methodology on a standardsbased, technology-independent and flexible identity data structure. This data structure uses a device-independent data object that HID Global calls a secure identity object, which can exist on any number of identity devices. These data objects work with companion SIO interpreters on the reader side that, together, behave as traditional cards and readers do while using a significantly more secure, flexible and extensible data structure.

Device-independent data objects offer three key benefits for FIPS-201-compliant solutions and other access control system implementations. First, because they’re portable, these data objects can reside on traditional contactless credentials and many different mobile device formats, ensuring interoperability and easy migration.

Second, their device independence enhances trusted security by enabling them to act as a data wrapper to provide additional key diversification, authentication and encryption while guarding against security penetration.

Third, because they use open standards, these deviceindependent identity objects improve flexibility and can grow in security capabilities while traditional architectures remain stuck in a fixed definition. Each of these benefits is critically important for next-generation, secure identity portability and for enhanced protection in a FIPS-201-compliant environment.

Implementing a Modular Compliance Upgrade

With a modular upgrade, the only hardware that needs to be added is new readers, compliance hardware modules and a compliance manager. Installed between the readers and the existing PACS panel, the compliance hardware modules are used to validate FIPS-201 cards, extract the badge ID and pass it along to the PACS panel for an access decision. The compliance manager provides centralized control of assurance level settings and distribution of validation data. The most recent offerings add a new service application programming interface (API) that integrates PACS enrollment capability directly into the validation service.

Today’s modular compliance systems perform all of the steps required for PIV authentication. At the time of enrollment, the trusted card issuers—also known as the trust anchors—are set in the system. The status of enrolled PIV cards is checked on a periodic basis to prohibit access by revoked cards. This is done by retrieving the card revocation status from the issuing certificate authority (OCSP/ CRL/MiniCRL) and the TWIC Hotlist. When a PIV, PIV-I, CAC or TWIC card with the appropriate assurance level is presented to a corresponding reader, the compliance hardware module validates the card according to the assurance level setting, extracts the badge ID from data on the card, and then passes the badge ID to the PACS panel for an access decision and logging.

The compliance hardware module also validates PIV cards from visitors by using the Server-based Certificate Validation Protocol (SCVP) to implement the path discovery process and establish a chain of trust through the federal bridge. This enables interoperability across government agencies and with non-government members of the federal bridge.

For invalid cards, the compliance hardware module is configurable to send a preset badge ID to the PACS panel and/or close an output relay. In case of communication interruption, the compliance hardware module maintains an updated validation data cache—such as issuer trust status and revocation status—so it can function offline, while strong authentication continues at the door.

Additionally, cardholder data can be captured automatically the first time a card is presented for validation to any reader connected to a compliance hardware module. The data also can then be stored and distributed to all other compliance hardware modules by a compliance management station. This feature delivers several benefits. It allows traditional cardholder enrollment using existing PACS enrollment functionality. It also allows integration with an identity management system or card management system.

Finally, it enables the use of third-party enrollment packages. Federal agencies face challenges in upgrading their PACS infrastructure to meet the latest government mandates. Until now, the compliance process has required multiple vendors, and agencies have often had to replace their entire systems. A new, modular hardware approach makes it significantly easier and less costly for agencies to respond to regulatory changes, while giving them the flexibility to modify security levels in selected areas, as required, and take advantage of ongoing advances in access control technology.

This article originally appeared in the October 2011 issue of Security Today.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Surveillance Cameras Provide Peace of Mind for New Florida Homeowners

    Managing a large estate is never easy. Tack on 2 acres of property and keeping track of the comings and goings of family and visitors becomes nearly impossible. Needless to say, the new owner of a $10 million spec home in Florida was eager for a simple way to monitor and manage his 15,000-square-foot residence, 2,800-square-foot clubhouse and expansive outdoor areas. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

Featured Cybersecurity

Webinars

New Products

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3