SlideShare a Scribd company logo
Cloud Identity Summit 2014
Getting Physical: Holistic Identity Management
22 July 2014
Karyn Higa-Smith
Program Manager
Cyber Security Division
Homeland Security Advanced Research Projects Agency
Science and Technology Directorate
Physical and Logical Access Control Convergence
• Presenter’s Name June 17, 2003
CSD Mission & Strategy
2
REQUIREMENTS
CSD MISSION
§  Develop and deliver new technologies, tools and techniques to defend and secure current
and future systems and networks
§  Conduct and support technology transition efforts
§  Provide R&D leadership and coordination within the government, academia, private sector and
international cybersecurity community
CSD STRATEGY
Trustworthy
Cyber
Infrastructure
Cybersecurity
Research
Infrastructure
Network & System
Security and
Investigations
Cyber
Physical
Systems
Transition
and Outreach
Government
Venture Capital
IT Security
Companies
Open
Source
International
Background
• Presenter’s Name June 17, 2003
S&T Identity Management Testbed
Attribute
RepositoryWS-Security
Policy
Decision
Point
Attribute
Aggregator
• Presenter’s Name June 17, 2003 • 5
Identity & Access Management
Research & Development
• Presenter’s Name June 17, 2003
§ PIV-I/FRAC Technology Transition
Working Group (TTWG)
§ Public Safety/Emergency Response
§ Security
§ Federated Identity for First Responders
§ National standard, Interoperable,
and trusted ID credential
§ One voice from the TTWG to policy
makers
§ Sharing lessons learned
§ Provide innovative, Cost-efficient
solutions 6
Technology Transition Working Group
• Presenter’s Name June 17, 2003
PIN
Authorization Information: Certifications,
Clearance, Job Function, Citizenship…
7
Enrollment Elements
• Presenter’s Name June 17, 2003
Bio:
Something
you are
•  Something you have
•  Something you know****
•  Something you are
8
Authentication
• Presenter’s Name June 17, 2003
Federated Attribute Exchange
• Presenter’s Name June 17, 2003 • 10
End-to-End Standard-Based Attribute
Exchange
Authoritative
Sources
F/ERO
Repository
(Attributes) SPML
Service
SPML
Gateway
Handheld
Local
Workstation
SAML
Service
SPML Profile
Create,
Read,
Update,
Delete
SPML Read-
Only Profile
ERO Entitlements
Authoritative Source
SPML Read-Only
Request/Response
Smartphone
OASIS: Organization for the Advancement of Structured Information Standards
F/ERO: Federal/Emergency Response Official
SPML: Service Provisioning Markup Language
SAML: Security Assertion Markup Language
Lightweight Protocol
JSON over REST
SAML Request/
Response
BAE SAML Profile
Tablet
Logical and Physical
Access Control Systems
Convergence
*show video*
• Presenter’s Name June 17, 2003
Capability Need:
Centralized access
control management;
utilize PIV/PIV-I
credentials
Technology: Develop
standard interface
between Physical and
logical access control
system
Impact: Security,
Remote and Central
Access Management,
Granular Access
Control, Less
Footprint, Usability,
and Reduce Cost
Transition:
proof-of-concept pilot,
transition to industry
Customer:
Fusion Center, FEMA,
CSO/CIO
Execution Model
12
• Presenter’s Name June 17, 2003 13
§  Requirement for access control management using PIV and PIV-I
§  Interoperability testing at the S&T IdM Testbed
§  Test Physical Access Control System against the “Logical” Policy Decision Point
§  PACS vendors to integrate software code based on the standard interfaces
§  XACML (Extensible Access Control Markup Language) - open standard
access control policy language
1
2
4
5
3
Policy	
  
Enforcement	
  
Point	
  
Policy	
  
Decision	
  
Point	
  
Requestor	
  
Cyber-Physical Access Control System
Convergence
• Presenter’s Name June 17, 2003 14
• Presenter’s Name June 17, 2003 15
Pilot at DC Government
• Presenter’s Name June 17, 2003
Visit Authorization Process
• Presenter’s Name June 17, 2003
Visitor Enrollment Kiosk
• Presenter’s Name June 17, 2003
Take Away
•  Security, Interoperability, Efficiency, Enhances Access
Control
Benefits
•  Team dynamics, dedication, education
•  Convergence required constant communication and
coordination with many different groups that normally
operate independently
Innovation – to - Operations
•  Kiosk interface
•  Speed
Usability
Lessons
Learned
• Presenter’s Name June 17, 2003
Future
• Presenter’s Name June 17, 2003
Resources
Websites
http://www.ahcusa.org/PIV-I%20TTWG.htm
http://www.dhs.gov/csd-idm
http://www.dhs.gov/cyber-research
Follow us on Twitter at @dhsscitech
• Presenter’s Name June 17, 2003 • 21
Karyn Higa-Smith
DHS Science and Technology Directorate
Homeland Security Advanced Research Projects
Agency
Cyber Security Division
Identity, Access, Privacy Research Program
Karyn.Higa-Smith@st.dhs.gov
Questions
§  Additional Resources
Location-based Access Control
§  https://www.youtube.com/watch?v=j3LXxqW160k
Data Privacy Research: http://go.usa.gov/8JZ9
CIS14: Physical and Logical Access Control Convergence

More Related Content

PDF
Modern vs. Traditional SIEM
PPT
information security management
PDF
Industrial_Cyber_Security
PPTX
ISO 27001 - information security user awareness training presentation -part 2
PDF
ISO 27005:2022 Overview 221028.pdf
PPTX
Integrating Security Across SDLC Phases
PPTX
Cybersecurity Assessment Framework - Slideshare.pptx
PPTX
Data Security - English
Modern vs. Traditional SIEM
information security management
Industrial_Cyber_Security
ISO 27001 - information security user awareness training presentation -part 2
ISO 27005:2022 Overview 221028.pdf
Integrating Security Across SDLC Phases
Cybersecurity Assessment Framework - Slideshare.pptx
Data Security - English

What's hot (20)

PDF
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
PPTX
ISO 27001 - information security user awareness training presentation - Part 1
PPTX
Introduction to security
PPTX
Sensitive Data Exposure
PDF
PDF
Cyber security and demonstration of security tools
PPTX
Cyber Defense Matrix: Reloaded
PPT
18.05.2017 ISMS - Iryna Ivchenko
PDF
Enterprise Security Architecture for Cyber Security
PDF
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
PPT
IT Security management and risk assessment
 
PPTX
Iso 27001 isms presentation
PDF
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
PDF
Data Privacy & Security
PPTX
ISO 27701
PPT
ISO 27001 - Information Security Management System
PPTX
WHY SOC Services needed?
PPTX
Build an Information Security Strategy
PPTX
Introduction to Cybersecurity Fundamentals
Understanding The Security Vendor Landscape Using the Cyber Defense Matrix (R...
ISO 27001 - information security user awareness training presentation - Part 1
Introduction to security
Sensitive Data Exposure
Cyber security and demonstration of security tools
Cyber Defense Matrix: Reloaded
18.05.2017 ISMS - Iryna Ivchenko
Enterprise Security Architecture for Cyber Security
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
IT Security management and risk assessment
 
Iso 27001 isms presentation
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Data Privacy & Security
ISO 27701
ISO 27001 - Information Security Management System
WHY SOC Services needed?
Build an Information Security Strategy
Introduction to Cybersecurity Fundamentals
Ad

Viewers also liked (8)

PDF
Access Control Presentation
PDF
Securing SCADA
PPTX
Physical and logical access controls - A pre-requsite for Internal Controls
PPT
Intro To Access Controls
PDF
Physical/Network Access Control
PDF
Guide scada and_industrial_control_systems_security
PPT
Ch07 Access Control Fundamentals
PPT
Integrating Physical And Logical Security
Access Control Presentation
Securing SCADA
Physical and logical access controls - A pre-requsite for Internal Controls
Intro To Access Controls
Physical/Network Access Control
Guide scada and_industrial_control_systems_security
Ch07 Access Control Fundamentals
Integrating Physical And Logical Security
Ad

Similar to CIS14: Physical and Logical Access Control Convergence (20)

DOC
08252016 John D Resume ITIL PMP CISSP CSM CISA1
PPTX
Virtual Gov Day - Security Breakout - Deloitte
PDF
Latest Developments in Cloud Security Standards and Privacy
PPTX
GDPR Part 2: Quest Relevance
PDF
Security in Cyber-Physical Systems
PDF
Democratizing security
PPTX
PCI presentation
PPTX
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
PDF
Science of Security: Cyber Ecosystem Attack Analysis Methodology
PPTX
Mobile Application Single Sign-On for Public Safety First Responders
PDF
Cloud Security Standards: What to Expect and What to Negotiate V2.0
PDF
Information assurance /Information security
PDF
Privacy By Design Manual | An Introduction to Shifting Privacy Left
PDF
Privacy By Design Manual, an introduction to steps for privacy by design
PPTX
Embedding Security in IT Projects
PDF
IoT—Let’s Code Like It’s 1999!
DOCX
Linder,William H IT Auditor 0216
PDF
H2020 project WITDOM overview
PPTX
Flanagan - RA21 Improving Access to Scholarly Resources
08252016 John D Resume ITIL PMP CISSP CSM CISA1
Virtual Gov Day - Security Breakout - Deloitte
Latest Developments in Cloud Security Standards and Privacy
GDPR Part 2: Quest Relevance
Security in Cyber-Physical Systems
Democratizing security
PCI presentation
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Science of Security: Cyber Ecosystem Attack Analysis Methodology
Mobile Application Single Sign-On for Public Safety First Responders
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Information assurance /Information security
Privacy By Design Manual | An Introduction to Shifting Privacy Left
Privacy By Design Manual, an introduction to steps for privacy by design
Embedding Security in IT Projects
IoT—Let’s Code Like It’s 1999!
Linder,William H IT Auditor 0216
H2020 project WITDOM overview
Flanagan - RA21 Improving Access to Scholarly Resources

More from CloudIDSummit (20)

PPTX
CIS 2016 Content Highlights
PPTX
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
PDF
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
PDF
Mobile security, identity & authentication reasons for optimism 20150607 v2
PDF
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
PDF
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
PDF
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
PDF
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
PDF
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
PDF
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
PDF
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
PDF
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
PDF
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
PDF
CIS 2015 The IDaaS Dating Game - Sean Deuby
PDF
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
PDF
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
PDF
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
PDF
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
PDF
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
PDF
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2016 Content Highlights
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
Mobile security, identity & authentication reasons for optimism 20150607 v2
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 Identity Relationship Management in the Internet of Things

Recently uploaded (20)

PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Encapsulation theory and applications.pdf
PPT
Teaching material agriculture food technology
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
sap open course for s4hana steps from ECC to s4
PDF
MIND Revenue Release Quarter 2 2025 Press Release
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Big Data Technologies - Introduction.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Electronic commerce courselecture one. Pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Encapsulation theory and applications.pdf
Teaching material agriculture food technology
Reach Out and Touch Someone: Haptics and Empathic Computing
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
sap open course for s4hana steps from ECC to s4
MIND Revenue Release Quarter 2 2025 Press Release
The AUB Centre for AI in Media Proposal.docx
Big Data Technologies - Introduction.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Diabetes mellitus diagnosis method based random forest with bat algorithm
Electronic commerce courselecture one. Pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
MYSQL Presentation for SQL database connectivity
20250228 LYD VKU AI Blended-Learning.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
NewMind AI Weekly Chronicles - August'25 Week I

CIS14: Physical and Logical Access Control Convergence

  • 1. Cloud Identity Summit 2014 Getting Physical: Holistic Identity Management 22 July 2014 Karyn Higa-Smith Program Manager Cyber Security Division Homeland Security Advanced Research Projects Agency Science and Technology Directorate Physical and Logical Access Control Convergence
  • 2. • Presenter’s Name June 17, 2003 CSD Mission & Strategy 2 REQUIREMENTS CSD MISSION §  Develop and deliver new technologies, tools and techniques to defend and secure current and future systems and networks §  Conduct and support technology transition efforts §  Provide R&D leadership and coordination within the government, academia, private sector and international cybersecurity community CSD STRATEGY Trustworthy Cyber Infrastructure Cybersecurity Research Infrastructure Network & System Security and Investigations Cyber Physical Systems Transition and Outreach Government Venture Capital IT Security Companies Open Source International
  • 4. • Presenter’s Name June 17, 2003 S&T Identity Management Testbed Attribute RepositoryWS-Security Policy Decision Point Attribute Aggregator
  • 5. • Presenter’s Name June 17, 2003 • 5 Identity & Access Management Research & Development
  • 6. • Presenter’s Name June 17, 2003 § PIV-I/FRAC Technology Transition Working Group (TTWG) § Public Safety/Emergency Response § Security § Federated Identity for First Responders § National standard, Interoperable, and trusted ID credential § One voice from the TTWG to policy makers § Sharing lessons learned § Provide innovative, Cost-efficient solutions 6 Technology Transition Working Group
  • 7. • Presenter’s Name June 17, 2003 PIN Authorization Information: Certifications, Clearance, Job Function, Citizenship… 7 Enrollment Elements
  • 8. • Presenter’s Name June 17, 2003 Bio: Something you are •  Something you have •  Something you know**** •  Something you are 8 Authentication
  • 9. • Presenter’s Name June 17, 2003 Federated Attribute Exchange
  • 10. • Presenter’s Name June 17, 2003 • 10 End-to-End Standard-Based Attribute Exchange Authoritative Sources F/ERO Repository (Attributes) SPML Service SPML Gateway Handheld Local Workstation SAML Service SPML Profile Create, Read, Update, Delete SPML Read- Only Profile ERO Entitlements Authoritative Source SPML Read-Only Request/Response Smartphone OASIS: Organization for the Advancement of Structured Information Standards F/ERO: Federal/Emergency Response Official SPML: Service Provisioning Markup Language SAML: Security Assertion Markup Language Lightweight Protocol JSON over REST SAML Request/ Response BAE SAML Profile Tablet
  • 11. Logical and Physical Access Control Systems Convergence *show video*
  • 12. • Presenter’s Name June 17, 2003 Capability Need: Centralized access control management; utilize PIV/PIV-I credentials Technology: Develop standard interface between Physical and logical access control system Impact: Security, Remote and Central Access Management, Granular Access Control, Less Footprint, Usability, and Reduce Cost Transition: proof-of-concept pilot, transition to industry Customer: Fusion Center, FEMA, CSO/CIO Execution Model 12
  • 13. • Presenter’s Name June 17, 2003 13 §  Requirement for access control management using PIV and PIV-I §  Interoperability testing at the S&T IdM Testbed §  Test Physical Access Control System against the “Logical” Policy Decision Point §  PACS vendors to integrate software code based on the standard interfaces §  XACML (Extensible Access Control Markup Language) - open standard access control policy language 1 2 4 5 3 Policy   Enforcement   Point   Policy   Decision   Point   Requestor   Cyber-Physical Access Control System Convergence
  • 15. • Presenter’s Name June 17, 2003 15 Pilot at DC Government
  • 16. • Presenter’s Name June 17, 2003 Visit Authorization Process
  • 17. • Presenter’s Name June 17, 2003 Visitor Enrollment Kiosk
  • 18. • Presenter’s Name June 17, 2003 Take Away •  Security, Interoperability, Efficiency, Enhances Access Control Benefits •  Team dynamics, dedication, education •  Convergence required constant communication and coordination with many different groups that normally operate independently Innovation – to - Operations •  Kiosk interface •  Speed Usability Lessons Learned
  • 19. • Presenter’s Name June 17, 2003 Future
  • 20. • Presenter’s Name June 17, 2003 Resources Websites http://www.ahcusa.org/PIV-I%20TTWG.htm http://www.dhs.gov/csd-idm http://www.dhs.gov/cyber-research Follow us on Twitter at @dhsscitech
  • 21. • Presenter’s Name June 17, 2003 • 21 Karyn Higa-Smith DHS Science and Technology Directorate Homeland Security Advanced Research Projects Agency Cyber Security Division Identity, Access, Privacy Research Program Karyn.Higa-Smith@st.dhs.gov Questions §  Additional Resources Location-based Access Control §  https://www.youtube.com/watch?v=j3LXxqW160k Data Privacy Research: http://go.usa.gov/8JZ9