5 tools for improved identity management

 

Connecting state and local government leaders

While agency security challenges continue to unfold, IT managers will have to rely on existing technology solutions to help manage their ongoing and embryonic security threats.

Second of two parts. Read part one.

The use of identity-centric security to protect government IT systems has become increasingly urgent as high profile attacks continue to pierce government  systems.  In fact, besides traditional forms of perimeter-based security, identity management is seen by some as offering the best case for protection in expanding cloud and mobile environments.

While these challenges unfold, government agencies will have to rely on improving existing technology solutions – like those highlighted below – to help manage their ongoing and embryonic security threats.  The programs and products represent some of the more far-thinking attempts to address the pressing identity issues and the resulting security concerns associated with weak passwords, the proliferation of mobile devices connecting to networks and the dangers posed by employee data handling errors and theft.

Connect.gov

A government federated identity management hub, overseen by the General Services Administration, started life several years ago as the Federal Cloud Credential Exchange, but became Connect.gov in late 2014. It allows personnel verified through the hub's sign-in partners –  including Verizon, ID.me, Google, Paypal and Yahoo – to use one set of digital credentials for accessing a range of both commercial and public sector sites. The exchange itself doesn’t validate identities, leaving that up to its various partners.

Still classified as a pilot, it already has a number of federal agency participants, such as the Veterans Administration, the Postal Service, the Agriculture Department, NIST and others. High profile agencies such as the IRS have said they won’t use the site for now, but hub officials expect a slew of other agencies to sign up for the service over the next two years.

Any credential users now have to access government sites or bank accounts could be used with Connect.gov, once it’s been validated by one of the sign-in partners. Or users could create a new credential with a partner. That will help cut down on the “identity fatigue” users now suffer from handling numerous passwords, officials believe, which is fueling the bring-your-own-identity movement.

The end goal, according to Connect.gov Director Jennifer Kerber, is to have government agencies organize around one sign-in platform and move away from the siloed identity proofing they've relied on so far. The result will be government providing citizens and businesses with better data.

Unisys Stealth

The firm’s Stealth system is used to establish “secure communities of interest” within an enterprise, where only authorized users can access information. Its origin lies in the Defense Department, where multiple, physical networks were used to segregate information depending on it security classification.

However, that can be tough to manage when there can be 20 or more networks on a single ship or at one site. Having those logically rather than physically isolated makes them much easier to manage, plus it allows for faster support of operations when new physical networks don’t have to be deployed, or wires run to desktops.

In developing the platform, Unisys’s Cohn said the company was looking at the requirements of cloud computing and how to protect and isolate customers’ data in the cloud as needed.

The Stealth solution has a “light fingerprint” as it basically sits on top of existing IT infrastructure.

“It’s essentially a packet filter that sits between layers two and three of the Internet stack,” he said. “It examines the packet to see if it’s intended for a particular community of interest, and, if the person logged on is not a member of that, it ignores it so it’s not translated up the stack.”

Stealth provides a way to do things that are identity related, and that isolates and protects information without a lot of administrative headaches, he said.

Metalogix Replicator Cross Domain Edition

Metalogix developed the Replicator in concert with the Defense Information Systems Agency as a way of securely and automatically transferring content between SharePoint farms that sit on different networks and at different security levels. It can, for example, synchronize content between secret SIPRNet and sensitive but unclassified NIPRNet domains.

Replicator is aimed at stemming data leaks from insiders, much of which happens because of unintended or careless actions.

With deployed forces, whose commanders had to operate within their own organizations but also to cooperate with NATO and other forces, sharing information “was a hugely manual process,” involving removable media, said retired Maj. Gen. Steven Smith, a former Army chief information security officer and now advisor with Metalogix.

That level of complexity inevitably led to mistakes from people who didn’t follow procedures, he said, and that involved, “a lot of work” to clear the resulting data spill.

The Replicator tool works with existing data guards in place at organizations. Metadata tags in SharePoint indicate what other organizations and security levels it can be shared with. Sharing is also bidirectional so any changes are automatically pushed back to the originators of the information and others who have shared it.

Experian TRAP

Experian’s Tax Return Analysis Platform is aimed at helping federal and state organizations combat tax fraud, though the basic technology can be used in circumstances that require identity verification and device proofing.

It has three main components:

  • A fraud and identity proofing platform that works with both public and private sources to authenticate a user remotely, in real time.
  • Knowledge-based authentication, which asks questions only the particular person being asked will know the answers to.
  • Fraudnet, a proofing tool that compares the device being used to file a tax return with a database of devices that are known to have been used in fraudulent activity.

Experian is using the same technology to service identity proofing systems for the Social Security Administration’s online statement system and for the Centers for Medicaid and Medicare Services for identity proofing involved with the Affordable Care Act.

Wave Virtual Smart Card

Wave Systems Corp.’s virtual smart card (VSC) is intended to replace the need for passwords or external tokens such as physical smart cards by using the Trusted Platform Module. The TPMs are security chips built into the motherboard of most current business-class computers with a full-featured Windows operating system.

The combination of a hardware-based root-of-trust provided by the VSC and the user’s personal identification number (PIN) delivers strong two-factor authentication. The fact that it’s a hardware solution both reduces much of the administrative overhead involved with software-based tokens as well as the cost of replacing lost physical tokens, according to the company.

“With around a fifth of physical tokens being lost each year, that’s just a massive burden on the support infrastructure,” said Greg Kazmierczak, Wave’s chief technology officer.

The VSC hasn’t been transitioned to other operating systems such as those for Android or Apple smartphones because a number of the specifications and capabilities are not yet mature enough, he said, unlike the market for Microsoft tablets, laptops and other devices. But they eventually will emerge, Kazmierczak said, helped along by NIST’s recently published SP 800-157 mobile PIV guidelines.

PREVIOUS:  Agencies navigate the identity-based security ecosystem

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.