Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
3Activity
0 of .
Results for:
No results containing your search query
P. 1
DHS National Strategies in Cyberspace DRAFT

DHS National Strategies in Cyberspace DRAFT

Ratings: (0)|Views: 33 |Likes:
Published by AxXiom

More info:

Published by: AxXiom on Jul 16, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

06/08/2013

pdf

text

original

 
 
National Strategy for Trusted Identities inCyberspace
Creating Options for EnhancedOnline Security and Privacy
June 25, 2010
Draft 
 
DRAFT National Strategy for Trusted Identities in CyberspaceJune 25, 2010i
Table of Contents
EXECUTIVE SUMMARY ..................................................................................................................... 1
 
INTRODUCTION ................................................................................................................................. 4
 
C
URRENT
L
ANDSCAPE
....................................................................................................................... 4
 
S
COPE
............................................................................................................................................. 6
 
N
ATIONAL
S
TRATEGY
D
EVELOPMENT
................................................................................................. 6
 
N
ATIONAL
S
TRATEGY
O
RGANIZATION
................................................................................................. 7
 
GUIDING PRINCIPLES ....................................................................................................................... 8
 
I
DENTITY
S
OLUTIONS WILL BE
S
ECURE AND
R
ESILIENT
........................................................................ 8
 
I
DENTITY
S
OLUTIONS WILL BE
I
NTEROPERABLE
.................................................................................... 8
 
I
DENTITY
S
OLUTIONS WILL BE
P
RIVACY
E
NHANCING AND
V
OLUNTARY FOR THE
P
UBLIC
......................... 9
 
I
DENTITY
S
OLUTIONS WILL BE
C
OST
-E
FFECTIVE AND
E
ASY
T
O
U
SE
.................................................... 10
 
VISION AND BENEFITS ................................................................................................................... 12
 
V
ISION
S
TATEMENT
......................................................................................................................... 12
 
I
DENTITY
E
COSYSTEM
...................................................................................................................... 12
 
B
ENEFITS OF THE
I
DENTITY
E
COSYSTEM
........................................................................................... 18
 
GOALS AND OBJECTIVES .............................................................................................................. 21
 
G
OAL
1:
 
D
EVELOP A COMPREHENSIVE
I
DENTITY
E
COSYSTEM
F
RAMEWORK
. ....................................... 21
 
G
OAL
2:
 
B
UILD AND IMPLEMENT INTEROPERABLE IDENTITY INFRASTRUCTURE ALIGNED WITH THECOMMON
I
DENTITY
E
COSYSTEM
F
RAMEWORK
. .................................................................................. 22
 
G
OAL
3:
 
E
NHANCE CONFIDENCE AND WILLINGNESS TO PARTICIPATE IN THE
I
DENTITY
E
COSYSTEM
. ..... 23
 
G
OAL
4:
 
E
NSURE THE LONG
-
TERM SUCCESS OF THE
I
DENTITY
E
COSYSTEM
. ...................................... 24
 
COMMITMENT TO ACTION ............................................................................................................. 26
 
H
IGH
P
RIORITY
A
CTIONS
.................................................................................................................. 26
 
A1
 
D
ESIGNATE A
F
EDERAL
A
GENCY TO
L
EAD THE
P
UBLIC
/P
RIVATE
S
ECTOR
E
FFORTS
A
SSOCIATEDWITH
A
DVANCING THE
V
ISION
........................................................................................................ 26
 
A2
 
D
EVELOP A
S
HARED
,
 
C
OMPREHENSIVE
P
UBLIC
/P
RIVATE
S
ECTOR
I
MPLEMENTATION
P
LAN
..... 26
 
A3
 
A
CCELERATE THE
E
XPANSION OF
G
OVERNMENT
S
ERVICES
,
 
P
ILOTS
,
AND
P
OLICIES THAT
A
LIGNWITH THE
I
DENTITY
E
COSYSTEM
.................................................................................................... 27
 
A4
 
W
ORK TO
I
MPLEMENT
E
NHANCED
P
RIVACY
P
ROTECTIONS
................................................... 27
 
A5
 
C
OORDINATE THE
D
EVELOPMENT AND
R
EFINEMENT OF
R
ISK
M
ODELS AND
I
NTEROPERABILITY
S
TANDARDS
................................................................................................................................. 28
 
A6
 
A
DDRESS THE
L
IABILITY
C
ONCERNS OF
S
ERVICE
P
ROVIDERS AND
I
NDIVIDUALS
..................... 28
 
A7
 
P
ERFORM
O
UTREACH AND
A
WARENESS ACROSS ALL
S
TAKEHOLDERS
.................................. 29
 
A8
 
C
ONTINUE
C
OLLABORATING IN
I
NTERNATIONAL
E
FFORTS
..................................................... 29
 
 
DRAFT National Strategy for Trusted Identities in CyberspaceJune 25, 2010iiA9
 
I
DENTIFY
O
THER
M
EANS TO
D
RIVE
A
DOPTION OF THE
I
DENTITY
E
COSYSTEM ACROSS THE
N
ATION
........................................................................................................................................ 29
 
CONCLUSION .................................................................................................................................. 31
 
APPENDIX A GLOSSARY ............................................................................................................. 32
 
APPENDIX B PARTICIPANTS ....................................................................................................... 35
 
APPENDIX C – FIPPS ...................................................................................................................... 36
 

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->