Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
8Activity
0 of .
Results for:
No results containing your search query
P. 1
National Strategy for Trusted Identities in Cyberspace

National Strategy for Trusted Identities in Cyberspace

Ratings: (0)|Views: 1,927 |Likes:
Published by Alex Howard
June 6/25/2010 version of the National Strategy for Trusted Identities in Cyberspace
June 6/25/2010 version of the National Strategy for Trusted Identities in Cyberspace

More info:

Published by: Alex Howard on Jan 07, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

06/17/2013

pdf

text

original

 
 
National Strategy for Trusted Identities inCyberspace
Creating Options for EnhancedOnline Security and Privacy
June 25, 2010
Draft 
 
DRAFT National Strategy for Trusted Identities in CyberspaceJune 25, 2010i
Table of Contents
EXECUTIVE SUMMARY ..................................................................................................................... 1
 
INTRODUCTION ................................................................................................................................. 4
 
C
URRENT
L
ANDSCAPE
....................................................................................................................... 4
 
S
COPE
............................................................................................................................................. 6
 
N
ATIONAL
S
TRATEGY
D
EVELOPMENT
................................................................................................. 6
 
N
ATIONAL
S
TRATEGY
O
RGANIZATION
................................................................................................. 7
 
GUIDING PRINCIPLES ....................................................................................................................... 8
 
I
DENTITY
S
OLUTIONS WILL BE
S
ECURE AND
R
ESILIENT
........................................................................ 8
 
I
DENTITY
S
OLUTIONS WILL BE
I
NTEROPERABLE
.................................................................................... 8
 
I
DENTITY
S
OLUTIONS WILL BE
P
RIVACY
E
NHANCING AND
V
OLUNTARY FOR THE
P
UBLIC
......................... 9
 
I
DENTITY
S
OLUTIONS WILL BE
C
OST
-E
FFECTIVE AND
E
ASY
T
O
U
SE
.................................................... 10
 
VISION AND BENEFITS ................................................................................................................... 12
 
V
ISION
S
TATEMENT
......................................................................................................................... 12
 
I
DENTITY
E
COSYSTEM
...................................................................................................................... 12
 
B
ENEFITS OF THE
I
DENTITY
E
COSYSTEM
........................................................................................... 18
 
GOALS AND OBJECTIVES .............................................................................................................. 21
 
G
OAL
1:
 
D
EVELOP A COMPREHENSIVE
I
DENTITY
E
COSYSTEM
F
RAMEWORK
. ....................................... 21
 
G
OAL
2:
 
B
UILD AND IMPLEMENT INTEROPERABLE IDENTITY INFRASTRUCTURE ALIGNED WITH THECOMMON
I
DENTITY
E
COSYSTEM
F
RAMEWORK
. .................................................................................. 22
 
G
OAL
3:
 
E
NHANCE CONFIDENCE AND WILLINGNESS TO PARTICIPATE IN THE
I
DENTITY
E
COSYSTEM
. ..... 23
 
G
OAL
4:
 
E
NSURE THE LONG
-
TERM SUCCESS OF THE
I
DENTITY
E
COSYSTEM
. ...................................... 24
 
COMMITMENT TO ACTION ............................................................................................................. 26
 
H
IGH
P
RIORITY
A
CTIONS
.................................................................................................................. 26
 
A1
 
D
ESIGNATE A
F
EDERAL
A
GENCY TO
L
EAD THE
P
UBLIC
/P
RIVATE
S
ECTOR
E
FFORTS
A
SSOCIATEDWITH
A
DVANCING THE
V
ISION
........................................................................................................ 26
 
A2
 
D
EVELOP A
S
HARED
,
 
C
OMPREHENSIVE
P
UBLIC
/P
RIVATE
S
ECTOR
I
MPLEMENTATION
P
LAN
..... 26
 
A3
 
A
CCELERATE THE
E
XPANSION OF
G
OVERNMENT
S
ERVICES
,
 
P
ILOTS
,
AND
P
OLICIES THAT
A
LIGNWITH THE
I
DENTITY
E
COSYSTEM
.................................................................................................... 27
 
A4
 
W
ORK TO
I
MPLEMENT
E
NHANCED
P
RIVACY
P
ROTECTIONS
................................................... 27
 
A5
 
C
OORDINATE THE
D
EVELOPMENT AND
R
EFINEMENT OF
R
ISK
M
ODELS AND
I
NTEROPERABILITY
S
TANDARDS
................................................................................................................................. 28
 
A6
 
A
DDRESS THE
L
IABILITY
C
ONCERNS OF
S
ERVICE
P
ROVIDERS AND
I
NDIVIDUALS
..................... 28
 
A7
 
P
ERFORM
O
UTREACH AND
A
WARENESS ACROSS ALL
S
TAKEHOLDERS
.................................. 29
 
A8
 
C
ONTINUE
C
OLLABORATING IN
I
NTERNATIONAL
E
FFORTS
..................................................... 29
 
 
DRAFT National Strategy for Trusted Identities in CyberspaceJune 25, 2010iiA9
 
I
DENTIFY
O
THER
M
EANS TO
D
RIVE
A
DOPTION OF THE
I
DENTITY
E
COSYSTEM ACROSS THE
N
ATION
........................................................................................................................................ 29
 
CONCLUSION .................................................................................................................................. 31
 
APPENDIX A GLOSSARY ............................................................................................................. 32
 
APPENDIX B PARTICIPANTS ....................................................................................................... 35
 
APPENDIX C – FIPPS ...................................................................................................................... 36
 

Activity (8)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
GovNewMedia liked this
GovNewMedia liked this
Jim Duncan liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->