Articles by Jeff Nigriny
In the wake of 9/11, the Federal Government’s secure-the-fort, big idea was to create an identity credential for all federal employees and contractors. Homeland Security Presidential Directive (HSPD)-12 set it all in motion. Today, we know the smartcard-based credential that arose from HSPD-12 as the Personal Identity Verification (PIV) card. The PIV card is meant to give employees/contractors physical access to federal facilities and logical access to federal information systems. While using a PIV card for logical access has been largely successful and compliant with HSPD-12, implementing PIV-based, physical access control systems (PACS) has been much more difficult to conquer. As a result, HSPD-12 compliance for PACS has largely eluded the Federal Government. The noncompliance reasons are many, but there is now hope for fully achieving HSPD-12’s mandates. Interoperability With Any Agency’s PIV Beyond Passports, PIV cards represent the only other open-standards-based, multi-vendor-supported, identity credential program on the planetAll Executive Branch employees and long-term contractors, including the entire Department of Defense, have been issued PIV cards. This has been true since 2013. Beyond Passports, PIV cards represent the only other open-standards-based, multi-vendor-supported, identity credential program on the planet. It seems so simple, where employees/contractors previously used their proximity card to open a federal facility door or go through a turnstile, they should now be able to use their PIV card. However, HSPD-12 took the PIV requirement one step further – compliant PACS must be interoperable with any agency’s PIV. This introduced an entire magnitude of additional complexity. A compliant, interoperable, PIV-based PACS should work like this: an authorized employee (or contractor) presents a PIV card (contact or contactless) to a card reader to enter whichever federal agency building they have reason to be. Over the last 14 years, in all but a very few cases, the lack of PACS’ HSPD-12 compliance has prevented this from happening. Secure Credential Policy Today, less than 1% of the Federal Government’s PACS are HSPD-12-compliant. At most federal facilities, especially those outside the National Capitol Region, a noncompliant PACS works like this: an authorized employee (or contractor) presents a proximity (‘prox’) badge to a proximity card reader to enter his or her agency’s facility. At the fraction of federal facilities with upgraded PACS that work with PIV cards, virtually all such PACS fail to properly use a minimum number of PIV security features before granting access – let alone interoperate with a PIV card from any other agency. Active government solicitations are issued for new, non-compliant, proximity-based systems that perpetuate the delay to HSPD-12 complianceNew federal initiatives frequently suffer from having no policy to enforce their roll-out. That isn’t the case with PACS compliance. Policies have been in place for so long that newer policies like Office of Management and Budget (OMB) M-11-11 (February 3, 2011) remind everyone what the policies said in 2004 and 2006. This year, OMB publicized its proposed OMB M-18-XX (Draft), which will replace M-11-11. OMB M-18-XX’s (Draft) main PACS thrust is, once again, to ensure that everyone understands what the Federal Government’s secure credential policy is. It hasn’t changed since 2004. It would be tempting to say that PACS technology isn’t mature, but that isn’t the case. In 2013, the Federal Government revamped the PACS portion of the FIPS 201 Evaluation Program and, since that time, all PACS on the General Services Administration’s (GSA) Approved Products List are 100% compliant and interoperable. Yet, on any given day, active government solicitations are issued for new, non-compliant, proximity-based systems that perpetuate the delay to HSPD-12 compliance. The usual suspects, policy and technology, are not the culprits for this epic delay. An authorized employee presents a PIV card to a card reader to enter whichever federal agency building they have reason to be Difficulties In Adopting HPSP-12 Compliance For PACS Standards – The Federal Government’s approach to standards is to avoid a great deal of specificity. It’s an unspoken tenet that federal standards must be flexible, promote innovation and avoid disadvantaging any participating market segment. The opposite is true if your goal is interoperability: nearly every detail must be specified. Consider the standards-based success story of chip-based credit cards. When was the last time you used a credit card and it didn’t work? Interoperability failures are nearly unheard of. If you look at the hundreds of volumes of technical specifications that cover minute aspects of every component in credit cards and payment terminals, you quickly realize why it works so well. Nothing is left to chance, nothing is a variable, and there is no optionality. The Good News: Work to increase viability through deep scrutiny has progressed in recent years. The GSA APL PACS Testing Lab, set up in 2013, annually tests credentials from all PIV issuers against all GSA-approved PACS. This testing has significantly reduced interoperability failures at federal facilities. Collaboration – In the past, physical access practitioners from federal agencies rarely collaborated, unlike their logical access counterparts. This is also true for PACS procurement decision-makers across agencies and facilities. The Good News: In 2018, an agency trend has emerged where finally physical access, physical security and IT practitioners have begun sitting down to discuss their shared responsibilities. We have already begun to see coordinated budget requests between IT and Security with enterprise architectures positioning PACS as an enterprise service on the network Scale – The Federal Government owns so many buildings that they can’t be counted. Google doesn’t know how many there are and neither does any one government official. Variability – A significant percentage of facilities have unique aspects making a one-size-fits-all approach infeasible. The Good News: Mature consulting services can now help agencies marry federal requirements with their unique environments to develop robust PACS enterprise architectures. As we see this occurring more and more frequently, a repeatable, achievable, systems-based upgrade of all PACS may be on the horizon. The GSA APL PACS Testing Lab annually tests credentials from all PIV issuers against all GSA-approved PACS Provenance – In many cases, different groups own different parts of a single facility, not all of whom might be subject to, or wish to interoperate with, a high-assurance compliant PACS. For example, GSA manages facilities for Legislative and Judicial tenants who aren’t subject to HSPD-12. Policy dictates that GSA manage the PACS for the front doors of these facilities should be HSPD-12-compliant, despite the fact that these tenants likely don’t have credentials that work with this technology. Sure, these tenants could commercially obtain a PIV-I credential, but almost none have. Economics – It’s difficult for agencies to create their annual security budget requests when HPSD-12 PACS upgrades are in scope, because so many unknowns exist at each facility. To assess the cost, the time to complete, and the facility’s existing equipment inventory, it would be logical for an agency to hire a contractor with PACS expertise to perform a site assessment. Having to do capital planning for an assessment phase in advance of making the annual budget request for the PACS upgrade creates a never-ending cycle of delay. Especially at agencies with multi-year capital planning requirements. Many agencies, trying to avoid this delay cycle, have fallen prey to doing site assessments themselves. This results in their integrators doing their walk-throughs after the contract is awarded. This is the leading cause of PACS upgrade cost overruns. Dependence on the agency’s IT department – Historically, PACS have been deployed on dedicated networks and are rarely ever connected to the enterprise, let alone the Internet. High-assurance PACS that validate credentials from other agencies must now communicate with many different systems on an enterprise network and over the Internet – so much so that the Federal Government reclassified PACS as IT systems. The Good News: With collaboration increasing between Physical Security Officers (PSOs) and Chief Information Officer (CIOs), we expect this to improve in due course. Resistance to change – This is a classic human factors challenge, and it’s a big one. PSOs have spent decades achieving their positions. PIV-based PACS could not be more different from the technologies that proceeded it, and such radical change is often resisted. When the value proposition is clear, change is adopted more readily. But security value isn’t easily measured or observed. It is often said that the best performance review for a PSO is to note that nothing happened. And when something does happen, it is necessarily kept quiet so the risk can be remediated without calling attention to the vulnerability in the interim. To date, the value proposition of moving to PIV-based PACS has been entirely based on policy (without corresponding funding in most cases) and through the shock value of white hat hackers, showing how easily most proximity badges can be cloned. This is not the stuff of change agents. PIV-based PACS could not be more different from the technologies that proceeded it, and such radical change is often resisted Are These Challenges A Unique Situation? No, these PACS challenges are not unique. Cybersecurity initially faced many of the same challenges that federal PACS face today. By 2000, the Federal Government recognized its urgent need to improve cybersecurity practices across its computing infrastructure and issued many policies that required agencies to improve. Improvement was sparse and inconsistent. GSA Schedules were set up to help agencies buy approved products and services to assist them, but this too produced lacklustre results. The Federal Government found that the best cybersecurity results occurred when enforced at the time an agency commissioned a system Congress enacted the Federal Information Security Management Act of 2002 (FISMA) (now amended by the Federal Information Security Modernization Action of 2014). FISMA mandates an Authority To Operate (ATO) accreditation process for all information systems. The Federal Government found that the best cybersecurity results occurred when enforced at the time an agency commissioned (vs. purchased) a system. FISMA and ATO accreditation has been highly successful when implementing new systems. These cybersecurity requirements are the closest thing that the Federal Government has to the ‘PIV Police’ today. However, the PIV requirements in FISMA and ATOs currently apply to only logical access for information systems. The proposed OMB M-18-XX (Draft) mentions that a FISMA PACS overlay to NIST SP 800-53 is forthcoming. The intent of the PACS overlay is to use the army of ATO accrediting officials in the Federal Government and enable them to assess implemented PACS as fit for purpose. This is the first time an enforcement approach has been brought forward that could reasonably succeed. How Long For HSPD-12 Compliance? We know that it won’t take another 14 years to achieve HSPD-12 compliance. Pockets of compliance are popping up. Compliant procurements do exist, and the state of PACS across the Federal Government is better in 2018 than in any previous year. Progress to date has been at a constant rate. The question is: what would take for progress to occur at an exponential rate instead? A major attack or compromise involving PACS would certainly hasten upgrades, but let’s hope that’s not the solution. The energy distribution sector has been riding a wave of security upgrade demands to retrofit their facilities across the U.S. The energy distribution sector, under nearly constant Advanced Persistent Threat attacks, has been riding a wave of security upgrade demands to retrofit their facilities across the U.S. The potential threat exists for Federal Government facilities as well. Looking into the federal PACS-compliance crystal ball, we’re beginning to see the faint outline of a multi-faceted campaign of education, budgetary oversight and accreditation of PACS that will ultimately see us past the tipping point. Consider though, at the current rate of PACS enablement, a 50% compliance rate is still far in the future. When that day arrives, the PIV card form factor may no longer be the key that fits that future lock. (Are you already using a mobile device’s Bluetooth interface to open the door to your office building?) Taking decades to perform a technology upgrade is the aging elephant in the room no one talks about. By the time critical mass is achieved with an upgrade facing these many challenges, there are typically compelling reasons to start over again with the next generation of technology. That cycle may well prove to be the Federal Government’s biggest PACS challenge of all.
CertiPath, an innovator in high-assurance identity, credential and access management services for highly regulated environments, launches an advanced visitor management solution within its TrustVisitor™ platform. The first of its kind to seamlessly and securely manage the complete lifecycle of a visit, TrustVisitor, which both secures and expedites visitor processing, meets the demands of all organizations that use high-assurance credentials (i.e. smart cards) including government, energy, banking, healthcare, critical infrastructure and Fortune 1000 companies. And, now, the need for sophisticated visitor pre-screening is at an all-time high with COVID-19 disrupting most aspects of everyday life. Maximum amount of intelligence TrustVisitor’s two-factor authentication process utilizes pre-registration to ensure expedited lobby experiences, and obtains the maximum amount of intelligence about visitors prior to arrival on site. It distinguishes between visitor types and visit categories, validating credentials, establishing visitors’ wellness and automatically provisions access. Employees create meetings and events via their email calendaring tool Employees create meetings and events via their email calendaring tool, inviting visitors – internal or external – to the organization. When a visitor registers for an event, providing all required information, event approvers receive emails with all details, and decisions can be made immediately regarding who is permitted to enter the facility. Visitor management solutions “CertiPath has been developing visitor management solutions for the past five years. From the very beginning, we emphasized the importance of vetting visitors before they arrive, as the only way to successfully achieve a faster and more secure lobby experience,” said Jeff Nigriny, President and Founder of CertiPath. “COVID-19 illustrates this point perfectly. In the past, we were concerned with establishing the identity of a visitor to ensure they were who they said they were and to be confident in that identity while they were onsite,” continued Nigriny. “So, suitability of visitors, up until now, has been focused on who they claim to be. Now, COVID-19 adds another aspect to suitability – wellness --which needs to be enforced for every visitor on a daily basis for the foreseeable future.” Adopting CDC guidelines With CertiPath’s TrustVisitor solution, visitor pre-registration is accomplished by using a valid smart card “The majority of organizations with which we are familiar have adopted CDC guidelines to ask a set of questions to anyone wishing to come back to a facility. This is the best practice we have, and it can be effective if people do not fatigue of it. However, far fewer organizations have conceived of a means to ask these same questions before they arrive,” states Nigriny. With CertiPath’s TrustVisitor solution, visitor pre-registration is accomplished by using a valid smart card (e.g., Personal Identity Verification [PIV], Common Access Card [CAC] Personal Identity Verification – Interoperable [PIV-I] or Commercial Identity Verification [CIV]). Validating electronic credentials Alternatively, visitors can pre-register with valid government-issued identification and receive a temporary CIV upon arrival. TrustVisitor then continuously validates electronic credentials and automatically facilitates access to the appropriate locations – for the duration of the visit. CertiPath’s TrustVisitor is the only fully US Federal compliant visitor management system available, originally developed for and used by federal agencies for high assurance credentialing needs. It is the only visitor management platform to implement the NIST SP 800-116-1.
CertiPath, an innovator and renowned company in high-assurance identity, credential and access management services for highly regulated environments, has announced the appointment of industry veteran, Jack L. Johnson, Jr. as Advisor to CertiPath’s Board of Directors, effective immediately. Johnson has over 30 years of industry experience that includes executive positions with Guidehouse Consulting and its legacy firm, PricewaterhouseCoopers, the Department of Homeland Security as its first Chief Security Officer, and has also served with the United States Secret Service for over 20 years. Security assessments expert Johnson is currently the Chief Executive Officer (CEO) and Managing Partner of Jack Johnson and Associates, a strategic consulting firm that specializes in security assessments, providing business and risk consulting domestically and internationally. “As part of Jack’s role, he will offer guidance and direction with regard to our growth initiatives and ongoing business strategies, identifying opportunities that align with CertiPath’s mission,” states Jeff Nigriny, President and Founder of CertiPath. High-assurance credentials provider I have known and worked with CertiPath’s rock-solid, principled leadership team members for decades" Jeff adds, “Because our primary focus is to develop and provide unparalleled, groundbreaking technologies and services that enable high-assurance credentials in the federal government and commercial spaces, we look forward to enhancing the ever-changing landscape with Jack helping to take us to the next level.” Jack Johnson stated, “I have known and worked with CertiPath’s rock-solid, principled leadership team members for decades. They are a well-regarded company that has been filling an essential niche in the identity management space.” Jack adds, “I’m excited to work alongside these great professionals, as the company is on the cusp of expanding significantly and I look forward to being a part of their success.” Protective and intelligence-related duties veteran Johnson’s career spans a full range of investigative, protective and intelligence-related duties, as well as assignments with various Presidents, Vice Presidents, Presidential candidates and foreign heads of state. Johnson received his Bachelor of Science degree from the University of Maryland, a Master’s degree in Forensic Science from George Washington University, and as a veteran of the United States Army, he is involved in the Code of Support Foundation.
NextgenID announces the immediate availability of products and solutions that meet the OMB Policy specified within the latest Executive release memorandum. “NextgenID continues to be a leader in improving and modernizing identity solutions specifically for the Government and has created products that support the use of shared services resulting in significant cost savings to all adopting agencies,” said Dario Berini, COO, NextgenID. Identity Proofing technology “Identity Proofing technology has been in place for over a decade with few advancements. In fact, it’s the Achilles heel of credential issuance both because of cost and unpredictable accuracy. NextgenID’s Kiosk and SRIP technology represents a new breed of proofing process, one that reduces cost while increasing accuracy. Proofing is the single largest cost component of any credentialing system,” said Jeff Nigriny, President, CertiPath. “In our analysis of the market, NextgenID’s SRIP is the leading solution that addresses cost and accuracy while providing many additional operational benefits.” With the introduction of VIP, the ID*Capture Kiosk further supports identity proofing as a shared service National Institute of Standards and Technology (NIST) Special Publications (SP) 800-63-3 is the foundation of digital identity. NextgenID’s ID*Capture Kiosk and Supervised Remote In-person Proofing (SRIP) solution, called Virtual In-person Proofing (VIP), is the only solution in the marketplace today that meets all of the requirements of SP 800-63A and enables adopting agencies and departments to obtain significant cost savings along with immediate compliance with the policy requirements of the just released OMB Memorandum. Virtual In-person Proofing (VIP) Over the last several years, NextgenID has focused on and improved its ID*Capture Kiosk to function as a universal front-end enrollment device, capable of supporting multiple identity systems and program requirements from a single device. With the introduction of VIP, the ID*Capture Kiosk further supports identity proofing as a shared service. Our forward-looking innovative COTS products and solutions are in complete alignment with the new OMB policy that requires solutions facilitate cross-government federation, federally provided or commercially provided shared services, and innovation. NextgenID applauds the Executive Office of the President, Office of Management and Budget in its continued leadership and guidance on identity in the Federal Government. NextgenID strongly believes that the new policies from OMB will, when adopted, substantially reduce the cost of the multiple identity programs in effect throughout the federal government.
How To Ramp Up Perimeter Security With License Plate Reader TechnologyDownload
Solve Access Control Challenges in the Healthcare SectorDownload
Getting the Most Value From Software Subscription AgreementsDownload
Shifting Trends in Operation Centers and Control Rooms for 2021Download