CHRIS TAYLOR ENTRUST - Secure Technology Alliance · WRAP-UP – NEXT STEPS • It’s a...

20
MOBILITY & IDENTITY TRACK IMPLEMENTING MOBILE DERIVED “PIV” CREDENTIALS CHRIS TAYLOR ENTRUST

Transcript of CHRIS TAYLOR ENTRUST - Secure Technology Alliance · WRAP-UP – NEXT STEPS • It’s a...

Page 1: CHRIS TAYLOR ENTRUST - Secure Technology Alliance · WRAP-UP – NEXT STEPS • It’s a partnership – a collaborative approach to be successful • Extending beyond GFE Mobile

MOBILITY & IDENTITY TRACK IMPLEMENTING MOBILE DERIVED “PIV” CREDENTIALS

CHRIS TAYLOR ENTRUST

Page 2: CHRIS TAYLOR ENTRUST - Secure Technology Alliance · WRAP-UP – NEXT STEPS • It’s a partnership – a collaborative approach to be successful • Extending beyond GFE Mobile

BUSINESS DRIVERS

2

Page 3: CHRIS TAYLOR ENTRUST - Secure Technology Alliance · WRAP-UP – NEXT STEPS • It’s a partnership – a collaborative approach to be successful • Extending beyond GFE Mobile

BUSINESS DRIVERS

• Problem: – Provide users same level of

access to enterprise resources on mobile devices as they have on their desktops

3

Page 4: CHRIS TAYLOR ENTRUST - Secure Technology Alliance · WRAP-UP – NEXT STEPS • It’s a partnership – a collaborative approach to be successful • Extending beyond GFE Mobile

BUSINESS DRIVERS

• Business Requirements – Address the demand by federal

employees to use mobile devices in the workplace and abroad

– Security on mobile devices meets policy – Reduce roadblocks that impede

PIV adoption – Secure alternative auth method to the PIV card – Compliance to security policies – Centralized control to manage Derived PIV Credential

(PIV-D) 4

Page 5: CHRIS TAYLOR ENTRUST - Secure Technology Alliance · WRAP-UP – NEXT STEPS • It’s a partnership – a collaborative approach to be successful • Extending beyond GFE Mobile

POLICY REQUIREMENTS

5

Page 6: CHRIS TAYLOR ENTRUST - Secure Technology Alliance · WRAP-UP – NEXT STEPS • It’s a partnership – a collaborative approach to be successful • Extending beyond GFE Mobile

POLICY REQUIREMENTS

The following policies are required to be adhered to: • FIPS-201-2 • SP800-157 • SP800-63-2 • SP800-73-4 • Common policy certificate policy • E-Auth/ICAM

6

Page 7: CHRIS TAYLOR ENTRUST - Secure Technology Alliance · WRAP-UP – NEXT STEPS • It’s a partnership – a collaborative approach to be successful • Extending beyond GFE Mobile

REQUIREMENTS

7

Page 8: CHRIS TAYLOR ENTRUST - Secure Technology Alliance · WRAP-UP – NEXT STEPS • It’s a partnership – a collaborative approach to be successful • Extending beyond GFE Mobile

REQUIREMENTS

• Use Cases Desktop Mobile – SCLO ü N/A – VPN ü ü – protected websites ü ü – Exchange (email) ü ü – Document signing ü ü – Support Mission Apps × ü

8

Page 9: CHRIS TAYLOR ENTRUST - Secure Technology Alliance · WRAP-UP – NEXT STEPS • It’s a partnership – a collaborative approach to be successful • Extending beyond GFE Mobile

REQUIREMENTS

9

• System requirements – Low total cost of ownership – MDM integration – Flexible deployment models –  runs on the majority of mobile devices

deployed (GFE today and BYOD tomorrow) – Scalable security mechanism of protecting

the private keys –  Integration into their existing eAuth

environment – Self-Service portal

Page 10: CHRIS TAYLOR ENTRUST - Secure Technology Alliance · WRAP-UP – NEXT STEPS • It’s a partnership – a collaborative approach to be successful • Extending beyond GFE Mobile

CHALLENGES

10

Page 11: CHRIS TAYLOR ENTRUST - Secure Technology Alliance · WRAP-UP – NEXT STEPS • It’s a partnership – a collaborative approach to be successful • Extending beyond GFE Mobile

CHALLENGES

• 800-157 and 800-73-4 – Not finalized as of yet

• Common policy certificate policy – Can’t issue a PIV-D until

updated

11

Page 12: CHRIS TAYLOR ENTRUST - Secure Technology Alliance · WRAP-UP – NEXT STEPS • It’s a partnership – a collaborative approach to be successful • Extending beyond GFE Mobile

CHALLENGES

• Need flexible solution – utilize the SSP and NFI CA cert types in a manner that best

matches the PIV-D intent until the standard is approved – on premise vs hosted

12

Page 13: CHRIS TAYLOR ENTRUST - Secure Technology Alliance · WRAP-UP – NEXT STEPS • It’s a partnership – a collaborative approach to be successful • Extending beyond GFE Mobile

CHALLENGES

• Integrations with other products • Derived credential is useless with out apps!

13

Page 14: CHRIS TAYLOR ENTRUST - Secure Technology Alliance · WRAP-UP – NEXT STEPS • It’s a partnership – a collaborative approach to be successful • Extending beyond GFE Mobile

DERIVED PIV CREDENTIAL SOLUTION

14

Page 15: CHRIS TAYLOR ENTRUST - Secure Technology Alliance · WRAP-UP – NEXT STEPS • It’s a partnership – a collaborative approach to be successful • Extending beyond GFE Mobile

DERIVED PIV CREDENTIAL SOLUTION

• Entrust Federal SSP • Entrust IdentityGuard Management Server/Self Service Module

• Entrust Mobile Smart Credential application

• Thursby Eco-system • MobileIron

15

Page 16: CHRIS TAYLOR ENTRUST - Secure Technology Alliance · WRAP-UP – NEXT STEPS • It’s a partnership – a collaborative approach to be successful • Extending beyond GFE Mobile

IMPLEMENTATION STRATEGY

16

Page 17: CHRIS TAYLOR ENTRUST - Secure Technology Alliance · WRAP-UP – NEXT STEPS • It’s a partnership – a collaborative approach to be successful • Extending beyond GFE Mobile

IMPLEMENTATION STRATEGY

•  Initial Proof-of-Concept –  Investigated potential solutions – Selected a solution – Evaluated for 12 months

• Limited agency pilot – 1H 2015 – Build out documentation and support structure – Provide to key stake holders within the organization

• Agency wide deployment to all GFE mobile devices – Build Production environment in summer 2015 –  To begin in 2H 2015

17

Page 18: CHRIS TAYLOR ENTRUST - Secure Technology Alliance · WRAP-UP – NEXT STEPS • It’s a partnership – a collaborative approach to be successful • Extending beyond GFE Mobile

WRAP-UP

18

Page 19: CHRIS TAYLOR ENTRUST - Secure Technology Alliance · WRAP-UP – NEXT STEPS • It’s a partnership – a collaborative approach to be successful • Extending beyond GFE Mobile

WRAP-UP – NEXT STEPS

• It’s a partnership – a collaborative approach to be successful

• Extending beyond GFE Mobile users – BYOD

• Hosting PIV-D solution for other federal agencies

• Consulting with other federal agencies for deploying their own PIV-D solution

• Expand use cases, e.g. mission critical apps

19

Page 20: CHRIS TAYLOR ENTRUST - Secure Technology Alliance · WRAP-UP – NEXT STEPS • It’s a partnership – a collaborative approach to be successful • Extending beyond GFE Mobile

THANK YOU

www.datacard.com www.entrust.com

20