SlideShare une entreprise Scribd logo
1  sur  8
NSTIC
Update: What has been happening
since
The June 25th
2010 Announcement
Convener: Jay Unger
National Strategy for Trusted Identities in Cyberspace
Action: What should the Internet
Identity Community do to
contribute / get ready?
Internet Identity Workshop #11 - Mountain, CA, November 2-4, 2010
NSTIC – Update & Action
What is NSTIC ?
National Strategy for Trusted
Identities in Cyberspace
● Blog post and link to draft
document on White House blog
on June 25th
2010
http://www.whitehouse.gov/blog/2010/06/25/
national-strategy-trusted-identities-cyberspace
● by Howard Schmidt
Cybersecurity Coordinator and
Special Assistant to the President
● Document still available at
http://www.dhs.gov/xlibrary/assets/ns_tic.pdf
● Public comments were accepted
at http://www.nstic.ideascale.com
 From June 25th
to January 19th
2010
 No new comment are being accepted but existing
comments can still be viewed
Internet Identity Workshop #11 - Mountain, CA, November 2-4, 2010
NSTIC Update & Action
The NSTIC Document
● Document Summary
 36 Pages
 Written primarily by a contractor (Deloitte) with input from various government
agencies and some information technology organizations and business.
 High-level document – mostly vision, examples, and goals and objectives.
 Very little technical detail or technology specifics.
 No specific implementation plan or schedule.
 Fairly repetitive. Not very well written or presented.
 Examples are generally poor.
● Document Spirit
 Does recognize the need for a general identity mechanism on the internet.
–To support and enhance both public and private interaction between citizens and
government, businesses, organizations etc.
–To reduce risks associated with identity theft and fraud for all citizens.
–Recognizes the need to work with both the information industry and citizens.
–Views government leadership as
Internet Identity Workshop #11 - Mountain, CA, November 2-4, 2010
NSTIC Update & Action
The NSTIC Document
● Reading between the lines
 Talks about present problems and limitations
– “ … the online environment today is not user-centric; individuals tend to have little control over their own
personal information. They have limited ability to utilize a single digital identity across multiple applications
…”
– “Over 10 million Americans are … victims of identity theft each year.”
– “… victims of identity theft can spend up to 130 hours reconstructing their identities (e.g., credit rating, bank
accounts, reputation, etc.) following an identity crime.”
– “The collection of identity-related information across multiple providers and accounts, coupled with the
sharing of personal information through the growth of social media, increases opportunities for data
compromise.”
 Discusses a vision of a “user centric identity ecosystem”
– “The Identity Ecosystem is an online environment where individuals, organizations, services, and devices
can trust one another through proper identification and authentication.”
– “… a world where individuals can seamlessly access information and services online from a variety of
sources …”
– “… and without the need to manage many accounts and passwords.”
– “ … eliminate redundant processes associated with collecting, managing, authenticating, authorizing, and
validating identity data … “
Internet Identity Workshop #11 - Mountain, CA, November 2-4, 2010
NSTIC Update & Action
The NSTIC Document
● Reading between the lines
 Reference to well established concepts:
– Identity Provider - “ … responsible for the processes associated with enrolling a subject, and establishing
and maintaining the digital identity associated with an individual … “
– User Centric – “ … allow individuals to select the interoperable credential appropriate for the transaction.”
– Relying Party – “ … makes transaction decisions based upon its receipt, validation, and acceptance of a
subject’s authenticated credentials (sic) and attributes.
– Attributes – “Trusted and validated attributes provide a basis for organizations that offer online services to
make authorization decisions.
– Anonymity / Pseudonym – “An individual has the choice to … authenticate to a transaction anonymously
or a pseudonym without uniquely identifying himself.”
Internet Identity Workshop #11 - Mountain, CA, November 2-4, 2010
NSTIC Update & Action
The NSTIC Process
“The Federal government - in collaboration with industry and the civil
liberties and privacy communities - should build a cyber security-based
identity management vision and strategy for the Nation.”
 Goals
– Build and implement an interoperable identity infrastructure aligned with the Identity Ecosystem Framework
– Enhance confidence and willingness to participate in the Identity Ecosystem
– Ensure the long-term success of the Identity Ecosystem
 Actions
– Designate a Federal Agency to Lead the Public/Private Sector Efforts Associated with Achieving the Goals of
the Strategy
– Develop a Shared, Comprehensive Public/Private Sector Implementation Plan
– Accelerate the Expansion of Federal Services, Pilots, and Policies that Align with the Identity Ecosystem
– Work Among the Public/Private Sectors to Implement Enhanced Privacy Protections
– Coordinate the Development and Refinement of Risk Models and Interoperability Standards
Internet Identity Workshop #11 - Mountain, CA, November 2-4, 2010
NSTIC Update & Action
NSTIC Feedback after June 25th
2010
● IdeaScale Comments
 Comment period was very short (6/25-7/19).
 Over 500 comments were posted and voted on.
 Many “knee-jerk” comments from the fringes.
– “Hands off my Internet”, “No National ID”, “Government Power Grab”, etc.
 Most frequent (non knee-jerk) comment:
– Extend Public Comment Opportunity
 Several thoughtful and technically insightful comments and threads
– Various authentication methods, process for public engagement, leadership agency,
how government should participate, existing standards etc.
 No public follow-up response, communication or Announcements
● Press Coverage
 Lots of trade press coverage - Mostly favorable.
 Some general press coverage - Neutral.
Internet Identity Workshop #11 - Mountain, CA, November 2-4, 2010
NSTIC Update & Action
NSTIC Feedback after June 25th
2010 (continued)
● Open Letter to Howard Schmidt at the White House on July 16th
2010
 From: Center for Democracy in Technology (CDT), Electronic Frontier Foundation
(EFF), Liberty Coalition http://www.cdt.org/files/pdfs/20100716_nstic_extend_ltr.pdf
 Requesting:
– “… that the public comment period be extended for at least 30 days to facilitate more robust
public discussion … that subsequent public comment periods on this topic extend for at
least 90 days”
– “… clarification on the agency's proposed timeline and process”
– “… an opportunity to convene an in-person discussion with an appropriate White House or
DHS official to discuss this important matter and engage in further public discussion.”
 Results:
– No extension of public comment period (IdeaScale was closed to new posts on 7/19/2010)
– CDT has had at least two follow-up meetings with the cyber-security staff at the
White House between mid-July and the present.
– CDT has had the opportunity to review and comment on new document drafts being
developed including an implementation plan and schedule.
– CDT has been informed that work is ongoing, internal agency reviews are being conducted,
and no announcements are expected before the beginning of next year

Contenu connexe

Tendances

June 2016 social media in legal investigations - final (for distribution)
June 2016   social media in legal investigations - final (for distribution)June 2016   social media in legal investigations - final (for distribution)
June 2016 social media in legal investigations - final (for distribution)Ian Tausig
 
Privacy & Social Media
Privacy & Social MediaPrivacy & Social Media
Privacy & Social Mediachuckbt
 
Michigan's Fiduciary Access to Digital Assets: What You Need to Know
Michigan's Fiduciary Access to Digital Assets: What  You Need to KnowMichigan's Fiduciary Access to Digital Assets: What  You Need to Know
Michigan's Fiduciary Access to Digital Assets: What You Need to Knowgallowayandcollens
 
Accessibility Challenges of the Next Decade: Cloud and Mobile Computing and B...
Accessibility Challenges of the Next Decade: Cloud and Mobile Computing and B...Accessibility Challenges of the Next Decade: Cloud and Mobile Computing and B...
Accessibility Challenges of the Next Decade: Cloud and Mobile Computing and B...Bebo White
 
Inclusive Smart Cities - Net Inclusion 2017 Presentation
Inclusive Smart Cities - Net Inclusion 2017 PresentationInclusive Smart Cities - Net Inclusion 2017 Presentation
Inclusive Smart Cities - Net Inclusion 2017 PresentationSmart Chicago Collaborative
 
Legal Information for Tennesseans (LIFT) Overview
Legal Information for Tennesseans (LIFT) OverviewLegal Information for Tennesseans (LIFT) Overview
Legal Information for Tennesseans (LIFT) OverviewErik Cole
 
Federated Identity - DLNE 11th December
Federated Identity - DLNE 11th DecemberFederated Identity - DLNE 11th December
Federated Identity - DLNE 11th DecemberMyDigitalBiz-DLNE
 
Privacy applications on blockchain
Privacy applications on blockchainPrivacy applications on blockchain
Privacy applications on blockchainWilson Bright
 
Media law for community journalists and bloggers
Media law for community journalists and bloggersMedia law for community journalists and bloggers
Media law for community journalists and bloggersjtownend
 
ADA Compliance for Hotels - Travel Tripper
ADA Compliance for Hotels - Travel TripperADA Compliance for Hotels - Travel Tripper
ADA Compliance for Hotels - Travel TripperNancy Huang
 
Cdas 2012, lilian edwards and edina harbinja
Cdas 2012, lilian edwards and edina harbinjaCdas 2012, lilian edwards and edina harbinja
Cdas 2012, lilian edwards and edina harbinjaLilian Edwards
 
Blockchain and Government: the Malta experience
Blockchain and Government: the Malta experienceBlockchain and Government: the Malta experience
Blockchain and Government: the Malta experienceStrategyWorks
 
Presentation by Christine Yeats for Information Awareness Month 2010 "Referen...
Presentation by Christine Yeats for Information Awareness Month 2010 "Referen...Presentation by Christine Yeats for Information Awareness Month 2010 "Referen...
Presentation by Christine Yeats for Information Awareness Month 2010 "Referen...NSW State Archives
 
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018gallowayandcollens
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internetmoldovaictsummit2016
 

Tendances (19)

Indonesian CSOs for IGF2013
Indonesian CSOs for IGF2013Indonesian CSOs for IGF2013
Indonesian CSOs for IGF2013
 
June 2016 social media in legal investigations - final (for distribution)
June 2016   social media in legal investigations - final (for distribution)June 2016   social media in legal investigations - final (for distribution)
June 2016 social media in legal investigations - final (for distribution)
 
Privacy & Social Media
Privacy & Social MediaPrivacy & Social Media
Privacy & Social Media
 
Michigan's Fiduciary Access to Digital Assets: What You Need to Know
Michigan's Fiduciary Access to Digital Assets: What  You Need to KnowMichigan's Fiduciary Access to Digital Assets: What  You Need to Know
Michigan's Fiduciary Access to Digital Assets: What You Need to Know
 
Accessibility Challenges of the Next Decade: Cloud and Mobile Computing and B...
Accessibility Challenges of the Next Decade: Cloud and Mobile Computing and B...Accessibility Challenges of the Next Decade: Cloud and Mobile Computing and B...
Accessibility Challenges of the Next Decade: Cloud and Mobile Computing and B...
 
Inclusive Smart Cities - Net Inclusion 2017 Presentation
Inclusive Smart Cities - Net Inclusion 2017 PresentationInclusive Smart Cities - Net Inclusion 2017 Presentation
Inclusive Smart Cities - Net Inclusion 2017 Presentation
 
Legal Information for Tennesseans (LIFT) Overview
Legal Information for Tennesseans (LIFT) OverviewLegal Information for Tennesseans (LIFT) Overview
Legal Information for Tennesseans (LIFT) Overview
 
Federated Identity - DLNE 11th December
Federated Identity - DLNE 11th DecemberFederated Identity - DLNE 11th December
Federated Identity - DLNE 11th December
 
Privacy applications on blockchain
Privacy applications on blockchainPrivacy applications on blockchain
Privacy applications on blockchain
 
Media law for community journalists and bloggers
Media law for community journalists and bloggersMedia law for community journalists and bloggers
Media law for community journalists and bloggers
 
Social Media Forensics
Social Media ForensicsSocial Media Forensics
Social Media Forensics
 
ADA Compliance for Hotels - Travel Tripper
ADA Compliance for Hotels - Travel TripperADA Compliance for Hotels - Travel Tripper
ADA Compliance for Hotels - Travel Tripper
 
Cdas 2012, lilian edwards and edina harbinja
Cdas 2012, lilian edwards and edina harbinjaCdas 2012, lilian edwards and edina harbinja
Cdas 2012, lilian edwards and edina harbinja
 
Blockchain and Government: the Malta experience
Blockchain and Government: the Malta experienceBlockchain and Government: the Malta experience
Blockchain and Government: the Malta experience
 
Presentation by Christine Yeats for Information Awareness Month 2010 "Referen...
Presentation by Christine Yeats for Information Awareness Month 2010 "Referen...Presentation by Christine Yeats for Information Awareness Month 2010 "Referen...
Presentation by Christine Yeats for Information Awareness Month 2010 "Referen...
 
Murray Privacy in the Context of Content Platforms & Discovery Tools
Murray Privacy in the Context of Content Platforms & Discovery ToolsMurray Privacy in the Context of Content Platforms & Discovery Tools
Murray Privacy in the Context of Content Platforms & Discovery Tools
 
Adler nurani
Adler nurani Adler nurani
Adler nurani
 
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
Fiduciary Access to Digital Assets Act in Michigan - Social Mitten 2018
 
Freedom of expression on the internet
Freedom of expression on the internetFreedom of expression on the internet
Freedom of expression on the internet
 

Similaire à IIW-11 NSTIC Update

UNDP Bolivia promotes democratic governance through www.gobernabilidad.org.bo...
UNDP Bolivia promotes democratic governance through www.gobernabilidad.org.bo...UNDP Bolivia promotes democratic governance through www.gobernabilidad.org.bo...
UNDP Bolivia promotes democratic governance through www.gobernabilidad.org.bo...kmimpactchallenge
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...Patrick McCormick
 
Personal Data and Trust Network inaugural Event 11 march 2015 - record
Personal Data and Trust Network inaugural Event   11 march 2015 - recordPersonal Data and Trust Network inaugural Event   11 march 2015 - record
Personal Data and Trust Network inaugural Event 11 march 2015 - recordDigital Catapult
 
National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...M2SYS Technology
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenienceDon Lovett
 
Innovating through public sector information
Innovating through public sector informationInnovating through public sector information
Innovating through public sector informationJerry Fishenden
 
Establishing a Trusted Identity in Cyberspace
Establishing a Trusted Identity in CyberspaceEstablishing a Trusted Identity in Cyberspace
Establishing a Trusted Identity in CyberspaceRightPatient®
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
 
RIM On The Social Side
RIM On The Social SideRIM On The Social Side
RIM On The Social SideNatalie Alesi
 
Harnessing Civic Tech & Data for Justice in STL
Harnessing Civic Tech & Data for Justice in STL Harnessing Civic Tech & Data for Justice in STL
Harnessing Civic Tech & Data for Justice in STL Christopher Whitaker
 
Towards long-term preservation of linked data - the PRELIDA project
Towards long-term preservation of linked data - the PRELIDA projectTowards long-term preservation of linked data - the PRELIDA project
Towards long-term preservation of linked data - the PRELIDA projectPRELIDA Project
 
Our Data Coop - Intelligent Sharing for Community Benefit: An Introduction
Our Data Coop - Intelligent Sharing for Community Benefit: An IntroductionOur Data Coop - Intelligent Sharing for Community Benefit: An Introduction
Our Data Coop - Intelligent Sharing for Community Benefit: An IntroductionCommon Futures
 
When Too Many is Just Enough: Citizen Engagement and Federal Government Websites
When Too Many is Just Enough: Citizen Engagement and Federal Government WebsitesWhen Too Many is Just Enough: Citizen Engagement and Federal Government Websites
When Too Many is Just Enough: Citizen Engagement and Federal Government WebsitesJeffrey Ryan Pass
 
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsJan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsTimothy Holborn
 
UK Government identity initiatives since the late 1990s - IDnext 2015
UK Government identity initiatives since the late 1990s - IDnext 2015UK Government identity initiatives since the late 1990s - IDnext 2015
UK Government identity initiatives since the late 1990s - IDnext 2015Jerry Fishenden
 
COMIT Sept 2016 - Open Data (Paul Wilkinson)
COMIT Sept 2016 - Open Data (Paul Wilkinson)COMIT Sept 2016 - Open Data (Paul Wilkinson)
COMIT Sept 2016 - Open Data (Paul Wilkinson)Comit Projects Ltd
 
Government as a platform: engaging the public with social media
Government as a platform: engaging the public with social mediaGovernment as a platform: engaging the public with social media
Government as a platform: engaging the public with social mediaPatrick McCormick
 

Similaire à IIW-11 NSTIC Update (20)

UNDP Bolivia promotes democratic governance through www.gobernabilidad.org.bo...
UNDP Bolivia promotes democratic governance through www.gobernabilidad.org.bo...UNDP Bolivia promotes democratic governance through www.gobernabilidad.org.bo...
UNDP Bolivia promotes democratic governance through www.gobernabilidad.org.bo...
 
Presentation kdid
Presentation kdidPresentation kdid
Presentation kdid
 
digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...digital identity 2.0: how technology is transforming behaviours and raising c...
digital identity 2.0: how technology is transforming behaviours and raising c...
 
Personal Data and Trust Network inaugural Event 11 march 2015 - record
Personal Data and Trust Network inaugural Event   11 march 2015 - recordPersonal Data and Trust Network inaugural Event   11 march 2015 - record
Personal Data and Trust Network inaugural Event 11 march 2015 - record
 
National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...National Association for Trusted Identities in Cyberspace - Establishing Trus...
National Association for Trusted Identities in Cyberspace - Establishing Trus...
 
Hope x talk
Hope x talkHope x talk
Hope x talk
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
 
Innovating through public sector information
Innovating through public sector informationInnovating through public sector information
Innovating through public sector information
 
Establishing a Trusted Identity in Cyberspace
Establishing a Trusted Identity in CyberspaceEstablishing a Trusted Identity in Cyberspace
Establishing a Trusted Identity in Cyberspace
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 
RIM On The Social Side
RIM On The Social SideRIM On The Social Side
RIM On The Social Side
 
Harnessing Civic Tech & Data for Justice in STL
Harnessing Civic Tech & Data for Justice in STL Harnessing Civic Tech & Data for Justice in STL
Harnessing Civic Tech & Data for Justice in STL
 
Towards long-term preservation of linked data - the PRELIDA project
Towards long-term preservation of linked data - the PRELIDA projectTowards long-term preservation of linked data - the PRELIDA project
Towards long-term preservation of linked data - the PRELIDA project
 
Our Data Coop - Intelligent Sharing for Community Benefit: An Introduction
Our Data Coop - Intelligent Sharing for Community Benefit: An IntroductionOur Data Coop - Intelligent Sharing for Community Benefit: An Introduction
Our Data Coop - Intelligent Sharing for Community Benefit: An Introduction
 
When Too Many is Just Enough: Citizen Engagement and Federal Government Websites
When Too Many is Just Enough: Citizen Engagement and Federal Government WebsitesWhen Too Many is Just Enough: Citizen Engagement and Federal Government Websites
When Too Many is Just Enough: Citizen Engagement and Federal Government Websites
 
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedingsJan 2017 Submission to AG Re: Metadata use in civil proceedings
Jan 2017 Submission to AG Re: Metadata use in civil proceedings
 
UK Government identity initiatives since the late 1990s - IDnext 2015
UK Government identity initiatives since the late 1990s - IDnext 2015UK Government identity initiatives since the late 1990s - IDnext 2015
UK Government identity initiatives since the late 1990s - IDnext 2015
 
COMIT Sept 2016 - Open Data (Paul Wilkinson)
COMIT Sept 2016 - Open Data (Paul Wilkinson)COMIT Sept 2016 - Open Data (Paul Wilkinson)
COMIT Sept 2016 - Open Data (Paul Wilkinson)
 
Open Goverment Data: Insights from the International Open Goverment Data Conf...
Open Goverment Data: Insights from the International Open Goverment Data Conf...Open Goverment Data: Insights from the International Open Goverment Data Conf...
Open Goverment Data: Insights from the International Open Goverment Data Conf...
 
Government as a platform: engaging the public with social media
Government as a platform: engaging the public with social mediaGovernment as a platform: engaging the public with social media
Government as a platform: engaging the public with social media
 

Dernier

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 

Dernier (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 

IIW-11 NSTIC Update

  • 1. NSTIC Update: What has been happening since The June 25th 2010 Announcement Convener: Jay Unger National Strategy for Trusted Identities in Cyberspace Action: What should the Internet Identity Community do to contribute / get ready?
  • 2. Internet Identity Workshop #11 - Mountain, CA, November 2-4, 2010 NSTIC – Update & Action What is NSTIC ? National Strategy for Trusted Identities in Cyberspace ● Blog post and link to draft document on White House blog on June 25th 2010 http://www.whitehouse.gov/blog/2010/06/25/ national-strategy-trusted-identities-cyberspace ● by Howard Schmidt Cybersecurity Coordinator and Special Assistant to the President ● Document still available at http://www.dhs.gov/xlibrary/assets/ns_tic.pdf ● Public comments were accepted at http://www.nstic.ideascale.com  From June 25th to January 19th 2010  No new comment are being accepted but existing comments can still be viewed
  • 3. Internet Identity Workshop #11 - Mountain, CA, November 2-4, 2010 NSTIC Update & Action The NSTIC Document ● Document Summary  36 Pages  Written primarily by a contractor (Deloitte) with input from various government agencies and some information technology organizations and business.  High-level document – mostly vision, examples, and goals and objectives.  Very little technical detail or technology specifics.  No specific implementation plan or schedule.  Fairly repetitive. Not very well written or presented.  Examples are generally poor. ● Document Spirit  Does recognize the need for a general identity mechanism on the internet. –To support and enhance both public and private interaction between citizens and government, businesses, organizations etc. –To reduce risks associated with identity theft and fraud for all citizens. –Recognizes the need to work with both the information industry and citizens. –Views government leadership as
  • 4. Internet Identity Workshop #11 - Mountain, CA, November 2-4, 2010 NSTIC Update & Action The NSTIC Document ● Reading between the lines  Talks about present problems and limitations – “ … the online environment today is not user-centric; individuals tend to have little control over their own personal information. They have limited ability to utilize a single digital identity across multiple applications …” – “Over 10 million Americans are … victims of identity theft each year.” – “… victims of identity theft can spend up to 130 hours reconstructing their identities (e.g., credit rating, bank accounts, reputation, etc.) following an identity crime.” – “The collection of identity-related information across multiple providers and accounts, coupled with the sharing of personal information through the growth of social media, increases opportunities for data compromise.”  Discusses a vision of a “user centric identity ecosystem” – “The Identity Ecosystem is an online environment where individuals, organizations, services, and devices can trust one another through proper identification and authentication.” – “… a world where individuals can seamlessly access information and services online from a variety of sources …” – “… and without the need to manage many accounts and passwords.” – “ … eliminate redundant processes associated with collecting, managing, authenticating, authorizing, and validating identity data … “
  • 5. Internet Identity Workshop #11 - Mountain, CA, November 2-4, 2010 NSTIC Update & Action The NSTIC Document ● Reading between the lines  Reference to well established concepts: – Identity Provider - “ … responsible for the processes associated with enrolling a subject, and establishing and maintaining the digital identity associated with an individual … “ – User Centric – “ … allow individuals to select the interoperable credential appropriate for the transaction.” – Relying Party – “ … makes transaction decisions based upon its receipt, validation, and acceptance of a subject’s authenticated credentials (sic) and attributes. – Attributes – “Trusted and validated attributes provide a basis for organizations that offer online services to make authorization decisions. – Anonymity / Pseudonym – “An individual has the choice to … authenticate to a transaction anonymously or a pseudonym without uniquely identifying himself.”
  • 6. Internet Identity Workshop #11 - Mountain, CA, November 2-4, 2010 NSTIC Update & Action The NSTIC Process “The Federal government - in collaboration with industry and the civil liberties and privacy communities - should build a cyber security-based identity management vision and strategy for the Nation.”  Goals – Build and implement an interoperable identity infrastructure aligned with the Identity Ecosystem Framework – Enhance confidence and willingness to participate in the Identity Ecosystem – Ensure the long-term success of the Identity Ecosystem  Actions – Designate a Federal Agency to Lead the Public/Private Sector Efforts Associated with Achieving the Goals of the Strategy – Develop a Shared, Comprehensive Public/Private Sector Implementation Plan – Accelerate the Expansion of Federal Services, Pilots, and Policies that Align with the Identity Ecosystem – Work Among the Public/Private Sectors to Implement Enhanced Privacy Protections – Coordinate the Development and Refinement of Risk Models and Interoperability Standards
  • 7. Internet Identity Workshop #11 - Mountain, CA, November 2-4, 2010 NSTIC Update & Action NSTIC Feedback after June 25th 2010 ● IdeaScale Comments  Comment period was very short (6/25-7/19).  Over 500 comments were posted and voted on.  Many “knee-jerk” comments from the fringes. – “Hands off my Internet”, “No National ID”, “Government Power Grab”, etc.  Most frequent (non knee-jerk) comment: – Extend Public Comment Opportunity  Several thoughtful and technically insightful comments and threads – Various authentication methods, process for public engagement, leadership agency, how government should participate, existing standards etc.  No public follow-up response, communication or Announcements ● Press Coverage  Lots of trade press coverage - Mostly favorable.  Some general press coverage - Neutral.
  • 8. Internet Identity Workshop #11 - Mountain, CA, November 2-4, 2010 NSTIC Update & Action NSTIC Feedback after June 25th 2010 (continued) ● Open Letter to Howard Schmidt at the White House on July 16th 2010  From: Center for Democracy in Technology (CDT), Electronic Frontier Foundation (EFF), Liberty Coalition http://www.cdt.org/files/pdfs/20100716_nstic_extend_ltr.pdf  Requesting: – “… that the public comment period be extended for at least 30 days to facilitate more robust public discussion … that subsequent public comment periods on this topic extend for at least 90 days” – “… clarification on the agency's proposed timeline and process” – “… an opportunity to convene an in-person discussion with an appropriate White House or DHS official to discuss this important matter and engage in further public discussion.”  Results: – No extension of public comment period (IdeaScale was closed to new posts on 7/19/2010) – CDT has had at least two follow-up meetings with the cyber-security staff at the White House between mid-July and the present. – CDT has had the opportunity to review and comment on new document drafts being developed including an implementation plan and schedule. – CDT has been informed that work is ongoing, internal agency reviews are being conducted, and no announcements are expected before the beginning of next year