SlideShare a Scribd company logo
1 of 17
Mobility in the Federal Government –
What’s Next?
July 9, 2013
2
Federal Digital Government Strategy (DGS) Milestones of Interest
DGS Milestone 9.1
Use Cases and Top Challenges
DoD, DHS, DOJ, and NIST Mobility Efforts
Moving Forward
Agenda
3
Milestones of Interest
 Information Centric
 MS 1.2 Open Data web-based availability
 MS 2.1 and 2.2 High Value Data web based availability
 Shared Platform
 MS 3.3 BYOD
 MS 3.6 Shared Mobile Application Development
 MS 4.2 Development and delivery of digital services
 MS 5.1 Wireless Federal Strategic Sourcing Initiative (FSSI)
 MS 5.2 Enterprise-wide inventory (CMDs and Contracts)
 MS 5.3 Analysis of enterprise contract vehicles
 MS 5.4 Delivery of mobile apps
 MS 5.5 Government-wide Mobile Device Management
 Customer Centric
 MS 6, 7 & 8 Customer focus & satisfaction
 Security and Privacy
 MS 9.1 Mobile Security Baseline and Mobile Security Architecture
 MS 10.2 Accelerate mobile technology adoption
 MS 10.3 Standard Approach to PII
Federal Mobile Security Baseline and
Reference Architecture
4
DELIVERABLE
Milestone 9.1 Federal Mobile
Security Baseline
DELIVERABLE
Mobile Security Reference
Architecture (Appendix: Mobile
Computing Decision Framework)
 Government Mobile and Wireless Security Baseline – A use case driven
security approach for four challenge areas identified in gap analysis of MS
10.2
 Mobile Device Management (MDM) (COMPLETED, based on NIST SP
800-53 rev4 and DoD MDM SRG)
Mobile Application Management (MAM) (COMPLETED, based on NIST SP
800-53 rev4 and DoD MDM SRG)
 Identity and Access Management (Notional)
 Data Sharing Standards (Notional)
 Mobile Security Reference Architecture (COMPLETED)
 Will be developed into a service level architecture by September
 Mobile Computing Decision Framework (COMPLETED)
Federal Digital Government Strategy
Milestone 9.1
5
6
Use Cases and Top Challenges
 DoD Mobile Device Strategy, 8 Jun 2012
 DoD CMD Implementation Plan, 15 Feb 2013
 Mobility Inventory Memo, 15 Mar 2013
 CMD Pilot Consolidation Memo, 21 Mar 2013
 Mobility BCA Memo, 15 Apr 2013
 Mobility STIGs (iOS, Android, BB), May 2013
 DMCC devices provisioned, May 2013
 DISA MDM/MAS RFP awarded, 27 Jun 2013
 NIAP Mobile Protection Profiles, CY 2013, Q3
Key DoD Mobility Efforts
7
Guidance Documents
 NIST FIPS 201-1: Personal Identity Verification (PIV) of Federal Employees and Contractors
 NIST FIPS 201-2 (DRAFT): Personal Identity Verification (PIV) of Federal Employees and Contractors
 NIST SP 800-46 R2 (DRAFT TBD): Guide to Enterprise Telework, Remote Access, and BYOD Security*
 NIST SP 800-53 R4: Security and Privacy Controls for Federal Information Systems and Organizations
 NIST SP 800-73-4, Part 1 (DRAFT): PIV Card Application Namespace, Data Model and Representation
 NIST SP 800-73-4, Part 2 (DRAFT): PIV Card Application Card Command Interface
 NIST SP 800-73-4, Part 3 (DRAFT): PIV Client Application Programming Interface
 NIST SP 800-114 R1 (DRAFT TBD): User's Guide to Telework and Bring Your Own Device (BYOD) Security*
 NIST SP 800-124 R1: Guidelines for Managing and Securing Mobile Devices in the Enterprise
 NIST SP 800-157 (DRAFT TBD): Guidelines for Personal Identity Verification (PIV) Derived Credentials*
 NIST SP 800-163 (DRAFT TBD): Guidelines for Testing and Vetting Mobile Apps
 NIST SP 800-164 (DRAFT): Guidelines on Hardware-Rooted Security in Mobile Devices
Key NIST Mobility Efforts
8
Additional Efforts
– Collaboration with DARPA on the TransApp Program
– Collaboration with NSA on the Enduring Security Framework (ESF)
* Taken from csrc.nist.gov/documents/nist-mobile-security-report.pdf
Key DHS Mobility Efforts
9
 DHS Mobility Strategy (DRAFT)
 DHS Mobility Implementation Plan
(DRAFT)
 Mobile Pilot(s) Consolidation Memos
(DRAFT)
 WorkPlace as a Service (WPaaS)
 Mobile Container solution,
APR 2013
 Mobile Application Vetting Platform
(CarWash)
 Initial Proof of Concept, MAR
2013
 DHS Enterprise Wireless Contract
 Awarded APR 2013
 Information Resource Management
Strategic Plan (DRAFT)
 FED Initiatives
 DGS
 Changed the way we look at delivery of IT
services and data
 DHS Initiatives
 WorkPlace Transformation
 Changing Business Model
 Maintain Federal Relationships
 Application Lifecycle Management (ALM)
 From concept to O&M
 Code Standards, Sharing, Testing Standards,
Drive Tool development, Distribution
Models, Context at the Presentation
Accomplishments
FOCUS: DHS Mobility Efforts
10
 Data Standards
 Structure, Tagging, Labeling, Temporal value
 Remove Context
 Aggregation Issues
 Authentication and Authorization
 Form Factor Issue, Device, App, or Network Level?
 Legacy infrastructure
 Mission Partners
 Application Services
 Move to data layer protection
 What to do in the interim?
 Progression of the trust level…
 Infrastructure
 Concept of Internet as transport
 Capability to support increased communications
 Mobility Strategy
 Partnerships with other Departments/Agencies
 App Development Strategy
 Pilot of New Handheld Devices
 Tablet Pilots
 Standard Tablets
 Hybrids
 BYOD Pilot
Key DoJ Mobility Efforts
11
 Building on the Digital Government Strategy Mobility Milestones
 Mobile Identity Management
 Mobile Application Development and Vetting
 Federal Mobility Solutions Architecture
Moving Forward
12
 Federal CIO Council Committees
 New Innovation Committee
 Information Security and Identity Management Committee (ISIMC)
 CIO Council will help coordinate Interagency efforts, including involvement
with OMB, GSA, and NIST
 Federal Digital Government Strategy
 Continue to build on Baseline and Reference Architecture (Milestone
9.1), as well as on other completed Milestones
 Partnered with NSA for security
 GSA: future contracts for Mobile Device Manager, mobile devices and
Airtime/Data Plans
 Mobile Applications Reciprocity across Agencies
 Expedite Mobile Security Approvals
 Collaborative Technology Exploration and Standards Development
Building on the Digital Government
Strategy Mobility Milestones
13
 Current Capabilities
 Bluetooth CAC Reader / Dongle
 CAC Sleeve (Case)
 Primary Candidates (2013-2014)
 Near-Field Communications (NFC)
 Hardware Security Modules (HSM)
 microSD Cards / Sleeve
 Trust Platform Modules (TPM)
 Derived Credentials (NIST SP 800-157)
 Secondary Candidates (> 2014)
 Universal Integrated Circuit Card (UICC)
 Out-of-Band One Time Pad (OTP) Tokens (App or Cellular SMS-based)
 Emerging Technologies (>2014)
 Environment-aware heuristics
 Cloud based Biometrics (facial/voice/fingerprint/iris recognition)
Mobile Identity Management
14
 DHS – Mobile Application Continuous Integration Orchestration Platform and
Mobile CoE, aka “CarWash”
 NIST/DARPA – TransApp Program (NIST SP800-163 DRAFT Coming Soon)
 DoD
 Software Assurance in Defense Acquisition Guidance
 DISA Mobility PMO – Mobile Applications Security Requirements Guide
(SRG)
 NSA Information Assurance Directorate (IAD) Center for Assured Software
(CAS)
 GSA Mobile PMO and Digital Services Innovation Center – Mobile Application
Development Program
Mobile Application Development and
Vetting
15
 Builds on the Federal Mobility Reference Architecture
 Building on Department/Agency (D/A) Use Cases
 Utilizing information gathered from D/As during development of
DGS Milestone 10.2 (Mobility Barriers/Opportunities/Gaps)
Federal Mobility Solutions
Architecture
16
 Programs/Opportunities
 GSA FSSI Wireless: Wireless Federal Strategic Sourcing Initiative BPAs
 GSA Mobility Management Solutions: potential MDM/MAM solutions sources
 DGS Milestone 3.6: GSA Mobile Application Development Program
 U.S. Government APIs: API Developer Resources
 NSA CSfC Program: Commercial Solutions for Classified Program
 DISA BAA 12-01: Mobile Device Common-Access-Card-Enabled Virtual Thin Client
 Working Groups
 ICAM Subcommittee (ICAMSC) Working Groups: various [e.g., CNSS IdAM WG, Logical Access
WG]
 DoD Commercial Mobile Device Working Group (CMDWG) – Next meeting 19 Sept 2013
 DoD PKE Mobility TIM –next meeting tentatively Dec 2013
 References
 HSPD-12: Policy for a Common Identification Standard for Federal Employees and Contractors
 OMB M-11-11: Continued Implementation of HSPD 12
 DTM 08-006: DoD Implementation of Homeland Security Presidential Directive - 12 (HSPD-12)
 NIAP CC Protection Profiles (PP): various [e.g., Mobile OS, VoIP Apps, WLAN]
 DISA SRGs: various [e.g., MDM, Mobile Policy, Mobile App, Mobile OS]
More Information
17

More Related Content

Similar to Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton & Robert Palmer | Federal Mobile Computing Summit | July 9, 2013

Dmg tem2011-0718-02 norton cmd disa mitre overview - v9
Dmg tem2011-0718-02 norton cmd disa mitre overview - v9Dmg tem2011-0718-02 norton cmd disa mitre overview - v9
Dmg tem2011-0718-02 norton cmd disa mitre overview - v9jakreile
 
1CHAPTER 22PEER REVIEWED SUMMARYi. Introduction
1CHAPTER 22PEER REVIEWED SUMMARYi. Introduction 1CHAPTER 22PEER REVIEWED SUMMARYi. Introduction
1CHAPTER 22PEER REVIEWED SUMMARYi. Introduction EttaBenton28
 
Multi-Channel App Approach & The Future of Multi-Channel
Multi-Channel App Approach & The Future of Multi-ChannelMulti-Channel App Approach & The Future of Multi-Channel
Multi-Channel App Approach & The Future of Multi-ChannelDipesh Mukerji
 
Mobile security decision framework
Mobile security decision frameworkMobile security decision framework
Mobile security decision frameworkVishal Sharma
 
Workshop 12-06 - Architectures for Enterprise Mobile Applications
Workshop 12-06 - Architectures for Enterprise Mobile ApplicationsWorkshop 12-06 - Architectures for Enterprise Mobile Applications
Workshop 12-06 - Architectures for Enterprise Mobile ApplicationsRABS
 
Data Warehouse Model For Mobile-Based Applications
Data Warehouse Model For Mobile-Based ApplicationsData Warehouse Model For Mobile-Based Applications
Data Warehouse Model For Mobile-Based ApplicationsIJERA Editor
 
Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...
Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...
Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...MOBIQUANT TECHNOLOGIES
 
Build a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYODBuild a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYODGraham Chalk
 
William McGuyer 2015
William McGuyer 2015William McGuyer 2015
William McGuyer 2015Bill McGuyer
 
GIS Technology & Mobile Applications - MTASC 2011 Conference
GIS Technology & Mobile Applications - MTASC 2011 ConferenceGIS Technology & Mobile Applications - MTASC 2011 Conference
GIS Technology & Mobile Applications - MTASC 2011 ConferenceJim Tochterman
 
1105 Media - 2014 Core Market Capabilities Presentation
1105 Media - 2014 Core Market Capabilities Presentation1105 Media - 2014 Core Market Capabilities Presentation
1105 Media - 2014 Core Market Capabilities PresentationChristina Langer
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...CA API Management
 
IGSS Corporate Briefing
IGSS Corporate BriefingIGSS Corporate Briefing
IGSS Corporate Briefingmrsjennbrown
 
Smartphone Applications - Common Criteria is going Mobile
Smartphone Applications - Common Criteria is going MobileSmartphone Applications - Common Criteria is going Mobile
Smartphone Applications - Common Criteria is going MobileJens Oberender
 
10 dosmann -disa tem slides
10 dosmann -disa tem slides10 dosmann -disa tem slides
10 dosmann -disa tem slidesjakreile
 
The Rise of Big Data and the Chief Data Officer (CDO)
The Rise of Big Data and the Chief Data Officer (CDO)The Rise of Big Data and the Chief Data Officer (CDO)
The Rise of Big Data and the Chief Data Officer (CDO)gcharlesj
 

Similar to Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton & Robert Palmer | Federal Mobile Computing Summit | July 9, 2013 (20)

Dmg tem2011-0718-02 norton cmd disa mitre overview - v9
Dmg tem2011-0718-02 norton cmd disa mitre overview - v9Dmg tem2011-0718-02 norton cmd disa mitre overview - v9
Dmg tem2011-0718-02 norton cmd disa mitre overview - v9
 
Cloud Mobility SIG
Cloud Mobility SIGCloud Mobility SIG
Cloud Mobility SIG
 
1CHAPTER 22PEER REVIEWED SUMMARYi. Introduction
1CHAPTER 22PEER REVIEWED SUMMARYi. Introduction 1CHAPTER 22PEER REVIEWED SUMMARYi. Introduction
1CHAPTER 22PEER REVIEWED SUMMARYi. Introduction
 
Multi-Channel App Approach & The Future of Multi-Channel
Multi-Channel App Approach & The Future of Multi-ChannelMulti-Channel App Approach & The Future of Multi-Channel
Multi-Channel App Approach & The Future of Multi-Channel
 
Mobile security decision framework
Mobile security decision frameworkMobile security decision framework
Mobile security decision framework
 
Workshop 12-06 - Architectures for Enterprise Mobile Applications
Workshop 12-06 - Architectures for Enterprise Mobile ApplicationsWorkshop 12-06 - Architectures for Enterprise Mobile Applications
Workshop 12-06 - Architectures for Enterprise Mobile Applications
 
Dossier 2008 V3
Dossier 2008 V3Dossier 2008 V3
Dossier 2008 V3
 
Data Warehouse Model For Mobile-Based Applications
Data Warehouse Model For Mobile-Based ApplicationsData Warehouse Model For Mobile-Based Applications
Data Warehouse Model For Mobile-Based Applications
 
Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...
Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...
Mobiquant Japan ITpro Expo Tokyo/ Mobile and IOT Security Conference - REDA Z...
 
Ibm worklight
Ibm worklightIbm worklight
Ibm worklight
 
Build a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYODBuild a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYOD
 
William McGuyer 2015
William McGuyer 2015William McGuyer 2015
William McGuyer 2015
 
GIS Technology & Mobile Applications - MTASC 2011 Conference
GIS Technology & Mobile Applications - MTASC 2011 ConferenceGIS Technology & Mobile Applications - MTASC 2011 Conference
GIS Technology & Mobile Applications - MTASC 2011 Conference
 
1105 Media - 2014 Core Market Capabilities Presentation
1105 Media - 2014 Core Market Capabilities Presentation1105 Media - 2014 Core Market Capabilities Presentation
1105 Media - 2014 Core Market Capabilities Presentation
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
 
IGSS Corporate Briefing
IGSS Corporate BriefingIGSS Corporate Briefing
IGSS Corporate Briefing
 
Smartphone Applications - Common Criteria is going Mobile
Smartphone Applications - Common Criteria is going MobileSmartphone Applications - Common Criteria is going Mobile
Smartphone Applications - Common Criteria is going Mobile
 
10 dosmann -disa tem slides
10 dosmann -disa tem slides10 dosmann -disa tem slides
10 dosmann -disa tem slides
 
The Rise of Big Data and the Chief Data Officer (CDO)
The Rise of Big Data and the Chief Data Officer (CDO)The Rise of Big Data and the Chief Data Officer (CDO)
The Rise of Big Data and the Chief Data Officer (CDO)
 
ijais13-451015
ijais13-451015ijais13-451015
ijais13-451015
 

More from Tim Harvey

Speaker Presention by Irena Bojanova of the University of Maryland University...
Speaker Presention by Irena Bojanova of the University of Maryland University...Speaker Presention by Irena Bojanova of the University of Maryland University...
Speaker Presention by Irena Bojanova of the University of Maryland University...Tim Harvey
 
Speaker Presention by Adam Porter of the University of Maryland | December 17...
Speaker Presention by Adam Porter of the University of Maryland | December 17...Speaker Presention by Adam Porter of the University of Maryland | December 17...
Speaker Presention by Adam Porter of the University of Maryland | December 17...Tim Harvey
 
Recap of MITRE Cloud Collaboration Sessions by Justin Brunelle of MITRE | Dec...
Recap of MITRE Cloud Collaboration Sessions by Justin Brunelle of MITRE | Dec...Recap of MITRE Cloud Collaboration Sessions by Justin Brunelle of MITRE | Dec...
Recap of MITRE Cloud Collaboration Sessions by Justin Brunelle of MITRE | Dec...Tim Harvey
 
Progam slides | December 17, 2013 | Federal Cloud Computing Summit
Progam slides | December 17, 2013 | Federal Cloud Computing SummitProgam slides | December 17, 2013 | Federal Cloud Computing Summit
Progam slides | December 17, 2013 | Federal Cloud Computing SummitTim Harvey
 
Visionary Keynote by Bill Schlough of the San Francisco Giants | December 17,...
Visionary Keynote by Bill Schlough of the San Francisco Giants | December 17,...Visionary Keynote by Bill Schlough of the San Francisco Giants | December 17,...
Visionary Keynote by Bill Schlough of the San Francisco Giants | December 17,...Tim Harvey
 
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...Tim Harvey
 
Mobile Security Project | Visionary Keynote by Marilyn Rose | Federal Mobile ...
Mobile Security Project | Visionary Keynote by Marilyn Rose | Federal Mobile ...Mobile Security Project | Visionary Keynote by Marilyn Rose | Federal Mobile ...
Mobile Security Project | Visionary Keynote by Marilyn Rose | Federal Mobile ...Tim Harvey
 
CAPI the NASS Way | Pam Hird | Federal Mobile Computing Summit | July 9, 2013
CAPI the NASS Way | Pam Hird | Federal Mobile Computing Summit | July 9, 2013CAPI the NASS Way | Pam Hird | Federal Mobile Computing Summit | July 9, 2013
CAPI the NASS Way | Pam Hird | Federal Mobile Computing Summit | July 9, 2013Tim Harvey
 
Lessons from mHealth | Dr. David Rogers | Federal Mobile Computing Summit | J...
Lessons from mHealth | Dr. David Rogers | Federal Mobile Computing Summit | J...Lessons from mHealth | Dr. David Rogers | Federal Mobile Computing Summit | J...
Lessons from mHealth | Dr. David Rogers | Federal Mobile Computing Summit | J...Tim Harvey
 
Mobile Broadband Performance | Visionary Keynote by Walter Johnston | Federal...
Mobile Broadband Performance | Visionary Keynote by Walter Johnston | Federal...Mobile Broadband Performance | Visionary Keynote by Walter Johnston | Federal...
Mobile Broadband Performance | Visionary Keynote by Walter Johnston | Federal...Tim Harvey
 
May 2013 Federal Cloud Computing Summit Presentation
May 2013 Federal Cloud Computing Summit PresentationMay 2013 Federal Cloud Computing Summit Presentation
May 2013 Federal Cloud Computing Summit PresentationTim Harvey
 
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClure
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClureMay 2013 Federal Cloud Computing Summit Welcome by Dr. David McClure
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClureTim Harvey
 
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David CearlyMay 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David CearlyTim Harvey
 

More from Tim Harvey (13)

Speaker Presention by Irena Bojanova of the University of Maryland University...
Speaker Presention by Irena Bojanova of the University of Maryland University...Speaker Presention by Irena Bojanova of the University of Maryland University...
Speaker Presention by Irena Bojanova of the University of Maryland University...
 
Speaker Presention by Adam Porter of the University of Maryland | December 17...
Speaker Presention by Adam Porter of the University of Maryland | December 17...Speaker Presention by Adam Porter of the University of Maryland | December 17...
Speaker Presention by Adam Porter of the University of Maryland | December 17...
 
Recap of MITRE Cloud Collaboration Sessions by Justin Brunelle of MITRE | Dec...
Recap of MITRE Cloud Collaboration Sessions by Justin Brunelle of MITRE | Dec...Recap of MITRE Cloud Collaboration Sessions by Justin Brunelle of MITRE | Dec...
Recap of MITRE Cloud Collaboration Sessions by Justin Brunelle of MITRE | Dec...
 
Progam slides | December 17, 2013 | Federal Cloud Computing Summit
Progam slides | December 17, 2013 | Federal Cloud Computing SummitProgam slides | December 17, 2013 | Federal Cloud Computing Summit
Progam slides | December 17, 2013 | Federal Cloud Computing Summit
 
Visionary Keynote by Bill Schlough of the San Francisco Giants | December 17,...
Visionary Keynote by Bill Schlough of the San Francisco Giants | December 17,...Visionary Keynote by Bill Schlough of the San Francisco Giants | December 17,...
Visionary Keynote by Bill Schlough of the San Francisco Giants | December 17,...
 
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
Future of Fed Mobility | Citrix Technical Exchange hosted by AMARC | Faisal I...
 
Mobile Security Project | Visionary Keynote by Marilyn Rose | Federal Mobile ...
Mobile Security Project | Visionary Keynote by Marilyn Rose | Federal Mobile ...Mobile Security Project | Visionary Keynote by Marilyn Rose | Federal Mobile ...
Mobile Security Project | Visionary Keynote by Marilyn Rose | Federal Mobile ...
 
CAPI the NASS Way | Pam Hird | Federal Mobile Computing Summit | July 9, 2013
CAPI the NASS Way | Pam Hird | Federal Mobile Computing Summit | July 9, 2013CAPI the NASS Way | Pam Hird | Federal Mobile Computing Summit | July 9, 2013
CAPI the NASS Way | Pam Hird | Federal Mobile Computing Summit | July 9, 2013
 
Lessons from mHealth | Dr. David Rogers | Federal Mobile Computing Summit | J...
Lessons from mHealth | Dr. David Rogers | Federal Mobile Computing Summit | J...Lessons from mHealth | Dr. David Rogers | Federal Mobile Computing Summit | J...
Lessons from mHealth | Dr. David Rogers | Federal Mobile Computing Summit | J...
 
Mobile Broadband Performance | Visionary Keynote by Walter Johnston | Federal...
Mobile Broadband Performance | Visionary Keynote by Walter Johnston | Federal...Mobile Broadband Performance | Visionary Keynote by Walter Johnston | Federal...
Mobile Broadband Performance | Visionary Keynote by Walter Johnston | Federal...
 
May 2013 Federal Cloud Computing Summit Presentation
May 2013 Federal Cloud Computing Summit PresentationMay 2013 Federal Cloud Computing Summit Presentation
May 2013 Federal Cloud Computing Summit Presentation
 
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClure
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClureMay 2013 Federal Cloud Computing Summit Welcome by Dr. David McClure
May 2013 Federal Cloud Computing Summit Welcome by Dr. David McClure
 
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David CearlyMay 2013 Federal Cloud Computing Summit Keynote by David Cearly
May 2013 Federal Cloud Computing Summit Keynote by David Cearly
 

Recently uploaded

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Mobility in the Federal Government -- What's Next? | Kevin Cox, Mark Norton & Robert Palmer | Federal Mobile Computing Summit | July 9, 2013

  • 1. Mobility in the Federal Government – What’s Next? July 9, 2013
  • 2. 2 Federal Digital Government Strategy (DGS) Milestones of Interest DGS Milestone 9.1 Use Cases and Top Challenges DoD, DHS, DOJ, and NIST Mobility Efforts Moving Forward Agenda
  • 3. 3 Milestones of Interest  Information Centric  MS 1.2 Open Data web-based availability  MS 2.1 and 2.2 High Value Data web based availability  Shared Platform  MS 3.3 BYOD  MS 3.6 Shared Mobile Application Development  MS 4.2 Development and delivery of digital services  MS 5.1 Wireless Federal Strategic Sourcing Initiative (FSSI)  MS 5.2 Enterprise-wide inventory (CMDs and Contracts)  MS 5.3 Analysis of enterprise contract vehicles  MS 5.4 Delivery of mobile apps  MS 5.5 Government-wide Mobile Device Management  Customer Centric  MS 6, 7 & 8 Customer focus & satisfaction  Security and Privacy  MS 9.1 Mobile Security Baseline and Mobile Security Architecture  MS 10.2 Accelerate mobile technology adoption  MS 10.3 Standard Approach to PII
  • 4. Federal Mobile Security Baseline and Reference Architecture 4 DELIVERABLE Milestone 9.1 Federal Mobile Security Baseline DELIVERABLE Mobile Security Reference Architecture (Appendix: Mobile Computing Decision Framework)
  • 5.  Government Mobile and Wireless Security Baseline – A use case driven security approach for four challenge areas identified in gap analysis of MS 10.2  Mobile Device Management (MDM) (COMPLETED, based on NIST SP 800-53 rev4 and DoD MDM SRG) Mobile Application Management (MAM) (COMPLETED, based on NIST SP 800-53 rev4 and DoD MDM SRG)  Identity and Access Management (Notional)  Data Sharing Standards (Notional)  Mobile Security Reference Architecture (COMPLETED)  Will be developed into a service level architecture by September  Mobile Computing Decision Framework (COMPLETED) Federal Digital Government Strategy Milestone 9.1 5
  • 6. 6 Use Cases and Top Challenges
  • 7.  DoD Mobile Device Strategy, 8 Jun 2012  DoD CMD Implementation Plan, 15 Feb 2013  Mobility Inventory Memo, 15 Mar 2013  CMD Pilot Consolidation Memo, 21 Mar 2013  Mobility BCA Memo, 15 Apr 2013  Mobility STIGs (iOS, Android, BB), May 2013  DMCC devices provisioned, May 2013  DISA MDM/MAS RFP awarded, 27 Jun 2013  NIAP Mobile Protection Profiles, CY 2013, Q3 Key DoD Mobility Efforts 7
  • 8. Guidance Documents  NIST FIPS 201-1: Personal Identity Verification (PIV) of Federal Employees and Contractors  NIST FIPS 201-2 (DRAFT): Personal Identity Verification (PIV) of Federal Employees and Contractors  NIST SP 800-46 R2 (DRAFT TBD): Guide to Enterprise Telework, Remote Access, and BYOD Security*  NIST SP 800-53 R4: Security and Privacy Controls for Federal Information Systems and Organizations  NIST SP 800-73-4, Part 1 (DRAFT): PIV Card Application Namespace, Data Model and Representation  NIST SP 800-73-4, Part 2 (DRAFT): PIV Card Application Card Command Interface  NIST SP 800-73-4, Part 3 (DRAFT): PIV Client Application Programming Interface  NIST SP 800-114 R1 (DRAFT TBD): User's Guide to Telework and Bring Your Own Device (BYOD) Security*  NIST SP 800-124 R1: Guidelines for Managing and Securing Mobile Devices in the Enterprise  NIST SP 800-157 (DRAFT TBD): Guidelines for Personal Identity Verification (PIV) Derived Credentials*  NIST SP 800-163 (DRAFT TBD): Guidelines for Testing and Vetting Mobile Apps  NIST SP 800-164 (DRAFT): Guidelines on Hardware-Rooted Security in Mobile Devices Key NIST Mobility Efforts 8 Additional Efforts – Collaboration with DARPA on the TransApp Program – Collaboration with NSA on the Enduring Security Framework (ESF) * Taken from csrc.nist.gov/documents/nist-mobile-security-report.pdf
  • 9. Key DHS Mobility Efforts 9  DHS Mobility Strategy (DRAFT)  DHS Mobility Implementation Plan (DRAFT)  Mobile Pilot(s) Consolidation Memos (DRAFT)  WorkPlace as a Service (WPaaS)  Mobile Container solution, APR 2013  Mobile Application Vetting Platform (CarWash)  Initial Proof of Concept, MAR 2013  DHS Enterprise Wireless Contract  Awarded APR 2013  Information Resource Management Strategic Plan (DRAFT)  FED Initiatives  DGS  Changed the way we look at delivery of IT services and data  DHS Initiatives  WorkPlace Transformation  Changing Business Model  Maintain Federal Relationships  Application Lifecycle Management (ALM)  From concept to O&M  Code Standards, Sharing, Testing Standards, Drive Tool development, Distribution Models, Context at the Presentation Accomplishments
  • 10. FOCUS: DHS Mobility Efforts 10  Data Standards  Structure, Tagging, Labeling, Temporal value  Remove Context  Aggregation Issues  Authentication and Authorization  Form Factor Issue, Device, App, or Network Level?  Legacy infrastructure  Mission Partners  Application Services  Move to data layer protection  What to do in the interim?  Progression of the trust level…  Infrastructure  Concept of Internet as transport  Capability to support increased communications
  • 11.  Mobility Strategy  Partnerships with other Departments/Agencies  App Development Strategy  Pilot of New Handheld Devices  Tablet Pilots  Standard Tablets  Hybrids  BYOD Pilot Key DoJ Mobility Efforts 11
  • 12.  Building on the Digital Government Strategy Mobility Milestones  Mobile Identity Management  Mobile Application Development and Vetting  Federal Mobility Solutions Architecture Moving Forward 12
  • 13.  Federal CIO Council Committees  New Innovation Committee  Information Security and Identity Management Committee (ISIMC)  CIO Council will help coordinate Interagency efforts, including involvement with OMB, GSA, and NIST  Federal Digital Government Strategy  Continue to build on Baseline and Reference Architecture (Milestone 9.1), as well as on other completed Milestones  Partnered with NSA for security  GSA: future contracts for Mobile Device Manager, mobile devices and Airtime/Data Plans  Mobile Applications Reciprocity across Agencies  Expedite Mobile Security Approvals  Collaborative Technology Exploration and Standards Development Building on the Digital Government Strategy Mobility Milestones 13
  • 14.  Current Capabilities  Bluetooth CAC Reader / Dongle  CAC Sleeve (Case)  Primary Candidates (2013-2014)  Near-Field Communications (NFC)  Hardware Security Modules (HSM)  microSD Cards / Sleeve  Trust Platform Modules (TPM)  Derived Credentials (NIST SP 800-157)  Secondary Candidates (> 2014)  Universal Integrated Circuit Card (UICC)  Out-of-Band One Time Pad (OTP) Tokens (App or Cellular SMS-based)  Emerging Technologies (>2014)  Environment-aware heuristics  Cloud based Biometrics (facial/voice/fingerprint/iris recognition) Mobile Identity Management 14
  • 15.  DHS – Mobile Application Continuous Integration Orchestration Platform and Mobile CoE, aka “CarWash”  NIST/DARPA – TransApp Program (NIST SP800-163 DRAFT Coming Soon)  DoD  Software Assurance in Defense Acquisition Guidance  DISA Mobility PMO – Mobile Applications Security Requirements Guide (SRG)  NSA Information Assurance Directorate (IAD) Center for Assured Software (CAS)  GSA Mobile PMO and Digital Services Innovation Center – Mobile Application Development Program Mobile Application Development and Vetting 15
  • 16.  Builds on the Federal Mobility Reference Architecture  Building on Department/Agency (D/A) Use Cases  Utilizing information gathered from D/As during development of DGS Milestone 10.2 (Mobility Barriers/Opportunities/Gaps) Federal Mobility Solutions Architecture 16
  • 17.  Programs/Opportunities  GSA FSSI Wireless: Wireless Federal Strategic Sourcing Initiative BPAs  GSA Mobility Management Solutions: potential MDM/MAM solutions sources  DGS Milestone 3.6: GSA Mobile Application Development Program  U.S. Government APIs: API Developer Resources  NSA CSfC Program: Commercial Solutions for Classified Program  DISA BAA 12-01: Mobile Device Common-Access-Card-Enabled Virtual Thin Client  Working Groups  ICAM Subcommittee (ICAMSC) Working Groups: various [e.g., CNSS IdAM WG, Logical Access WG]  DoD Commercial Mobile Device Working Group (CMDWG) – Next meeting 19 Sept 2013  DoD PKE Mobility TIM –next meeting tentatively Dec 2013  References  HSPD-12: Policy for a Common Identification Standard for Federal Employees and Contractors  OMB M-11-11: Continued Implementation of HSPD 12  DTM 08-006: DoD Implementation of Homeland Security Presidential Directive - 12 (HSPD-12)  NIAP CC Protection Profiles (PP): various [e.g., Mobile OS, VoIP Apps, WLAN]  DISA SRGs: various [e.g., MDM, Mobile Policy, Mobile App, Mobile OS] More Information 17