SlideShare ist ein Scribd-Unternehmen logo
1 von 33
Downloaden Sie, um offline zu lesen
Session ID:
Session Classification:
2
3


4



5
ENFORCE ENABLE
Strategic Enablers:
How the drivers
impact FPKIMA
VISION
FPKIMA Supporting
Functions: High-level
business functions
supporting the
FPKIMA mission
Platform
Management
FPKIMA Primary
Functions:
Fundamental
building blocks of the
program
Fostering effective identity and access
management government-wide and
between external business partners,
by enforcing digital certificate
standards for trusted identity
authentication
Strategic Drivers:
Organizations and
entities that direct or
influence FPKIMA
activities
ICAM
Certificate Services
GSA
Ensure that government-wide policies
encourage agencies to develop and
utilize the best, most cost effective
management practices for the conduct
of their specific programs
Enforce digital certificate standards
for trusted identity authentication
across the federal agencies and
between external business partners
FPKIPA
Enable the best and most cost-effective identity management practices for secure physical and logical access, document sharing,
and communications across federal agencies and between external business partners through the execution of digital certificate
policies and standards.
FPKIMA Mission:
FPKIMA mission that
aligns program functions
Manage systems and
services
Security Management
Implement policy and
security controls to
protect platform
Program Management
Provide program
oversight and control
Planning
Relationship
Management
Board, manage, and
support entities
Community
Collaborate and test
solutions for the
advancement of the
trust infrastructure
Boarding Thought Leadership
Repository Services
Configuration Management
Monitoring & Reporting
Policy Compliance
User Support
Technical Exploration
Testing
Communications
Budgeting
Performance Reporting
Scheduling & Controlling
Privacy Protection
Physical & Logical Protection
Monitoring & Reporting
Security Authorization
Policy Audit
6



7




8

►
►
►
►
9
USPS
STATE
TREASURY
NASADHSSSA
Entrust
MSO
Verizon
VeriSign
ORC
VeriSign
Digicert
ORC
Key Mgt
VeriSign
DEA
VeriSign SSP
SHA-1
Key Mgt
Illinois
EOP
VA
HHS
Dept of Ed
Naval
Research
NRC
Dept of
Transportation
STATE PIV
STATE High
Assurance CA
OCIO
FISCAL
Service
Entrust
GPO
USPTO
ENTRUST
Verizon
ORC
ACES
IDENTRUST
ACES
CertiPath
G2 Bridge
CertiPath
Common Policy
Root G2
Netherlands
Defense
Citi
HID
SAFE
BioPharma
Bridge
J&JTRANS
SPED
TC TrustCenter
Bristol
Meyer
Exostar
Key Mgt
SHA-1
Key Mgt
DoD Root
CA 2
DoD CA 19
thru
DoD CA 30
DoD EMAIL CA 19
thru
DoD EMAIL CA 30Key Mgt
SHA-1
Key Mgt
CertiPath
Bridge
EADS
Exostar
CertiPath Common
Policy Root
Lockheed
Raytheon
Northrop
Exostar
FTS
Identrust
DoD ECA
ORC
VeriSign
.
SHA-1 FRCA
FBCA
Common
Policy CA
.
.
DOD
IRoot
10
►
►
►
►
11




12

►
►
►
►


►
►
►
►
13
ENFORCE ENABLE
Strategic Enablers:
How the drivers
impact FPKIMA
VISION
FPKIMA Supporting
Functions: High-level
business functions
supporting the
FPKIMA mission
Platform
Management
FPKIMA Primary
Functions:
Fundamental
building blocks of the
program
Fostering effective identity and access
management government-wide and
between external business partners,
by enforcing digital certificate
standards for trusted identity
authentication
Strategic Drivers:
Organizations and
entities that direct or
influence FPKIMA
activities
ICAM
Certificate Services
GSA
Ensure that government-wide policies
encourage agencies to develop and
utilize the best, most cost effective
management practices for the conduct
of their specific programs
Enforce digital certificate standards
for trusted identity authentication
across the federal agencies and
between external business partners
FPKIPA
Enable the best and most cost-effective identity management practices for secure physical and logical access, document sharing,
and communications across federal agencies and between external business partners through the execution of digital certificate
policies and standards.
FPKIMA Mission:
FPKIMA mission that
aligns program functions
Manage systems and
services
Security Management
Implement policy and
security controls to
protect platform
Program Management
Provide program
oversight and control
Planning
Relationship
Management
Board, manage, and
support entities
Community
Collaborate and test
solutions for the
advancement of the
trust infrastructure
Boarding Thought Leadership
Repository Services
Configuration Management
Monitoring & Reporting
Policy Compliance
User Support
Technical Exploration
Testing
Communications
Budgeting
Performance Reporting
Scheduling & Controlling
Privacy Protection
Physical & Logical Protection
Monitoring & Reporting
Security Authorization
Policy Audit




14
ENFORCE ENABLE
Strategic Enablers:
How the drivers
impact FPKIMA
VISION
FPKI MA Supporting
Functions: High-level
business functions
supporting the
FPKIMA mission
Platform
Management
FPKIMA Primary
Functions:
Fundamental
building blocks of the
program
Fostering effective identity and access
management government-wide and
between external business partners,
by enforcing digital certificate
standards for trusted identity
authentication
Strategic Drivers:
Organizations and
entities that direct or
influence FPKIMA
activities
ICAM
Certificate Services
GSA
Ensure that government-wide policies
encourage agencies to develop and
utilize the best, most cost effective
management practices for the conduct
of their specific programs
Enforce digital certificate standards
for trusted identity authentication
across the federal agencies and
between external business partners
FPKIPA
Enable the best and most cost-effective identity management practices for secure physical and logical access, document sharing,
and communications across federal agencies and between external business partners through the execution of digital certificate
policies and standards.
FPKIMA Mission:
FPKIMA mission that
aligns program functions
Manage systems and
services
Security Management
Implement policy and
security controls to
protect platform
Program Management
Provide program
oversight and control
Planning
Relationship
Management
Board, manage, and
support entities
Community
Collaborate and test
solutions for the
advancement of the
trust infrastructure
Boarding Thought Leadership
Repository Services
Configuration Management
Monitoring & Reporting
Policy Compliance
User Support
Technical Exploration
Testing
Communications
Budgeting
Performance Reporting
Scheduling & Controlling
Privacy Protection
Physical & Logical Protection
Monitoring & Reporting
Security Authorization
Policy Audit




15
ENFORCE ENABLE
Strategic Enablers:
How the drivers
impact FPKIMA
VISION
FPKIMA Supporting
Functions: High-level
business functions
supporting the
FPKIMA mission
Platform
Management
FPKIMA Primary
Functions:
Fundamental
building blocks of the
program
Fostering effective identity and access
management government-wide and
between external business partners,
by enforcing digital certificate
standards for trusted identity
authentication
Strategic Drivers:
Organizations and
entities that direct or
influence FPKIMA
activities
ICAM
Certificate Services
GSA
Ensure that government-wide policies
encourage agencies to develop and
utilize the best, most cost effective
management practices for the conduct
of their specific programs
Enforce digital certificate standards
for trusted identity authentication
across the federal agencies and
between external business partners
FPKIPA
Enable the best and most cost-effective identity management practices for secure physical and logical access, document sharing,
and communications across federal agencies and between external business partners through the execution of digital certificate
policies and standards.
FPKI A Mission:
FPKIMA mission that
aligns program functions
Manage systems and
services
Security Management
Implement policy and
security controls to
protect platform
Program Management
Provide program
oversight and control
Planning
Relationship
Management
Board, manage, and
support entities
Community
Collaborate and test
solutions for the
advancement of the
trust infrastructure
Boarding Thought Leadership
Repository Services
Configuration Management
Monitoring & Reporting
Policy Compliance
User Support
Technical Exploration
Testing
Communications
Budgeting
Performance Reporting
Scheduling & Controlling
Privacy Protection
Physical & Logical Protection
Monitoring & Reporting
Security Authorization
Policy Audit



16
ENFORCE ENABLE
Strategic Enablers:
How the drivers
impact FPKIMA
VISION
FPKIMA Supporting
Functions: High-level
business functions
supporting the
FPKIMA mission
Platform
Management
FPKIMA Primary
Functions:
Fundamental
building blocks of the
program
Fostering effective identity and access
management government-wide and
between external business partners,
by enforcing digital certificate
standards for trusted identity
authentication
Strategic Drivers:
Organizations and
entities that direct or
influence FPKIMA
activities
ICAM
Certificate Services
GSA
Ensure that government-wide policies
encourage agencies to develop and
utilize the best, most cost effective
management practices for the conduct
of their specific programs
Enforce digital certificate standards
for trusted identity authentication
across the federal agencies and
between external business partners
FPKIPA
Enable the best and most cost-effective identity management practices for secure physical and logical access, document sharing,
and communications across federal agencies and between external business partners through the execution of digital certificate
policies and standards.
FPKIMA Mission:
FPKIMA mission that
aligns program functions
Manage systems and
services
Security Management
Implement policy and
security controls to
protect platform
Program Management
Provide program
oversight and control
Planning
Relationship
Management
Board, manage, and
support entities
Community
Collaborate and test
solutions for the
advancement of the
trust infrastructure
Boarding Thought Leadership
Repository Services
Configuration Management
Monitoring & Reporting
Policy Compliance
User Support
Technical Exploration
Testing
Communications
Budgeting
Performance Reporting
Scheduling & Controlling
Privacy Protection
Physical & Logical Protection
Monitoring & Reporting
Security Authorization
Policy Audit





17
18



19

►
►
►
►


20
21




22

►
►
►

►
►
►
►
►
23





24
0
200
400
600
800
1,000
1,200
1,400
1,600
1,800
Oct-09
Dec-09
Feb-10
Apr-10
Jun-10
Aug-10
Oct-10
Dec-10
Feb-11
Apr-11
Jun-11
Aug-11
Oct-11
Dec-11
Feb-12
Apr-12
Jun-12
Aug-12
Oct-12
MonthlyRequests(Millions)
FPKIMA Repository Usage FY10 Onward
Monthly Usage (HTTP) Monthly Usage (LDAP) Total Monthly Usage
This chart shows the number of requests made to the
FPKIMA Repository each month.
The blue bar represents the number of web requests (HTTP
GETs). The red bar represents the number of directory
requests (LDAP SEARCHes). The green line represents the
total number of requests and is the sum of the two bars.
Each request for a Certificate Revocation List (CRL) or
certificate file (P7C) counts. This is therefore a measurement
of usage of the FPKI Repository, primarily for capacity
planning purposes.
25
26
27



28




29
30
31
32
Png r35 a

Weitere ähnliche Inhalte

Ähnlich wie Png r35 a

Strategies For Partner Recruitment & Channel Account Management - A Customer ...
Strategies For Partner Recruitment & Channel Account Management - A Customer ...Strategies For Partner Recruitment & Channel Account Management - A Customer ...
Strategies For Partner Recruitment & Channel Account Management - A Customer ...
dreamforce2006
 
LY Resume 2014_Final_v4 4
LY Resume 2014_Final_v4 4LY Resume 2014_Final_v4 4
LY Resume 2014_Final_v4 4
LORENZO YOUNG
 
Seven Elements Of Effective Compliance Programs
Seven Elements Of Effective Compliance ProgramsSeven Elements Of Effective Compliance Programs
Seven Elements Of Effective Compliance Programs
Maria Macri
 
E.E Smith Resume 2016
E.E Smith Resume 2016E.E Smith Resume 2016
E.E Smith Resume 2016
Etiwan Smith
 
CML Group GRCaaS Dashboard
CML Group GRCaaS Dashboard CML Group GRCaaS Dashboard
CML Group GRCaaS Dashboard
Jim Robins
 
DianeOakleyResume20170130
DianeOakleyResume20170130DianeOakleyResume20170130
DianeOakleyResume20170130
Diane Oakley
 

Ähnlich wie Png r35 a (20)

Nasrhuma Inc Grc Solutions 011010
Nasrhuma Inc Grc Solutions 011010Nasrhuma Inc Grc Solutions 011010
Nasrhuma Inc Grc Solutions 011010
 
Strategies For Partner Recruitment & Channel Account Management - A Customer ...
Strategies For Partner Recruitment & Channel Account Management - A Customer ...Strategies For Partner Recruitment & Channel Account Management - A Customer ...
Strategies For Partner Recruitment & Channel Account Management - A Customer ...
 
10 Steps to Simplify and Improve Service-Oriented Architecture Governance
10 Steps to Simplify and Improve Service-Oriented Architecture Governance10 Steps to Simplify and Improve Service-Oriented Architecture Governance
10 Steps to Simplify and Improve Service-Oriented Architecture Governance
 
LY Resume 2014_Final_v4 4
LY Resume 2014_Final_v4 4LY Resume 2014_Final_v4 4
LY Resume 2014_Final_v4 4
 
FulcrumWay GRC Solutions
FulcrumWay GRC SolutionsFulcrumWay GRC Solutions
FulcrumWay GRC Solutions
 
Board Software vendors
Board Software vendorsBoard Software vendors
Board Software vendors
 
Seven Elements Of Effective Compliance Programs
Seven Elements Of Effective Compliance ProgramsSeven Elements Of Effective Compliance Programs
Seven Elements Of Effective Compliance Programs
 
Vendor Compliance Management software
Vendor Compliance Management softwareVendor Compliance Management software
Vendor Compliance Management software
 
Board software vendors
Board software vendorsBoard software vendors
Board software vendors
 
Get to know primero v1.0 may2015
Get to know primero v1.0 may2015Get to know primero v1.0 may2015
Get to know primero v1.0 may2015
 
E.E Smith Resume 2016
E.E Smith Resume 2016E.E Smith Resume 2016
E.E Smith Resume 2016
 
CML Group GRCaaS Dashboard
CML Group GRCaaS Dashboard CML Group GRCaaS Dashboard
CML Group GRCaaS Dashboard
 
Board Software vendors
Board Software vendorsBoard Software vendors
Board Software vendors
 
Qdms Integrated Management System
Qdms Integrated Management SystemQdms Integrated Management System
Qdms Integrated Management System
 
Prozone Insurance Collaboration Platform
Prozone Insurance Collaboration PlatformProzone Insurance Collaboration Platform
Prozone Insurance Collaboration Platform
 
overview 2015
overview 2015overview 2015
overview 2015
 
DianeOakleyResume20170130
DianeOakleyResume20170130DianeOakleyResume20170130
DianeOakleyResume20170130
 
GRC tools
GRC toolsGRC tools
GRC tools
 
Seioglobal Profile
Seioglobal ProfileSeioglobal Profile
Seioglobal Profile
 
Third-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a StrategyThird-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a Strategy
 

Mehr von SelectedPresentations

Mehr von SelectedPresentations (20)

Длительное архивное хранение ЭД: правовые аспекты и технологические решения
Длительное архивное хранение ЭД: правовые аспекты и технологические решенияДлительное архивное хранение ЭД: правовые аспекты и технологические решения
Длительное архивное хранение ЭД: правовые аспекты и технологические решения
 
Трансграничное пространство доверия. Доверенная третья сторона.
Трансграничное пространство доверия. Доверенная третья сторона.Трансграничное пространство доверия. Доверенная третья сторона.
Трансграничное пространство доверия. Доверенная третья сторона.
 
Варианты реализации атак через мобильные устройства
Варианты реализации атак через мобильные устройстваВарианты реализации атак через мобильные устройства
Варианты реализации атак через мобильные устройства
 
Новые технологические возможности и безопасность мобильных решений
Новые технологические возможности и безопасность мобильных решенийНовые технологические возможности и безопасность мобильных решений
Новые технологические возможности и безопасность мобильных решений
 
Управление безопасностью мобильных устройств
Управление безопасностью мобильных устройствУправление безопасностью мобильных устройств
Управление безопасностью мобильных устройств
 
Современные технологии контроля и защиты мобильных устройств, тенденции рынка...
Современные технологии контроля и защиты мобильных устройств, тенденции рынка...Современные технологии контроля и защиты мобильных устройств, тенденции рынка...
Современные технологии контроля и защиты мобильных устройств, тенденции рынка...
 
Кадровое агентство отрасли информационной безопасности
Кадровое агентство отрасли информационной безопасностиКадровое агентство отрасли информационной безопасности
Кадровое агентство отрасли информационной безопасности
 
Основное содержание профессионального стандарта «Специалист по безопасности и...
Основное содержание профессионального стандарта «Специалист по безопасности и...Основное содержание профессионального стандарта «Специалист по безопасности и...
Основное содержание профессионального стандарта «Специалист по безопасности и...
 
Основное содержание профессионального стандарта «Специалист по безопасности а...
Основное содержание профессионального стандарта «Специалист по безопасности а...Основное содержание профессионального стандарта «Специалист по безопасности а...
Основное содержание профессионального стандарта «Специалист по безопасности а...
 
Основное содержание профессионального стандарта «Специалист по технической за...
Основное содержание профессионального стандарта «Специалист по технической за...Основное содержание профессионального стандарта «Специалист по технической за...
Основное содержание профессионального стандарта «Специалист по технической за...
 
Основное содержание профессионального стандарта «Специалист по безопасности т...
Основное содержание профессионального стандарта «Специалист по безопасности т...Основное содержание профессионального стандарта «Специалист по безопасности т...
Основное содержание профессионального стандарта «Специалист по безопасности т...
 
О профессиональных стандартах по группе занятий (профессий) «Специалисты в об...
О профессиональных стандартах по группе занятий (профессий) «Специалисты в об...О профессиональных стандартах по группе занятий (профессий) «Специалисты в об...
О профессиональных стандартах по группе занятий (профессий) «Специалисты в об...
 
Запись активности пользователей с интеллектуальным анализом данных
Запись активности пользователей с интеллектуальным анализом данныхЗапись активности пользователей с интеллектуальным анализом данных
Запись активности пользователей с интеллектуальным анализом данных
 
Импортозамещение в системах ИБ банков. Практические аспекты перехода на росси...
Импортозамещение в системах ИБ банков. Практические аспекты перехода на росси...Импортозамещение в системах ИБ банков. Практические аспекты перехода на росси...
Импортозамещение в системах ИБ банков. Практические аспекты перехода на росси...
 
Обеспечение защиты информации на стадиях жизненного цикла ИС
Обеспечение защиты информации на стадиях жизненного цикла ИСОбеспечение защиты информации на стадиях жизненного цикла ИС
Обеспечение защиты информации на стадиях жизненного цикла ИС
 
Документ, как средство защиты: ОРД как основа обеспечения ИБ
Документ, как средство защиты: ОРД как основа обеспечения ИБДокумент, как средство защиты: ОРД как основа обеспечения ИБ
Документ, как средство защиты: ОРД как основа обеспечения ИБ
 
Чего не хватает в современных ids для защиты банковских приложений
Чего не хватает в современных ids для защиты банковских приложенийЧего не хватает в современных ids для защиты банковских приложений
Чего не хватает в современных ids для защиты банковских приложений
 
Об участии МОО «АЗИ» в разработке профессиональных стандартов в области инфор...
Об участии МОО «АЗИ» в разработке профессиональных стандартов в области инфор...Об участии МОО «АЗИ» в разработке профессиональных стандартов в области инфор...
Об участии МОО «АЗИ» в разработке профессиональных стандартов в области инфор...
 
Оценка состояния, меры формирования индустрии информационной безопасности Рос...
Оценка состояния, меры формирования индустрии информационной безопасности Рос...Оценка состояния, меры формирования индустрии информационной безопасности Рос...
Оценка состояния, меры формирования индустрии информационной безопасности Рос...
 
Об угрозах информационной безопасности, актуальных для разработчика СЗИ
Об угрозах информационной безопасности, актуальных для разработчика СЗИОб угрозах информационной безопасности, актуальных для разработчика СЗИ
Об угрозах информационной безопасности, актуальных для разработчика СЗИ
 

Png r35 a

  • 2. 2
  • 3. 3
  • 6. ENFORCE ENABLE Strategic Enablers: How the drivers impact FPKIMA VISION FPKIMA Supporting Functions: High-level business functions supporting the FPKIMA mission Platform Management FPKIMA Primary Functions: Fundamental building blocks of the program Fostering effective identity and access management government-wide and between external business partners, by enforcing digital certificate standards for trusted identity authentication Strategic Drivers: Organizations and entities that direct or influence FPKIMA activities ICAM Certificate Services GSA Ensure that government-wide policies encourage agencies to develop and utilize the best, most cost effective management practices for the conduct of their specific programs Enforce digital certificate standards for trusted identity authentication across the federal agencies and between external business partners FPKIPA Enable the best and most cost-effective identity management practices for secure physical and logical access, document sharing, and communications across federal agencies and between external business partners through the execution of digital certificate policies and standards. FPKIMA Mission: FPKIMA mission that aligns program functions Manage systems and services Security Management Implement policy and security controls to protect platform Program Management Provide program oversight and control Planning Relationship Management Board, manage, and support entities Community Collaborate and test solutions for the advancement of the trust infrastructure Boarding Thought Leadership Repository Services Configuration Management Monitoring & Reporting Policy Compliance User Support Technical Exploration Testing Communications Budgeting Performance Reporting Scheduling & Controlling Privacy Protection Physical & Logical Protection Monitoring & Reporting Security Authorization Policy Audit 6
  • 10. USPS STATE TREASURY NASADHSSSA Entrust MSO Verizon VeriSign ORC VeriSign Digicert ORC Key Mgt VeriSign DEA VeriSign SSP SHA-1 Key Mgt Illinois EOP VA HHS Dept of Ed Naval Research NRC Dept of Transportation STATE PIV STATE High Assurance CA OCIO FISCAL Service Entrust GPO USPTO ENTRUST Verizon ORC ACES IDENTRUST ACES CertiPath G2 Bridge CertiPath Common Policy Root G2 Netherlands Defense Citi HID SAFE BioPharma Bridge J&JTRANS SPED TC TrustCenter Bristol Meyer Exostar Key Mgt SHA-1 Key Mgt DoD Root CA 2 DoD CA 19 thru DoD CA 30 DoD EMAIL CA 19 thru DoD EMAIL CA 30Key Mgt SHA-1 Key Mgt CertiPath Bridge EADS Exostar CertiPath Common Policy Root Lockheed Raytheon Northrop Exostar FTS Identrust DoD ECA ORC VeriSign . SHA-1 FRCA FBCA Common Policy CA . . DOD IRoot 10
  • 14. ENFORCE ENABLE Strategic Enablers: How the drivers impact FPKIMA VISION FPKIMA Supporting Functions: High-level business functions supporting the FPKIMA mission Platform Management FPKIMA Primary Functions: Fundamental building blocks of the program Fostering effective identity and access management government-wide and between external business partners, by enforcing digital certificate standards for trusted identity authentication Strategic Drivers: Organizations and entities that direct or influence FPKIMA activities ICAM Certificate Services GSA Ensure that government-wide policies encourage agencies to develop and utilize the best, most cost effective management practices for the conduct of their specific programs Enforce digital certificate standards for trusted identity authentication across the federal agencies and between external business partners FPKIPA Enable the best and most cost-effective identity management practices for secure physical and logical access, document sharing, and communications across federal agencies and between external business partners through the execution of digital certificate policies and standards. FPKIMA Mission: FPKIMA mission that aligns program functions Manage systems and services Security Management Implement policy and security controls to protect platform Program Management Provide program oversight and control Planning Relationship Management Board, manage, and support entities Community Collaborate and test solutions for the advancement of the trust infrastructure Boarding Thought Leadership Repository Services Configuration Management Monitoring & Reporting Policy Compliance User Support Technical Exploration Testing Communications Budgeting Performance Reporting Scheduling & Controlling Privacy Protection Physical & Logical Protection Monitoring & Reporting Security Authorization Policy Audit     14
  • 15. ENFORCE ENABLE Strategic Enablers: How the drivers impact FPKIMA VISION FPKI MA Supporting Functions: High-level business functions supporting the FPKIMA mission Platform Management FPKIMA Primary Functions: Fundamental building blocks of the program Fostering effective identity and access management government-wide and between external business partners, by enforcing digital certificate standards for trusted identity authentication Strategic Drivers: Organizations and entities that direct or influence FPKIMA activities ICAM Certificate Services GSA Ensure that government-wide policies encourage agencies to develop and utilize the best, most cost effective management practices for the conduct of their specific programs Enforce digital certificate standards for trusted identity authentication across the federal agencies and between external business partners FPKIPA Enable the best and most cost-effective identity management practices for secure physical and logical access, document sharing, and communications across federal agencies and between external business partners through the execution of digital certificate policies and standards. FPKIMA Mission: FPKIMA mission that aligns program functions Manage systems and services Security Management Implement policy and security controls to protect platform Program Management Provide program oversight and control Planning Relationship Management Board, manage, and support entities Community Collaborate and test solutions for the advancement of the trust infrastructure Boarding Thought Leadership Repository Services Configuration Management Monitoring & Reporting Policy Compliance User Support Technical Exploration Testing Communications Budgeting Performance Reporting Scheduling & Controlling Privacy Protection Physical & Logical Protection Monitoring & Reporting Security Authorization Policy Audit     15
  • 16. ENFORCE ENABLE Strategic Enablers: How the drivers impact FPKIMA VISION FPKIMA Supporting Functions: High-level business functions supporting the FPKIMA mission Platform Management FPKIMA Primary Functions: Fundamental building blocks of the program Fostering effective identity and access management government-wide and between external business partners, by enforcing digital certificate standards for trusted identity authentication Strategic Drivers: Organizations and entities that direct or influence FPKIMA activities ICAM Certificate Services GSA Ensure that government-wide policies encourage agencies to develop and utilize the best, most cost effective management practices for the conduct of their specific programs Enforce digital certificate standards for trusted identity authentication across the federal agencies and between external business partners FPKIPA Enable the best and most cost-effective identity management practices for secure physical and logical access, document sharing, and communications across federal agencies and between external business partners through the execution of digital certificate policies and standards. FPKI A Mission: FPKIMA mission that aligns program functions Manage systems and services Security Management Implement policy and security controls to protect platform Program Management Provide program oversight and control Planning Relationship Management Board, manage, and support entities Community Collaborate and test solutions for the advancement of the trust infrastructure Boarding Thought Leadership Repository Services Configuration Management Monitoring & Reporting Policy Compliance User Support Technical Exploration Testing Communications Budgeting Performance Reporting Scheduling & Controlling Privacy Protection Physical & Logical Protection Monitoring & Reporting Security Authorization Policy Audit    16
  • 17. ENFORCE ENABLE Strategic Enablers: How the drivers impact FPKIMA VISION FPKIMA Supporting Functions: High-level business functions supporting the FPKIMA mission Platform Management FPKIMA Primary Functions: Fundamental building blocks of the program Fostering effective identity and access management government-wide and between external business partners, by enforcing digital certificate standards for trusted identity authentication Strategic Drivers: Organizations and entities that direct or influence FPKIMA activities ICAM Certificate Services GSA Ensure that government-wide policies encourage agencies to develop and utilize the best, most cost effective management practices for the conduct of their specific programs Enforce digital certificate standards for trusted identity authentication across the federal agencies and between external business partners FPKIPA Enable the best and most cost-effective identity management practices for secure physical and logical access, document sharing, and communications across federal agencies and between external business partners through the execution of digital certificate policies and standards. FPKIMA Mission: FPKIMA mission that aligns program functions Manage systems and services Security Management Implement policy and security controls to protect platform Program Management Provide program oversight and control Planning Relationship Management Board, manage, and support entities Community Collaborate and test solutions for the advancement of the trust infrastructure Boarding Thought Leadership Repository Services Configuration Management Monitoring & Reporting Policy Compliance User Support Technical Exploration Testing Communications Budgeting Performance Reporting Scheduling & Controlling Privacy Protection Physical & Logical Protection Monitoring & Reporting Security Authorization Policy Audit      17
  • 18. 18
  • 21. 21
  • 25. 0 200 400 600 800 1,000 1,200 1,400 1,600 1,800 Oct-09 Dec-09 Feb-10 Apr-10 Jun-10 Aug-10 Oct-10 Dec-10 Feb-11 Apr-11 Jun-11 Aug-11 Oct-11 Dec-11 Feb-12 Apr-12 Jun-12 Aug-12 Oct-12 MonthlyRequests(Millions) FPKIMA Repository Usage FY10 Onward Monthly Usage (HTTP) Monthly Usage (LDAP) Total Monthly Usage This chart shows the number of requests made to the FPKIMA Repository each month. The blue bar represents the number of web requests (HTTP GETs). The red bar represents the number of directory requests (LDAP SEARCHes). The green line represents the total number of requests and is the sum of the two bars. Each request for a Certificate Revocation List (CRL) or certificate file (P7C) counts. This is therefore a measurement of usage of the FPKI Repository, primarily for capacity planning purposes. 25
  • 26. 26
  • 27. 27
  • 30. 30
  • 31. 31
  • 32. 32