AOH :: ISN-1197.HTM

IA Roadmap

IA Roadmap
IA Roadmap 

By Patrick Chisholm
July 25, 2005 

To realize the Department of Defense's vision for the Global 
Information Grid (GIG), information assurance (IA) requirements 
include robust identity, authentication and privilege management, 
policy for dynamic access control, security management, and 
"persistence monitoring" or continual monitoring throughout the 
network, according to Daniel G. Wolf, the director of information 
assurance for the National Security Agency (NSA). 

Protecting information across the entire GIG is a top priority of NSA, 
which recently revised its IA roadmap for the GIG and continues to 
update it as technology advances. In doing so, NSA is working with the 
military services and DoD agencies to form alliances and validate the 
GIG IA program requirements, budget requirements and implementation 
strategy based on the architecture that NSA has proposed. 

To be sure, implementing the roadmap is a long-term project: the 
architectural plan for data sharing on the GIG is to be carried out 
over the next 15 to 20 years. 

The roadmap leverages the five tenets of IA: availability, integrity, 
authentication, confidentiality and non-repudiation.

Essential components of the IA roadmap include: 

* Maintaining availability in an end-to-end encrypted "black core"
  environment that is "unforgeable" and "unspoofable."

* Identity management, specifying people, objects (data and
  applications) and machines.

* Privilege management, laying out the rights and privileges of users.

* Dynamic access enforcement.

* Mediated access between and among people, objects and machines based
  on identities and privileges.

* Assured information sharing.

* Underlying security management infrastructure.


Attend the Black Hat Briefings and
Training, Las Vegas July 23-28 - 
2,000+ international security experts, 
10 tracks, no vendor pitches. 

Site design & layout copyright © 1986-2014 CodeGods