Cybersecurity Identity Management (Idm)

Cybersecurity Identity Management (Idm)

Identity Management (IdM) Side Event Cybersecurity Dick Brackney ITU-T JCA-IdM Co-Convener Objectives What is Identity Management (IdM)? Why is IdM work in ITU-T important? What are the major IdM benefits? WTSA-08, Johannesburg, South Africa, 21-30 October 2008 2 Introduction Networks are increasingly distributed, converged, and packet based where access to services can be based on identity contexts and roles and accessed anywhere, anytime. Security and trust of identity information in this environment is significantly more complex. – Users may have multiple, context dependent “identities” – Network services may require different identity trust levels – Identity information is distributed throughout the network Old methods of managing of identity information are inadequate, may limit services, and cause significant cybersecurity problems Consequently, a new, robust set of secure and trusted capabilities is needed i.e IdM WTSA-08, Johannesburg, South Africa, 21-30 October 2008 3 IdM An evolutionary technology Identity-based services. Security services, especially those associated with user, device, application authentication WTSA-08, Johannesburg, South Africa, 21-30 October 2008 4 IdM is a set of Capabilities that: Attach identity data to a person, device, or application. Facilitate the secure storage, retrieval and secure exchange of identity data. Provide significantly better identity lifecycle management. Can allow user control of personally identifiable information (PII). WTSA-08, Johannesburg, South Africa, 21-30 October 2008 5 ITU-T work on IdM Existing identity management solutions: – Are not interoperable, – In some cases they are unknown to each other and need to be “discoverable”. Principal focus of ITU-T Program is: – Common data model for identity information, – Common view of trust levels, – Discovery of authoritative identity information, – Application of IdM to next generation networks. WTSA-08, Johannesburg, South Africa, 21-30 October 2008 6 Major Benefits of IdM: Better privacy Multiple trust levels Nomadic “any-” services Single sign-on/off Inter-Federation services Simplified user-service interface Efficient Lifecycle management of identity data Creation of new security and identity based services Option to use third party identity service providers Reduces identity theft & fraud WTSA-08, Johannesburg, South Africa, 21-30 October 2008 7 Conclusions IdM is – An important capability in the distributed, anywhere, anytime converged packet-based network environment. ITU-T is uniquely positioned to: – Harmonize IdM solutions for global use, – Collaborate among diverse Forums, Standards Bodies, Consortiums, and Nations. WTSA-08, Johannesburg, South Africa, 21-30 October 2008 8.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    8 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us