2
DOD PROGRAMS Public Key Infrastructure (PKI) Executive Summary DoD Public Key Infrastructure (PKI) Increment 1 provides authentcated dentty management va password-protected Common Access Card (CAC) to enable DoD members, coalton partners, and others to access restrcted web stes, enroll n onlne servces, and encrypt and dgtally sgn e-mal. The Jont Interoperablty Test Command (JITC) conducted the DoD PKI Increment 1, Spiral 2 IOT&E in February and March 2008. DOT&E assessed the PKI system as operatonally effectve and operatonally sutable for use n ts ntended operatonal envronment. The DoD PKI Program Office should correct unresolved deficiencies identified during the IOT&E prior to the Full Deployment Decision at the end of Increment 1. System DoD PKI s a crtcal-enablng technology for Informaton Assurance (IA) servces to support seamless secure information flows across the Global Information Grid (GIG) or when stored locally. DoD PKI s the framework and servces that provde for the generaton, producton, dstrbuton, control, revocaton, recovery, and tracking of Public Key certificates and their correspondng prvate keys, and enables commercal off-the-shelf (COTS) and government off-the-shelf (GOTS) applcatons to provde IA and e-busness capabltes. Usng authortatve data, obtaned va face-to-face dentty proofing, DoD PKI creates a credential that combines this dentty nformaton wth cryptographc nformaton that s non-forgeable and non-changeable. In ths way, DoD PKI provdes a standards-based representaton of a physcal dentty n an electronc form. DoD PKI Certification Authorities (CA) reside in the Defense Informaton Systems Agency (DISA) Defense Enterprse Computng Centers (DECC) n Chambersburg, Pennsylvana, and Oklahoma Cty, Oklahoma. - DoD PKI s comprsed of COTS hardware, COTS software, and the National Security Agency (NSA)-developed applcatons software. - Certificates are imprinted on the DoD CAC token for personnel identification using Defense Enrollment Elgblty Reportng System (DEERS) personnel data. DoD PKI is being developed jointly by DISA and the NSA using spiral acquisition in multiple increments. The current increment, Increment 1, is being deployed in five spirals, of whch two have been operatonally tested and deployed. Mission DoD PKI enables net-centrc operatons by allowng warfighters, communities of interest, and other authorized users to securely access, process, store, transport, and use nformaton, applcatons, and networks regardless of technology, organzaton, or locaton. Commanders at all levels wll use DoD PKI to provde authentcated dentty management va password-protected CAC to enable DoD members, coalton partners, and others to access restrcted web stes, enroll n onlne servces, and encrypt and dgtally sgn e-mal. Commanders wll use specific PKI services to: - Enable and promote a common ubiquitous secure web-servces envronment - Enable the ntegrty of data/forms/orders movng wthn the GIG, va use of dgtal sgnatures - Enable management of denttes operatng n groups or certan roles wthn GIG systems - Ensure the integrity and confidentiality of what is operating on a network by provson of assured PKI-based credentals for any devce on that network Prime Contractor • Government Integrator (DISA) PKI 45

Public Key Infrastructure (PKI) - GlobalSecurity.org · d o d P r o G r A M S 46 PKI Activity • JITC conducted the DoD PKI Increment 1, Spiral 2 IOT&E in February and March 2008

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Public Key Infrastructure (PKI) - GlobalSecurity.org · d o d P r o G r A M S 46 PKI Activity • JITC conducted the DoD PKI Increment 1, Spiral 2 IOT&E in February and March 2008

d o d P r o G r A M S

Public Key Infrastructure (PKI)

Executive Summary• DoD Public Key Infrastructure (PKI) Increment 1 provides

authent�cated �dent�ty management v�a password-protected Common Access Card (CAC) to enable DoD members, coal�t�on partners, and others to access restr�cted web s�tes, enroll �n onl�ne serv�ces, and encrypt and d�g�tally s�gn e-ma�l.

• The Jo�nt Interoperab�l�ty Test Command (JITC) conducted the DoD PKI Increment 1, Spiral 2 IOT&E in February and March 2008. DOT&E assessed the PKI system as operat�onally effect�ve and operat�onally su�table for use �n �ts �ntended operat�onal env�ronment.

• The DoD PKI Program Office should correct unresolved deficiencies identified during the IOT&E prior to the Full Deployment Decision at the end of Increment 1.

System• DoD PKI �s a cr�t�cal-enabl�ng technology for Informat�on

Assurance (IA) serv�ces to support seamless secure information flows across the Global Information Grid (GIG) or when stored locally.

• DoD PKI �s the framework and serv�ces that prov�de for the generat�on, product�on, d�str�but�on, control, revocat�on, recovery, and tracking of Public Key certificates and their correspond�ng pr�vate keys, and enables commerc�al off-the-shelf (COTS) and government off-the-shelf (GOTS) appl�cat�ons to prov�de IA and e-bus�ness capab�l�t�es.

• Us�ng author�tat�ve data, obta�ned v�a face-to-face �dent�ty proofing, DoD PKI creates a credential that combines this �dent�ty �nformat�on w�th cryptograph�c �nformat�on that �s non-forgeable and non-changeable. In th�s way, DoD PKI prov�des a standards-based representat�on of a phys�cal �dent�ty �n an electron�c form.

• DoD PKI Certification Authorities (CA) reside in the Defense Informat�on Systems Agency (DISA) Defense Enterpr�se Comput�ng Centers (DECC) �n Chambersburg, Pennsylvan�a, and Oklahoma C�ty, Oklahoma.- DoD PKI �s compr�sed of COTS hardware, COTS software,

and the National Security Agency (NSA)-developed appl�cat�ons software.

- Certificates are imprinted on the DoD CAC token for personnel identification using Defense Enrollment El�g�b�l�ty Report�ng System (DEERS) personnel data.

• DoD PKI is being developed jointly by DISA and the NSA using spiral acquisition in multiple increments. The current increment, Increment 1, is being deployed in five spirals, of wh�ch two have been operat�onally tested and deployed.

Mission• DoD PKI enables net-centr�c operat�ons by allow�ng

warfighters, communities of interest, and other authorized users to securely access, process, store, transport, and use �nformat�on, appl�cat�ons, and networks regardless of technology, organ�zat�on, or locat�on.

• Commanders at all levels w�ll use DoD PKI to prov�de authent�cated �dent�ty management v�a password-protected CAC to enable DoD members, coal�t�on partners, and others to access restr�cted web s�tes, enroll �n onl�ne serv�ces, and encrypt and d�g�tally s�gn e-ma�l. Commanders w�ll use specific PKI services to: - Enable and promote a common ubiquitous secure

web-serv�ces env�ronment- Enable the �ntegr�ty of data/forms/orders mov�ng w�th�n the

GIG, v�a use of d�g�tal s�gnatures - Enable management of �dent�t�es operat�ng �n groups or

certa�n roles w�th�n GIG systems- Ensure the integrity and confidentiality of what is operating

on a network by prov�s�on of assured PKI-based credent�als for any dev�ce on that network

Prime contractor• Government Integrator (DISA)

PKI 45

Page 2: Public Key Infrastructure (PKI) - GlobalSecurity.org · d o d P r o G r A M S 46 PKI Activity • JITC conducted the DoD PKI Increment 1, Spiral 2 IOT&E in February and March 2008

d o d P r o G r A M S

46 PKI

Activity• JITC conducted the DoD PKI Increment 1, Spiral 2 IOT&E

in February and March 2008. Testing was accomplished accord�ng to DOT&E-approved test plans and procedures. All or parts of 13 of the 14 Increment 1 enhancements were evaluated �n the operat�onal PKI env�ronment, w�th typ�cal users prov�d�ng system support.

• Pr�or to the IOT&E, JITC observed developmental test�ng in the DISA PKI Laboratory at Fort Huachuca, Arizona. JITC observat�ons were captured �n a ser�es of Letters of Observat�on subm�tted to DOT&E.- Early observat�on of th�s test�ng allowed JITC to �dent�fy

�ssues that could �mpact operat�ons. - The Program Office was able to correct areas of concern

pr�or to the IOT&E, or schedule for the�r correct�on pr�or to deployment.

Assessment• The testing conducted by JITC was adequate to assess the

operat�onal effect�veness and su�tab�l�ty of the DoD PKI Increment 1, Spiral 2 configuration. DOT&E concurred with the JITC assessment that the DoD PKI Increment 1, Spiral 2 capabilities provide an operationally effective and operat�onally su�table system.

• DoD PKI system IA controls were met, w�th the except�on of phys�cal access controls at the Chambersburg DECC at the Letterkenny Army Depot �n Pennsylvan�a.

• Other deficiencies observed during the IOT&E include: - A s�ngle po�nt of fa�lure �n the PKI system arch�tecture- Training materials and system documentation did not reflect

the current system under test- A system resource conflict occurred when generating the

da�ly revocat�on l�st• JITC’s early observat�ons of developmental test�ng were

�nvaluable �n reduc�ng r�sk to the PKI operat�onal m�ss�on when the basel�ne was deployed for IOT&E.

recommendations• Status of Previous Recommendations. This is the first annual

report for th�s program. • FY08 Recommendations.

1. DISA should coordinate with the Letterkenny Army Depot to el�m�nate the phys�cal secur�ty vulnerab�l�ty created by the lack of access control to the area surround�ng the DECC.

2. The PKI Program Management Office should resolve the s�ngle po�nt of fa�lure �n the system, correct the resource allocat�on �ssue dur�ng creat�on of the revocat�on l�st, and prov�de system documentat�on and tra�n�ng mater�als that accurately describe the actual system configurations.