FB pixel

DOD’s digital ID and access management tools could be live in a year

DOD’s digital ID and access management tools could be live in a year
 

The Department of Defense says that its digital ID, credentialing and access management project, first trialed in 2018, will serve all corners of the department by next summer.

That is rapid development for a federal IT project of any description, but then, ICAM, as it is known, is essential to creating a zero-trust architecture. The Pentagon was trialing ICAM as recently as last October.

It took a while, but in the last few years, Defense leaders finally realized that physical and digital breaches are an existential threat to their core mission to be prepared to rebuff any attack on the United States and its interests.

In terms of bedrock national defense assumptions, there is the mutually-assured-destruction model of nuclear weapon defense and, coming soon to field indoctrination seminars, mutual authentication, which underpins zero-trust digital identity architectures.

FedScoop is reporting that the DOD’s Defense Information Systems Agency (DISA) expects in the next year to create a global directory used to identify all department personnel. Biometric sign-in will be one recognizable zero-trust tool.

The agency continues to experiment with other recognition tools, according to FedScoop, that run more to the behavioral/surveillance roles. Gait recognition systems reportedly are among those tools.

Moving toward zero trust is not entirely a top-down enterprise. The Air Force last year was working with the Defense Information Systems Agency on a mix of physical security, biometric authentication and signal jamming capabilities for phones and tablets used by personnel.

It is interesting to note that the digital ID architecture apparently will be centralized. That would make development, support and distribution more efficient than doing so regionally, in segments or by department.

There are, however, security concerns to be balanced, too. Centralized architectures can pull down a lot of capability in the event of failure or attack.

Article Topics

 |   |   |   |   |   | 

Latest Biometrics News

 

How to explain the EUDI Wallet? Industry and citizens discuss Europe’s digital ID

The European Digital Identity (EUDI) Wallet is well on its way towards becoming a reality. To explain the major impact…

 

Decentralize face authentication for control, stronger protection: Youverse

The implementation method of biometric face authentication has become increasingly important in recent years due to the limitations of traditional…

 

Researchers develop display screens with biometric sensor capabilities

Traditional display screens like those built into smartphones require extra sensors for touch control, ambient light, and fingerprint sensing. These…

 

Meta, porn industry and Kansas governor weigh in on age verification

As Europe mulls how to restrict access to certain content for minors, Meta offers its own solution. Meanwhile, U.S. states…

 

As national U.S. data privacy law becomes more likely, critics emerge to point out flaws

The push for comprehensive privacy legislation in the U.S. is gaining momentum, as the proposed American Privacy Rights Act 2024…

 

AI surveillance robot uses facial recognition to decide who to blast with paintballs

Those pining for a life as an eccentric shut-in with robots guarding their house can rejoice at the emergence of…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Most Read From This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events