Security Industry Association Releases ICAM White Paper

Document shows connection between OSIPS, ICAM

July 9, 2010

1 Min Read

PRESS RELEASE

ALEXANDRIA, Va. - The Security Industry Association (SIA) has released "Applying OSIPS to ICAM," an application white paper that highlights the role that standards developed by SIA had in the federal government’s recently released Identity, Credentialing and Access Management (ICAM) roadmap document.

The ICAM roadmap, sometimes referred to as FICAM when relating to federal government applications, provides federal agencies with architecture and implementation guidance that addresses credentialing and access management issues. The document is designed to help agencies address access management gaps and realize benefits in security, cost and interoperability.

"Applying OSIPS to ICAM" provides a detailed analysis of the access control environment specified by ICAM and reveals details that must be clarified to ensure that solutions perform well. The paper relates how an adaptable set of standards, specifically SIA’s Open Systems Integration and Performance Standards (OSIPS) aligns closely with the goals and results that the ICAM document postulates. The OSIPS reference model is explained and readers are provided with examples of security system architectures that diagram the envisioned future state of ICAM when implemented in conjunction with OSIPS standards.

The Security Industry Association (www.siaonline.org) is the leading trade group for businesses in the electronic and physical security market. SIA protects and advances its members' interests by advocating pro-industry policies and legislation on Capitol Hill and throughout the 50 states; producing cutting-edge global market research; creating open industry standards that enable integration; advancing industry professionalism through education and training; opening global market opportunities; and providing sole sponsorship of the ISC Expos, the world's largest security trade shows and conferences.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights