Security Industry Association Releases ICAM White PaperSecurity Industry Association Releases ICAM White Paper
Document shows connection between OSIPS, ICAM
July 9, 2010

PRESS RELEASE
ALEXANDRIA, Va. - The Security Industry Association (SIA) has released "Applying OSIPS to ICAM," an application white paper that highlights the role that standards developed by SIA had in the federal government’s recently released Identity, Credentialing and Access Management (ICAM) roadmap document.
The ICAM roadmap, sometimes referred to as FICAM when relating to federal government applications, provides federal agencies with architecture and implementation guidance that addresses credentialing and access management issues. The document is designed to help agencies address access management gaps and realize benefits in security, cost and interoperability.
"Applying OSIPS to ICAM" provides a detailed analysis of the access control environment specified by ICAM and reveals details that must be clarified to ensure that solutions perform well. The paper relates how an adaptable set of standards, specifically SIA’s Open Systems Integration and Performance Standards (OSIPS) aligns closely with the goals and results that the ICAM document postulates. The OSIPS reference model is explained and readers are provided with examples of security system architectures that diagram the envisioned future state of ICAM when implemented in conjunction with OSIPS standards.
The Security Industry Association (www.siaonline.org) is the leading trade group for businesses in the electronic and physical security market. SIA protects and advances its members' interests by advocating pro-industry policies and legislation on Capitol Hill and throughout the 50 states; producing cutting-edge global market research; creating open industry standards that enable integration; advancing industry professionalism through education and training; opening global market opportunities; and providing sole sponsorship of the ISC Expos, the world's largest security trade shows and conferences.
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication Methods
Oct 26, 2023Modern Supply Chain Security: Integrated, Interconnected, and Context-Driven
Nov 06, 2023How to Combat the Latest Cloud Security Threats
Nov 06, 2023Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and Phishing
Nov 01, 2023SecOps & DevSecOps in the Cloud
Nov 06, 2023