Security Industry Association Releases ICAM White Paper
Document shows connection between OSIPS, ICAM
July 9, 2010
PRESS RELEASE
ALEXANDRIA, Va. - The Security Industry Association (SIA) has released "Applying OSIPS to ICAM," an application white paper that highlights the role that standards developed by SIA had in the federal government’s recently released Identity, Credentialing and Access Management (ICAM) roadmap document.
The ICAM roadmap, sometimes referred to as FICAM when relating to federal government applications, provides federal agencies with architecture and implementation guidance that addresses credentialing and access management issues. The document is designed to help agencies address access management gaps and realize benefits in security, cost and interoperability.
"Applying OSIPS to ICAM" provides a detailed analysis of the access control environment specified by ICAM and reveals details that must be clarified to ensure that solutions perform well. The paper relates how an adaptable set of standards, specifically SIA’s Open Systems Integration and Performance Standards (OSIPS) aligns closely with the goals and results that the ICAM document postulates. The OSIPS reference model is explained and readers are provided with examples of security system architectures that diagram the envisioned future state of ICAM when implemented in conjunction with OSIPS standards.
The Security Industry Association (www.siaonline.org) is the leading trade group for businesses in the electronic and physical security market. SIA protects and advances its members' interests by advocating pro-industry policies and legislation on Capitol Hill and throughout the 50 states; producing cutting-edge global market research; creating open industry standards that enable integration; advancing industry professionalism through education and training; opening global market opportunities; and providing sole sponsorship of the ISC Expos, the world's largest security trade shows and conferences.
You May Also Like
DevSecOps/AWS
Oct 17, 2024Social Engineering: New Tricks, New Threats, New Defenses
Oct 23, 202410 Emerging Vulnerabilities Every Enterprise Should Know
Oct 30, 2024Simplify Data Security with Automation
Oct 31, 2024