Security Industry Association Releases ICAM White PaperSecurity Industry Association Releases ICAM White Paper
Document shows connection between OSIPS, ICAM
July 9, 2010
ALEXANDRIA, Va. - The Security Industry Association (SIA) has released "Applying OSIPS to ICAM," an application white paper that highlights the role that standards developed by SIA had in the federal government’s recently released Identity, Credentialing and Access Management (ICAM) roadmap document.
The ICAM roadmap, sometimes referred to as FICAM when relating to federal government applications, provides federal agencies with architecture and implementation guidance that addresses credentialing and access management issues. The document is designed to help agencies address access management gaps and realize benefits in security, cost and interoperability.
"Applying OSIPS to ICAM" provides a detailed analysis of the access control environment specified by ICAM and reveals details that must be clarified to ensure that solutions perform well. The paper relates how an adaptable set of standards, specifically SIA’s Open Systems Integration and Performance Standards (OSIPS) aligns closely with the goals and results that the ICAM document postulates. The OSIPS reference model is explained and readers are provided with examples of security system architectures that diagram the envisioned future state of ICAM when implemented in conjunction with OSIPS standards.
The Security Industry Association (www.siaonline.org) is the leading trade group for businesses in the electronic and physical security market. SIA protects and advances its members' interests by advocating pro-industry policies and legislation on Capitol Hill and throughout the 50 states; producing cutting-edge global market research; creating open industry standards that enable integration; advancing industry professionalism through education and training; opening global market opportunities; and providing sole sponsorship of the ISC Expos, the world's largest security trade shows and conferences.
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023