Model:
Summary:
The FICAM Model
The Federal Identity, Credential, and Access Management (FICAM) framework is designed to enhance the security and efficiency of federal agencies by providing a structured approach to managing digital identities, credentials, and access. This comprehensive model outlines five core service areas: identity management, credential management, access management, federation, and governance. Each area is detailed with specific services that help agencies implement robust security measures and ensure compliance with federal standards and policies.
FICAM Services Summary
- Identity Management - Identity Management focuses on establishing and maintaining digital identities.
- The Creation service establishes an identity using attributes that define a person or entity.
- Identity Proofing connects digital identities to real-world entities using various validation methods.
- Provisioning manages the lifecycle of accounts and entitlements, including creation, management, and deprovisioning.
- Maintenance ensures that identity records are accurate and up-to-date throughout their lifecycle.
- Identity Aggregation reconciles and links disparate identity records for the same entity.
- Deactivation removes or suspends enterprise identity records when they are no longer needed.
- Credential Management - Credential Management involves the processes of issuing and maintaining credentials.
- Sponsorship formally establishes the need for a credential.
- Registration collects necessary information to issue it.
- Generation & Issuance assigns credentials, ensuring they are activated and tokens are provided.
- Maintenance includes renewing, resetting, suspending, and reissuing credentials throughout their lifecycle.
- Revocation involves terminating credentials or deactivating authenticators when they are no longer valid.
- Access Management - Access Management defines how access to resources is controlled and monitored.
- Policy Administration involves creating and maintaining the technical access requirements that govern protected services.
- Authentication verifies that claimed identities are genuine through validation processes, including two-factor and multi-factor authentication.
- Authorization determines access permissions based on policies, identity attributes, and entitlements, granting or denying access accordingly.
- Privileged Access Management secures accounts with elevated permissions, protecting critical configurations and data from unauthorized access and potential misuse.
- Federation - Federation focuses on establishing trust and enabling interoperability between different systems.
- Policy Alignment develops relationships and mutual understanding between parties through established authorities, policies, standards, and principles.
- Authentication Broker transforms authentication events into alternative formats to support secure access across different systems.
- Attribute Exchange involves discovering and sharing identity attributes to promote consistent access decisions and system interoperability.
- Governance - Governance ensures that identity, credential, and access management practices align with organizational policies and standards.
- Identity Governance links enterprise personnel, applications, and data to help manage access and mitigate risk.
- Analytics leverages continuous data collection and monitoring to identify conflicts in entitlements and ensure compliance with access requirements.
- Mitigation addresses identified risks and corrects problems through redress and remediation efforts, ensuring ongoing security and compliance.
Summary
The FICAM model provides a detailed and structured approach to managing digital identities, credentials, and access within federal agencies. By focusing on identity management, credential management, access management, federation, and governance, FICAM helps organizations enhance their cybersecurity measures, streamline operations, and comply with federal regulations. Implementing these services ensures that agencies can effectively protect sensitive information and maintain a robust security posture.
Sources:
CISA - Identity, Credential, and Access Management (ICAM) Reference ArchitectureNIST SP 1800-35 - Implementing a Zero Trust Architecture - Privileged Access ManagementQuotes:
"Identity and access management is at the heart of cybersecurity; it is critical to verify that people are who they say they are and that they have the appropriate access to systems and data." - Bruce Schneier