Title | Size | Updated | |
---|---|---|---|
X.509 Certificate Policy for the U.S. Federal PKI Common Policy Framework
This Certificate Policy (CP) defines policies for Certification Authorities (CAs) that issue and manage certificates under the Federal Common Policy CA on behalf of federal executive branch agencies.
|
— |
10 Mar 2023
|
|
United States Department of Defense X.509 Certificate Policy - Version 10.7
The United States Department of Defense Certificate Policy (CP) is the unified policy under which a Certification Authority (CA) operated by a DoD component is established and operates. This document defines the creation and management of Version 3 X.509 public key certificates for use in applications requiring communication between networked computer-based systems.
|
1015 KB |
18 Jan 2023
|
|
United States Department of Defense S-Interoperability Domain X.509 Certificate Policy
The S-Interoperability Certificate Policy outlines the policy for the secret level multi-domain Public Key Infrastructure created by the S-Interop Root CA and defines the procedures for the approval and issuance of cross-certificates to member Certification Authorities.
|
407.85 KB |
30 Nov 2018
|
|
United States Department of Defense External Certification Authority (ECA) X.509 Certificate Policy (CP) - Version 4.7
This Certificate Policy (CP) governs the operation of the ECA Public Key Infrastructure (PKI), consisting of products and services that provide and manage X.509 certificates for public-key cryptography. The United States (US) DoD has established the External Certification Authority (ECA) program to support the issuance of DoD-approved certificates to industry partners and other external entities and organizations. The ECA program is designed to provide the mechanism for these entities to securely communicate with the DoD and authenticate to DoD Information Systems.
|
1.07 MB |
29 May 2024
|
|
OMBs Requirements for Accepting Externally-Issued Identity Credentials Memorandum
This OMB Memorandum requires agencies to begin leveraging externally-issued credentials, in addition to continuing to offer federally-issued credentials. The use of externally-issued credentials (i.e., those that have been issued by an entity other than the federal government) will decrease the burden on uses of government information systems and reduce costs associated with managing credentials.OMB's Requirements for Accepting Externally-Issued Identity Credentials
|
— |
21 Feb 2019
|
|
OMB Memorandum 11-11, Continued Implementation of HSPD-12
OMB M-11-11 requires that all federal agencies continue implementing the requirements outlined in Homeland Security Presidential Directive (HSPD) 12 to enable agency-wide use of the Personal Identity Verification (PIV) card. This includes enabling agency IT systems, applications, and facilities to be capable of using the PIV card as the mechanism for granting user access.OMB M-11-11, Continued Implementation of HSPD-12
|
— |
21 Feb 2019
|
|
OMB Memorandum 04-04, E-Authentication Guidance for Federal Agencies
OMB M-04-04 requires requires agencies to review new and existing electronic transactions to ensure that authentication processes provide the appropriate level of assurance. It establishes and describes four levels of identity assurance for electronic transactions requiring authentication.OMB Memorandum 04-04, E-Authentication Guidance for Federal Agencies OMB M-04-04 requires requires agencies to review new and existing electronic transactions to ensure that authentication processes provide the appropriate level of assurance. It establishes and describes four levels of identity assurance for electronic transactions requiring authentication.OMB Memorandum 04-04, E-Authentication Guidance for Federal Agencies
|
— |
21 Feb 2019
|
|
NIST SP 800-78-4, Cryptographic Algorithms and Key Sizes for PIV
NIST SP 800-78-4 specifies the cryptographic algorithms and key sizes for PIV systems and is a companion document to FIPS 201.NIST SP 800-78-4, Cryptographic Algorithms and Key Sizes for PIV
|
— |
21 Feb 2019
|
|
NIST SP 800-63-3
|
— |
24 Feb 2019
|
|
HSPD-12, Policy for a Common Identification Standard for Federal Employees and Contractors
HSPD 12 is a presidential directive requiring all Federal Executive Departments and Agencies to implement a government-wide standard for secure and reliable forms of identification for employees and contractors, for access to Federal facilities and information systems.HSPD-12, Policy for a Common Identification Standard for Federal Employees and Contractors
|
— |
21 Feb 2019
|
|
FIPS PUB 201-1, Personal Identity Verification (PIV) of Federal Employees and Contractors
FIPS PUB 201-1 specifies Personal Identity Verification (PIV) requirements for Federal employees and contractors. This standard specifies a PIV system within which a common identity credential can be created and later used to verify a claimed identity.FIPS PUB 201-1, Personal Identity Verification (PIV) of Federal Employees and Contractors (Download Link)
|
— |
21 Feb 2019
|
|
FIPS PUB 140-2, Security Requirements for Cryptographic Modules
IPS PUB 140-2 specifies the security requirements that will be satisfied by a cryptographic module utilized within a security system protecting sensitive but unclassified information in computer and telecommunication systems. FIPS PUB 140-2, Security Requirements for Cryptographic Modules (Download Link)
|
— |
21 Feb 2019
|
|
DoD Memorandum - Department of Defense Requirements for Accepting Non-Federally Issued Identity Credentials
This DoD Memorandum provides Federal Government Guidance on acceptance and use of Non-Federal Issuer (NFI) identity credentials and specific DoD policies and practices for accepting credentials for logical access to DoD applications and websites.
|
2.41 MB |
30 Nov 2018
|
|
DoD Memorandum - Department of Defense Acceptance and Use of Personal Identity Verification-Interoperable (PIV-I) Credentials
This DoD Memorandum permits acceptance of PIV-I credentials for authentication and access when DoD relying parties, installation commanders, and facility coordinators determine that granting access is appropriate and the appropriate vetting requirements are met.
|
654.83 KB |
30 Nov 2018
|
|
DoD Instruction 8520.03, Identity Authentication for Information Systems
DoDI 8520.03 is a new instruction that requires that all authentications of users be conducted with an appropriate credential that is approved for use by a DoD authority and has been verified as active (not revoked) and not expired by the credential issuing authority. It defines four levels of data sensitivity granularity for sensitive but unclassified information, and three levels of data sensitivity granularity for Secret or Confidential information. It then provides specific requirements for authentication credentials based on these levels of sensitivity. Policy related to authentication requirements was previously found in DoDI 8520.2 which has been obsoleted by DoDI 8520.02.DoD Instruction 8520.03, Identity Authentication for Information Systems (Web Link)
|
— |
21 Feb 2019
|
|
DoD Instruction 8520.02, Public Key Infrastructure (PKI) and Public Key (PK) Enabling
DoDI 8520.02 is a re-release of DoDI 8520.2 that establishes the availability of the Coalition PKI for Combatant Commands (COCOMS), refers to the SIPRNET PKI that will be transitioned to operate under Committee for National Security Systems (CNSS) authority, provides specific guidance on issuance of alternate logon tokens (ALTs) to Flag-level officers or Senior Executives, and incorporates the DoD CIO "Approval of External PKIs" memorandum (circa July 2008) into the instruction. It also contains two other major changes. The first is that all policy related to authentication requirements has been moved to DoDI 8520.03. The second major change impacts pursuing waivers to DoDI 8520.02. Previously, Component CIOs had the authority to approve waivers to the instruction
|
— |
21 Feb 2019
|
|
CNSSI-1300, National Security Systems (NSS) PKI X.509 Certificate Policy
The Committee on National Security Systems Instruction (CNSSI) No. 1300, "Instruction for National Security Systems (NSS) Public Key Infrastructure (PKI) X.509 Certificate Policy, Under CNSS Policy No. 25," states the requirements for issuing and managing certificates that Relying Parties can use in making decisions regarding what assurance they can place in a certificate issued by a NSS PKI CA.
|
— |
21 Feb 2019
|
|
CNSS Policy No. 25
|
— |
01 Mar 2019
|
|
CNSS Directive 506
|
— |
24 Feb 2019
|