Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Army strengthens access rules for secret network
Wednesday - 8/24/2011, 8:01am EDT
By Jared Serbu
Federal News Radio
TAMPA, Fla. — The Army has moved more than 2,000 users of the military's secret computer network to a new, more secure system for signing in — one of several advances the service said it's making on identity management.
Currently, most users of the Defense Department's classified network, known as SIPRNet, log on using just a username and password. That method is going away in favor of a more secure, two-factor identification system: combining something users know with something they have in their physical possession, just as they currently do when they log onto the non-secret network, NIPRNet, with their common access cards.
Users will get a similar but separate public key infrastructure, or PKI, smartcard and pin number that will be used only for the secret network. The Army said it has deployed these new cards to an initial 2,400 users through an initial operational test and evaluation (IOT&E).
Tracy Traylor, chief of the Army's identity management division, said, so far, soldiers like them.
Leave the sticky note behind
"It's really cool," she told an Army audience at the LandWarNet conference Tuesday. "It's a live token — you get to keep it for three years, it's not that we're going to take it back at the end of the IOT&E — and you don't have to remember that 15-character password that we all have written on the sticky note under the keyboard or in the desk."
The Army received DoD approval to continue deploying the cards in an extended test period to its organizations that volunteer. Traylor said they want to distribute as many as they can through the test in order to avoid a mad dash to make the switch all at once when DoD finally pulls the plug on SIPRNet usernames and passwords.
DoD is paying the bill for the initial deployment of the smartcard system, a capital expenditure that Traylor said would otherwise be significant for the Army. Just the physical cards themselves cost around $40 each, and the Army has an estimated 300,000 SIPRNet users.
Meanwhile, the Army, and DoD as a whole, are beefing up the security of their existing system of common access cards, which are used for most day-to-day unclassified tasks. They're phasing out an older, weaker data security algorithm known as SHA-1, which is now more than 15 years old. Its replacement, the stronger SHA-2, will take over on Jan. 1, 2014, and SHA-1 will no longer be supported on newly minted cards.
Traylor said the Army wants to make the transition as painless to users as possible, but there are no guarantees.
"Your CAC card will continue to work," she said. "Your Web applications and things like that that only accept SHA-1 may not. We just went out with a data call to find out what applications were out there to make people aware that this change was coming. As we do data center consolidation, we've added that to the checklist. As they take an application and move it from one data center to a new data center, that's something they're watching for. We want Jan. 1, 2014 to be uneventful, so that when that new CAC card is issued, it's just transparent. The apps are ready to go, no big deal."
Another reason for the move: it's required for DoD to continue to share information with many of the federal government's civilian agencies.
"A lot of organizations have just gone straight to SHA-2," she said. "If you're authenticating to some of their data systems or websites, they're already there."
But regardless of how DoD users authenticate themselves to the network, many of the discrete systems inside the network that people need to access on a day-to-day basis still rely on individual, localized schemes of usernames and passwords.
That brings up a third change the Army has just started to tackle with the Defense Information Systems Agency. DISA is working on a system to synchronize DoD users' identities across the myriad systems the military services run around the globe and eventually aims to eliminate all of those individual accounts.
"We're going to take your identity and your attributes that make up who you are — major, contractor, reserve, civilian — all of these things about you, and store it in an identity forest," she said. "Our goal is to authenticate once, based on your single identity and all these attributes that we know about you, and then grant you access to those things that you need."