Federal Mission: Security Compliance using Externalized Authorization Management (EAM)

United States federal agencies are beholden to myriad regulations and standards, some of the most notable of which are the FIPS Publication 200 and the NIST Special Publication 800-53. Both documents, in combination, “ensure that appropriate security requirements and security controls are applied to all federal information and information systems.” These documents offer guidance on […]

Federal Mission: Dissemination and Information Sharing using ABAC

Law enforcement, defense, and intelligence agencies are under the obligation to securely share as much information as possible within their respective communities. The keyword here is “securely.” It is oftentimes the aggregate of data that provides actionable information to help agencies carry out their missions.  But how can an information owner share her data in […]

Federal Government: Insider Threat Use Case

U.S. federal government agencies hold information that, if released from control, could do grave harm to the country and its citizens. This information includes Personally Identifiable Information on federal employees and U.S. citizens, proprietary or export controlled data, or other sensitive material related to national security. Federal agencies invest heavily in protecting data from hacking […]

Federal Government: Cross-domain ABAC Use Case

Agencies look to Cross Domain Solutions (CDS) to transfer information between these domains in a way that ensures the timely sharing of information while still maintaining confidentiality and integrity. The use of Attribute Based Access Control (ABAC), as defined by the NIST (SP) 800-162 Guide to ABAC, can provide fine-grained, dynamic authorization to enhance your […]

Attribute Based Access Control for Manufacturing

Attribute Based Access Control for Manufacturing Manufacturers around the globe are faced with the growing risk of breaches – in many cases the attackers are after IP and sensitive customer data. Using an Attribute Based Access Control approach can help balance the need to protect these critical assets, while facilitating collaboration through the sharing of […]

Cross Border Privacy Enforcement – Global Financial Services and the Data Flow Challenge

Privacy regulations impact cross-border transactions in the financial services industry. Domestic processing of personally identifiable information (PII) and the transfer thereof for storage or processing outside the country’s jurisdiction are scenarios with different regulatory mandates. This business case brief will highlight the challenges and solution to secure information and to be compliant with regulations. Key […]