Accession Number:

ADA526958

Title:

Public Key Infrastructure Roadmap for the Department of Defense

Descriptive Note:

Corporate Author:

ASSISTANT SECRETARY OF DEFENSE (COMMAND CONTROL COMMUNICATIONS AND INTELLIGENCE) WASHINGTON DC

Personal Author(s):

Report Date:

2000-12-18

Pagination or Media Count:

43.0

Abstract:

The Public Key Infrastructure PKI Roadmap establishes the enterprise-wide end-state for the Department of Defense DoD PKI and outlines the evolution strategy and timeline for the availability of the Departments PKI capabilities. Also, it identifies critical risk areas that must be addressed, summarizes measures that will be undertaken to mitigate those risks, and highlights roles and responsibilities of organizations involved with its realization. This document is an update to the DoD PKI Roadmap Version 3.0. It provides an updated perspective on the overall evolution of the Departments PKI program, and addresses new requirements identified in the 12 August 2000 ASD C3I Memorandum including integration with the Common Access Card CAC. Achieving Information Superiority in the highly interconnected, interdependent, shared-risk DoD environment requires that the Departments Information Assurance IA capabilities be applied within a management framework that considers the pervasiveness of information as a vital aspect of warfighting and business operations. The technical strategy that underlies DoD IA is Defense in Depth, in which layers of defense are used to achieve our security objectives. The DoD PKI is a supporting layer of this strategy, providing a vital element for a secure IA posture for the Defense Information Infrastructure DII. The DoD PKI strategy recognizes that a traditional, Government-developed implementation will not be able to keep pace with a strategy based on commercial technology and services. It recognizes that the DoD PKI must employ an incremental, evolutionary approach using open standards, based on commercially available products and services that can keep pace with the technology rollover and constantly evolving applications and standards inherent in the Information Technology IT environment. With that, it must still maintain appropriate levels of security, embracing secure interoperability both within the DoD and externally wi

Subject Categories:

  • Computer Systems Management and Standards
  • Military Forces and Organizations

Distribution Statement:

APPROVED FOR PUBLIC RELEASE