Securely Sharing Information Across Organizational Boundries
The law enforcement community has in the past been encumbered by the inability to trust the electronic identity of individuals in information sharing solutions, but has always had a real need to share sensitive information with first responders and other agencies. With strong authentication and secure remote identity proofing, officials can now trust that remote users entering reports into these systems, or gaining access to sensitive information in these systems, are who they expect.
We have been involved from the beginning as homeland security programs sought to build trust relationships with a broad base of end users to improve information sharing. One of the greatest complexities in sharing information, even at the controlled unclassified information (CUI) level, is making sure that two key elements are met:
- what assurances can we have that only those we want in the information sharing system can get in the system
- how can I trust that the person who posted the information to the system is a trustworthy source
With strong two-factor authentication, those barriers have been overcome – now we know who is in the system accessing the information and who is sharing information. Additionally, leveraging remote identity proofing and verification solutions allows agencies to add people to the network who would otherwise require face-to-face identity checking. This also alleviates relying on referential access with email providing connectivity between the nominator, validator, and requestor.
This need for trust and non-repudiation is similar in other agencies and organizations. To learn more about establishing trust in remote users and developing secure information sharing environments, contact one of our specialists.
Recommended For You
Last Update: January 25, 2019 An agreement has been reached to end the partial government shutdown. A three-week continuing resolution […]
On December 18, President Obama signed legislation to encourage businesses to share cyberthreat information with the federal government. The Cybersecurity Information Sharing […]
The key to success in discovery of an identity is understanding how disparate data elements combine to form a conclusive […]
Companies have spent a great deal of time and money protecting their core systems and infrastructure from cyber attacks — hardening […]