Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Newswire

HSPD-12 PIV Cards Moving into States and Enterprises

November 2, 2008

October 27th was deadline day for the four-year-old HSPD-12 initiative. Attendees at the Smart Card Alliance Smart Cards in Government Conference got a firsthand report Friday on the governmentwide credentialing program’s impressive results from a key figure in the program—Karen Evans, administrator of e-government and IT for the Office of Management and Budget.

In what she termed a “successful partnership between government and industry,” Evans summarized the achievements of the last four years. Standards were created and implemented; identity vetting and issuance processes are in place; 34 system integrators and 370 products were qualified; every agency has plans in place to implement both physical and logical access control using the Personal Identity Verification (PIV) cards; and as of September 1st more than 1.2 million credentials had been issued to federal government employees who were fully vetted by the new process, according to Evans. One particularly telling anecdote is that the new PIV card and surrounding infrastructure enabled the President to electronically authorize and submit the official U.S. budget to the Government Printing Office (GPO) and Capitol Hill earlier this year, a first for the United States or for any country, she said. Up-to-date results on how close the government came to its goal of credentialing approximately two million federal employees will be announced this week.

State and local governments are now starting to plan and test how to issue and use PIV interoperable cards, and enterprises are also moving to adopt PIV interoperable or compliant cards. Since only the federal government can issue PIV cards, distinctions are evolving for PIV interoperable and PIV compatible cards, based mostly on whether the PKI certificate comes from a Certificate Authority (CA) approved through the federal bridge. PIV compatible cards issued by commercial enterprises would, like PIV cards, meet the FIPS 201 technical specifications but have digital certificates that are not cross-linked and therefore not interoperable with the federal government.

Robert Bunty, an IT policy consultant for the Commonwealth of Pennsylvania, reported the state has largely completed putting an infrastructure in place to issue and use PIV interoperable credentials for network security as part of its Identity Protection Access Management vision.   The next challenge is to get leadership buy-in and support to generate “the big MO” needed to issue and use the credentials statewide, Bunty said.

In addition to strong authentication for network security, many states in the National Capital Region see the FEMA-led initiative to create an interoperable First Responder Authentication Credential (FRAC) as the main motivation to start issuing PIV interoperable credentials. Mike McAllister of the Governor’s Office of Commonwealth Preparedness announced that Virginia would be starting its phase two program to issue an additional 2,000 FRAC credentials in December 2008 for emergency responders in Alexandria and Arlington County. Virginia was the first state to issue FRACs and has already issued 2,200, according to McAllister.

Several of the presenters at the Alliance conference applauded the efforts of FEMA’s Craig Wilson, coordinator for National Preparedness, for his leadership in programs to create a trusted, interoperable identity credential that can be used by federal, state and local authorities. To make sure every emergency response official (ERO) is ready to use a FRAC in a disaster, Wilson and his team have organized 13 demonstrations to test various emergency scenarios, including last week’s Autumn Rush in Gettysburg, Pennsylvania. The FRAC builds on the PIV standards and smart cards, but Wilson reminded attendees this is not about technology. It is about capability—enabling law enforcement officials to make an informed decision about whom they can trust and what they can do at a time of crisis. “We don’t want chaos on top of chaos,” Wilson said.

Enterprises are also moving into PIV cards for physical and logical access control. Northrop Grumman expects to fully badge 85 percent of its employees in 2009 with a PIV interoperable card called One Badge, and has already upgraded thousands of physical access control readers to work with the cards, according to Keith Ward of its System Integration and Automation division. 

Chris Williams of SAIC says about one-third of the company’s 44,000 employees have smart cards they use for logical access control. One interesting aspect is that all of them requested it, primarily as a replacement for one-time password (OTP) tokens. SAIC employees use the cards for strong authentication to desktops and networks, digital signature and encryption. Smart cards give employees more functionality at a lower cost than OTP tokens, Williams said.

The Smart Card Alliance Identity Council recently published a white paper, Using FIPS 201 and the PIV Card for the Corporate Enterprise, available for free at the Identity Council page on the Smart Card Alliance Web site at www.smartcardalliance.org, along with many other new whitepapers. Newly covered subjects include interoperable air transport identity credentials, what makes a smart card secure and emergency response official credentials (FRAC).

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Smart Card Application for HSPD-12 and FIPS-201 Compliance

    See More
  • TWIC and PIV Integration with Physical Access Control Systems

    See More
  • data privacy

    Which states are getting into the data privacy game?

    See More

Related Products

See More Products
  • 150 things.jpg

    The Handbook for School Safety and Security

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing