1. Analysis of Identity and Access Management alternatives for a multinational information-sharing environment
- Author
-
Cody Fleming, Patrick Maribojoc, Leah Procopi, Ned Selzer, Zach Calhoun, and Nicola Bezzo
- Subjects
Engineering ,National security ,business.industry ,Corporate governance ,Information sharing ,Computer security ,computer.software_genre ,Identity management ,Politics ,Multinational corporation ,Construct (philosophy) ,business ,Cyberspace ,computer - Abstract
In the 21st century, each country must make decisions on how to utilize modern technologies to maximize benefits and minimize repercussions. For example, the United States Department of Defense (DoD) needs to be able to share information efficiently with its allies while simultaneously preventing unwarranted access or attacks. These attacks pose a threat to the national security of the United States, but proper use of the cyberspace provides countless benefits. The aim of this paper is to explore Identity and Access Management (IdAM) technologies that the Department of Defense can use in joint operations with allies that will allow efficient information-sharing and enhance security. To this end, we have created a methodology and a model for evaluating Identity and Access Management technologies that the Department of Defense can use in joint operations with other nations, with a specific focus on Japan and Australia. To evaluate these systems, we employed an approach that incorporates Political, Operational, Economic and Technical (POET) factors. Governance protocols, technological solutions, and political factors were first thoroughly reviewed and then used to construct an evaluation model to formally assess Identity and Access Management alternatives. This model provides systematic guidance on how the Department of Defense can improve their use of Identity and Access Management systems in the future.
- Published
- 2017