Attachment | Size |
---|---|
ACT-IAC ICAM.pdf | 1.01 MB |
Abstract
Identity, Credential, and Access Management (ICAM) plays a crucial role in managing and securing access to digital and physical resources. ICAM supports an organization’s mission by reducing the chances of successful cyber-attacks across the organization’s information systems and facilities. A well-structured ICAM program reduces costs, simplifies user management, secures access to information, and protects resources across organizations.
This report provides concepts, implementation examples, and best practices for federal citizen-to-government ICAM use cases, focused on providing identity proofing solutions that can be leveraged by two or more agencies. This report was prepared by the American Council for Technology – Industry Advisory Council (ACT-IAC) in collaboration with the Better Identity Coalition (BIC).