PIV cards and identity controls provided by Xceedium, now owned by CA Technologies, are already in use by many government agencies, who use the technology to provide authenticated access for both modern systems like the cloud and legacy systems.
“By using our platform, [agencies] were able to bridge these smart cards, PIV and CaC authentication methods, to next generation systems like cloud and virtualization, as well as legacy systems like mainframes and classic work stations,” explained Ken Ammon, senior advisor at CA Technologies, formerly of Xceedium, in an interview with FierceGovernmentIT.
CA Technologies won’t necessarily be providing the PIV cards and identity controls for CDM – the award has yet to be announced – but in any case, the existing solution in government agencies is the best model for how it might look in CDM, Ammon related.
Other important aspects of privileged access are behavior management and user privileges. Ammon noted that many times breaches occur it’s because a user has the same system identity for low-security needs like email and high-security needs like database management.