DoD's Identity and Access Management Strategy
As we look at enabling these new architectures and these capabilities that are going to get us to that military advantage, we need to figure out how to expand and extend those capabilities. We need to keep the same high level of assurance in the face of that near peer cyber adversary. Doing that and sort of pivoting to strong identity providers that can federate identity, be interoperable and carry forward this broader ecosystem of high quality high assurance authenticators. If we get that wrong, we can throw out the great assurance level we have with the common access card (CAC) that went with the background investigation of proofing that chip with a private key that's well protected, those are really fundamental parts.
Former, Chief of Identity Solutions, Office of the Department of Defense Chief Information Officer, Office of the Secretary of Defense