Government Operating Environment By its nature, Government operates in a highly regulated environment. In most cases, individual Agencies make their own policies and procedures to comply with law or other directives. One of these major directives in the identity and credentials involves interoperability and the ability to provision a single, standardized credential that works across Government. The underlying directive has driven standardization of identity proofing, background processing, enrollment, and centralized credential management. Due to funding and other constraints, it has taken nearly two decades to upgrade legacy physical security infrastructure to approach compliance with certificate-management standards. A few other factors add more complexity to this highly regulated environment: identity management across the government and agencies; supporting both classified and unclassified work; trade compliance requirements. A single Agency may have different entities performing Management and Operations (M&O) at its individual Sites. Agencies may also have to handle personnel from a variety of organizations. Regulations US Government Homeland Security Directive – 12 Department of Defense Department of Energy Other Governments entities have similar requirements Industry Use Cases Manage Identities and Credentials across Own Agency, own Site Own Agency, different Site and/or M&O Contractor Other Agencies within the Government Private Company Personnel Foreign Government Personnel Visitors Process Security Clearances and Company Clearances Support related clearance processes – such as leave reporting Handle security incidents and infraction program Manage Foreign National Employees, Assignees and Visitors Have a badging program that supports a variety of credentials: PIV, CIV, Local Badging, Visitor Badging Perform default access management (based on Security Level/Layer) and support requested access for authorized personnel Manage need-to-know levels Protect sensitive unclassified information via personnel and physical security processes Conduct access audits and remove access in a timely manner Manage alarms coming from a variety of sources (such as video, intrusion detection sensors, access control alarms) and to acknowledge, assess, and resolve these alarms pursuant to airport policy Ability to correlate and quickly identify potentially malevolent behavior Solutions enTrilogy provides Solutions to solve these Govrenment-specific requirements, pain points, and risks.