ML24046A108: Difference between revisions

From kanterella
Jump to navigation Jump to search
(StriderTol Bot insert)
 
(StriderTol Bot change)
 
Line 27: Line 27:


Template Version 2.0 (03/2023)
Template Version 2.0 (03/2023)
Identity, Credential, and Access Management (ICAM)                               Version 1.1 Privacy Impact Assessment                                                         02/01/2024
Identity, Credential, and Access Management (ICAM) Version 1.1 Privacy Impact Assessment 02/01/2024


Document Revision History
Document Revision History


Date         Version         PIA Name/Description                 Author 02/01/2024   1.1             Revised based on change to the federal OCIO credentialing services USAccess 07/25/2023   1.0             Initial Release of ITI_ICAM PIA in new OCIO template                             Oasis Systems, LLC 07/13//2023 DRAFT           Draft Release - Completed ICAM PIA in OCIO new template                         Oasis Systems, LLC Identity, Credential, and Access Management (ICAM)                                                       Version 1.1 Privacy Impact Assessment                                                                               02/01/2024
Date Version PIA Name/Description Author 02/01/2024 1.1 Revised based on change to the federal OCIO credentialing services USAccess 07/25/2023 1.0 Initial Release of ITI_ICAM PIA in new OCIO template Oasis Systems, LLC 07/13//2023 DRAFT Draft Release - Completed ICAM PIA in OCIO new template Oasis Systems, LLC Identity, Credential, and Access Management (ICAM) Version 1.1 Privacy Impact Assessment 02/01/2024


Table of Contents
Table of Contents


1     Description                                                                                                                             1
1 Description 1


2     Authorities and Other Requirements                                                                                     3
2 Authorities and Other Requirements 3


3     Characterization of the Information                                                                                       3
3 Characterization of the Information 3


4     Data Security                                                                                                                         5
4 Data Security 5


5     Privacy Act Determination                                                                                                     7
5 Privacy Act Determination 7


6     Records and Information Management-Retention and Disposal                                           8
6 Records and Information Management-Retention and Disposal 8


7     Paperwork Reduction Act                                                                                                     12
7 Paperwork Reduction Act 12


8     Privacy Act Determination                                                                                                   13
8 Privacy Act Determination 13


9     OMB Clearance Determination                                                                                           14
9 OMB Clearance Determination 14


10   Records Retention and Disposal Schedule Determination                                                   15
10 Records Retention and Disposal Schedule Determination 15


11   Branch Chief Review and Concurrence                                                                               16 Identity, Credential, and Access Management (ICAM)                               Version 1.1 Privacy Impact Assessment                                                       02/01/2024
11 Branch Chief Review and Concurrence 16 Identity, Credential, and Access Management (ICAM) Version 1.1 Privacy Impact Assessment 02/01/2024


The agency is subject to the requirements of the E-Government Act and is committed to identifying and addressing privacy risks whenever it develops or makes changes to its information systems. The questions below help determine any privacy risks related to the E-Government Act or later guidance by the Office of Management and Budget (OMB) and the National Institute of Standards and Technology (NIST).
The agency is subject to the requirements of the E-Government Act and is committed to identifying and addressing privacy risks whenever it develops or makes changes to its information systems. The questions below help determine any privacy risks related to the E-Government Act or later guidance by the Office of Management and Budget (OMB) and the National Institute of Standards and Technology (NIST).
Line 69: Line 69:
Date Submitted for review/approval: February 6, 2024.
Date Submitted for review/approval: February 6, 2024.


1 Description
1 Description


1.1 Provide the description of the system/subsystem, technology (i.e., Microsoft Products), program, or other data collections (hereinafter referred to as project).
1.1 Provide the description of the system/subsystem, technology (i.e., Microsoft Products), program, or other data collections (hereinafter referred to as project).
Line 77: Line 77:


Please mark appropriate response below if your project/system will involve the following:
Please mark appropriate response below if your project/system will involve the following:
PowerApps                                   Public Website Dashboard                                   Internal Website SharePoint                                 Other (General Service Administrations USAccess PIV System)
PowerApps Public Website Dashboard Internal Website SharePoint Other (General Service Administrations USAccess PIV System)


PIA Template (03-2023)                                                                                                   1 Identity, Credential, and Access Management (ICAM)                               Version 1.1 Privacy Impact Assessment                                                       02/01/2024
PIA Template (03-2023) 1 Identity, Credential, and Access Management (ICAM) Version 1.1 Privacy Impact Assessment 02/01/2024


1.2 Does this privacy impact assessment (PIA) support a proposed new project, proposed modification to an existing project, or other situation? Select options that best apply in table below.
1.2 Does this privacy impact assessment (PIA) support a proposed new project, proposed modification to an existing project, or other situation? Select options that best apply in table below.
Line 95: Line 95:
(Do not adjust or change table fields. Annotate N/A if unknown. If multiple individuals need to be added in a certain field, please add lines where necessary.)
(Do not adjust or change table fields. Annotate N/A if unknown. If multiple individuals need to be added in a certain field, please add lines where necessary.)


Project     System           ISSO       Business     Technical     Executive Manager     Owner/Data                       Project     Project     Sponsor Owner/Steward                     Manager       Manager Name   TBD       Gwen Hayden     Julie Hughes     TBD       James Peyton   TBD Branden Jarrell Office           OCIO/ITSDOD     OCIO/CISD
Project System ISSO Business Technical Executive Manager Owner/Data Project Project Sponsor Owner/Steward Manager Manager Name TBD Gwen Hayden Julie Hughes TBD James Peyton TBD Branden Jarrell Office OCIO/ITSDOD OCIO/CISD
  /Division                             OCIO/CISD                   OCIO/CISD
/Division OCIO/CISD OCIO/CISD
  /Branch Telephone             301-287-0761     301-287-9277               301-287-0701 301-415-4074
/Branch Telephone 301-287-0761 301-287-9277 301-287-0701 301-415-4074


PIA Template (03-2023)                                                                                                   2 Identity, Credential, and Access Management (ICAM)                             Version 1.1 Privacy Impact Assessment                                                       02/01/2024 2 Authorities and Other Requirements
PIA Template (03-2023) 2 Identity, Credential, and Access Management (ICAM) Version 1.1 Privacy Impact Assessment 02/01/2024 2 Authorities and Other Requirements


2.1 What specific legal authorities and/or agreements permit the collection of information for the project?
2.1 What specific legal authorities and/or agreements permit the collection of information for the project?


Provide all statutory and regulatory authorities for operating the project, including the authority to collect the information; NRC internal policy is not a legal authority. Please mark appropriate response in table below.
Provide all statutory and regulatory authorities for operating the project, including the authority to collect the information; NRC internal policy is not a legal authority. Please mark appropriate response in table below.
Mark with an X on all that             Authority                       Citation/Reference apply.
Mark with an X on all that Authority Citation/Reference apply.
Statute                         N/A Executive Order                 Homeland Security Presidential Directive 12 Federal Regulation             N/A Memorandum of                   N/A Understanding/Agreement Other (summarize and provide a copy of relevant     OMB Memorandum M-22-09 portion) 2.2 Explain how the information will be used under the authority listed above (i.e., enroll employees in a subsidies program to provide subsidy payment).
Statute N/A Executive Order Homeland Security Presidential Directive 12 Federal Regulation N/A Memorandum of N/A Understanding/Agreement Other (summarize and provide a copy of relevant OMB Memorandum M-22-09 portion) 2.2 Explain how the information will be used under the authority listed above (i.e., enroll employees in a subsidies program to provide subsidy payment).


The purpose of ICAM and the data it collects is to identify applicants and verify identity information provided by those applicants in support of a request for electronic credentials for access to federal facilities, networks, computer systems, and Internet-based e-Government applications.
The purpose of ICAM and the data it collects is to identify applicants and verify identity information provided by those applicants in support of a request for electronic credentials for access to federal facilities, networks, computer systems, and Internet-based e-Government applications.
Line 113: Line 113:
ICAM may require the use of Social Security Number (SSN) information for confirmation of applicant identity or for federal processing requirements. All SSN data is encrypted to applicable federal standards at rest and during transmission.
ICAM may require the use of Social Security Number (SSN) information for confirmation of applicant identity or for federal processing requirements. All SSN data is encrypted to applicable federal standards at rest and during transmission.


3 Characterization of the Information
3 Characterization of the Information


In the table below, mark the categories of individuals for whom information is collected.
In the table below, mark the categories of individuals for whom information is collected.
Line 119: Line 119:
Licensees Other - N/A
Licensees Other - N/A


PIA Template (03-2023)                                                                                                   3 Identity, Credential, and Access Management (ICAM)                     Version 1.1 Privacy Impact Assessment                                               02/01/2024
PIA Template (03-2023) 3 Identity, Credential, and Access Management (ICAM) Version 1.1 Privacy Impact Assessment 02/01/2024


In the table below, is a list of the most common types of PII collected. Mark all PII that is collected and stored by the project/system. If there is additional PII not defined in the table below, a comprehensive listing of PII is provided for further reference in ADAMS at the following link: PII Reference Table 2023.
In the table below, is a list of the most common types of PII collected. Mark all PII that is collected and stored by the project/system. If there is additional PII not defined in the table below, a comprehensive listing of PII is provided for further reference in ADAMS at the following link: PII Reference Table 2023.
Categories of Information o
Categories of Information o
                                    'cense Number t                             License Plate Number Citizenship                           Passport numb ality                             tives Information Taxpayer Identification Number ress                             Credit/Der ti Alien R Ethnicity Informati                       Criminal History Personaress                     entifiers (facial images, fingerprints, i Personal Bank Account Number         Emergency e.g., a third party to contact in case of an emerg Personal Mobile Nu                 Accommodation/disabi Other - N/A
'cense Number t License Plate Number Citizenship Passport numb ality tives Information Taxpayer Identification Number ress Credit/Der ti Alien R Ethnicity Informati Criminal History Personaress entifiers (facial images, fingerprints, i Personal Bank Account Number Emergency e.g., a third party to contact in case of an emerg Personal Mobile Nu Accommodation/disabi Other - N/A


3.1 Describe how the data is collected for the project. (i.e., NRC Form, survey, questionnaire, existing NRC files/ databases, response to a background check).
3.1 Describe how the data is collected for the project. (i.e., NRC Form, survey, questionnaire, existing NRC files/ databases, response to a background check).
Line 133: Line 133:
In addition, External Partner company names are verified against Secretary of State business records and company affiliation is verified through a telephonic employment check.
In addition, External Partner company names are verified against Secretary of State business records and company affiliation is verified through a telephonic employment check.


PIA Template (03-2023)                                                                                                   4 Identity, Credential, and Access Management (ICAM)                             Version 1.1 Privacy Impact Assessment                                                       02/01/2024
PIA Template (03-2023) 4 Identity, Credential, and Access Management (ICAM) Version 1.1 Privacy Impact Assessment 02/01/2024


3.2 If using a form to collect the information, provide the form number, title and/or a link.
3.2 If using a form to collect the information, provide the form number, title and/or a link.
Line 139: Line 139:
N/A.
N/A.


3.3 Who provides the information? Is it provided directly from the individual or a third party.
3.3 Who provides the information? Is it provided directly from the individual or a third party.


Directly from the individual. For internal staff, information is collected from the PSATS and FPPS to ensure accuracy and consistency of information used for identity credentials.
Directly from the individual. For internal staff, information is collected from the PSATS and FPPS to ensure accuracy and consistency of information used for identity credentials.
Line 147: Line 147:
Directly from the individual.
Directly from the individual.


3.5 Will PII data be used in a test environment? If so, explain the rationale.
3.5 Will PII data be used in a test environment? If so, explain the rationale.


N/A.
N/A.
Line 155: Line 155:
Users have access to EIH SailPoint IdentityIQ which allows them to update personal information such as name and home contact information, Office location & phone numbers, organizational information such as position and organization information, as well as the ability to update emergency contact information.
Users have access to EIH SailPoint IdentityIQ which allows them to update personal information such as name and home contact information, Office location & phone numbers, organizational information such as position and organization information, as well as the ability to update emergency contact information.


4 Data Security 4.1 Describe who has access to the data in the project (i.e., internal NRC, system administrators, external agencies, contractors, public).
4 Data Security 4.1 Describe who has access to the data in the project (i.e., internal NRC, system administrators, external agencies, contractors, public).


System administrators with a need-to-know.
System administrators with a need-to-know.
Line 163: Line 163:
NRC e-Government applications may have access to External Partner credential information when a controlled access mechanism is available.
NRC e-Government applications may have access to External Partner credential information when a controlled access mechanism is available.


PIA Template (03-2023)                                                                                                   5 Identity, Credential, and Access Management (ICAM)                               Version 1.1 Privacy Impact Assessment                                                         02/01/2024
PIA Template (03-2023) 5 Identity, Credential, and Access Management (ICAM) Version 1.1 Privacy Impact Assessment 02/01/2024


4.3 If the project/system connects, receives, or shares information with any external non-NRC partners or systems, identify what is being shared.
4.3 If the project/system connects, receives, or shares information with any external non-NRC partners or systems, identify what is being shared.
Line 191: Line 191:
Headquarters and all Regions.
Headquarters and all Regions.


4.8 Can the project be accessed by a contractor? If so, do they possess an NRC badge?
4.8 Can the project be accessed by a contractor? If so, do they possess an NRC badge?


Yes, contractors possess a badge and PIV card.
Yes, contractors possess a badge and PIV card.
Line 199: Line 199:
All privileged role holders must meet qualifications and sign special Rules of Behavior for Trusted Persons which are periodically renewed. Private Key recovery requires a minimum of two authorized administrators with administrator certificates and key recovery privilege. Defined system security events trigger email alerts. Viewing audit data requires administrator privileges.
All privileged role holders must meet qualifications and sign special Rules of Behavior for Trusted Persons which are periodically renewed. Private Key recovery requires a minimum of two authorized administrators with administrator certificates and key recovery privilege. Defined system security events trigger email alerts. Viewing audit data requires administrator privileges.


PIA Template (03-2023)                                                                                                   6 Identity, Credential, and Access Management (ICAM)                         Version 1.1 Privacy Impact Assessment                                                   02/01/2024
PIA Template (03-2023) 6 Identity, Credential, and Access Management (ICAM) Version 1.1 Privacy Impact Assessment 02/01/2024


4.10 Describe if the project has the capability to identify, locate, and monitor (i.e.,
4.10 Describe if the project has the capability to identify, locate, and monitor (i.e.,
Line 216: Line 216:
Estimated date:
Estimated date:
Yes Indicate the data impact levels (Low, Moderate, High, Undefined) approved by the Chief Information Security Officer (CISO)
Yes Indicate the data impact levels (Low, Moderate, High, Undefined) approved by the Chief Information Security Officer (CISO)
Confidentiality- Moderate Integrity- Moderate Availability- Moderate 4.13 Provide the NRC system Enterprise Architecture (EA)/Inventory number. If unknown, contact EA Service Desk to get the EA/Inventory number.
Confidentiality-Moderate Integrity-Moderate Availability-Moderate 4.13 Provide the NRC system Enterprise Architecture (EA)/Inventory number. If unknown, contact EA Service Desk to get the EA/Inventory number.


The ITI EA# is 20090005.
The ITI EA# is 20090005.


5 Privacy Act Determination 5.1 Is the data collected retrieved by a personal identifier?
5 Privacy Act Determination 5.1 Is the data collected retrieved by a personal identifier?


Mark the appropriate response.
Mark the appropriate response.
Line 229: Line 229:
Name e PII is noersonal  
Name e PII is noersonal  


PIA Template (03-2023)                                                                                                   7 Identity, Credential, and Access Management (ICAM)                           Version 1.1 Privacy Impact Assessment                                                     02/01/2024
PIA Template (03-2023) 7 Identity, Credential, and Access Management (ICAM) Version 1.1 Privacy Impact Assessment 02/01/2024


5.2 For all collections where the information is retrieved by a personal identifier, the Privacy Act requires that the agency publish a System of Record Notice (SORN) in the Federal Register. As per the Privacy Act of 1974, "the term 'system of records' means a group of any records under the control of any agency from which information is retrieved by the name of the individual or by some other personal identifier assigned to the individual.
5.2 For all collections where the information is retrieved by a personal identifier, the Privacy Act requires that the agency publish a System of Record Notice (SORN) in the Federal Register. As per the Privacy Act of 1974, "the term 'system of records' means a group of any records under the control of any agency from which information is retrieved by the name of the individual or by some other personal identifier assigned to the individual.
Line 248: Line 248:
Options Privacy Act Statement (insert link to PAS)
Options Privacy Act Statement (insert link to PAS)
Privacy Advisory (insert link to Privacy Advisory)
Privacy Advisory (insert link to Privacy Advisory)
Not Applicable Unknown 5.4 Is providing the PII mandatory or voluntary? What is the effect on the individual by not providing the information?
Not Applicable Unknown 5.4 Is providing the PII mandatory or voluntary? What is the effect on the individual by not providing the information?


Mandatory via PSATS and FPPS.
Mandatory via PSATS and FPPS.


6 Records and Information Management-Retention and Disposal
6 Records and Information Management-Retention and Disposal


The National Archives and Records Administration (NARA), in collaboration with federal agencies, approves whether records are Temporary (eligible at some point for destruction/deletion because they no longer have business value) or Permanent (eligible at some point to be transferred to the National Archives because of historical or evidential
The National Archives and Records Administration (NARA), in collaboration with federal agencies, approves whether records are Temporary (eligible at some point for destruction/deletion because they no longer have business value) or Permanent (eligible at some point to be transferred to the National Archives because of historical or evidential


PIA Template (03-2023)                                                                                                   8 Identity, Credential, and Access Management (ICAM)                             Version 1.1 Privacy Impact Assessment                                                       02/01/2024
PIA Template (03-2023) 8 Identity, Credential, and Access Management (ICAM) Version 1.1 Privacy Impact Assessment 02/01/2024


significance). Records/data and information with historical value, identified as having a permanent disposition, are transferred to the National Archives of the United States at the end of their retention period. All other records identified as having a temporary disposition are destroyed at the end of their retention period in accordance with the NARA Records Schedule or the General Records Schedule.
significance). Records/data and information with historical value, identified as having a permanent disposition, are transferred to the National Archives of the United States at the end of their retention period. All other records identified as having a temporary disposition are destroyed at the end of their retention period in accordance with the NARA Records Schedule or the General Records Schedule.
Line 269: Line 269:
* Involves a cloud solution,
* Involves a cloud solution,
* And/or if there are additional questions regarding Records and Information Management
* And/or if there are additional questions regarding Records and Information Management
      - Retention and Disposal, please contact the NRC Records staff at ITIMPolicy.Resource@nrc.gov for further guidance.
- Retention and Disposal, please contact the NRC Records staff at ITIMPolicy.Resource@nrc.gov for further guidance.


If the project/system has a record retention schedule or an automated RIM functionality, please complete the questions below.
If the project/system has a record retention schedule or an automated RIM functionality, please complete the questions below.
Line 276: Line 276:
NURE10, NRC Comprecords Disposition Schedule NARAs General Records Sched duled
NURE10, NRC Comprecords Disposition Schedule NARAs General Records Sched duled


PIA Template (03-2023)                                                                                                   9 Identity, Credential, and Access Management (ICAM)                               Version 1.1 Privacy Impact Assessment                                                       02/01/2024
PIA Template (03-2023) 9 Identity, Credential, and Access Management (ICAM) Version 1.1 Privacy Impact Assessment 02/01/2024


6.2 If so, cite the schedule number, approved disposition, and describe how this is accomplished.
6.2 If so, cite the schedule number, approved disposition, and describe how this is accomplished.


System Name (include sub-systems,         ICAM platforms, or other locations where the same data resides)
System Name (include sub-systems, ICAM platforms, or other locations where the same data resides)


Records Retention Schedule                 GRS 5.6 - Security Records, items 120, 121, and Number(s)                                 130
Records Retention Schedule GRS 5.6 - Security Records, items 120, 121, and Number(s) 130


GRS 5.6 item 120 - Personal identification credentials and cards. Application and activation records.
GRS 5.6 item 120 - Personal identification credentials and cards. Application and activation records.
Line 294: Line 294:
GRS 3.2 Information Systems Security Records
GRS 3.2 Information Systems Security Records


Approved Disposition Instructions         GRS 3.1 - General Technology Management Records See all related dispositions.
Approved Disposition Instructions GRS 3.1 - General Technology Management Records See all related dispositions.


GRS 3.2 Information Systems Security Records See all related dispositions.
GRS 3.2 Information Systems Security Records See all related dispositions.
Line 311: Line 311:
Destroy upon immediate collection once the temporary credential or card is returned for potential reissuance due to nearing expiration or not to exceed 6 months from time of issuance or when individual no longer requires access,
Destroy upon immediate collection once the temporary credential or card is returned for potential reissuance due to nearing expiration or not to exceed 6 months from time of issuance or when individual no longer requires access,


PIA Template (03-2023)                                                                                                 10 Identity, Credential, and Access Management (ICAM)                                 Version 1.1 Privacy Impact Assessment                                                         02/01/2024
PIA Template (03-2023) 10 Identity, Credential, and Access Management (ICAM) Version 1.1 Privacy Impact Assessment 02/01/2024


whichever is sooner, but longer retention is authorized if required for business use.
whichever is sooner, but longer retention is authorized if required for business use.


Is there a current automated functionality   No or a manual process to support RIM requirements? This includes the ability to apply records retention and disposition policies in the system(s) to support records accessibility, reliability, integrity, and disposition.
Is there a current automated functionality No or a manual process to support RIM requirements? This includes the ability to apply records retention and disposition policies in the system(s) to support records accessibility, reliability, integrity, and disposition.


Disposition of Temporary Records             TBD
Disposition of Temporary Records TBD


Will the records/data or a composite be automatically or manually deleted once they reach their approved retention?
Will the records/data or a composite be automatically or manually deleted once they reach their approved retention?


Disposition of Permanent Records             TBD
Disposition of Permanent Records TBD


Will the records be exported to an approved format and transferred to the National Archives based on approved retention and disposition instructions?
Will the records be exported to an approved format and transferred to the National Archives based on approved retention and disposition instructions?
Line 329: Line 329:
NRC Transfer Guidance (Information and Records Management Guideline - IRMG)
NRC Transfer Guidance (Information and Records Management Guideline - IRMG)


PIA Template (03-2023)                                                                                                 11 Identity, Credential, and Access Management (ICAM)                               Version 1.1 Privacy Impact Assessment                                                       02/01/2024 7 Paperwork Reduction Act
PIA Template (03-2023) 11 Identity, Credential, and Access Management (ICAM) Version 1.1 Privacy Impact Assessment 02/01/2024 7 Paperwork Reduction Act


The Paperwork Reduction Act (PRA) of 1995 requires that agencies obtain an Office of Management and Budget (OMB) approval in the form of a "control number"before promulgating a paper form, website, surveys, questionnaires, or electronic submission from 10 or members of the public. If the data collection is from federal employees regarding work-related duties, then a PRA clearance is not necessary.
The Paperwork Reduction Act (PRA) of 1995 requires that agencies obtain an Office of Management and Budget (OMB) approval in the form of a "control number"before promulgating a paper form, website, surveys, questionnaires, or electronic submission from 10 or members of the public. If the data collection is from federal employees regarding work-related duties, then a PRA clearance is not necessary.
Line 347: Line 347:
Note: For information collection (OMB clearances) questions: contact the NRCs Clearance Officer. Additional guidance can be found on the NRCs internal Information Collections Web page at: https://intranet.nrc.gov/ocio/33456.
Note: For information collection (OMB clearances) questions: contact the NRCs Clearance Officer. Additional guidance can be found on the NRCs internal Information Collections Web page at: https://intranet.nrc.gov/ocio/33456.


PIA Template (03-2023)                                                                                                 12 Identity, Credential, and Access Management (ICAM) Version 1.1 Privacy Impact Assessment 02/01/2024 PIA Template (03-2023) 138 Privacy Act Determination Project/System Name: Information Technology Infrastructure (ITI) Identity, Credential, and Access Management (ICAM).
PIA Template (03-2023) 12 Identity, Credential, and Access Management (ICAM) Version 1.1 Privacy Impact Assessment 02/01/2024 PIA Template (03-2023) 138 Privacy Act Determination Project/System Name: Information Technology Infrastructure (ITI) Identity, Credential, and Access Management (ICAM).
Submitting Office: Office of the Chief Information Officer (OCIO).
Submitting Office: Office of the Chief Information Officer (OCIO).
Privacy Officer Review Review Results Action Items This project/system does not contain PII. No further action is necessary for Privacy.
Privacy Officer Review Review Results Action Items This project/system does not contain PII. No further action is necessary for Privacy.
This project/system does contain PII; the Privacy Act does NOT apply, since information is NOT retrieved by a personal identifier.Must be protected with restricted access to those with a valid need-to-know.
This project/system does contain PII; the Privacy Act does NOT apply, since information is NOT retrieved by a personal identifier.Must be protected with restricted access to those with a valid need-to-know.
This project/system does contain PII; the Privacy Act does apply.SORN is required- Information is retrieved by a personal identifier.
This project/system does contain PII; the Privacy Act does apply.SORN is required-Information is retrieved by a personal identifier.
Comments:
Comments:
Covered by System of Records NRC 45 - Electronic Credentials for Personal Identity Verification Reviewers Name Title Privacy Officer Signed by Hardy, Sally on 02/27/24
Covered by System of Records NRC 45 - Electronic Credentials for Personal Identity Verification Reviewers Name Title Privacy Officer Signed by Hardy, Sally on 02/27/24
Line 359: Line 359:
Currently has OMB Clearance. Clearance No.
Currently has OMB Clearance. Clearance No.
Comments:
Comments:
The OMB clearance to approve the collection of information from external partners is in process.
The OMB clearance to approve the collection of information from external partners is in process.
Reviewers Name Title Agency Clearance Officer Signed by Cullison, David on 02/26/24
Reviewers Name Title Agency Clearance Officer Signed by Cullison, David on 02/26/24


Line 374: Line 374:
Chief Information Security Officer Cyber Information Security Division Office of the Chief Information Officer Signed by Feibus, Jonathan on 02/27/24
Chief Information Security Officer Cyber Information Security Division Office of the Chief Information Officer Signed by Feibus, Jonathan on 02/27/24


Identity, Credential, and Access Management (ICAM)                             Version 1.1 Privacy Impact Assessment                                                       02/01/2024
Identity, Credential, and Access Management (ICAM) Version 1.1 Privacy Impact Assessment 02/01/2024


ADDITIONAL ACTION ITEMS/CONCERNS
ADDITIONAL ACTION ITEMS/CONCERNS


Name of Project/System: Information Technology Infrastructure (ITI) Identity, Credential, and Access Management (ICAM)
Name of Project/System: Information Technology Infrastructure (ITI) Identity, Credential, and Access Management (ICAM)


Date CISD received PIA for review:             Date CISD completed PIA review:
Date CISD received PIA for review: Date CISD completed PIA review:


February 15, 2024                             February 26, 2024
February 15, 2024 February 26, 2024


Action Items/Concerns:
Action Items/Concerns:
Line 392: Line 392:
Jonathan Feibus Chief Information Security Officer Cyber Information Security Division Office of the Chief Information Officer
Jonathan Feibus Chief Information Security Officer Cyber Information Security Division Office of the Chief Information Officer


PIA Template (03-2023)                                                                                                 17}}
PIA Template (03-2023) 17}}

Latest revision as of 16:08, 5 October 2024

Information Technology Infrastructure (Iti) Identity, Credential, and Access Management (ICAM) Pia
ML24046A108
Person / Time
Issue date: 02/01/2024
From:
NRC/OCIO
To:
Jarrell B
References
Download: ML24046A108 (20)


Text

U.S. Nuclear Regulatory Commission

Privacy Impact Assessment Information Technology Infrastructure (ITI)

Identity, Credential, and Access Management (ICAM)

Office of the Chief Information Officer (OCIO)

Version 1.0 02/01/2024

Instruction Notes:

Please do not enter the PIA document into ADAMS. An ADAMS accession number will be assigned through the e-Concurrence system which will be handled by the Privacy Team

Template Version 2.0 (03/2023)

Identity, Credential, and Access Management (ICAM) Version 1.1 Privacy Impact Assessment 02/01/2024

Document Revision History

Date Version PIA Name/Description Author 02/01/2024 1.1 Revised based on change to the federal OCIO credentialing services USAccess 07/25/2023 1.0 Initial Release of ITI_ICAM PIA in new OCIO template Oasis Systems, LLC 07/13//2023 DRAFT Draft Release - Completed ICAM PIA in OCIO new template Oasis Systems, LLC Identity, Credential, and Access Management (ICAM) Version 1.1 Privacy Impact Assessment 02/01/2024

Table of Contents

1 Description 1

2 Authorities and Other Requirements 3

3 Characterization of the Information 3

4 Data Security 5

5 Privacy Act Determination 7

6 Records and Information Management-Retention and Disposal 8

7 Paperwork Reduction Act 12

8 Privacy Act Determination 13

9 OMB Clearance Determination 14

10 Records Retention and Disposal Schedule Determination 15

11 Branch Chief Review and Concurrence 16 Identity, Credential, and Access Management (ICAM) Version 1.1 Privacy Impact Assessment 02/01/2024

The agency is subject to the requirements of the E-Government Act and is committed to identifying and addressing privacy risks whenever it develops or makes changes to its information systems. The questions below help determine any privacy risks related to the E-Government Act or later guidance by the Office of Management and Budget (OMB) and the National Institute of Standards and Technology (NIST).

Name/System/Subsystem/Service Name:

Identity, Credential, and Access Management (ICAM).

Data Storage Location (i.e., Database Server, SharePoint, Cloud, Other Government Agency, Power Platform):

Database Server, SharePoint, Other Government Agency (GSA).

Date Submitted for review/approval: February 6, 2024.

1 Description

1.1 Provide the description of the system/subsystem, technology (i.e., Microsoft Products), program, or other data collections (hereinafter referred to as project).

Explain the reason the project is being created.

ICAM is a robust set of identity and credentialing services built on industry standard commercial off-the-shelf software running on the Nuclear Regulatory Commission (NRC) standard computing platforms. ICAM delivers Public Key Infrastructure (PKI) and One-Time Password (OTP) credentials to internal staff, contractors, and external partners. In addition, it provides single sign-on (SSO), identity management, and attribute synchronization services. ICAM includes processes for verifying the identity of certificate applicants, securely issuing certificates and keys, and revoking certificates in a timely manner. ICAM also escrows encryption keys of employees and contractors to prevent loss of data in the event a users data encryption key becomes unavailable. ICAM is a Privacy Act System of Records, identified as NRC-45, as defined by the Privacy Act of 1974.

Please mark appropriate response below if your project/system will involve the following:

PowerApps Public Website Dashboard Internal Website SharePoint Other (General Service Administrations USAccess PIV System)

PIA Template (03-2023) 1 Identity, Credential, and Access Management (ICAM) Version 1.1 Privacy Impact Assessment 02/01/2024

1.2 Does this privacy impact assessment (PIA) support a proposed new project, proposed modification to an existing project, or other situation? Select options that best apply in table below.

Mark appropriate response.

Status Options New system/project Modification to an existing system/project.

If modifying or making other updates to an existing system/project, provide the ADAMS ML of the existing PIA and describe the modification.

Annual Review If making minor edits to an existing system/project, briefly describe the changes below.

The NRC has transitioned its Personal Identity Verification (PIV) card system from an internally hosted system to the General Service Administrations (GSA) USAccess PIV System.

Other (explain)

1.3 Points of

Contact:

(Do not adjust or change table fields. Annotate N/A if unknown. If multiple individuals need to be added in a certain field, please add lines where necessary.)

Project System ISSO Business Technical Executive Manager Owner/Data Project Project Sponsor Owner/Steward Manager Manager Name TBD Gwen Hayden Julie Hughes TBD James Peyton TBD Branden Jarrell Office OCIO/ITSDOD OCIO/CISD

/Division OCIO/CISD OCIO/CISD

/Branch Telephone 301-287-0761 301-287-9277 301-287-0701 301-415-4074

PIA Template (03-2023) 2 Identity, Credential, and Access Management (ICAM) Version 1.1 Privacy Impact Assessment 02/01/2024 2 Authorities and Other Requirements

2.1 What specific legal authorities and/or agreements permit the collection of information for the project?

Provide all statutory and regulatory authorities for operating the project, including the authority to collect the information; NRC internal policy is not a legal authority. Please mark appropriate response in table below.

Mark with an X on all that Authority Citation/Reference apply.

Statute N/A Executive Order Homeland Security Presidential Directive 12 Federal Regulation N/A Memorandum of N/A Understanding/Agreement Other (summarize and provide a copy of relevant OMB Memorandum M-22-09 portion) 2.2 Explain how the information will be used under the authority listed above (i.e., enroll employees in a subsidies program to provide subsidy payment).

The purpose of ICAM and the data it collects is to identify applicants and verify identity information provided by those applicants in support of a request for electronic credentials for access to federal facilities, networks, computer systems, and Internet-based e-Government applications.

If the project collects Social Security numbers, state why this is necessary and how it will be used.

ICAM may require the use of Social Security Number (SSN) information for confirmation of applicant identity or for federal processing requirements. All SSN data is encrypted to applicable federal standards at rest and during transmission.

3 Characterization of the Information

In the table below, mark the categories of individuals for whom information is collected.

Category of individual Federal employees Contractors Members of the Public (any individual other than a federal employee, consultant, or contractor)

Licensees Other - N/A

PIA Template (03-2023) 3 Identity, Credential, and Access Management (ICAM) Version 1.1 Privacy Impact Assessment 02/01/2024

In the table below, is a list of the most common types of PII collected. Mark all PII that is collected and stored by the project/system. If there is additional PII not defined in the table below, a comprehensive listing of PII is provided for further reference in ADAMS at the following link: PII Reference Table 2023.

Categories of Information o

'cense Number t License Plate Number Citizenship Passport numb ality tives Information Taxpayer Identification Number ress Credit/Der ti Alien R Ethnicity Informati Criminal History Personaress entifiers (facial images, fingerprints, i Personal Bank Account Number Emergency e.g., a third party to contact in case of an emerg Personal Mobile Nu Accommodation/disabi Other - N/A

3.1 Describe how the data is collected for the project. (i.e., NRC Form, survey, questionnaire, existing NRC files/ databases, response to a background check).

For internal staff, information is collected from the PSATS and FPPS to ensure accuracy and consistency of information used for identity credentials. Information from the PSATS and/or FPPS is a data transfer. Information is collected from online registration and paper submissions completed by the applicant. Information is also collected through the General Service Administrations USAccess PIV System.

For External Partner applicants, the provided identity information may be validated using an external service that accesses one or more authoritative repositories intended for identity verification.

In addition, External Partner company names are verified against Secretary of State business records and company affiliation is verified through a telephonic employment check.

PIA Template (03-2023) 4 Identity, Credential, and Access Management (ICAM) Version 1.1 Privacy Impact Assessment 02/01/2024

3.2 If using a form to collect the information, provide the form number, title and/or a link.

N/A.

3.3 Who provides the information? Is it provided directly from the individual or a third party.

Directly from the individual. For internal staff, information is collected from the PSATS and FPPS to ensure accuracy and consistency of information used for identity credentials.

3.4 Explain how the accuracy of the data collection is validated. If the project does not check for accuracy, please explain why.

Directly from the individual.

3.5 Will PII data be used in a test environment? If so, explain the rationale.

N/A.

3.6 What procedures are in place to allow the subject individual to correct inaccurate or erroneous information?

Users have access to EIH SailPoint IdentityIQ which allows them to update personal information such as name and home contact information, Office location & phone numbers, organizational information such as position and organization information, as well as the ability to update emergency contact information.

4 Data Security 4.1 Describe who has access to the data in the project (i.e., internal NRC, system administrators, external agencies, contractors, public).

System administrators with a need-to-know.

4.2 If the project/system shares information with any other NRC systems, identify the system, what information is being shared and the method of sharing.

NRC e-Government applications may have access to External Partner credential information when a controlled access mechanism is available.

PIA Template (03-2023) 5 Identity, Credential, and Access Management (ICAM) Version 1.1 Privacy Impact Assessment 02/01/2024

4.3 If the project/system connects, receives, or shares information with any external non-NRC partners or systems, identify what is being shared.

Identify what agreements are in place in the table below.

Agreement Type Contract Provide Contract Number:

License Provide License Information:

Memorandum of Understanding Provide ADAMS ML number for MOU:

Other

  • Online searches for copies of an individuals public digital certificate using the Public Certificate Repository portion of the ICAM system; and
  • Data transmitted to the Office of Personnel Management (OPM) as part of the vetting process for internal applicants. OPM has access only to the data transmitted, not to the system.
  • The Public Certificate Repository is made available to all agencies, organizations, and the public. The Office of Personnel Management (OPM)

Fingerprint Transaction System receives transmitted applicant data.

4.4 Describe how the data is accessed and describe the access control mechanisms that prevent misuse.

Data can only be accessed through privileged accounts and a PIV card.

4.5 Explain how the data is transmitted and how confidentiality is protected (i.e.,

encrypting the communication or by encrypting the information before it is transmitted).

ICAM transmits content to staff over the NRCs ITI internal network. ICAM communicates with General Service Administrations USAccess PIV System for data transfer. The data is encrypted and so is the communication.

4.6 Describe where the data is being stored (i.e., NRC, Cloud, Contractor Site).

Stored at NRC database.

4.7 Explain if the project can be accessed or operated at more than one location.

Headquarters and all Regions.

4.8 Can the project be accessed by a contractor? If so, do they possess an NRC badge?

Yes, contractors possess a badge and PIV card.

4.9 Explain the auditing measures and technical safeguards in place to prevent misuse of data.

All privileged role holders must meet qualifications and sign special Rules of Behavior for Trusted Persons which are periodically renewed. Private Key recovery requires a minimum of two authorized administrators with administrator certificates and key recovery privilege. Defined system security events trigger email alerts. Viewing audit data requires administrator privileges.

PIA Template (03-2023) 6 Identity, Credential, and Access Management (ICAM) Version 1.1 Privacy Impact Assessment 02/01/2024

4.10 Describe if the project has the capability to identify, locate, and monitor (i.e.,

trace/track/observe) individuals.

No.

4.11 Define which FISMA boundary this project is part of.

ICAM is a subsystem of the Information Technology Infrastructure (ITI) boundary.

4.12 Is there an Authority to Operate (ATO) associated with this project/system?

Authorization Status Unknown No If no, please note that the authorization status must be reported to the Chief Information Security Officer (CISO) and Computer Security Organization (CSOs)

Point of Contact (POC) via e-mail quarterly to ensure the authorization remains on track.

In Progress provide the estimated date to receive an ATO.

Estimated date:

Yes Indicate the data impact levels (Low, Moderate, High, Undefined) approved by the Chief Information Security Officer (CISO)

Confidentiality-Moderate Integrity-Moderate Availability-Moderate 4.13 Provide the NRC system Enterprise Architecture (EA)/Inventory number. If unknown, contact EA Service Desk to get the EA/Inventory number.

The ITI EA# is 20090005.

5 Privacy Act Determination 5.1 Is the data collected retrieved by a personal identifier?

Mark the appropriate response.

Response

is retrieved by a persoe.e., ina address, SSN, etc.)

List the l be used to rn on the vidual.

Name e PII is noersonal

PIA Template (03-2023) 7 Identity, Credential, and Access Management (ICAM) Version 1.1 Privacy Impact Assessment 02/01/2024

5.2 For all collections where the information is retrieved by a personal identifier, the Privacy Act requires that the agency publish a System of Record Notice (SORN) in the Federal Register. As per the Privacy Act of 1974, "the term 'system of records' means a group of any records under the control of any agency from which information is retrieved by the name of the individual or by some other personal identifier assigned to the individual.

Mark the appropriate response in the table below.

Response

Yes, this system is covered by an existing SORN. (See existing SORNs:

https://www.nrc.gov/reading-rm/foia/privacy-systems.html )

Provide the SORN name, number, and link to the Federal Register Notice. (List all SORNs that apply):

NRC 45 - Electronic Credentials for Personal Identity Verification SORN is in progress SORN needs to be created Unaware of an existing SORN No, this system is not a system of records and a SORN is not applicable.

5.3 When an individual is asked to provide personal data (i.e., form, webpage, survey), is a Privacy Act Statement (PAS) provided?

A Privacy Act Statement is a disclosure statement required to appear on documents used by agencies when an individual is asked to provide personal data. It is required for any forms, surveys, or other documents, including electronic forms, used to solicit personal information from individuals that will be maintained in a system of records.

Mark the appropriate response.

Options Privacy Act Statement (insert link to PAS)

Privacy Advisory (insert link to Privacy Advisory)

Not Applicable Unknown 5.4 Is providing the PII mandatory or voluntary? What is the effect on the individual by not providing the information?

Mandatory via PSATS and FPPS.

6 Records and Information Management-Retention and Disposal

The National Archives and Records Administration (NARA), in collaboration with federal agencies, approves whether records are Temporary (eligible at some point for destruction/deletion because they no longer have business value) or Permanent (eligible at some point to be transferred to the National Archives because of historical or evidential

PIA Template (03-2023) 8 Identity, Credential, and Access Management (ICAM) Version 1.1 Privacy Impact Assessment 02/01/2024

significance). Records/data and information with historical value, identified as having a permanent disposition, are transferred to the National Archives of the United States at the end of their retention period. All other records identified as having a temporary disposition are destroyed at the end of their retention period in accordance with the NARA Records Schedule or the General Records Schedule.

These determinations are made through records retention schedules and NARA statutes (44 United States Code (U.S.C.), 36 Code of Federation Regulations (CFR)). Under 36 CFR, agencies are required to establish procedures for addressing Records and Information Management (RIM) requirements. This includes strategies for establishing and managing recordkeeping requirements and disposition instructions before approving new electronic information systems or enhancements to existing systems.

The following questions are intended to determine whether the records/data and information in the system have approved records retention schedules and disposition instructions, whether the system incorporates RIM strategies including support for NARAs Universal Electronic Records Management (ERM) requirements, and if a mitigation strategy is needed to ensure compliance.

If the project/system:

  • Does not have an approved records retention schedule and/or
  • Does not have an automated RIM functionality,
  • Involves a cloud solution,
  • And/or if there are additional questions regarding Records and Information Management

- Retention and Disposal, please contact the NRC Records staff at ITIMPolicy.Resource@nrc.gov for further guidance.

If the project/system has a record retention schedule or an automated RIM functionality, please complete the questions below.

6.1 Does this project map to an applicable retention schedule in NRCs Comprehensive Records Disposition Schedule (NUREG-0910), or NARAs General Records Schedules?

NURE10, NRC Comprecords Disposition Schedule NARAs General Records Sched duled

PIA Template (03-2023) 9 Identity, Credential, and Access Management (ICAM) Version 1.1 Privacy Impact Assessment 02/01/2024

6.2 If so, cite the schedule number, approved disposition, and describe how this is accomplished.

System Name (include sub-systems, ICAM platforms, or other locations where the same data resides)

Records Retention Schedule GRS 5.6 - Security Records, items 120, 121, and Number(s) 130

GRS 5.6 item 120 - Personal identification credentials and cards. Application and activation records.

GRS 5.6 item 121 - Cards

GRS 5.6 item 130 - Temporary and local facility identification and card access records.

GRS 3.1 - General Technology Management Records

GRS 3.2 Information Systems Security Records

Approved Disposition Instructions GRS 3.1 - General Technology Management Records See all related dispositions.

GRS 3.2 Information Systems Security Records See all related dispositions.

GRS 5.6 item 120 Personal identification credentials and cards.

Application and activation records.

Temporary.

Destroy 6 years after the end of an employee or contractors tenure, but longer retention is authorized if required for business use.

GRS 5.6 item 121 Cards.

Temporary.

Destroy after expiration, confiscation, or return.

GRS 5.6 item 130 Temporary and local facility identification and card access records.

Temporary.

Destroy upon immediate collection once the temporary credential or card is returned for potential reissuance due to nearing expiration or not to exceed 6 months from time of issuance or when individual no longer requires access,

PIA Template (03-2023) 10 Identity, Credential, and Access Management (ICAM) Version 1.1 Privacy Impact Assessment 02/01/2024

whichever is sooner, but longer retention is authorized if required for business use.

Is there a current automated functionality No or a manual process to support RIM requirements? This includes the ability to apply records retention and disposition policies in the system(s) to support records accessibility, reliability, integrity, and disposition.

Disposition of Temporary Records TBD

Will the records/data or a composite be automatically or manually deleted once they reach their approved retention?

Disposition of Permanent Records TBD

Will the records be exported to an approved format and transferred to the National Archives based on approved retention and disposition instructions?

If so, what formats will be used?

NRC Transfer Guidance (Information and Records Management Guideline - IRMG)

PIA Template (03-2023) 11 Identity, Credential, and Access Management (ICAM) Version 1.1 Privacy Impact Assessment 02/01/2024 7 Paperwork Reduction Act

The Paperwork Reduction Act (PRA) of 1995 requires that agencies obtain an Office of Management and Budget (OMB) approval in the form of a "control number"before promulgating a paper form, website, surveys, questionnaires, or electronic submission from 10 or members of the public. If the data collection is from federal employees regarding work-related duties, then a PRA clearance is not necessary.

7.1 Will the project be collecting any information from 10 or more persons who are not Federal employees?

Yes.

7.2 Is there any collection of information addressed to all or a substantial majority of an industry?

No.

7.3 Is the collection of information required by a rule of general applicability?

No.

Note: For information collection (OMB clearances) questions: contact the NRCs Clearance Officer. Additional guidance can be found on the NRCs internal Information Collections Web page at: https://intranet.nrc.gov/ocio/33456.

PIA Template (03-2023) 12 Identity, Credential, and Access Management (ICAM) Version 1.1 Privacy Impact Assessment 02/01/2024 PIA Template (03-2023) 138 Privacy Act Determination Project/System Name: Information Technology Infrastructure (ITI) Identity, Credential, and Access Management (ICAM).

Submitting Office: Office of the Chief Information Officer (OCIO).

Privacy Officer Review Review Results Action Items This project/system does not contain PII. No further action is necessary for Privacy.

This project/system does contain PII; the Privacy Act does NOT apply, since information is NOT retrieved by a personal identifier.Must be protected with restricted access to those with a valid need-to-know.

This project/system does contain PII; the Privacy Act does apply.SORN is required-Information is retrieved by a personal identifier.

Comments:

Covered by System of Records NRC 45 - Electronic Credentials for Personal Identity Verification Reviewers Name Title Privacy Officer Signed by Hardy, Sally on 02/27/24

Identity, Credential, and Access Management (ICAM) Version 1.1 Privacy Impact Assessment 02/01/2024 PIA Template (03-2023) 149 OMB Clearance Determination NRC Clearance Officer Review Review Results No OMB clearance is needed.

OMB clearance is needed.

Currently has OMB Clearance. Clearance No.

Comments:

The OMB clearance to approve the collection of information from external partners is in process.

Reviewers Name Title Agency Clearance Officer Signed by Cullison, David on 02/26/24

Identity, Credential, and Access Management (ICAM) Version 1.1 Privacy Impact Assessment 02/01/2024 PIA Template (03-2023) 1510 Records Retention and Disposal Schedule Determination Records Information Management Review Review Results No record schedule required.

Additional information is needed to complete assessment.

Needs to be scheduled.

Existing records retention and disposition schedule covers the system - no modifications needed.

Comments:

Reviewers Name Title Sr. Program Analyst, Electronic Records Manager Signed by Dove, Marna on 02/23/24

Identity, Credential, and Access Management (ICAM) Version 1.1 Privacy Impact Assessment 02/01/2024 PIA Template (03-2023) 1611 Branch Chief Review and Concurrence Review Results This project/system does not collect, maintain, or disseminate information in identifiable form.

This project/system does collect, maintain, or disseminate information in identifiable form.

I concur with the Privacy Act, Information Collections, and Records Management reviews.

Chief Information Security Officer Cyber Information Security Division Office of the Chief Information Officer Signed by Feibus, Jonathan on 02/27/24

Identity, Credential, and Access Management (ICAM) Version 1.1 Privacy Impact Assessment 02/01/2024

ADDITIONAL ACTION ITEMS/CONCERNS

Name of Project/System: Information Technology Infrastructure (ITI) Identity, Credential, and Access Management (ICAM)

Date CISD received PIA for review: Date CISD completed PIA review:

February 15, 2024 February 26, 2024

Action Items/Concerns:

Copies of this PIA will be provided to:

Gwendolyn Hayden Acting Director IT Services Development and Operations Division Office of the Chief Information Officer

Jonathan Feibus Chief Information Security Officer Cyber Information Security Division Office of the Chief Information Officer

PIA Template (03-2023) 17