White House updates identity, credential and access management policy

The Trump administration is revising how agencies should conduct identity proofing, establish digital identities and adopt processes for authentication and access control.
ICAM, authentication, identity, credential, access management
(Getty Images)

The Trump administration has updated the government’s policy for identity, credential and access management, with an emphasis on making individual agencies more responsible for how people are authenticated to use their networks.

New technologies have simultaneously improved federal operations and exposed more personally identifiable information on social media and through breaches, prompting the new ICAM policy. Specifically, the White House memo revises how agencies should conduct identity proofing, establish digital identities and adopt processes for authentication and access control.

While Personal Identity Verification (PIV) credentials remain the standard for accessing federal information systems and facilities, over time agencies must shift to managing identities themselves, according to the Office of Personnel Management. Agencies are expected to pilot new authenticators and ensure they have the ability to revoke access and destroy credentials when an employee leaves or a relationship with a contractor ends.


The memo directs agencies to accept PIV credentials from other agencies through electronic verification, instead of issuing new ones. PIV credentials should also be used for digital signatures and information encryption.

“While hardening the perimeter is important, agencies must shift from simply managing access inside and outside of the perimeter to using identity as the underpinning for managing the risk posed by attempts to access federal resources made by users and information systems,” reads the memo.

Long term, agencies are moving away from their focus on a perimeter in favor of zero-trust networks that continuously authorize all devices, users and flows.

Agencies must designate an ICAM office, team or structure that includes personnel from multiple offices including their chief information officers’ for oversight of governmentwide requirements. They must also develop an ICAM policy, process and tech solution roadmap.

Any ICAM capability deployed should be interchangeable, use commercially available products and leverage application programming interfaces to promote interoperability, according to the memo.


Best in Class and Tier 2 contract vehicles, shared services, and the Continuous Diagnostics and Mitigation program can all be used to procure ICAM capabilities.

The memo also aims to limit how often users have to disclose privacy data to access government services.

The General Services Administration has three months to publish and maintain a catalog of ICAM solutions and shared services agencies can use, while the Department of Homeland Security is tasked with leading research and development coordination between agencies and industry to fill tech gaps.

Dave Nyczepir

Written by Dave Nyczepir

Dave Nyczepir is a technology reporter for FedScoop. He was previously the news editor for Route Fifty and, before that, the education reporter for The Desert Sun newspaper in Palm Springs, California. He covered the 2012 campaign cycle as the staff writer for Campaigns & Elections magazine and Maryland’s 2012 legislative session as the politics reporter for Capital News Service at the University of Maryland, College Park, where he earned his master’s of journalism.

Latest Podcasts