ICIF Concept

  • Introduction
  • How to Use
  • What Is ICIF?
  • Who Can Benefit?
  • The Challenge
    • The IS&S Landscape Today
    • A Mandate for Cooperation
    • Building on Prior Successes
  • ICIF and the Terrorism-Related ISE
  • Guiding Principles
  • Assertion-Based Approach
    • The ABA Defined
    • ABA Capabilities in Brief
    • ABA and the Guiding Principles
  • How to Use the ABA
    • Example: New Jersey ISE
    • Example: National Identity Exchange Federation
  • ABA Capabilities
    • Assertion Authoring & Publishing Capability
    • Assertion Assessor Capability
    • Assertion Operational Infrastructure Capability
    • Agreement Builder Capability
  • Legal Aspects
  • ABA Exemplar
    • Origins of the Trustmark Framework
    • Trustmark Framework in Detail
    • Mapping the Trustmark Framework to the ABA

The IS&S Challenge

According to the 2012 National Strategy for Information Sharing and Safeguarding (NSISS):

Our national security depends on our ability to share the right information, with the right people, at the right time. This information sharing mandate requires sustained and responsible collaboration between Federal, state, local, tribal, territorial, private sector, and foreign partners. Over the last few years, we have successfully streamlined policies and processes, overcome cultural barriers, and better integrated information systems to enable information sharing. Today’s dynamic operating environ­ment, however, challenges us to continue improving information sharing and safeguarding processes and capabilities. While innovation has enhanced our ability to share, increased sharing has created the potential for vulnerabilities requiring strengthened safeguarding practices.

The technology innovation has provided us with better ways to integrate systems and share information with implementing robust safeguarding measures. Again, according to NSISS:

Our ability to share information and safeguarding is stronger and more adaptable when government departments and agencies partner with one another and industry to identify and reuse the best solutions already at the government’s disposal and to develop standards-based technologies that support multiple missions and communities. Stakeholders are encouraged to work with industry to develop and acquire tools and technologies leveraging information sharing and safeguarding standards. Federal acquisition policies, including grant policies, should facilitate and reward collaboration between departments and agencies resulting in reuse of existing services and encouraging development of enterprise-wide acquisition priorities.

Navigation

  • Introduction
  • How to Use
  • What Is ICIF?
  • Who Can Benefit?
  • The Challenge
    • The IS&S Landscape Today
    • A Mandate for Cooperation
    • Building on Prior Successes
  • ICIF and the Terrorism-Related ISE
  • Guiding Principles
  • Assertion-Based Approach
    • The ABA Defined
    • ABA Capabilities in Brief
    • ABA and the Guiding Principles
  • How to Use the ABA
    • Example: New Jersey ISE
    • Example: National Identity Exchange Federation
  • ABA Capabilities
    • Assertion Authoring & Publishing Capability
    • Assertion Assessor Capability
    • Assertion Operational Infrastructure Capability
    • Agreement Builder Capability
  • Legal Aspects
  • ABA Exemplar
    • Origins of the Trustmark Framework
    • Trustmark Framework in Detail
    • Mapping the Trustmark Framework to the ABA

Copyright © 2025 · Focus Pro on Genesis Framework · WordPress · Log in