The Army took another step closer toward its Zero Trust network security architecture goals this week, awarding a development contract for software prototypes to support Tactical-Identity Credential and Access Management, or T-ICAM.

T-ICAM is expected to significantly enhance the security of systems in the tactical environment, as well as interoperability between systems and applications. A critical element of ICAM gives Soldiers authorized access to information through a new identity-based security model, which incorporates authoritative user identities and protection measures across the Army’s Unified Network, in both the enterprise and tactical environments. User access is based on least-privilege, need-to-know Zero Trust principles that presume the network is already compromised.

As part of the Unified Network Operations (NetOps) program, known as (UNO), the service will leverage the T-ICAM prototypes to demonstrate the technical and operational feasibility of extending commercial ICAM capabilities — including Army Enterprise (E)-ICAM capabilities such as authoritative identity directories — to tactical units in denied, disconnected, intermittent, and limited bandwidth (DDIL) operational environments.

In line with DoD and Army Zero Trust architecture principles and strategies, ICAM will be a fundamental element of systems that connect to the Army’s Unified Network.

“We have to assume that malicious cyber-attacks and degraded network environments will be a constant threat in future Large Scale Combat Operations,” said Mr. Mark Kitz, program executive officer for Command, Control, Communications-Tactical (PEO C3T), the office of primary responsibility for the Army’s Enterprise and Tactical ICAM capabilities. “Tactical-ICAM will enhance our defenses by more securely and effectively providing network and specific data access only to authorized users, devices, applications and services, even in the harshest operational environments. Simultaneously, it will prevent adversaries from accessing our network sites and services.”

Following an extensive market research and source selection process, PEO C3T awarded the UNO T-ICAM OTA on April 4, 2024, through the Consortium Management Group (CMG) via the C5 Program Management Office, to Akamai Technologies, Inc., a non-traditional defense contractor with extensive experience providing modular security services to Fortune 500 companies, U.S. banks and all branches of the U.S. military. OTAs give the DoD the flexibility necessary to adopt and more rapidly incorporate new technology and business practices based on commercial industry standards and best practices.

Earlier this year, the Army Acquisition Executive authorized the T-ICAM effort to be managed using the DOD’s new Software Acquisition Pathway, which requires an agile software development approach using constant Soldier feedback to make rapid enhancements to the software. As part of this path, the Army will leverage operational units to support field assessments on the initial T-ICAM prototypes beginning this fiscal year and will incorporate the Soldier feedback into future updates. After T-ICAM has further matured, the Army will conduct a larger rollout of the new capability, which, on the current timeline, is expected in the next 12-18 months.

See the news here.

Ad



Not Yet a Premium Partner/Sponsor? Learn more about the OS AI Premium Corporate and Individual Plans here. Plans start at $250 annually.

How useful was this post?

Click on a star to rate it!

We are sorry that this post was not useful for you!

Let us improve this post!

Tell us how we can improve this post?

Leave a Reply