Who are you? What information are you allowed to access? Where do you live? What financial assistance are you eligible for? How much do you owe the government? Are you qualified to do that job? Can I verify the information you provided is accurate?

When it comes to online transactions, these questions are difficult for government organizations to answer. And yet, verified credentials are required to enable government efficiency efforts over the next decade. Whether streamlining health records, processing taxes, verifying unemployment benefits, approving student loans, planning transportation needs, accessing criminal justice records, issuing business licenses, reforming correctional facilities or improving dozens of other processes, the use of identity management and provisioning is an essential component to lasting improvements in business processes.

Getting this right won’t be easy. Similar opportunities about single sign-ons were discussed in the ’90s. Privacy groups also raise legitimate concerns about centralized identity management solutions that must be addressed.

Progress has been slow — with only pockets of success across the nation. State and local governments still face many challenges to implementing federated digital identities that are trusted by the public and private sectors. Some of these challenges include value proposition and benefits, defining the business drivers, building the architecture and standards, enrollment process and issuance, funding and acquisition, and sourcing options.

Meanwhile, the federal government has made steady progress in the past eight years, e.g., the Federal Public Key Infrastructure Policy Authority (2002); First Responder Authentication Credential (2006); Federal Identity, Credentialing and Access Management (2009); Cyberspace Policy Review (2009); and The National Strategy for Trusted Identities in Cyberspace (2010 draft).

What must governments do now? For one, partner with groups like NASCIO on this topic. According to the association’s leadership, we can’t afford to work alone or on proprietary systems. We must have solutions that interoperate across all governments using a federated approach that’s competitively sourced. One answer includes adopting the Federal Identity, Credential and Access Management Roadmap and Implementation Guidance as a framework. Most state technology funds come from the federal government, so states must work closely with federal partners in this area. NASCIO created several working groups on identity and access management with emphasis on identity assurance. Another goal is to streamline federally funded and state-administered programs’ business processes to obtain cost reductions. Establishing trustworthy digital identities paves the way for many government efficiency efforts. The level of trust must match the situation. The time to act is now. ¨

Dan Lohrmann is Michigan’s CTO and was the state’s first chief information security officer. He has 25 years of worldwide security experience, and has won numerous awards for his leadership in the information security field. 

Dan Lohrmann Dan Lohrmann  |  Contributing Writer

Daniel J. Lohrmann became Michigan's first chief security officer (CSO) and deputy director for cybersecurity and infrastructure protection in October 2011. Lohrmann is leading Michigan's development and implementation of a comprehensive security strategy for all of the state’s resources and infrastructure. His organization is providing Michigan with a single entity charged with the oversight of risk management and security issues associated with Michigan assets, property, systems and networks.

Lohrmann is a globally recognized author and blogger on technology and security topics. His keynote speeches have been heard at worldwide events, such as GovTech in South Africa, IDC Security Roadshow in Moscow, and the RSA Conference in San Francisco. He has been honored with numerous cybersecurity and technology leadership awards, including “CSO of the Year” by SC Magazine and “Public Official of the Year” by Governing magazine.