Share

Resources


SynchroCyber has a straightforward approach to support: We make it right. No matter the challenge, no matter the issues, we begin each engagement with a commitment to stay until our client is satisfied with the solution.

  • Streamlining Authentication and Identity Management Within The Federal Government  View
  • E-Authentication Guidelines for Federal Agencies  View
  • Electronic Signatures: How to Mitigate the Risk of Commercial Managed Services  View
  • Federal Identity Credentialing Committee – Federal Identity Management Handbook  View
  • Continued Implementation of HSPD-12 – Policy for a Common Identification Standard for Federal Employees and Contractors  View
  • Requirements for Accepting Externally-Issued Identity Credentials  View
  • Federal PKI FAQ on Transition to SHA-256  View
  • Lessons Learned from SHA-256 Transition  View
  • Federal Identity Credential and Access Management (FICAM) Roadmap and Implementation Guidance, Version 2  View
  • National Strategy for Trusted Identities in Cyberspace (NSTIC)  View
  • DRAFT – Personal Identity Verification (PIV) of Federal Employees and Contractors (FIPS 201-2)  View
  • Personal Identity Verification (PIV) of Federal Employees and Contractors (FIPS 201-1-chng1)  View
  • DRAFT – Cloud Computing Synopsis and Recommendations – SP 800-146  View
  • A NIST Definition of Cloud Computing – SP 800-145  View
  • Guidelines on Security and Privacy in Public Cloud Computing – SP 800-144  View
  • A recommendation for the Use of PIV Credentials in Physical Access Control Systems (PACS) – SP 800-116  View
  • Cryptographic Algorithms and Key Sizes for Personal Identity Verification (PIV) – SP 800-78-3  View
  • DRAFT Biometric Data Specification for Personal Identity Verification – SP 800-76-2  View
  • Biometric Data Specification for Personal Identity Verification – SP 800-76-1  View
  • Interfaces for Personal Identity Verification (4 Parts) SP 800-73-3
    • Part 1 – End Point PIV Card Application Namespace, Data Model & Representation  View
    • Part 2 – PIV Card Application Card Command Interface  View
    • Part 3 – PIV Client Application Programming Interface  View
    • Part 4 – The PIV Transitional Interface & Data Model Specification  View

Download our Capabilities Statement and Company Data

SynchroCyber Corporation

CyberSecurity | Identity and Access Management | HSPD-12 / PIV / Smart Cards

 James.Burke@SynchroCyber.com | 703.862.5500 (m) 703.649.6285 (f)

 17959 Dumfries Shopping Plaza, Suite 2B, Dumfries VA 22026

Description: cid:image003.png@01D14E92.E3071920