National Public Safety Telecommunications Council
People and Vehicles : Firefighter, Policeman, Police cruiser, Ambulance
Vehicles : Fire truck, Ambulance, Police boat
People : Policemen
Towers : Towers on a ridge
Computers : monitor array
SAFECOM/CISA Document Publication: Identity, Credential, and Access Management (ICAM) Value Proposition Suite

SAFECOM Members,
We are pleased to announce the release of the Identity, Credential, and Access Management (ICAM) Value Proposition Suite of documents in collaboration with SAFECOM and the National Council of Statewide Interoperability Coordinators (NCSWIC).  This suite of five (5) documents introduces ICAM concepts, explores federated ICAM use-cases, and highlights the potential benefits for the public safety community.
Specifically, the ICAM Value Proposition Suite includes:
  • ICAM Value Proposition Overview – a high-level summary of federated ICAM benefits and domain-specific scenarios covered by other documents in the suite;
  • ICAM Value Proposition Scenario: Hurricane Response – presents federated ICAM use cases and potential benefits for disaster response operations such as hurricanes;
  • ICAM Value Proposition Scenario: Drug Response – outlines federated ICAM use cases and information sharing benefits for large-scale drug overdose epidemic (e.g., opioid, methamphetamine, and cocaine) prevention and response;
  • ICAM Value Proposition Scenario: School Shooting Response – provides federated ICAM use cases and information sharing benefits for an active shooter scenario (e.g., school shooting); and
  • ICAM Value Proposition Scenario: Bombing Response – illustrates information sharing benefits observed during the March 2018 Austin serial bombings.
  • The development of this document would not have been possible without your input, ideas, expertise, and commitment, and we sincerely thank you.  We are grateful for your contributions and are looking forward to continuing working with the you on future ICAM guidance.
    We encourage you to share these resources with your colleagues and others who might be interested in this document.
    Thank you again for your continued support of this document.
    Robert Rhoads
    Cybersecurity and Infrastructure Security Agency