UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

close
Already an Engineering360 user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your Engineering360 Experience

close
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

ARMY - DA PAM 25–2–13

Army Identity, Credential, and Access Management and Public Key Infrastructure Implementing Instructions

active, Most Current
Organization: ARMY
Publication Date: 8 April 2019
Status: active
Page Count: 69
scope:

Purpose

This pamphlet institutes identity, credential, and access management (ICAM) and Public Key Infrastructure (PKI) standards and procedures for all information technology (IT) capabilities used in and by the Army. It supports AR 25-2 in implementing Public Law 104-106 (known as the Clinger-Cohen Act); Title 10, United States Code, Section 2223 (10 USC 2223); DODI 8520.02; DODI 8520.03, and other guidance. These management processes involve strategic planning, routine operations, and information technology performance measurements.

Document History

DA PAM 25–2–13
April 8, 2019
Army Identity, Credential, and Access Management and Public Key Infrastructure Implementing Instructions
Purpose This pamphlet institutes identity, credential, and access management (ICAM) and Public Key Infrastructure (PKI) standards and procedures for all information technology (IT) capabilities used...

References

Advertisement