The Pentagon has a vision of future warfare that requires a network it calls Joint All-Domain Command and Control (JADC2). The network would enable access to a cloud-like computing environment in which even warfighters at the tactical edge could obtain quick access to whatever information they need. However, there is a challenge to implementing the network that must be overcome. The system needs a reliable Identity, Credential and Access Management (ICAM) tool that can assure only legitimate users are tapping into the network. In the absence of such a tool, either the wrong actors might get in or the right actors might be kept out. Either way, that would defeat the purpose of JADC2. I have written a commentary for Forbes here.
Find Archived Articles: