Enterprise Key Management Infrastructure (EKMI) Arshad Noor, Chair, EKMI TC OASIS IDtrust Workshop Barcelona, Spain October.

Slides:



Advertisements
Similar presentations
Database Security Policies and Procedures and Implementation for the Disaster Management Communication System Presented By: Radostina Georgieva Master.
Advertisements

Introduction to z/OS Security Lesson 4: There’s more to it than RACF
Notes: Update as of 1/13/2010. Vulnerabilities are included for SQL Server 2000, SQL Server 2005, SQL Server Oracle (8i, 9i, 9iR2, 10g, 10gR2,11g),
The OASIS IDtrust (I M The OASIS IDtrust (Identity and Trusted Infrastructure ) Member Section For more information please see:
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Exchange Network Key Management Services A Security Component February 28, 2005 The Exchange Network Node Mentoring Workshop.
Enterprise Key Management Infrastructures: Understanding them before auditing them Arshad Noor CTO, StrongAuth, Inc. Chair, OASIS EKMI-TC.
Figure 1: SDR / MExE Download Framework SDR Framework Network Server Gateway MExE Download + Verification Using MExE Repository (Java sandbox) MExE Applet.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Enterprise Key Management Infrastructure (EKMI) Arshad Noor CTO, StrongAuth, Inc. Chair, EKMI TC – OASIS
Enterprise Key Management Infrastructure: Understanding them before auditing them Arshad Noor CTO, StrongAuth, Inc. Chair, OASIS EKMI-TC.
Update on Interoperability Roadmap Comments Sections E, F, and G Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair March.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Copyright © 2015 Pearson Education, Inc. Confidentiality and Privacy Controls Chapter
Public Key Infrastructure from the Most Trusted Name in e-Security.
A Robust Health Data Infrastructure P. Jon White, MD Director, Health IT Agency for Healthcare Research and Quality
JVM Tehnologic Company profile & core business Founded: February 1992; –Core business: design and implementation of large software applications mainly.
Clinic Security and Policy Enforcement in Windows Server 2008.
Enterprise Privacy Architectures Leveraging Encryption to Keep Data Private Karim Toubba VP of Product Management Ingrian Networks.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
SODA Archiving October 2013
Enterprise Key Management Infrastructure: Understanding them before auditing them Arshad Noor, CTO, StrongAuth, Inc. Chair,
What is EKMI? Enterprise Key Management Infrastructure Take the tour.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Securing Data in Transit and Storage Sanjay Beri Co-Founder & Senior Director of Product Management Ingrian Networks.
KMIP - Hardware Security Modules Meta-Data-Only (MDO) Keys Saikat Saha & Denis Pochuev Feb 2012.
Security Policy and Key Management Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric. Tina Stewart, Vice President.
OASIS IDtrust Member Section June Leung Chair, OASIS IDtrust Member Section Steering Committee
Case study of XML based PKI management protocols. Tomas Gustavsson PrimeKey Solutions AB
Enterprise Key Management Infrastructure (EKMI) Securing data for e-Business and e-Government Arshad Noor, Co-Chair, EKMI-TC
Copyright © 2006, Oracle. All rights reserved Oracle Web Services Manager.
Clouding with Microsoft Azure
Web Security.
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
e-Health Platform End 2 End encryption
Module 8: Securing Network Traffic by Using IPSec and Certificates
MIS 5121: Real World Control Failure - TJX
CHAPTER 3 Architectures for Distributed Systems
BY GAWARE S.R. DEPT.OF COMP.SCI
CS691 M2009 Semester Project PHILIP HUYNH
RSA Key Manager Enterprise-wide Encryption Keys Management David Mateju RSA Sales Consultant
KMIP Key Management with Vormetric Data Security Manager
JP Morgan spends $500 million per year on cyber security
GENERAL BANK MANAGEMENT Technology Management
KMIP Key Management with Vormetric Data Security Manager
Enterprise Key Management with OASIS KMIP
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
12 E-Commerce Overview.
Anna Cottone, Scott Covington, Emma Pham, Tailai Zhang
Enabling Encryption for Data at Rest
Authentication Protocol
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Introduction to z/OS Security Lesson 4: There’s more to it than RACF
Enabling Encryption for Data at Rest
CS691 M2009 Semester Project PHILIP HUYNH
Organization for the Advancement of Structured Information Standards
Component-Based Software Engineering: Technologies, Development Frameworks, and Quality Assurance Schemes X. Cai, M. R. Lyu, K.F. Wong, R. Ko.
NAAS 2.0 Features and Enhancements
Goals Introduce the Windows Server 2003 family of operating systems
Searchable. Secure. Simple.
OASIS PKCS#11 RSA Conference 2018.
Public Key Infrastructure from the Most Trusted Name in e-Security
E-Commerce for Developing Countries (EC-DC)
RKL Remote key loading.
Module 8: Securing Network Traffic by Using IPSec and Certificates
Install AD Certificate Services
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Quality Assurance for Component-Based Software Development
RSA Digital Certificate Solutions RSA Solutions for PKI David Mateju RSA Sales Consultant
Presentation transcript:

Enterprise Key Management Infrastructure (EKMI) Arshad Noor, Chair, EKMI TC OASIS IDtrust Workshop Barcelona, Spain October 22,

Why do you need EKMI? Avoid going to jail UK's Regulation of Investigatory Powers (RIPA) Act 2000 Part 3 1 Avoid breach-related charges TJX charge of $216M 2 1: 2:

Why do you need EKMI? Regulatory Compliance PCI-DSS, PCSA, HIPAA, FISMA, SB-1386, etc. Impending Massachusetts H213 bill Avoiding fines - ChoicePoint $15M, Nationwide Building Society £1 M Avoiding lawsuits Accenture, BofA, TD Ameritrade, TJX (multiple) Avoiding negative publicity VA, IRS, Fidelity, E&Y, Citibank, BofA, WF, Ralph Lauren, UC, 300+ others

The Encryption Problem ● Define Policy ● Generate ● Encrypt ● Decrypt ● Escrow ● Authorize ● Recover ● Destroy ● Audit ● Define Policy ● Generate ● Encrypt ● Decrypt ● Escrow ● Authorize ● Recover ● Destroy ● Audit ● Define Policy ● Generate ● Encrypt ● Decrypt ● Escrow ● Authorize ● Recover ● Destroy ● Audit ● Define Policy ● Generate ● Encrypt ● Decrypt ● Escrow ● Authorize ● Recover ● Destroy ● Audit ● Define Policy ● Generate ● Encrypt ● Decrypt ● Escrow ● Authorize ● Recover ● Destroy ● Audit ● Define Policy ● Generate ● Encrypt ● Decrypt ● Escrow ● Authorize ● Recover ● Destroy ● Audit and on and on

Key Management Silos

EKMI Harmony

The Encryption Solution

What is an EKMI? An Enterprise Key Management Infrastructure is: “A collection of technology, policies and procedures for managing all cryptographic keys in the enterprise.”

EKMI Characteristics A single place to define EKM policy A single place to manage all keys Standard protocols for EKM services Platform and Application-independent Scalable to service millions of clients Available even when network fails Extremely secure

EKMI Components Public Key Infrastructure For digital certificate management; used for strong-authentication, and secure storage & transport of symmetric encryption keys Symmetric Key Management System SKS Server for symmetric key management SKCL for client interactions with SKS Server SKSML protocol EKMI = PKI + SKMS

SKMS Big-Picture DB Server Crypto Module Application Server Crypto Module SKCL C/C++ Application RPG Application Java Application Key Cache JNIRPGNI Server Client Network Client Application makes a request for a symmetric key 2. SKCL makes a digitally signed request to the SKS 3. SKS verifies SKCL request, generates, encrypts, digitally signs & escrows key in DB 4. Crypto HSM provides security for RSA Signing & Encryption keys of SKS 5. SKS responds to SKCL with signed and encrypted symmetric key 6. SKCL verifies response, decrypts key and hands it to the Client Application 7. Native (non-Java) applications make requests through Java Native Interface 77

The Sharing Problem - (DHS-PCII) DHS Personnel First Responder Encryption Key Private Sector PCI Data PCI Ciphertext Encryption Key shared out-of-band Internet + = Key shared out-of-band

The Sharing Problem - Multiplied Encryption Keys First Responders (50 States, Counties, 20,000+ Cities) DHS Personnel (180,000+) Private Sector PCI Data (Tens of thousands?)

The Sharing Problem - Solved* PCII Database SKS Server Internet DHS Personnel (180,000+) Private Sector PCI Data (Tens of thousands?) First Responders (50 States, Counties, 20,000+ Cities)

The Retail Solution Store N Back-Office Database Bank Settlement Fraud Analysis SKS Server WAN Store 1

The Healthcare Solution ER Application and Database Patient Registration SKS Server EMT N Laptop EMT 1 Laptop Wireless MAN AP ER Nurse

The Financial Solution

EKMI TC Goals Standardize Symmetric Key Services Markup Language (SKSML) Create Implementation & Operations Guidelines Create Audit Guidelines Create Interoperability Test-Suite

33 EKMI TC Members/Observers FundServ* MISMO NuParadigm Government Systems PA Consulting (UK) PrimeKey (Sweden) Red Hat StrongAuth* US Dept. of Defense Visa International* Wave Systems Wells Fargo WISeKey (Switzerland) OS Software company Database SW company PKI SW company (Canada) Storage/Security SW company Govt. Agency (New Zealand) Individuals representing Audit and Security backgrounds* * Founder Members

Burton Group on EKMI "The life cycle of encryption keys is incredibly important. As enterprises deploy ever-increasing numbers of encryption solutions, they often find themselves managing silos with inconsistent policies, availability, and strength of protection. Enterprises need to maintain keys in a consistent way across various applications and business units," said Trent Henry, senior analyst, Burton Group. "EKMI will be an important step in addressing this problem in an open, cross-vendor manner."

Conclusion “Securing the Core” should have been Plan A from the beginning – but its not too late for remediation OASIS EKMI TC is driving new key- management standards that cuts across platforms, applications and industries. Get involved!

Resources OASIS EKMI TC Resources Use Cases, SKSML Schema, Presentations, White Papers, Guidelines, etc. - Open Source SKMS implementation Article on SKMS in February 2007 issue of ISSA Journal