The Laws of Identity Kim Cameron Architect of Identity and Access Microsoft Corporation.

Slides:



Advertisements
Similar presentations
Seven Perspectives on CardSpace Ronny Bjones Security Strategist Microsoft Corporation.
Advertisements

Potential Smart Grid standardisation work in ETSI Security and privacy aspects Carmine Rizzo on behalf of Scott CADZOW, C3L © ETSI All rights reserved.
MicroKernel Pattern Presented by Sahibzada Sami ud din Kashif Khurshid.
Socioeconomics knowledge cafe Wrap-up. Agreed the list of socioeconomic themes/issues that have dependencies with RWI research priorities Standardization.
Current methods for negotiating firewalls for the Condor ® system Bruce Beckles (University of Cambridge Computing Service) Se-Chang Son (University of.
InfoCard and the Identity Metasystem Kim Cameron, Chief Architect of Identity Microsoft.
1 Privacy Prof. Ravi Sandhu Executive Director and Endowed Chair March 8, © Ravi Sandhu World-Leading Research.
EID Summer Summit 28 June 2005 EAP’s Sponsored and in Partnership with 7 Laws of Identity Kim Cameron Chief Architect of Identity and Access MS Corp, Redmond.
Project management Project manager must;
Sponsored by the U.S. Department of Defense © 2005 by Carnegie Mellon University 1 Pittsburgh, PA Dennis Smith, David Carney and Ed Morris DEAS.
OPSEC Awareness Briefing Man-In-The-Middle Attacks (MITM)
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Creating a Winning E-Business Second Edition
Copyright 2014 TOP TEN LEGAL ISSUES WITH. NUMBER 10: Are we friends?
Windows CardSpace and the Identity Metasystem Glen Gordon Developer Evangelist, Microsoft
OASIS Reference Model for Service Oriented Architecture 1.0
Digital Identity within E-Business and E-Government: Where are we now and Where do we go from here William Barnhill Booz Allen Hamilton.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
Using Digital Credentials On The World-Wide Web M. Winslett.
Computer Engineering 203 R Smith Requirements Management 6/ Requirements IEEE Standard Glossary A condition or capability needed by a user to solve.
The Laws of Identity and Cardspace Charles Young Solidsoft.
Security and Policy Enforcement Mark Gibson Dave Northey
Introduction to Research
The Identity Metasystem Caspar Bowden, Chief Privacy Advisor EMEA EMEA Technology Office on behalf of: Kim Cameron, Architect of Identity and Access Microsoft.
OpenID And the Future of Digital Identity Alicia Bozyk April 1, 2008.
Internet Protocol Security (IPSec)
Design Choices Underlying the Identity Metasystem Proposal Kim Cameron and Mike Jones Microsoft.
Microsoft Online and Cloud Services. Software Services Benefits from your on premise investments Ease and convenience of online access to services Power.
Terminal Services in Windows Server ® 2008 Infrastructure Planning and Design.
SECURITY REQUIREMENT FROM PROBLEM FRAMES PERPECTIVE Fabricio Braz 01/25/08.
Phishing Rising to the challenge Amy Marasco Microsoft.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Who are you? From Directories and Identity Silos to Ubiquitous User-Centric Identity Mike Jones, Microsoft and Dale Olds, Novell.
13-Sep-15: 1 Web Services Framework Paper by IBM and Microsoft Andrew Layman, XML Web Services Architect, Microsoft Copyright © 2001 Microsoft Corporation,
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
A Claims Based Identity System Steve Plank Identity Architect Microsoft UK.
Mobile data. Introduction Wireless (cellular) communications has experienced a tremendous growth in this decade. Most of the wireless users also access.
Identity Management Report By Jean Carreon and Marlon Gonzales.
INSTALLING MICROSOFT EXCHANGE SERVER 2003 CLUSTERS AND FRONT-END AND BACK ‑ END SERVERS Chapter 4.
Purpose of study A high-quality computing education equips pupils to use computational thinking and creativity to understand and change the world. Computing.
Introduction to Cloud Computing
Windows Azure Dave Glover Developer Evangelist Microsoft Australia Tel:
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
1 Issues in Assessment in Higher Education: Science Higher Education Forum on Scientific Competencies Medellin-Colombia Nov 2-4, 2005 Dr Hans Wagemaker.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
Geneva, Switzerland, September 2014 Identity Based Attestation and Open Exchange Protocol (IBOPS) Scott Streit Chief Scientist.
Disclosure risk when responding to queries with deterministic guarantees Krish Muralidhar University of Kentucky Rathindra Sarathy Oklahoma State University.
Enterprise Risk Management Chapter One Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
Telecom and Informatics 1 Security and Privacy in Distributed Services Trial lecture: Security and Privacy in Distributed Services Richard Torbjørn Sanders.
Distribution and components. 2 What is the problem? Enterprise computing is Large scale & complex: It supports large scale and complex organisations Spanning.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
Assurance service/engagement
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
Doing a CIM Project. 22 CIM Design Center  A rule I learned about applying technology:  Understand the design center of the technology.  Use extreme.
Introduction to Active Directory
Attribute Delivery - Level of Assurance Jack Suess, VP of IT
Role Of Network IDS in Network Perimeter Defense.
Securing Access to Data Using IPsec Josh Jones Cosc352.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Dr. Ir. Yeffry Handoko Putra
Stop Those Prying Eyes Getting to Your Data
Tactic 1: Adopt Least Privilege
The Laws of Identity Kim Cameron
Laws for Secure Credentialing
An Identity on the Internet
Building "One Size Fits All" Identity Systems Possible or Fantasy
Presentation transcript:

The Laws of Identity Kim Cameron Architect of Identity and Access Microsoft Corporation

Problem Statement The Internet was built without a way to know who and what you are connecting to –Everyone offering an internet service has had to come up with a workaround –Patchwork of identity one-offs –We have inadvertently taught people to be phished and pharmed –No fair blaming the user – no framework, no cues, no control We are Missing the identity layer Digital identity currently exists in a world without synergy because of identity silos

Criminalization of the Internet Greater use and greater value attract professionalized international criminal fringe –Understand ad hoc nature of identity patchwork –Phishing and Pharming (Phraud) at 1000% CAGR –Combine with stash attacks reported as identity loses… Unwinding of acceptance where we should be seeing progress. –Opportunity of moving beyond public-ation –Need to intervene so web services can get out of the starting gate The ad hoc nature of internet identity cannot withstand the growing assault of professionalized attackers –We can predict a deepening public crisis

From Patchwork to Identity Fabric The evolution to an identity fabric is hard –Partial successes in specific domains – SSL; Kerberos –But little agreement on what identity layer is or how it should be run Digital identity related to contexts Many contexts - each jealously guarded –Enterprises, governments, verticals prefer one-offs to loss of control –Individual is also a player – the key player – and has a veto Role of convenience, coolness, privacy, safety Nuanced and cogent privacy advocates in a world of pathetic identity loss No simplistic solution is realistic –Cross cultural and international problems are the final straw

An Identity Metasystem Diverse needs of players mean integrating multiple constituent technologies Not the first time weve seen this in computing –Think back to things as basic as abstract display services made possible through device drivers –Or the emergence of sockets and TCP/IP Unified Ethernet, Token Ring, Frame Relay, X.25 and even the uninvented wireless protocols We need a unifying identity metasystem –Protect applications from complexities of systems –Allow digital identity to be loosely coupled Avoid need to agree on dominant technologies a priori – they will emerge from the ecosystem

The role of The Laws… We must be able to structure our understanding of digital identity –We need a way to avoid returning to the Empty Page every time we talk about digital identity –We need to inform peoples thinking by teasing apart the factors and dynamics explaining the successes and failures of identity systems since the 1970s –We need to develop hypotheses – resulting from observation – that are testable and can be disproved –Our goals must be pragmatic, bounding our inquiry, with the aim of defining the characteristics of an unifying identity metasystem –The Laws of Identity offer a good way to express this thought –Beyond mere conversation, the Blogosphere offers us a crucible. The concept has been to employ this crucible to harden and deepen the laws.

Words to allow dialogue Digital Identity: A set of claims made by one digital subject about itself or another digital subject Digital Subject: A person or thing represented in the digital realm which is being described or dealt with –Devices, computers, resources, policies, relationships Claim: An assertion of the truth of something, typically one which is disputed or in doubt –An identifier –Knowledge of a secret –Personally identifying information –Membership in a given group (e.g. people under 16) –Even a capability These definitions embrace Kerberos, X.509, SAML, and newly emerging technologies

1. User Control and Consent Digital identity systems must only reveal information identifying a user with the users consent –Appeal by means of convenience and simplicity –Endure by earning the users trust Requires a holistic commitment Put the user in control of what identities are used and what information is released Protect against deception (destination and misuse) Inform user of auditing implications Retain paradigm of consent across all contexts

2. Minimal Disclosure for Limited Use The solution that discloses the least identifying information and best limits its use is the most stable long term solution –Consider Information breaches to be inevitable –To mitigate risk, acquire and store information on a need to know and need to retain basis –Less information implies less value implies less attraction implies less risk –Least identifying information includes: Reduction of cross-context information (universal identifiers) Use of claim transformation to reduce individuation (example of over an age threshold as compared to specific birth date –Limiting information hoarding for unspecified futures –Relation of this law to information catastrophes

3. Justifiable Parties Digital identity systems must limit disclosure of identifying information to parties having a necessary and justifiable place in a given identity relationship –The user must be aware of the party with whom information is being shared –Justification requirements apply both to the subject and to the relying party Example of Microsofts experience with Passport –In what contexts will use of government identities succeed and fail? –Same issues face intermediaries (but dont preclude them) –Parties to a disclosure must provide a statement about information use –Criminal investigation does not make the state a party to disclosure in the normal sense

4. Directed Identity A unifying identity metasystem must support both omni- directional identifiers for public entities and unidirectional identifiers for private entities –Digital identity is always asserted with respect to some other identity or set of identities –Public entities require well-known beacons Examples: web sites or public devices –Private entities (people) require the option to not be a beacon Unidirectional identifiers used in combination with a single beacon: no correlation handles –Example of Bluetooth and RFID – growing pushback –Wireless was also misdesigned in light of this law

5. Pluralism of Operators and Technologies A unifying identity metasystem must channel and enable the inter-working of multiple identity technologies run by multiple identity providers –Characteristics that make a system ideal in one context disqualify it in another –Example of government versus employer versus individual as consumer and human being –Craving for segregation of contexts –Important new technologies currently emerging – must not glue in a single technology or require fork- lift upgrade –Convergence can occur, but only when there is a platform (identity ecology) for that to happen in

6. Human Integration A unifying identity metasystem must define the human user as a component integrated through protected and unambiguous human-machine communications –Weve done a good job of securing the first 5,000 miles but allowed penetration of the last 2 feet –The channel between the display and the brain is under attack –Need to move from thinking about a protocol to thinking about a ceremony –Example of Channel 9 on United Airlines –How to achieve highest levels of reliability in communication between user and rest of system

7. Consistent Experience Across Contexts A unifying identity metasystem must provide a simple consistent experience while enabling separation of contexts through multiple operators and technologies –Need to thingify identities – make them things on the desktop so users can see them, inspect details, add and delete –What type of digital identity is acceptable in any context? Properties of potential candidates specified by the relying party Matching thingified identities presented to user, allow her to select one and understand information associated with it. –Single relying party may accept more than one type of identity –User can select best identity for the context Example of 401(k) portal in a large enterprise See this as the synergetic expression of all the laws

Contributors to the discussion Arun Nanda, Andre Durand, Bill Barnes, Carl Ellison, Caspar Bowden, Craig Burton, Dan Blum, Dave Kearn, Dave Winer, Dick Hardt, Doc Searls, Drummond Reed, Ellen McDermott, Eric Norlin, Ester Dyson, Fen Labalme, Identity Woman Kaliya, JC Cannon. James Kobielus, James Governor… Jamie Lewis, John Shewchuk, Luke Razzell, Marc Canter, Mark Wahl, Martin Taylor, Mike Jones, Phil Becker, Radovan Janocek, Ravi Pandya, Robert Scoble, Scott C. Lemon, Simon Davies, Stefan Brandt, Stuart Kwan and William Heath And others…

Conclusion Those of us working on and with identity systems need to obey the laws of identity Ignoring them results in unintended consequences. –Similar to what would happen if civil engineers ignored the laws of gravity By following the Laws of Identity we can build an identity metasystem that can be very widely accepted and enduring