1 PKI Buy vs. Build Decision at UW-Madison Presented by Nicholas Davis PKI Project Leader UWMadison, Division of Information Technology.

Slides:



Advertisements
Similar presentations
Conducting your own Data Life Cycle Audit
Advertisements

Planning Reports and Proposals
NIMS ICS All-Hazard Position Specific Training – A Way Forward A Special Presentation for the All Hazards IMT Conference Houston, Texas November 4.
1 Nia Sutton Becta Total Cost of Ownership of ICT in schools.
Managing Hardware and Software Assets
© Copyright 2006 FPT Software 1 © FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 How to work in Fsoft project Authors: KienNT.
Chapter 14 Intranets & Extranets. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES Introduction Technical Infrastructure Planning an Intranet.
Operations Management Maintenance and Reliability Chapter 17
Lousy Introduction into SWITCHaai
ASYCUDA Overview … a summary of the objectives of ASYCUDA implementation projects and features of the software for the Customs computer system.
By Rick Clements Software Testing 101 By Rick Clements
1 Introduction to Transportation Systems. 2 PART I: CONTEXT, CONCEPTS AND CHARACTERIZATI ON.
1 The Academic Profession and the Managerial University: An International Comparative Study from Japan Akira Arimoto Research Institute for Higher Education.
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Seminar on Standardization and ICT Development for the Information.
Module N° 7 – Introduction to SMS
Public B2B Exchanges and Support Services
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Digital Signatures in State of Tennessee Pam Roberts Finance & Administration Office for Information Resources Planning, Research & Development.
Webinar: June 6, :00am – 11:30am EDT The Community Eligibility Option.
Presenter:Dr. Maureen White Developer: Dr. Chuck Wiseley 12/9/10 1.
PKI Solutions: Buy vs. Build David Wasley, U. California (ret.) Jim Jokl, U. Virginia Nick Davis, U. Wisconsin.
1 Early Intervention Central Billing Office Electronic Claims Submission.
1 Implementing Internet Web Sites in Counseling and Career Development James P. Sampson, Jr. Florida State University Copyright 2003 by James P. Sampson,
Presented by Brad Jacobson The Publisher on the Web Exploiting the new online sales channels.
1 Auto Club Group ACG Direct Mail Program September 21, 2009.
| Copyright © 2009 Juniper Networks, Inc. | 1 WX Client Rajoo Nagar PLM, WABU.
RTI International RTI International is a trade name of Research Triangle Institute. Enhancing an Organizations Capabilities for Technical Assistance.
1 Quality Indicators for Device Demonstrations April 21, 2009 Lisa Kosh Diana Carl.
1 Contract Inactivation & Replacement Fly-in Action ( Continue to Page Down/Click on each page…) Electronic Document Access (EDA)
1. 2 August Recommendation 9.1 of the Strategic Information Technology Advisory Committee (SITAC) report initiated the effort to create an Administrative.
“The Honeywell Web-based Corrective Action Solution”
Environmental Management Systems Refresher
Digital Futures International Forum - Tuesday 18th September 1 Digital Futures International Forum The Digitisation Standard: Back & Forth Stephen Clarke.
How to commence the IT Modernization Process?
Lets play bingo!!. Calculate: MEAN Calculate: MEDIAN
Online learning projects Some critical factors Prepared by: Paul Trahair 29 August 2003.
April 2003 ONLINE SERVICE DELIVERY Presentation. 2 What is Online Service Delivery? Vision The current vision of the Online Service Delivery program is.
WHICH TO CHOOSE RIGHT SERVER FOR THE RIGHT JOB. Today’s business environment demands that small and midsize businesses do more with less. The large majority.
Functional Areas & Positions
By CA. Pankaj Deshpande B.Com, FCA, D.I.S.A. (ICA) 1.
1 Chapter 11: Data Centre Administration Objectives Data Centre Structure Data Centre Structure Data Centre Administration Data Centre Administration Data.
25 seconds left…...
Vblock™ Specialized Systems for Extreme Applications
Slippery Slope
© Paradigm Publishing Inc Chapter 10 Information Systems.
Week 1.
We will resume in: 25 Minutes.
Fundamentals of Cost Analysis for Decision Making
Marketing Strategy and the Marketing Plan
© Prentice Hall CHAPTER 15 Managing the IS Function.
VPN AND REMOTE ACCESS Mohammad S. Hasan 1 VPN and Remote Access.
DVA Webclaim. DVA Webclaim is a real-time web-based DVA claiming channel. And, is available at no cost.
- 1 - Defense Security Service Background: During the Fall of 2012 Defense Security Service will be integrating ISFD with the Identity Management (IdM)
Building an EMS Database on a Company Intranet By: Nicholas Bollons Sally Goodman.
Copyright © 2002 by The McGraw-Hill Companies, Inc. All rights reserved Chapter The Future of Training and Development.
Introduction to ikhlas ikhlas is an affordable and effective Online Accounting Solution that is currently available in Brunei.
The Plan Member Secure Site Key features that will help you manage your benefits plan.
Registry system data exchange General design requirements Pre-sessional Consultations on Registries 19 October 2002 New Delhi, India UNFCCC secretariat.
Comprehensive User Fee Study
PKI in US Higher Education TAGPMA Meeting, March 2006 Rio De Janeiro, Brazil.
PKI Past, Present and Future at the UW Nicholas Davis, PKI Project Leader Eighth Annual Educause PKI Summit.
Public Key Infrastructure at the University of Pittsburgh Robert F. Pack, Vice Provost Academic Planning and Resources Management March 27, 2000 CNI Spring.
The Unique Challenges of Rolling Out a PKI in the U.W. Academic Environment Nicholas A. Davis.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Making Digital Security a Reality With PKI Nicholas A. Davis, UW-Madison November 28, 2006.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
The Decision to Buy vs. Build Nicholas Davis (UW-Madison) Tom McDonnell (Geotrust)
PKI Implementation at the University of Wisconsin-Madison
Presentation transcript:

1 PKI Buy vs. Build Decision at UW-Madison Presented by Nicholas Davis PKI Project Leader UWMadison, Division of Information Technology

2 Overview Brief history of PKI at UW-Madison UW-Madison IT environment PKI requirements gathering effort Comparison of benefits of buy vs. build in our environment Our experience so far Integration with existing systems Critical success factors Future considerations What we have learned

3 History of PKI at UW-Madison October 2000 Internet2 Public Key Infrastructure Lab established at UW- Madison Provided certificates to Shibboleth testing community 2004 Campus requirements gathering initiative Spring 2005 RFI review August 2005 Geotrust selected

4 UW-Madison IT Environment Serving a universe of 50,000 Faculty, Staff, Students Highly decentralized Public institution Research driven environment

5 Why the UW-Madison is interested in PKI Threat of identity theft (strong 2-factor authentication) More university businesses conducted via web / extranets through open community, across organizations Privacy of information (encryption) Authenticated communication (signing)

6 UW-Madison Critical Solution Attributes Ease of management Ready integration into existing systems Ease of adoption by end users Scalability, flexibility, cost of ownership, accreditations…

7 Core Requirements Automated certificate delivery Used for encryption, digital signing and potentially authentication Off site key escrow Transparency to end user Global trust Implementation within 6 months Minimum lock in commitment Time, Cost, Features, Quality

8 PKI Models and Systems Under Consideration In House (Commercial and Open Source) Co-managed Verisign -- Commercial -- Co-managed Entrust -- Commercial -- In house Geotrust -- Commercial -- Co-managed RSA -- Commercial -- In house Open Source -- Non-Commercial -- In House

9 Time to Implement In House – Open Source To develop our desired feature set would require 2 full time programmers for 12 months Cost of establishing sandbox, QA and production environments Hardware acquisition: secure cage, network equipment, Certificate Authority, Registration Authority CP and CPS statements would need to be written and reviewed by DoIT management and UW Legal Estimated time to implement: 12 months

10 Time to Implement In house – Commercial 1 FTE would be needed to act as Administrator Need to establish sandbox, and QA environments. Design logical and physical security infrastructure for secure CA and offsite key escrow Purchase hardware, install software Develop policy, CP and CPS Estimated time to implement: 9 months

11 Time to implement Co-managed 1 FTE would be needed to act as Administrator Upon completion of purchase contract, system would be immediately ready No need to establish sandbox, and QA environments. Estimated time to implement: 4 weeks

12 Building Open Source Costs Year 1 system costs 5000 users ~$50,000 2 FTE (salary and benefits) ~$200,000 Total Year 1 costs: ~$250,000 Year 2 and beyond (annual costs) 5000 users ~$0 2 FTE (salary and benefits) ~$200,000 Total annual costs ~$200, year cost ~$2,050,000

13 Building Commercial Costs Year 1 system costs 5000 users ~$200,000 1 FTE (salary and benefits) ~$100,000 Total Year 1 costs: ~$300,000 Year 2 and beyond ($40,000 maint.) 5000 users ~$0 1 FTE (salary and benefits) ~$100,000 Upgrades and maintenance ~$5000 Total annual costs ~$145, year cost ~$1,605,000

14 Co-managed Costs Year 1 System costs 5000 users ~$43,000 1 FTE (salary and benefits) ~$100,000 Total yearly costs = ~$143,000 Year 2 and beyond (annual contract) 5000 users ~$43,000 1 FTE (salary and benefits) ~$100,000 Total annual cost $143, year cost ~$1,430,000

15 Annual Cost Summary 1 year 10 year There is no free lunch, even with open source The price of entry for infrastructure can be cost prohibitive and a major sticking point for organizational commitment

16 Feature Set – No Trusted Root With Open Source Unsigned Root means distrust both within and outside our core universe Who are you serving? Internal customers? External customers? Both?

17 Benefits of co-managed solution Seamless trust lets us play globally via The Equifax Secure eBusiness CA1 Logistical, financial and political issues with Building true off site key escrow Keys are securely kept offsite

18 Benefits of co-managed solution (continued) All the user needs is a web browser in order to get theircertificate Quality co-managed PKI systems are constantly monitored, patched, upgraded and backed up at a remote location

19 Our experience so far Customers appreciate: Automated certificate delivery Trusted Root Key Escrow Uses: Using certificates for digital signing Using certificates for encrypted Digital signing of mass to campus

20 Integration With Existing Systems Easily scalable – Load users in CSV format in batch Public keys are exportable to LDAP and University White Pages CRL is automated via True Credentials system Third party software available for high assurance server authentication

21 Critical Success Factors A focus on the customer requirements is of pinnacle importance Financial lifecycle modeling for both short and long term Being careful not to reinvent the wheel simply for the sake of pride Top down support from the CIOs office

22 Summary of Benefits Lower upfront fixed costs Lower 10 year costs Faster road to implementation Trusted Root Off Site Key Escrow Automated certificate delivery UW-Madison common look and feel No long term lock in

23 Future Considerations The beneficial cost argument may change if our user population grows dramatically Widespread adoption of the Higher Education Bridge CA (HEBCA) may alter our reliance on a commercial pre-installed root

24 What We Have Learned Dont let your pride dictate your choice of PKI model Focus effort on things which have not already been done and on providing utility to the end user, not on where your CA hardware is located A certificate is a certificate

25 What We Have Learned (continued) The key to success in a decentralized environment lies in motivating your users, not obligating your users Whether you choose to build or buy, remember to keep it simple for the customers Dont spend time on duplication of effort

26 What We Have Learned (continued) What matters most is what your organization does with the certificate once it is issued The challenge of implementing PKI is 30% technical and 70% user education, marketing and acceptance

27 Questions, Comments Contact information: Nicholas Davis University of WisconsinMadison Division of Information Technology Telephone: