Organization for the Advancement of Structured Information Standards

Slides:



Advertisements
Similar presentations
KMIP 1.3 SP Issues Joseph Brand / Chuck White / Tim Hudson December 12th,
Advertisements

Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Public Key Infrastructure from the Most Trusted Name in e-Security.
Standards in Industry Mark Skilton, Director Global Infrastructure Services, Strategy co-chair, Cloud computing work group, The Open Group
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
SODA Archiving October 2013
KMIP - Hardware Security Modules Meta-Data-Only (MDO) Keys Saikat Saha & Denis Pochuev Feb 2012.
1 The OASIS KMIP Standard: Interoperability for the Cryptographic Ecosystem Jon Geater OASIS KMIP TC With thanks to Bob Griffin, co-chair,
Cloud Use Cases, Required Standards, and Roadmaps Excerpts From Cloud Computing Use Cases White Paper
What is EKMI? Enterprise Key Management Infrastructure Take the tour.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Security and Privacy for the Smart Grid James Bryce Clark, OASIS Robert Griffin, RSA Hal Lockhart, Oracle.
KMIP - Hardware Security Modules Meta-Data-Only (MDO) Keys Saikat Saha & Denis Pochuev Feb 2012.
Cyber in the Cloud & Network Enabling Offense and Defense Mark Odell April 28, 2015.
Microsoft Azure and ServiceNow: Extending IT Best Practices to the Microsoft Cloud to Give Enterprises Total Control of Their Infrastructure MICROSOFT.
© 2013 TM Forum | 1 V Catalysts and Innovation Projects Rapid Technology Innovation Projects The Hub at Management World 2013.
Global Service Resource Planning (SRP) SaaS Solutions Market Share, Global Trends, Analysis, Research, Report, Opportunities,
Private Cloud Market to Global Analysis and Forecasts by Services, Applications No of Pages: 150 Publishing Date: Feb 2017 Single User PDF: US$
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024Low Power Wide Area Network.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024Low Power Wide Area Network.
Clouding with Microsoft Azure
© 2016 Global Market Insights, Inc. USA. All Rights Reserved IoT in Retail Market to exceed $30bn by 2024: Global Market Insights Inc.
TAG Presentation 18th May 2004 Paul Butler
READ ME FIRST Use this template to create your Partner datasheet for Azure Stack Foundation. The intent is that this document can be saved to PDF and provided.
ISO’s standardization approach to security, privacy and trust
AuraPortal Cloud Helps Empower Organizations to Organize and Control Their Business Processes via Applications on the Microsoft Azure Cloud Platform MICROSOFT.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved IoT Utilities Market to cross $15 Bn by 2024: Global Market Insights, Inc.
Web Applications Security Cryptography 1
Segmap Solutions Mapping segments.
CIM Modeling for E&U - (Short Version)
Ralleo Enterprise-Grade Solution for Managing Change and Business Transformation Provides Opportunities to Better Analyze Real-Time Data MICROSOFT AZURE.
Partner Logo Veropath Offers a Next-Gen Expense Management SaaS Technology Solution, Built Specifically to Harness Big Data Analytics Capabilities in Azure.
TAG Presentation 18th May 2004 Paul Butler
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Behavior Analytics Market to surpass $3.5bn by 2024: Global Market Insights,
A10 Networks vThunder Leverages the Powerful Microsoft Azure Cloud Platform to Offer Advanced Layer 4-7 Networking, Security on a Global Scale MICROSOFT.
SMS+ on Microsoft Azure Provides Enhanced and Secure Text Messaging, with Audit Trail, Scalability, End-to-End Encryption, and Special Certifications MICROSOFT.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Electronic Document Management System Market to grow at 15% CAGR from 2017.
Cloud DX Connected Health Kits Depend on Azure to Deliver Cloud Storage and Securely Host Data for its Remote Patient Monitoring MICROSOFT AZURE APP BUILDER.
CS691 M2009 Semester Project PHILIP HUYNH
Boost Your Sales, Extend Your Reach, Attain New Levels of Customer Satisfaction in the Modern, Mobile, Cloud Era with blue-app and Windows 10 WINDOWS APP.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Network Function Virtualization Market to reach $70bn by 2024: Global Market.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 IoT Device Management Market.
KMIP Key Management with Vormetric Data Security Manager
KMIP Key Management with Vormetric Data Security Manager
Enterprise Key Management with OASIS KMIP
Enabling Encryption for Data at Rest
Resco Mobile CRM Enables Sales Reps and Field Technicians to Access CRM Data Effortlessly While On the Go Across All Types of Mobile Devices WINDOWS APP.
Introduction to z/OS Security Lesson 4: There’s more to it than RACF
Enabling Encryption for Data at Rest
CS691 M2009 Semester Project PHILIP HUYNH
Data Security for Microsoft Azure
Excelian Grid as a Service Offers Compute Power for a Variety of Scenarios, with Infrastructure on Microsoft Azure and Costs Aligned to Actual Use MICROSOFT.
Unitrends Enterprise Backup Solution Offers Backup and Recovery of Data in the Microsoft Azure Cloud for Better Protection of Virtual and Physical Systems.
Crypteron is a Developer-Friendly Data Breach Solution that Allows Organizations to Secure Applications on Microsoft Azure in Just Minutes MICROSOFT AZURE.
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
OASIS PKCS#11 RSA Conference 2018.
Public Key Infrastructure from the Most Trusted Name in e-Security
TEMPLATE.
One-Stop Shop Manages All Technical Vendor Data and Documentation and is Globally Deployed Using Microsoft Azure to Support Asset Owners/Operators MICROSOFT.
RKL Remote key loading.
Media365 Portal by Ctrl365 is Powered by Azure and Enables Easy and Seamless Dissemination of Video for Enhanced B2C and B2B Communication MICROSOFT AZURE.
The Secure Sockets Layer (SSL) Protocol
TEMPLATE NOTES Our datasheet and mini-case study templates are formatted specifically for consistency of branding at Microsoft. Please do not alter font.
Cybersecurity Issues Impacting Public Sector Financial Management OASIS e-Gov Washington Workshop, April John Sabo Director.
RSA 2019 Interop Demonstration Event
Global megatrends (relevant for our business)
IT Management Services Infrastructure Services
Plan and design the solution
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

Organization for the Advancement of Structured Information Standards Presented by Chuck White & Jerry StUEve © 2018 Fornetix · All Rights Reserved

What Is OASIS? OASIS is a nonprofit consortium that drives the development, convergence, and adoption of open standards for the global information society. OASIS works because different teams come to OASIS from different background and different goals. © 2018 Fornetix · All Rights Reserved

In Standards We Trust KMIP PKCS#11 OpenC2 Fornetix & OASIS © 2018 Fornetix · All Rights Reserved

What does KMIP do? Security Applications or Appliances Key Material & Metadata Transport KMIP Key Management Server Create, Register, Locate and Retrieve Encryption Keys Many extended services: Encrypt, Decrypt, Signing, Split- Keys etc. Supports Symmetric Keys, Asymmetric Keys, Certificates, Signing etc. Rich metadata for essential cryptographic management Much more than just add, modify & delete The KMIP specification includes an incredibly broad range of capabilities for full lifecycle management of security objects, with almost unlimited extensibility through a flexible, yet interoperable attribute model. 46 Operations (much more than just add, modify & delete) enables Security Appliances/Applications to perform tasks including: Encryption, Decryption, Authentication, Certification, Signing, Verification and Split-Key operations. 9 Object types catering for many more security objects include: Certificate, Certificate Request, Opaque Object, PGP Key, Private Key, Public Key, Secret Data, Split Key, Symmetric Key 54 Attributes to represent information (meta-data) about each Object under management

KMIP Deployed in Solutions KMIP solutions are deployed across in all industry sectors, delivering management of security objects for: Cloud Storage Identity Management Financial systems Automotive Healthcare Email Provisioning and supply chain PKI Communications Authentication Defense

KMIP Specification Development Enterprise Requirements Specification Development Product Deployment Specification Testing Being part of the OASIS KMIP TC enables vendors to more quickly bring their customers’ requirements to the standards development process. The enterprise requirements drive the Specification development which Drives the Product Testing which is fed back into the enterprise

KMIP 2018 RSA Interop Demonstration Over the last month implementations from these vendors have undergone a rigorous Interoperability testing process to prove the latest additions to the KMIP Specification and deliver true multi vendor interoperability. It is this rigor that ensures conformant implementations meet the aims of the KMIP Technical Committee and the expectations of the market If you have not already seen a demonstration from at least one of these members, please ask for a demonstration at the conclusion of this presentation.

KMIP RSA 2018 Test Results 9 KMIP TC members 17 implementations 8 Client Implementations 9 Server Implementations Over 33,000 successful test runs 72 Test combinations 4 encodings 9 KMIP Technical Committee members testing 17 implementations 8 Client Implementations 9 Server Implementations Over 33,000 successful test runs 72 Test combinations across 4 encodings

KMIP Deployed by Organizations Many organizations are relying on KMIP to ensure management and visibility of their security object It remains the default standard for full lifecycle security object management

Technologies Consistent Data Storage HSM Integration Cyber Defense Data in Motion Hypervisor Storage Cloud Storage Database Storage Hardened Boundary for Cryptographic Functions Supports Top Algorithms Threat Mitigation Machine Identity IoT Security PKI Management Security Cryptographic Velocity Mutual Authentication © 2018 Fornetix · All Rights Reserved

What Does This Mean? Benefits Speed & Savings Shared Enhancements With consistent interfaces, we can integrate our product with others in a much shorter timeframe with a lower integration cost and additional security. Shared Enhancements Focus on making other enhancements to our product and rolling those enhancements back into the technical committee for consideration. Mutual Growth The end result of this collaborative process is making everyone’s products better. © 2018 Fornetix · All Rights Reserved

Across Verticals Practicality of Standards Energy Healthcare Financial Cross-Vertical Concerns Smart Meters Smart Grid Power Generation Electronic Health Records Medical Implants Connected Medical Diagnostic Systems Medical Record Integrity Financial Transaction Enablement Customer Confidentiality Record Integrity GDPR Secure Supply Chain Crypto Agility © 2018 Fornetix · All Rights Reserved