EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.

Slides:



Advertisements
Similar presentations
Digital Signatures in State of Tennessee Pam Roberts Finance & Administration Office for Information Resources Planning, Research & Development.
Advertisements

3SKey 3SKey.
Overview of US Federal Identity Management Initiatives Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority and Asst. CIO E-Authentication, NIH.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Levels of Assurance: An Overview Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority.
The Need for Trusted Credentials Information Assurance in Cyberspace Mary Mitchell Deputy Associate Administrator Office of Electronic Government & Technology.
The Federation for Identity and Cross-Credentialing Systems (FiXs) FiXs ® - Federated and Secure Identity Management in Operation Implementing.
The U.S. Federal PKI Richard Guida, P.E. Chair, Federal PKI Steering Committee Chief Information Officers Council
© Southampton City Council Sean Dawtry – Southampton City Council The Southampton Pathfinder for Smart Cards in public services.
15June’061 NASA PKI and the Federal Environment 13th Fed-Ed PKI Meeting 15 June ‘06 Presenter: Tice DeYoung.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
Copyright Judith Spencer This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
Federal Approach to Electronic Credentials For services to citizens, businesses, other governments, and employees Mary J. Mitchell Office of Electronic.
The U.S. Federal PKI and the Federal Bridge Certification Authority
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
FIT3105 Smart card based authentication and identity management Lecture 4.
NIH-EDUCAUSE Interoperability Project, Phase 3: Fulfilling the Promise Dartmouth PKI Implementation Workshop Peter Alterman, Ph.D. Assistant CIO for E-Authentication.
Brooks Evans – CISSP-ISSEP, Security+ IT Security Officer Arkansas Department of Human Services.
Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering Committee
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
UNCLASS DoD Public Key Infrastructure LCDR Tom Winnenberg DISA API1 Chief Engineer 25 April 2002.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
The E-Authentication Initiative An Overview Peter Alterman, Ph.D. Assistant CIO for e-Authentication, NIH and Chair, Federal PKI Policy Authority The E-Authentication.
1 USHER Update Fed/ED December 2007 Jim Jokl University of Virginia.
The Federal Bridge Certification Authority – Description and Current Status Peter Alterman, Ph.D. Senior Advisor to the Chair, Federal PKI Steering Committee.
The U.S. Federal PKI, 2004: Report to EDUCAUSE Peter Alterman, Ph.D. Assistant CIO for E-Authentication National Institutes of Health.
Public Key Infrastructure from the Most Trusted Name in e-Security.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Chapter 10: Authentication Guide to Computer Network Security.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
1 PKI & USHER/HEBCA Fall 2005 Internet2 Member Meeting Jim Jokl September 21, 2005.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
The Evolving U.S. Federal PKI Richard Guida Chair, Federal PKI Steering Committee Federal Chief Information Officers Council
Time/Date Stamp Time/Date Stamp Authorization Secure Non- repudiation Secure Non- repudiation Key Recovery Key Recovery Message Confidentiality Message.
U.S. General Services Administration Federal Technology Service November 9, 1999 Judith Spencer Director, Center for Governmentwide Security Office of.
1 June Richard Guida Stephanie Evans Johnson & Johnson Director, WWIS WWIS SAFE Infrastructure Overview.
Federal Electronic Commerce Program Office Tony Trenkle General Services Administration October 28, 1998.
The NIH PKI Pilots Peter Alterman, Ph.D. … again.
HEPKI-PAG Policy Activities Group David L. Wasley University of California.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
PKI and the U.S. Federal E- Authentication Architecture Peter Alterman, Ph.D. Assistant CIO for e-Authentication National Institutes of Health Internet2.
The Evolving Federal PKI Gary Moore Entrust Technologies Richard Guida Chair, Federal PKI Steering Committee.
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
1 Federal Identity Management Initiatives Federal Identity Management Initatives David Temoshok Director, Identity Policy and Management GSA Office of.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Electronic Security and PKI Richard Guida Chair, Federal PKI Steering Committee Chief Information Officers Council
Trusted Electronic Communications for Federal Student Aid Mark Luker Vice President EDUCAUSE Copyright Mark Luker, This work is the intellectual.
Interoperability and the Evolving Federal PKI Richard Guida, P.E. Member, Government Information Technology Services Board Chair, Federal PKI Steering.
1 US Higher Education Root CA (USHER) Update Fed/Ed Meeting December 14, 2005 Jim Jokl University of Virginia.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
E-Authentication Guidance Jeanette Thornton, Office of Management and Budget “Getting to Green with E-Authentication” February 3, 2004 Executive Session.
Module 8: Securing Network Traffic by Using IPSec and Certificates
Organized by governmental sector (National Institute of information )
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
U.S. Federal e-Authentication Initiative
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Public Key Infrastructure from the Most Trusted Name in e-Security
Technical Approach Chris Louden Enspier
HIMSS National Conference New Orleans Convention Center
Module 8: Securing Network Traffic by Using IPSec and Certificates
E-Government Procurement: Standard Transactions and Interoperability David Temoshok Director, Federal Identity Management GSA Office of Governmentwide.
RSA Digital Certificate Solutions RSA Solutions for PKI David Mateju RSA Sales Consultant
Presentation transcript:

EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide Policy October 31, 2001

e-Gov and PKI Drivers Government Paperwork Elimination and ESIGN Acts Public Expectations Long-term Cost Savings The Need for Privacy and Security –Government is held to higher standard Trading Partner Practices

Bill Payment $ $3.32 $ $ % - 67% Insurance Policy $400 - $700 $200 - $350 50% Software Distribution $15 $ $ % - 67% Procurement 70% Motor Vehicle Registration $7 <$2 71% Order-Filling (DOD) $24 $12 50% Traditional System Internet Percent Savings Business Driver: Savings by Process Type

Electronic Signatures in Global and National Commerce Act Signed by President Clinton on 6/30/00. E-SIGN addresses: –Commercial, consumer, and business transactions affecting interstate or foreign commerce; –Legality of electronic signatures and records; –Preemption of inconsistent statutes/rules. E-SIGN does not address: – security, authentication, or records requirements; – interoperability; –Electronic signatures based on different technologies; –Rules for reliance/accepting different kinds of signatures. Federal Agency activities and requirements are generally not within the scope of this legislation; they are instead addressed by the Government Paperwork Elimination Act (GPEA).

GPEA Requirements Government Paperwork Elimination Act (GPEA) of 1998 addresses: –requirement for federal agencies to offer the public the option of electronic filings/transactions/record-keeping for agency business by October 2003; –Legality of electronic signatures and records; –Technology neutrality -- electronic signature alternatives. OMB required all agencies to report on GPEA implementation/compliance by 10/00. Including: –Information collections under Paperwork Reduction Act –Use of Electronic Signature. –Risk Assessment.

What is an Electronic Signature under E-SIGN? “…means an electronic sound, symbol, or process, attached to or logically associated with a contract or other record and executed or adopted by a person with the intent to sign the record.” PIN or Password Biometric Profile Click through on software program’s dialog box Typed names Digitized image of a handwritten signature Digital Signature or other encrypted authentication system Knowledge-based Authentication

Authentication: Is originator who they really say they are? 4Achieved by binding the sender’s identity credentials to the message (digital signature) Data Integrity: Has message/transaction been accidentally or maliciously been altered? 4Achieved via comparing hash of the data (digital signature) Confidentiality: Can message be read only by authorized entities? 4Encryption protects information from unauthorized disclosure Non-repudiation: Can sender or receiver dispute that message was actually sent or received? 4Enabled through digital signature process Security Needs Met by PKI

A trusted third-party, the Certificate Authority (CA), issues the digital certificate, containing: - Name, Issuers name, Certificateholder’s public key, other attributes. The Issuer (CA) must verify and bind identity to the Electronic ID. The Issuer (CA) digitally signs the certificate so no one can change its contents and certificate can be verified as authentic. Public Key or Digital Certificates - The Electronic ID CA Digital Certificate Name: Joe College Serial #: Issuer: CA #78901 Expiration: 12/1/02 Public Key: CA Digital Certificate Name: Joe College Serial #: Issuer: CA #78901 Expiration: 12/1/02 Public Key: CA’s Digital Signature Unique identifier for certificate Unique identifier for certificate issuer Certificate expiration date (validity period) Certificateholder’s public key Ensures Certificate’s validity

A Digitized Signature is a scanned image that can be pasted on any document. A Digital Signature is a numeric value that is created by performing cryptographic transformation of a message using the “signer’s” private key. Digitized vs. Digital Signature 99 MH ?!C6 23 ?!C64 JD HD G *564 QHD736 JFHF Digital SignatureDigitized Signature

Why build a Federal PKI? Statutory mandates for e-government and implementing electronic signature technology Business Demands for improved services at lower cost Leverage infrastructure costs Critical security need Why not a Federal PKI? Privacy concerns Agency internal politics Vendor battles for market space Cost

Federal PKI Approach Determine need for PKI through risk assessment. Use PKI when electronic signature and document/data integrity must be assured (non-repudiation). Provide Federal PKI and PKI services contract for government-wide use -- ACES. Build Federal PKI Interoperability –Establish Federal PKI Policy Authority (for policy interoperability). –Implement Federal Bridge CA using COTS (for technical interoperability). Organize federal agency PKI use around common citizen and industry groups.

The Core Federal PKI DOD IECA DOD PKI GSA ACES NFC PKI Federal Bridge CA Available to all Federal agencies Available to all Military personnel and dependents Available to all Government vendors and contractors Available to all U.S. citizens, businesses, government agencies

PKI Interoperability Policy PKI Interoperability involves the determination of “Trusted” PKI domains which will meet the level of assurance needed. Technical PKI interoperability involves the validation of certificates form a different PKI domain to determine validity of certificates and paths. A small number of PKI domains makes it easier to achieve interoperability -- however it is still complex. PKI Domain 1 PKI Domain 2 PKI Domain 3 Certification Policies & Practices Statements Validation Protocols Bi-lateral Agreements

The Challenge to PKI Interoperability PKI interoperability becomes much more complex as the number of PKI domains increase.

The Solution: The Federal Bridge CA The Federal Bridge CA simplifies PKI interoperability: Common and easy way to determine “Trusted” PKI domains and assurance levels (policy mapping); Common and, relatively, easy way to validate certificate status through cross certification; Standard Bi-lateral Agreement between the Bridge and Agency CA. FPKI Policy AuthorityFBCA Operational Authority

PKI Policy Mapping -- Equivalence Example DoD 2 DoD 3 DoD 4 NFC PKI Basic NFC PKI Medium) NFC PKI High NFC PKI Test FBCA High FBCA Medium FBCA Basic FBCA Rudimentary GSA ACES (Med) DoD IECA (Med) FBCA RequirementsNFC PKIDOD PKIDOD IECA PKIACES PKI

Common PKI solution encourages agencies to work together Allows equitable cost sharing among agencies Efficient, effective, economical due to aggregation of Federal needs One digital identity credential can be used by multiple Agency processes “Anonymous” certificate numbering for identification Public pays nothing for digital ID. ACES Program Vision

ACES Registration Processes ACES Contractor Registration for Individuals Agency Registration Business Representative Registration

ACES Remote (On-line) Certificate Application Process Public applies for certificate Secure Web Federal State Commercial ACES vendor validates ID to multiple independent databases Applicant PIN activation process ACES vendor registers applicant for certificate and mails one-time PIN ACES vendor sends registered certificate

Authorized Web-based Application Access Authorized System with ACES authentication Return Personalized Services/Benefits/ Information Validate Electronic ID (ACES) through standard on-line protocol (OCSP) Secure Web Citizen Accessing Web-Based Applications and Services ACES Contracted Certificate Authority Federal Agency

Agency Application App API Agency Application App API CAM AA Interface CA I/F Crypto Library (RSA, DSA, ECDSA) ACES CA CA n Subscriber Certs Signature Device with CAM Private Key CA Certificate List Invalid Certificate List Transaction Log Subscriber Scope of CAM CA n Subscriber Certs CA n Subscriber Certs CA n Subscriber Certs - Parse Cert -Verify Issuer as an ACES CA -Verify Issuer’s signature -Verify operational period -Check cached Invalid Cert IDs -Get route to Issuer -Send signed Status Request & Cert data to Issuer -Receive signed Status Response -Verify Status Response signature -Pass status & cert data to App -Log audit data CAM Architecture

Who Can Be a Member of the ACES PKI? Certificate Authorities – ACES contractors Relying Parties – Any Federal agency – Non-federal entities if authorized by a Federal Agency for legitimate program purposes. Subscribers – Any individual in U.S. – Any individual as a representative of a business, organization, or governmental entity

Securely store, protect, and transport cryptographic keys (public/private keys) and digital certificates. Capacity to hold multiple keys/certificates. Provide secure computational and processing facility without exposing sensitive information to risk. Provides security for: generation of digital signature, use of private key for personal authentication, portable permissions/logical access control. Convenience for end user. PKI can be one set of functions on a multi-application smart card. PKI and Smart Cards Should result in trust and confidence in E-Gov applications.

For More Information Phone David Temoshok Websites