EDUCAUSE Best Practices Build Better Systems Ann West, InCommon Dedra Chamberlin, UC Berkeley.

Slides:



Advertisements
Similar presentations
PKI and LOA Establishing a Basis for Trust David L. Wasley PKI Deployment Forum April 2008.
Advertisements

Appropriate Access InCommon Identity Assurance Profiles David L. Wasley Campus Architecture and Middleware Planning workshop February 2008.
1 The Challenges of Creating an Identity Management Infrastructure for the University of California David Walker Karl Heins Office of the President University.
Bronze and Silver Identity Assurance Profiles for Technical Implementers Tom Barton Senior Director for Integration University of Chicago Jim Green Manager,
Password Policy: Update Recommendations Identity & Access Management Committee September, 2012.
Identity Assurance Profiles & Trust Federations David Bantz, U Alaska Tom Barton, U Chicago Ann West, Internet2 & InCommon David Bantz, U Alaska Tom Barton,
Identity Assurance at Virginia Tech CSG January 13, 2010 Mary Dunker
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
InCommon Assurance Certification VA-SCAN October 3, 2013 Mary Dunker.
Enterprise Architecture 2014 EAAF as a vehicle for LoA Using EAAF processes to incrementally approach InCommon/UCTrust certification.
The SAFE-BioPharma Identity Proofing Process Author of Record SWG (Digital Credentials) October 3, 2012 Peter Alterman, Ph.D. Chief Operating Officer,
Technical Issues with Establishing Levels of Assurance Zephyr McLaughlin Lead, Security Middleware Computing & Communications University of Washington.
U.S. Department of Agriculture eGovernment Program February 2004 eAuthentication Integration Status eGovernment Program.
1 Authentication Trustworthiness The Next Stage in Identity-Based Access and Security Tom Board, NUIT.
1 Enabling Open Government Using the OIDF/ICF Open Trust Framework OASIS Identity Management 2009 September 29, 2009 Don Thibeau, ED, OpenID Foundation.
Security Controls – What Works
Information Security Policies and Standards
Federal Information Processing Standard (FIPS) 201, Personal Identity Verification for Federal Employees and Contractors Tim Polk May.
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Federated Identity, Levels of Assurance, and the InCommon Silver Certification Jim Green Identity Management Academic Technology Services © Michigan State.
Information Resources and Communications University of California, Office of the President Current Identity Management Initiatives at UC & Beyond: UCTrust.
Information Resources and Communications University of California, Office of the President UCTrust Implementation Experiences David Walker, UCOP Albert.
Meeting InCommon Silver Profile Standards at UCD and UCB Bob Ono, UC Davis, Dedra Chamberlin, UC Berkeley, David Walker, UC Davis, Doreen Meyer, UC Davis.
User Authentication Recommendations Transport & Security Standards Workgroup December 10, 2014.
Intra-ASEAN Secure Transactions Framework Project Progress Report
Appropriate Access: Levels of Assurance Stefan Wahe Office of Campus Information Security.
Federal Requirements for Credential Assessments Renee Shuey ITS – Penn State February 6, 2007.
Credential Provider Operational Practices Statement CAMP Shibboleth June 29, 2004 David Wasley.
Policy, Trust and Technology Mitigating Risk in the Digital World David L. Wasley Camp 2006 © David L. Wasley, 2006.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Privacy and Security Tiger Team Meeting Discussion Materials Today’s Topic Recommendations on Trusted Identities for Providers in Cyberspace August 20,
Cloud Security Myths, Legends and Reality Cloud Security Paul Schopis CTO OARnet Joint Techs.
The InCommon Federation The U.S. Access and Identity Management Federation
Applied Technology Services, Inc. Your Partner in Technology Applied Technology Services, Inc. Your Partner in Technology.
IDENTITY ASSURANCE PROFILES AND FRAMEWORK DOCUMENTS: PEEK INTO PROPOSED FICAM CHANGES 12/12/12 1.
A DESCRIPTION OF CONCEPTS AND PLANS MAY 14, 2014 A. HUGHES FOR TFTM The Identity Ecosystem DISCUSSION DRAFT 1.
U.S. Department of Agriculture eGovernment Program August 14, 2003 eAuthentication Agency Application Pre-Design Meeting eGovernment Program.
U.S. Department of Agriculture eGovernment Program July 23, 2003 eAuthentication Initiative Agency Responsibilities and Funding Discussion eGovernment.
Workgroup Discussion on RESTful Application Programming Interface (API) Security Transport & Security Standards Workgroup January 12, 2014.
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
ITU-T X.1254 | ISO/IEC An Overview of the Entity Authentication Assurance Framework.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
Presented by: Presented by: Tim Cameron CommIT Project Manager, Internet 2 CommIT Project Update.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
Levels of Assurance in Authentication Tim Polk April 24, 2007.
Ning Zhang, the University of Manchester, UK David Groep, National Institute for Nuclear and High Energy Physics, NL Blair Dillaway, OGF Security Area.
Privacy and Security Tiger Team Meeting Discussion Materials Today’s Topic Recommendations on Trusted Identities for Providers in Cyberspace August 6,
Identity Assurance: When it Matters David L. Wasley Internet2 / InCommon.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Using Levels of Assurance Well, at least thinking about it…. MAX (just MAX)
Credentialing in Higher Education Michael R Gettes Duke University CAMP, June 2005, Denver Michael R Gettes Duke University
NIST E-Authentication Technical Guidance Bill Burr Manager, Security Technology Group National Institute of Standards and Technology
1 Federal Identity Management Initiatives Federal Identity Management Initatives David Temoshok Director, Identity Policy and Management GSA Office of.
Trusted Operating Systems
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Attribute Delivery - Level of Assurance Jack Suess, VP of IT
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
SEPARATE ACCOUNTS FOR PROSPECTS? WHAT A HEADACHE! Ann West Assistant Director, InCommon Assurance and Community Internet2 at Michigan Tech.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
E-Authentication Guidance Jeanette Thornton, Office of Management and Budget “Getting to Green with E-Authentication” February 3, 2004 Executive Session.
LoA In Electronic Identity Jasig Dallas Levels of Assurance In Electronic Identity Considerations for Implementation Benjamin Oshrin Rutgers University.
Preparing For An InCommon Silver Audit – Lessons From the First Phase
InCommon Participant Operating Practices: Friend or Foe?
Federal Requirements for Credential Assessments
InCommon Participant Operating Practices: Friend or Foe?
Appropriate Access InCommon Identity Assurance Profiles
Technical Issues with Establishing Levels of Assurance
Presentation transcript:

EDUCAUSE Best Practices Build Better Systems Ann West, InCommon Dedra Chamberlin, UC Berkeley

Introductions  Who we are  Who you are  Topics for Today  What’s the Problem?  Stories from the Field  Profiles Overview and Gap Analysis  Profiles to Practice: Business and Technical Implementation Considerations and Sample Timeline  Resources to Help You

What’s the Problem and Why Should You be Worrying?

Deloitte Predictions 2013 Passwords==bad  Strong? 5 hours to crack  Phishing  Bad habits  Same pwd - multiple sites  Online sources of cracked passwords  Cell encouraging numbers-only  Bad practices  Yahoo recycling addresses  Sample Articles Sample Articles

Is This a Case for Multifactor?  What questions should we be asking?  How can I address phishing?  How can I protect against inappropriate reassignment?  How can I ensure the right physical person is using that password?  InCommon’s Identity Assurance Framework and Profiles provides a step-wise and standards-based way to address these questions

Components of Assurance 6 RiskAssurance component that mitigates Fraudulently obtained Identity proofing + credential management Vetting process, Subject attributes, record keeping Inappropriate reassignment Credential management Token issuance & revocation, binding of Token to Subject, secure infrastructure, record keeping Stolen or shared Token technologies Additional factors (biometric, geolocation,...) Multi-factor (PIN + token) Second factor (OTP, “phone factor”, 2 nd password) Password/passphrase Effort to mitigate

Providing Credentials for your Credentials  2004: USG defines 4 Levels of Assurance (NIST )  2009: USG Identity, Credential and Access Management (ICAM)  Certifies trust frameworks to interact with the USG agencies  Determines comparability with  2011: InCommon ICAM Trust Provider  Higher Ed developed, USG approved  Bronze comparable to NIST LoA 1  Silver comparable to NIST LoA 2

What Guidance are You Using?

Stories from the Field

Stronger Authentication at UCB –Adopt Me Please? ●IAM Systems review – Burton report ●Pre-InCommon Assurance and campus data classification ●Still a perceived need to “tighten” assurance ●Finding a cost-effective solution

CAS Second-Level Authentication ●Much easier and less expensive to deploy than two-factor ●Developed as contribution to existing CAS open source initiative ●User to supply a second “secret” for sensitive apps ●CAS Second Level OverviewCAS Second Level Overview ●One line code change for apps already integrated with CAS

Adoption, or not… ●Adoption Round 1 – It’s the right thing to do ●Adoption Round 2 – You have to do it ●The bet

Conceding Defeat

UC Trust Compliance and InCommon Silver ●UC Trust Federation - Basic Assurance ●Decision to convert to InC Silver ●System-wide gap analysisSystem-wide gap analysis ●System-wide HR replacement ●Still no decision - likely deferred ●How to prioritize and align resources?

Your Stories from the Field?

The InCommon Assurance Profiles

03/08/ It’s All About Identity Assurance Assurance  a positive declaration intended to give confidence; a promise Identity Assurance  the ability for a party to determine, with some level of certainty, that an electronic credential representing a person can be trusted to actually belong to the person.

Risk Management Perspective Understanding the risk  Compliance  Financial  Reputational Choosing to invest in mitigation  Idaho and HIPPA Fine Idaho and HIPPA Fine

InCommon – Higher Ed OMB/NIST – Federal Agencies Relevant Assurance Docs  Identity Assurance Assessment Framework Identity Assurance Assessment Framework  Identity Assurance Profiles Identity Assurance Profiles  Bronze (Level 1)  Silver (Level 2)  Certification: Legal Addendum Legal Addendum  Privacy criteria from ICAM  OMB M04 04 E- Authentication Guidance for Federal AgenciesE- Authentication Guidance for Federal Agencies  Maps risk to four levels of assurance  NIST E- Authentication Guidelines  Describes how to implement the four levels

InCommon Bronze: Common Sense  Assign Responsibility for IdM  Establish Policy for IdM  Harden Password Management  Harden Credential Technology Infrastructure  Optional Compliance: Perform Self Assessment

InCommon Silver: Critical Business  Strengthen Identity Proofing and Registration  Enforce Strong Passwords (or Deploy MFA)  Further Harden Password Management  Harden Technical Infrastructure  Optional Compliance: Obtain Independent Audit

A Note on Compliance  Using Profiles is free, downloading is free  Compliance will be required when federating with  US Government  Other InCommon Service Providers requesting an InCommon Profile  Pros  Published on Federal and InCommon website  Shows good practice to your service providers  Bronze is free; Silver is good biz practice  Con  Due diligence – more work  Silver requires audit and fee to be certified

 Business, Policy and Operational Criteria  Registration and Identity Proofing  Credential Technology  Credential Issuance and Management  Authentication Process  Identity Information Management  Assertion Content  Technical Environment 03/08/2012 InCommon Identity Assurance Profiles 23

Functional AreaCriteriaBronzeSilver Business, Policy and Operational Criteria.1 InCommon Participant.2 Notification to InCommon.3 Continuing Compliance.4 IdPO Risk Management Profile Specifics

Functional AreaCriteriaBronzeSilver Registration and Identity Proofing.1 RA Authentication.2 Identity Verification Process.3 Registration Records.4 Identity Proofing.4.1 Existing Relationship.4.2 In-person Proofing.4.3 Remote Proofing.5 Address of Record Confirmation.6 Protection of Personally Identifiable Information

Functional AreaCriteriaBronzeSilver Credential Technology.1 Credential Unique Identifier.2 Basic Resistance to Guessing Authentication Secret.3 Strong resistance to Guessing Authentication Secret.4 Stored Authentication Secrets.5 Basic Protection of Authentication Secrets.6 Strong Protection of Authentication Secrets

Functional AreaCriteriaBronzeSilver Credential Issuance and Management.1 Credential Issuance.2 Credential Revocation or Expiration.3 Credential Renewal or Re-issuance.4 Credential Issuance Records Retention.5 Resist Token Issuance Tampering Threat

Functional AreaCriteriaBronzeSilver Authentication Process.1 Resist Replay Attack.2 Resist Eavesdropper Attack.3 Secure Communication.4 Proof of Possession.5 Resist Session Hijacking Threat.6 Mitigate Risk of Credential Compromise

Functional AreaCriteriaBronzeSilver Identity Information Management.1 Identity Record Qualification Assertion Content.1 Identity Attributes.2 Identity Assertion Qualifier.3 Cryptographic Security Technical Environment.1 Software Maintenance.2 Network Security.3 Physical Security.4 Reliable Operations

Find the Gaps ●Review the IAP table ●Where are you likely to find gaps? ●Business process, documentation ●Credential management ●Who needs to help fill them? ●Systems of Record representatives, Service Desk ●Central IT – security, credential managers systems teams ●When should you engage them? ●Estimating resources and timelines – sample gap analysis chart

BREAK

Profile to Practice

Profile to Practice: Business

Framework: Functional Model 34

Business Process Considerations ●On-boarding and the IdPO  ID proofing and bootstrapping the digital credential  HR, delegated admins or both  The “CalNet Deputy” model and CalNet Deputy Training“CalNet Deputy” CalNet Deputy Training ●Remote proofing ●Re-issuance ●Security questions? ●User education and awareness

Profile to Practice: Technology

Password/passphrase Entropy ●Password complexity ●Dictionary checks ●Expiration ●Lockouts ●Failed login counter ●Entropy CalculatorsEntropy Calculators

Credential Management ●Where is the verifier used? ●Certify other systems? ●Downgrade credentials? ●UCB proxied authentication guidelinesUCB proxied authentication guidelines

Stronger Credential Options ●Second credential ●Multi-factorMulti-factor ●Related application level concerns ●For entire app? ●For some roles?

Technical Environment ●Campus minimum standards if you have them ●Industry standards - CIS BenchmarksCIS Benchmarks

Profile to Practice: Making the Pitch

Considering Your Audience ●Elevator pitches for: ○ Audit (if not for certification) ○ IT Executives ○ IT Security ○ Functional Owners (HR, Controller, Student System)

Profile to Practice: 18 months to Better Practices

Q1Q2Q3Q4Q1Q2 Bronze gap Bronze documentation Bronze certification Silver gap Silver funding Silver mitigations Silver documentation Silver audit/certification

Resources

Standing on the Shoulders of Others  InCommon Assurance Program Website InCommon Assurance Program Website  InCommon Assurance Implementers wiki InCommon Assurance Implementers wiki  AD Cookbook for Silver  Failed Login Counter: Possible shared investment  Multi-factor Guidance  Va Tech Case Study  Password Entropy Calculators

Join the Club!  Make a community contribution to the Assurance Wiki  Participate on the mailing list  Join the monthly calls  Contribute to the reading of the Bronze spec starting this fall

Your Presenters Dedra Chamberlin Deputy Director, Identity and Access Management University of California – Berkeley Ann West Assistant Director for InCommon Assurance and Community Internet