The OASIS IDtrust (I M The OASIS IDtrust (Identity and Trusted Infrastructure ) Member Section For more information please see:

Slides:



Advertisements
Similar presentations
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Advertisements

PKE PP Mike Henry Jean Petty Entrust CygnaCom Santosh Chokhani.
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
1st Expert Group Meeting (EGM) on Electronic Trade-ECO Cooperation on Trade Facilitation May 2012, Kish Island, I.R.IRAN.
PKI Implementation in the Real World
Cybersecurity Issues Impacting Public Sector Financial Management OASIS e-Gov Washington Workshop, April John Sabo Director Global Government Relations.
PAPERLESS BUSINESS in GEORGIAN FINANCIAL SECTOR NANA ENUKIDZE - Advisor to the Governor.
Enterprise Key Management Infrastructures: Understanding them before auditing them Arshad Noor CTO, StrongAuth, Inc. Chair, OASIS EKMI-TC.
WS-Security TC Christopher Kaler Kelvin Lawrence.
Click to edit Master title style OASIS PKI Workshop.
Public Key Superstructure It’s PKI Jim, but not as we know it! 7 th Annual “IDtrust” Symposium 5 March 2008, Gaithersburg MD, USA Stephen Wilson Lockstep.
Stephen Wilson Chair, PKI Adoption Technical Committee Managing Director, Lockstep, Australia PKIA Goals for 2007 Stephen Wilson Chair, PKI Adoption Technical.
Enterprise Key Management Infrastructure (EKMI) Arshad Noor CTO, StrongAuth, Inc. Chair, EKMI TC – OASIS
Enterprise Key Management Infrastructure: Understanding them before auditing them Arshad Noor CTO, StrongAuth, Inc. Chair, OASIS EKMI-TC.
Burton Group Catalyst Meeting Barcelona, Spain 22 October 2007 June Leung OASIS PKI Adoption TC The OASIS PKI Adoption TC Objectives and Case Studies Burton.
Burton Group Catalyst Workshop June Leung on behalf of Stephen Wilson Chair, OASIS PKI Adoption TC The OASIS PKI Adoption TC Objectives and Work Program.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E 36th RIPE Meeting Budapest 2000 APNIC Certificate Authority Status Report.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
Web services security I
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
A Robust Health Data Infrastructure P. Jon White, MD Director, Health IT Agency for Healthcare Research and Quality
Russ Housley IETF Chair Founder, Vigil Security, LLC 8 June 2009 NIST Key Management Workshop Key Management in Internet Security Protocols.
National Smartcard Project Work Package 8 – Security Issues Report.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Vilnius, October 21st, 2002 © eEurope SmartCards Securing a Telework Infrastructure: Smart.IS - Objectives and Deliverables Dr. Lutz Martiny Co-Chairman,
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
INFORMATION SECURITY THE NEXT GENERATION 13 th World Electronics Forum Israel Christopher Joscelyne Board Member & Membership Chairman AEEMA November 2007.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Burton Group Catalyst Meeting xxxxxxxxx Stephen Wilson Chair, OASIS PKI Adoption TC The OASIS PKI Adoption TC Objectives and Work Program Burton Group.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
X-Road – Estonian Interoperability Platform
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Enterprise Key Management Infrastructure: Understanding them before auditing them Arshad Noor, CTO, StrongAuth, Inc. Chair,
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
U.S. General Services Administration Federal Technology Service November 9, 1999 Judith Spencer Director, Center for Governmentwide Security Office of.
What is EKMI? Enterprise Key Management Infrastructure Take the tour.
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
PKI Survey Chet Ensign OASIS Individual Member Chet Ensign OASIS Individual Member Study on the Use of PKI in OASIS Standards March 26th, 2008.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
Standards in E government Harm Jan van Burg OASIS E-gov Technical Committee Oasis adoption forum, London October 17,
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Electronic Security and PKI Richard Guida Chair, Federal PKI Steering Committee Chief Information Officers Council
E-Science Security Roadmap Grid Security Task Force From original presentation by Howard Chivers, University of York Brief content:  Seek feedback on.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Presented by: Sonali Pagade Nibha Dhagat paper1.pdf.
Security Policy and Key Management Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric. Tina Stewart, Vice President.
Expectations for the New Secure Network Age panel discussion Asia PKI Forum Conference Tokyo 24 February 2005 Stephen Wilson (OASIS liaison to APKIF) PKI.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
OASIS IDtrust Member Section June Leung Chair, OASIS IDtrust Member Section Steering Committee
Enterprise Key Management Infrastructure (EKMI) Securing data for e-Business and e-Government Arshad Noor, Co-Chair, EKMI-TC
Enterprise Key Management Infrastructure (EKMI) Arshad Noor, Chair, EKMI TC OASIS IDtrust Workshop Barcelona, Spain October.
Security in ebXML Messaging
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
HIMSS National Conference New Orleans Convention Center
Install AD Certificate Services
InfiNET Solutions 5/21/
Presentation transcript:

The OASIS IDtrust (I M The OASIS IDtrust (Identity and Trusted Infrastructure ) Member Section For more information please see: For more information related to ‘Joining OASIS,’ please see:

OASIS provides a neutral setting where government agencies, companies, research institutes, and individuals work together to advance the use of trusted infrastructures. The OASIS PKI Member Section has restructured as the OASIS Identity and Trusted Infrastructure (IDtrust) Member Section The IDtrust MS has expanded its scope to encompass additional standards-based identity and trusted infrastructure technologies, policies, and practices.

Transformation Old PKI Forum Migration to OASIS PKI MS in November 2002 One TC Focus on use of PKI and addressing barriers to deployment, not development of technical standards London OASIS Adoption Forum in November 2006 Led to transformation into IDtrust MS in 2007

Four Strategic Focus Areas: Identity and Trusted Infrastructure components such as cataloguing and carrying out studies and projects addressing technology-based Identity and Trust models and standards, including those that are PKI-based as well as those utilizing other security mechanisms; relevant protocols and standards; trust infrastructures in use; and costs, benefits and risk management issues Identity and Trust Policies and Enforcement, including policies and policy issues; policy mapping and standardization; assurance; technical validation mechanisms; and trust path building and validation

Four Strategic Focus Areas: Education and Outreach: documenting trust use cases and business case scenarios, best practices and adoption reports and papers; organizing conferences and workshops; and establishing Web-based resources Barriers and Emerging Issues associated with Identity and Trusted Infrastructures, including data privacy issues; interoperability; cross border/ organizational trust; outsourcing; cryptographic issues; application integration; and international issues

PKI IDtrust Steering Committee Dr. Abbie Barbir, Nortel June Leung, FundSERV Arshad Noor, StrongAuth John Sabo, CA, Inc. Ann Terwilliger, Visa International

Two Technical Committees Enterprise Key Management Infrastructure TC Chairs: Hans van Tilburg, Visa Arshad Noor, StrongAuth PKI Adoption TC Chair: Stephen Wilson, Lockstep LLC

Enterprise Key Management Infrastructure (EKMI) TC

Business Motivation Regulatory Compliance PCI-DSS, HIPAA, FISMA, SB-1386, etc. Avoiding fines ChoicePoint $15M, Nationwide $2M Avoiding lawsuits – BofA, TJX Avoiding negative publicity VA, IRS, TJX, E&Y, Citibank, BofA, WF, Ralph Lauren, UC, etc.

e-Business/e-Government Challenges Sharing data while keeping it secure Protected Critical Information Infrastructure (PCII) at the DHS Medical, Taxpayer and Employee data Other sensitive data Protecting data across the enterprise Laptops, Desktops, Databases, PDAs, Servers, Storage devices, Partners, etc.

Encryption Problem ● Generate ● Encrypt ● Decrypt ● Escrow ● Authorize ● Recover ● Destroy ● Generate ● Encrypt ● Decrypt ● Escrow ● Authorize ● Recover ● Destroy ● Generate ● Encrypt ● Decrypt ● Escrow ● Authorize ● Recover ● Destroy ● Generate ● Encrypt ● Decrypt ● Escrow ● Authorize ● Recover ● Destroy ● Generate ● Encrypt ● Decrypt ● Escrow ● Authorize ● Recover ● Destroy ● Generate ● Encrypt ● Decrypt ● Escrow ● Authorize ● Recover ● Destroy and on and on

Encryption Solution WAN SKS Server Generate Protect Escrow Authorize Recover Destroy Encrypt Decrypt SKS Server Encrypt Decrypt Encrypt Decrypt Encrypt Decrypt Encrypt Decrypt Encrypt Decrypt

What is an EKMI? An Enterprise Key Management Infrastructure is: “A collection of technology, policies and procedures for managing all cryptographic keys in the enterprise.”

EKMI Characteristics A single place to define EKM policy A single place to manage all keys Standard protocols for EKM services Platform and Application-independent Scalable to service millions of clients Available even when network fails Extremely secure

EKMI Components PKI For digital certificate management; used for strong-authentication, and secure storage & transport of symmetric encryption keys Symmetric Key Management System SKS Server for symmetric key management SKCL for client interactions with SKS Server EKMI = PKI + SKMS

EKMI-TC Goals Standardize on a Symmetric Key Services Markup Language (SKSML) Create Implementation & Operations Guidelines Create Audit Guidelines Create Interoperability Test-Suite

EKMI-TC Members/Observers FundServ, PA Consulting, PrimeKey, Sterling Commerce, StrongAuth, US DoD, Visa International, Wave Systems Booz Allen Hamilton, EMC (RSA), Entrust, Mitre Corporation, Oracle, Sigaba, Symantec Individuals representing Audit and Security backgrounds

PKI Adoption TC

The PKI environment c PKI is resurgent, driven by applications needing signatures, esp. for paperless transacting Embedded keys & certs now commonplace Certificates now more about relationships between issuer & subject than “identity” of strangers In the midst of paradigm shift to identity plurality PKI becoming application specific, not general purpose

Resurgent, Embedded Business-Driven PKI Closed/Vertical/Community based schemes US PIV, Identrus, ICAO e-passports, CableLabs, Skype, BankID (Sweden) National ID smartcards with PKI Hong Kong, Malaysia, Estonia, Belgium, Thailand … Health smartcards with PKI France, Germany, Taiwan, Italy, Austria, Australia … Digital Credentials based on certificates US Patent Office, Australia, France, Taiwan, …

PKI Adoption: Draft objectives Note: These are proposed objectives of the new PKI Adoption TC, yet to be ratified by the Committee. Continue to overcome obstacles with targeted practical initiatives that improve understanding of PKI Re-vitalise and complete the Third International Survey See to download survey Canvass and disseminate PKI case studies Modernise the PKI message so it reflects real needs De-mystify legal, governance and interoperability issues Liaise more closely with other OASIS efforts

Study on the Use of PKI in OASIS Standards Chet Ensign

Overall project goals Document use & applicability of PKI for OASIS standards Identify expectations re authentication, integrity, confidentiality, etc. Identify assumptions re specific PKI methods/systems available List explicit standards referenced Identify possible issues & barriers Provide recommendations

Status 2nd stage of study on use of PKI & related technologies in OASIS standards Study has 3 stages: Update earlier 2003 report Write new report on applicability, expectations and assumptions in OASIS TCs Provide briefings to Member Section

Approach to TC reviews  Group TCs by importance of e-business services to TC success Interview TC chairs or technical leads Review archives & documents for discussion of: Services, e.g. authentication, trust, encryption, digital signature Specific standards, e.g. PKI, X.509, Kerberos, SAML Summarize trends, observations, themes & provide any recommendations

Preliminary observations (1) Acronym “PKI” not broadly used. Instead, TCs discuss services (e.g. authentication, digital signature) or standards (e.g. X.509, Kerberos, SAML) Concepts and issues generally lumped under “Security” ‘End-user’ standards (e.g. Election & Voter Services, Court Filing) leave solution to implementation or reference other standards

Preliminary observations (2) PKI perceived as big, expensive and complex relative to the issues users believe they need to solve. Also has reputation for interoperability problems. Many standards leave flexibility to implementation to ensure use. General sense that buyers do not understand issues, so do not call for PKI solutions.

TC PKI References

Closed TCs Since 09/03, 27 TCs closed 22 in original 2003 study; 5 were not Of 22, only 7 (about 1/3/) discussed PKI concepts or standards in archives or specifications Only 1 explicitly addressed authentication & security in its spec

Closed TCs Published documents & discussion of PKI (4 TCs): Business Transactions; Application Vulnerability Description Language; Directory Services ML; XML Common Biometric Format XML Common Biometric Format was only spec to address PKI in depth

New TCs Since 09/03 draft, 37 TCs started 6 completed & covered above Of 31, 15 (about 1/2/) discuss PKI concepts or standards in archives or documents 7 explicitly address PKI concepts or issues in their work

New TCs New TCs most actively addressing PKI issues, concepts and standards: Enterprise Key Management Infrastructure Framework for Web Services Implementation International Health Continuum WS Quality Model WS Reliable Exchange WS Secure Exchange WS Transaction

Study Next Steps Chet Ensign now completing interviews Analysis of findings Development of inferences and conclusions Final report and presentation to the MS within next two months

IDTrust Summary Steering Committee developing new work plan for 2007 and 2008 Many opportunities to get involved Invitation to join OASIS and participate in the MS and/or TCs Contact Dee Schur