Kansas PKI Model Brian Stevenson General Manager Nebraska.gov.

Slides:



Advertisements
Similar presentations
What is. Digital Certificate It is an identity.
Advertisements

© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Seminar on Standardization and ICT Development for the Information.
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Digital Signatures in State of Tennessee Pam Roberts Finance & Administration Office for Information Resources Planning, Research & Development.
3SKey 3SKey.
Worldwide Access to Foreign Law: International & National Developments Toward Digital Authentication IFLA World Library and Information Congress 2012 Helsinki,
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Public Key Infrastructure (PKI) Hosting Services.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
Auditing of a Certification Authority Patrick Cain, CISA, CISM The Cooper-Cain Group, Inc.
HIT Standards Committee: Digital Certificate Trust – Policy Question for HIT Policy Committee March 29, 2011.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
Figure 1: SDR / MExE Download Framework SDR Framework Network Server Gateway MExE Download + Verification Using MExE Repository (Java sandbox) MExE Applet.
The 4BF The Four Bridges Forum Higher Education Bridge Certificate Authority.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
In the CA I trust. A look at Certification Authorities James E. Shearer CSEP 590 March 8 th 2006.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
Brooks Evans – CISSP-ISSEP, Security+ IT Security Officer Arkansas Department of Human Services.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Bill Maaske CIO AZ Secretary of State
ESIGN 101 Ken Moyle Margo Tank David Whitaker Chief Legal Officer
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Controller of Certifying Authorities Public Key Infrastructure for Digital Signatures under the IT Act, 2000 : Framework & status Mrs Debjani Nag Deputy.
Digital Signature Technologies & Applications Ed Jensen Fall 2013.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Galileo - Knowledge Testing Service e-MSoft Artur Majuch.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Commonwealth Office of Technology Finance and Administration Cabinet Electronic Signature Overview Name:Chris Clark Date: October 28, 2004.
THE ROLE OF CIVIL REGISTRY TO ACTIVATE THE ELECTRONIC AUTHENTICATION
Account Authority Digital Signature AADS Lynn Wheeler First Data Corporation
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
UNCLASSIFIED DITSCAP Primer. UNCLASSIFIED 1/18/01DITSCAP Primer.PPT 2 DITSCAP* Authority ASD/C3I Memo, 19 Aug 92 –Develop Standardized C&A Process DODI.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )
U.S. General Services Administration Federal Technology Service November 9, 1999 Judith Spencer Director, Center for Governmentwide Security Office of.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
Evolving Issues in Electronic Data Collection Workshop Interoperability Russ Savage Electronic Transactions Liaison Arizona Secretary of State Office.
DIGITAL SIGNATURE.
Session 52-1 Session 52 E-Signature: Implications of the E-SIGN Legislation for Student Aid 1.
PKI Policy Determination Process Input from PKI Decision Process PKI Policy Determination Process Application(s) Workflows Players.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Electronic Security and PKI Richard Guida Chair, Federal PKI Steering Committee Chief Information Officers Council
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Alex Ezrakhovich Process Approach for an Integrated Management System Change driven.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
Electronic Banking & Security Electronic Banking & Security.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
TAG Presentation 18th May 2004 Paul Butler
ESign Aashutosh.
TAG Presentation 18th May 2004 Paul Butler
SPECIALISED E-SERVICES FOR MUNICIPALITIES
Digital Signature.
Applying Robust Solutions
U.S. Federal e-Authentication Initiative
Secure Electronic Transaction (SET)
E-Commerce for Developing Countries (EC-DC)
INFORMATION SYSTEMS SECURITY and CONTROL
HIPAA Security Standards Final Rule
PKI (Public Key Infrastructure)
National Trust Platform
Presentation transcript:

Kansas PKI Model Brian Stevenson General Manager Nebraska.gov

Kansas PKI Uses Any individual or business required to interact with a state government agency in a transaction needing an ink signature or needing to transmit data through an unsecured network is a potential PKI user.

Make government more efficient and accessible to businesses. Kansas PKI Mission

Kansas PKI History Spent more than 8 years working on PKI Input from many groups –Combined resources (financial & personnel) –Across agency boundaries ITEC, KITO, KSOS, KDOT, KDOR, Treasurer, INK, Kansas.gov (accessKansas) –Enterprise-wide service

Cost Avoidance INK grant covered cost of creating Kansas PKI infrastructure –$261,000 –Represents cost avoidance for each agency that uses PKI

Kansas Infrastructure Statutes – PKI work group drafted legislation in 1999 – Legislation became part of the Kansas Uniform Electronic Transactions Act in 2001 – Legislation ensured various units of state government would not build silos Work group then drafted regulations and certificate policy

Stratified Responsibilities KSOS is responsible for the contract for Certification Authority services VeriSign is the CA INK is the Registration Authority Kansas created procedures to allow trusted parties to vet other trusted parties Certificate Policy

Self-sustaining Only strive for appropriate users Difference Between Kansas PKI & Other States

PKI committee reviews each potential PKI project Selects only those that are truly ready for PKI Evaluated on –need –readiness to implements –associated risks –return on investment Project Evaluation

Currently implementations added one at a time Ensures sufficient resources are available to make it successful Committee builds on knowledge gained from each implementation Implementation Process

Kansas state government treats PKI as a digital signature Digital Signature provides signer & document authentication –Signer authentication – ability to identify the person who digitally signed document –Document authentication – ensures the information was not altered after it was digitally signed Use of PKI

Encryption Digital Certificates have the ability to encrypt information Information can then only be understood by intended recipient

Kansas DOES NOT support treating PKI as access control, but as a supplement to these systems. PKI Is Not Access Control

KDOR E-lien Upcoming – KSOS ELVIS Both these applications will be discussed after lunch Current Uses of PKI

Thank You QUESTIONS & ANSWERS