Enterprise Key Management Infrastructures: Understanding them before auditing them Arshad Noor CTO, StrongAuth, Inc. Chair, OASIS EKMI-TC.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Mutual OATH HOTP Variants 65th IETF - Dallas, TX March 2006.
SPD1 Improving Security and Access to Network with Smart Badge Eril Pasaribu CISA,CISSP Security Consultant.
1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
1 Security on OpenStack 11/7/2013 Brian Chong – Global Technology Strategist.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
The OASIS IDtrust (I M The OASIS IDtrust (Identity and Trusted Infrastructure ) Member Section For more information please see:
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Exchange Network Key Management Services A Security Component February 28, 2005 The Exchange Network Node Mentoring Workshop.
An In-Depth Examination of PKI Strengths, Weaknesses and Recommendations.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Enterprise Key Management Infrastructure (EKMI) Arshad Noor CTO, StrongAuth, Inc. Chair, EKMI TC – OASIS
Enterprise Key Management Infrastructure: Understanding them before auditing them Arshad Noor CTO, StrongAuth, Inc. Chair, OASIS EKMI-TC.
Core Web Service Security Patterns
Java Security Model Lab#1 I. Omaima Al-Matrafi. Safety features built into the JVM Type-safe reference casting Structured memory access (no pointer arithmetic)
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Security and Policy Enforcement Mark Gibson Dave Northey
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Web services security I
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
1 Introduction to Information Security , Spring 2015 Lecture 7: Applied cryptography: asymmetric Eran Tromer Slides credit: John Mitchell, Stanford.
Copyright © 2015 Pearson Education, Inc. Confidentiality and Privacy Controls Chapter
Public Key Infrastructure from the Most Trusted Name in e-Security.
Russ Housley IETF Chair Founder, Vigil Security, LLC 8 June 2009 NIST Key Management Workshop Key Management in Internet Security Protocols.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Clinic Security and Policy Enforcement in Windows Server 2008.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Data Center Infrastructure
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Authenticating Users Chapter 6. Learning Objectives Understand why authentication is a critical aspect of network security Describe why firewalls authenticate.
Enterprise Privacy Architectures Leveraging Encryption to Keep Data Private Karim Toubba VP of Product Management Ingrian Networks.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Sagar Joshi Senior Security Consultant | ACE Team, Microsoft Information Security
WS-Security: SOAP Message Security Web-enhanced Information Management (WHIM) Justin R. Wang Professor Kaiser.
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
Enterprise Key Management Infrastructure: Understanding them before auditing them Arshad Noor, CTO, StrongAuth, Inc. Chair,
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Cryptography Chapter 14. Learning Objectives Understand the basics of algorithms and how they are used in modern cryptography Identify the differences.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
Chapter 18: Doing Business on the Internet Business Data Communications, 4e.
What is EKMI? Enterprise Key Management Infrastructure Take the tour.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Securing Data in Transit and Storage Sanjay Beri Co-Founder & Senior Director of Product Management Ingrian Networks.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Security Policy and Key Management Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric. Tina Stewart, Vice President.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Enterprise Key Management Infrastructure (EKMI) Securing data for e-Business and e-Government Arshad Noor, Co-Chair, EKMI-TC
Enterprise Key Management Infrastructure (EKMI) Arshad Noor, Chair, EKMI TC OASIS IDtrust Workshop Barcelona, Spain October.
CS691 M2009 Semester Project PHILIP HUYNH
KMIP Key Management with Vormetric Data Security Manager
Enabling Encryption for Data at Rest
Enabling Encryption for Data at Rest
CS691 M2009 Semester Project PHILIP HUYNH
Public Key Infrastructure from the Most Trusted Name in e-Security
Presentation transcript:

Enterprise Key Management Infrastructures: Understanding them before auditing them Arshad Noor CTO, StrongAuth, Inc. Chair, OASIS EKMI-TC

Agenda What is an EKMI? Components of an EKMI Auditing an EKMI ISACA members at OASIS EKMI Summary

Business Challenges Regulatory compliance –PCI-DSS, FISMA, HIPAA, SB-1386, etc. Avoiding fines –ChoicePoint: $15M, Nationwide: $2M Avoiding lawsuits –TJX (multiple), Bank of America Avoiding negative publicity to the brand –TJ Maxx, Ralph Lauren, Citibank, Wells Fargo, IBM, Ernst & Young, Fidelity, etc., etc.

The Encryption Problem ● Generate ● Encrypt ● Decrypt ● Escrow ● Authorize ● Recover ● Destroy ● Generate ● Encrypt ● Decrypt ● Escrow ● Authorize ● Recover ● Destroy ● Generate ● Encrypt ● Decrypt ● Escrow ● Authorize ● Recover ● Destroy ● Generate ● Encrypt ● Decrypt ● Escrow ● Authorize ● Recover ● Destroy ● Generate ● Encrypt ● Decrypt ● Escrow ● Authorize ● Recover ● Destroy ● Generate ● Encrypt ● Decrypt ● Escrow ● Authorize ● Recover ● Destroy....and so on

Key-management silos

What is an EKMI? ● An Enterprise Key Management Infrastructure is: “A collection of technology, policies and procedures for managing all cryptographic keys in the enterprise.”

EKMI Characteristics ● A single place to define EKM policy ● A single place to manage all keys ● Standard protocols for EKM services ● Platform and Application-independent ● Scalable to service millions of clients ● Available even when network fails ● Extremely secure

EKM Harmony

The Encryption Solution WAN SKS Server Generate Protect Escrow Authorize Recover Destroy Encrypt Decrypt SKS Server Encrypt Decrypt Encrypt Decrypt Encrypt Decrypt Encrypt Decrypt Encrypt Decrypt

EKMI Components ● Public Key Infrastructure ● For digital certificate management; used for strong-authentication, and secure storage & transport of symmetric encryption keys ● Symmetric Key Management System ● SKS Server for symmetric key management ● SKCL for client interactions with SKS Server ● SKSML for SKCL-SKS communication ● EKMI = PKI + SKMS

PKI Well known, but not well understood Reputation for being costly and complex BUT –Used in every e-commerce solution –Used by DOD of most democratic nations –Citizen cards, e-Passports –Corporate Access Cards –US Personal Identity Verification (PIV) card –IETF PKIX standards

SKMS: SKS Server Symmetric Key Services Server –Contains all symmetric encryption keys –Generates, escrows and retrieves keys –ACLs authorizing access to encryption keys –Central policy for symmetric keys: Key-size, key-type, key-lifetime, etc. –Accepts SKSML protocol requests –Functions like a DNS-server

SKMS: SKCL Symmetric Key Client Library –Communicates with SKS Server –Requests (new or existing) symmetric keys –Caches keys locally, per key-cache policy –Encrypts & Decrypts data, per key-use policy Currently supports 3DES, AES-128, AES-192 & AES-256 –Makes SKSML requests –Functions like DNS-client library

SKMS: SKSML Symmetric Key Services Markup Language –Request new symmetric key(s) from SKS server, when Encrypting new information, or Rotating symmetric keys for existing ciphertext –Request existing symmetric key(s) from SKS server for decrypting previously encrypted ciphertext –Request key-cache-policy information for client

The Big Picture

Security in an SKMS Symmetric keys are encrypted with SKS server's RSA public-key for secure storage Client requests are digitally signed (RSA) Server responses are digitally signed (RSA) and encrypted (RSA) All database records are digitally signed (RSA) when stored, and verified when accessed – including history logs – for message integrity

Common KM problems Using proprietary encryption algorithm “Hiding” the encryption key on the machine Embedding encryption key in software Encrypting symmetric key with another Using a single key across the enterprise Backing up key with data on the same tape Using weak passwords for Password- Based-Encryption (PBE)

Auditing an EKMI Key-management policy Prerequisite controls: –Physical access control to EKMI machines –Logical & network access control to EKMI –Standard security controls Firewall Minimal attack-surface (minimal services) Security patches Security logging

Auditing an SKMS Client Is a hardware token being used? How many people are required to log into the token to activate it? How many people have access to token? How often is the token PIN changed? How much data is encrypted with 1 key? SHA-1 hash of client library?

Auditing an SKMS Server Is a hardware token being used? How many people are required to log into the token to activate it? How many people have access to token? How often is token PIN changed? SHA-1 hashes of server jar files?

OASIS EKMI-TC ● Standardize on Symmetric Key Services Markup Language (SKSML) ● Create Implementation & Operations Guidelines ● Create Audit Guidelines ● Create Interoperability Test-Suite

OASIS EKMI-TC Members ● FundServ, PA Consulting, PrimeKey, Red Hat, Sterling Commerce, StrongAuth, US DoD, Visa International, Wave Systems ● Booz Allen Hamilton, EMC (RSA), Entrust, Mitre Corporation, Oracle, Sigaba, Symantec ● Individuals representing Audit and Security backgrounds

ISACA – OASIS Many ISACA members from San Francisco are EKMI-TC (AGSC) members Full-day workshop scheduled for October- November 2007 –Setting up an SKMS –Operating an SKMS –Auditing an SKMS –Attacking an SKMS

Conclusion ● “Securing the Core” should have been Plan A from the beginning... but its not too late to remediate. ● OASIS EKMI-TC is driving new key- management standards that cuts across platforms, applications and industries. ● Auditing EKMIs requires new levels of knowledge and understanding. ● Get involved!

Thank you!