Johnson & Johnson Use of Public Key Technology Brian G. Walsh Senior Analyst, WWIS.

Slides:



Advertisements
Similar presentations
Digital Certificate Installation & User Guide For Class-2 Certificates.
Advertisements

Installation & User Guide
Digital Certificate Installation & User Guide For Class-2 Certificates.
Digital Certificate Installation & User Guide For Class-2 Certificates.
KIERAN JACOBSEN HP Understanding PKI and Certificate Services Gold Sponsors Silver Sponsors.
Deploying and Managing Active Directory Certificate Services
SSL & SharePoint IT:Network:Applications. Agenda Secure Socket Layer Encryption 101 SharePoint Customization SharePoint Integration.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
PKI Implementation in the Real World
Chapter 9 Deploying IIS and Active Directory Certificate Services
U N C L A S S I F I E D LA-UR LANL Exchange / Blackberry Deployment June 2, 2009 Anil Karmel Solutions Architect Network and Infrastructure Engineering.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
PKI Activities at Virginia January 2004 CSG Meeting Jim Jokl.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Mobile Credentials Ennio J. Carboni Product Manager, Keon PKI
Dartmouth PKI Deployment Robert Brentrup PKI Summit July 14, 2004.
Adoption of PKI Where are we, where should we be, what’s holding us back, and where do we want to go? And: what about authentication vs. authorization?
1 Johnson & Johnson: Use of Public Key Technology Rich Guida Director, Information Security Rajesh Shah Sr. Consultant, Information Security.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Understanding Active Directory
Chapter 11: Active Directory Certificate Services
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Identity Management and PKI Credentialing at UTHSC-H Bill Weems Academic Technology University of Texas Health Science Center at Houston.
PKI-Enabled Applications That work! Linda Pruss Office of Campus Information Security
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Public Key Infrastructure Ammar Hasayen ….
Managing Client Access
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
Security Directions - Release 6 and beyond SearchDomino.com Webcast Patricia Booth Security and Directory Product Management 9/25/02.
F. Guilleux, O. Salaün - CRU Middleware activities in French Higher Education.
Active Directory ® Certificate Services Infrastructure Planning and Design Published: June 2010 Updated: November 2011.
Deploying PKI Inside Microsoft The experience of Microsoft in deploying its own corporate PKI Published: December 2003.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Johnson & Johnson’s Public Key Infrastructure Bob Stahl
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
HEPKI-TAG UPDATE Jim Jokl University of Virginia
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
Configuring Directory Certificate Services Lesson 13.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
Dartmouth PKI Update Robert Brentrup Internet2 Member Meeting April 21, 2004.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Integrating security services with the automatic processing of content TERENA 2001 Antalya, May 2001 Francesco Gennai, Marina Buzzi Istituto.
PKI Activities at Virginia September 2000 Jim Jokl
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Who’s watching your network The Certificate Authority In a Public Key Infrastructure, the CA component is responsible for issuing certificates. A certificate.
WSV Problem Background 3. Accelerated Protocols and Workloads 4. Deployment and Management 2. BranchCache Solution Modes 5. BranchCache Protocols.
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
PKI Future Directions 29 November 2001 Russ Housley RSA Laboratories CS – Class of 1981.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Copyright Statement Copyright Robert J. Brentrup This work is the intellectual property of the author. Permission is granted for this material to.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Digital Disruption, Alfresco, and Digital Signatures Brian LaPointe VP Sales, Americas CoSign by ARX.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Total Enterprise Mobility Comprehensive Management and Security
Virtual Private Networks (VPN)
Product Manager, Keon PKI
Virtual Private Networks (VPN)
IWRITER 365 Offers Seamless, Easy-to-Use Solution for Using, Designing, Managing, and Sharing All Your Company Templates in Microsoft Office 365 OFFICE.
Rights Management Services (RMS)
It’s About Time – ScheduleMe Outlook Add-In for Office 365 Enables Users to Schedule Meetings Easily with People Outside of Your Organization Partner Logo.
Office 365 Integration Enables WebUntis Users to Sign in Using Office 365 Account Information and to Export WebUntis Timetables Directly to Outlook OFFICE.
ForceManager Integrates with Office 365 Outlook Mail, Calendar, Contacts, Word, and Excel for a Smart, Fast, Intuitive Mobile CRM Sales Solution OFFICE.
Public Key Infrastructure from the Most Trusted Name in e-Security
Install AD Certificate Services
National Trust Platform
Presentation transcript:

Johnson & Johnson Use of Public Key Technology Brian G. Walsh Senior Analyst, WWIS

2 Johnson & Johnson The world’s largest and most comprehensive manufacturer of health care products Founded in 1886 Headquartered in New Brunswick, NJ Sales of $41.9 billion in operating companies in 54 countries Over 110,000 employees worldwide Customers in over 175 countries

3 Four Business Groups Pharmaceuticals –Prescription drugs including EPREX, REMICADE Medical Devices and Diagnostics –Blood analyzers, stents, wound closure, prosthetics, minimally invasive surgical equipment Consumer Products –E.g., Neutrogena; SPLENDA Consumer Pharmaceuticals and Nutritionals –E.g., TYLENOL

4 Statistics 400+ UNIX servers; WinNT/2000 servers 96,000+ desktops/laptops (Win2K) 60,000+ remote users –Employ two-factor authentication (almost all using PKI; a few still using SecurID but being migrated) 50M+ s/month; 50+ TB of storage 530+ internet and intranet servers, 3.3M+ website hits/day

5 Enterprise Directory Uses Active Directory forest –Separate from Win2K OS AD but some contents replicated Populated by authoritative sources only Uses World Wide Identifiers (WWIDs) as index Supports entire security framework –Source of all information put into certificates 300K+ entries (employees, partners, retirees, former) LDAP accessible

6 J&J PKI Directory centric – certificate subscriber must be in Enterprise Directory Certificate contents dictated by ED info (none based on “user-supplied input”) Certificates issued with supervisor ID proofing Simple hierarchy – root CA and subordinate online CA

7 J&J PKI (con’t) Standard form factor: hardware tokens (USB) Production deployment began early 2003 –Total of over 150,000 certificates (signature and encryption) issued to date Most important initial applications: –Remote authentication –Secure –Some enterprise applications

8 Experience (1) Training help desks (you can’t do too much of this…) Ensuring sufficient help desk resources to respond to peaks (>100% of average level; fortunately reasonably short half-life) Shifting user paradigms (always hard to change human behavior…) –Patience –Clear, unequivocal instructions/steps

9 Experience (2) Hardware tokens –CSP issues of “Pass Phrase caching” –User recovery from lost, stolen or destroyed token Short term recovery (network userID/PW) Long term recovery (new cert(s)) Certificate revocation –Reason codes in CRL (25% increase in size of CRL) –Don’t give users options to select (too confusing to them) – ask questions instead (then automate reason code selection)

10 Experience (3) We put in three identifiers in each cert (e- mail address, WWID, UPN) –Right thing to do for apps –Means employee transfer out/transfer in processes require getting new certs (since address changes) –HR controls those processes, not IM –Moral: smart IM technical/policy decisions may require implementation outside IM

11 Experience (4) Once user gets new certs: –Register them with apps (e.g., Outlook S/MIME profile changes) –Link them to other user accounts (e.g., Nortel VPN client) Thus – there are some additional steps to “migrate” to new certs –Not yet seamless

12 Experience (5) Decryption private key recovery –User can do for his/her own (after authenticating) –Local Key Recovery Authority Officer can request for others Global KRAO must approve –But – important to distinguish key recovery from revocation or getting new certs –Unclear terminology (to users) resulted in lots of unnecessary requests, none of which required approval

13 Experience (6) CRL growth is always faster than you predict –Ours is now 1.3 MB (expected it to be less than half that size) Caching CRLs in Windows is “easy” but not obvious –IE manages CRL cache as part of “temporary internet files” folder –Standard setting for us was: flush that folder when IE is closed –Results in lots of CRL downloads

14 Experience (7) With employees in over 50 countries, J&J has one main business language (English) and over 12 important languages PKI certificate subscribers have to sign agreement to get tokens Must be in native languages Translation services became an issue – especially with last minute changes to agreement Lesson learned: English is not legally binding universally

15 Experience (8) Rolling out tokens and certificates to over 1000 individuals at a time over a 4-6 month period Users are not technically savvy, regular registration is confusing and complicated Need more then one way to get certificates to the user population, not everyone will understand a series of technical steps All problems attributed to PKI (Identity Token)!!!

Questions?? Brian G. Walsh Senior Analyst, WW Information Security

17 Group Registration Process Rolling out to the masses Strict Standard Operating Procedure –Number of Roles requiring training –Designed to maintain the integrity of the JJEDS, while enabling a speedy, easy roll-out Training of Help Desk and Deployments teams were crucial to the successful deployments It is still new technology, no matter how you package it