Direct Project Direct + Policy Enablement. 12/06/10 Overview Policy Role In Direct Policy Enablement Security and Trust Support Architecture Tool Demo.

Slides:



Advertisements
Similar presentations
Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing Xinwen Zhang Francesco Parisi-Presicce Ravi Sandhu
Advertisements

DNSSEC in Windows Server. DNS Server changes Provide DNSSEC support in the DNS server – Changes should allow federal agencies to comply with SC-20 and.
2 Introduction A central issue in supporting interoperability is achieving type compatibility. Type compatibility allows (a) entities developed by various.
LEAD Portal: a TeraGrid Gateway and Application Service Architecture Marcus Christie and Suresh Marru Indiana University LEAD Project (
PKE PP Mike Henry Jean Petty Entrust CygnaCom Santosh Chokhani.
Electronic Submission of Medical Documentation (esMD) for Medicare FFS Presentation to HITSC Provenance Workgroup January 16, 2015.
S&I Framework Provider Directories Initiative esMD Work Group October 19, 2011.
Direct Project Scalable Trust and Trust Bundles. 12/06/10 Overview What is Scalable Trust State of Trust Trust Issues Trust Solutions Trust Bundle Demo.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Network Shared Services. Shared Services –Network Authentication and Authorization Services –Exchange Network Discovery Service –Universal Description.
Applying the ISO RM-ODP Standard in e-Government B. Meneklis 1, A. Kaliontzoglou 2,3, D. Polemi 1, C. Douligeris 1 1 University of Piraeus, Department.
Automated Policy Enforcement Adam Vincent, Layer 7 Federal Technical Director
DNS-centric PKI Sean Turner Russ Housley Tim Polk.
S&I Framework Doug Fridsma, MD, PhD Director, Office of Standards and Interoperability, ONC Fall 2011 Face-to-Face.
Application of Attribute Certificates in S/MIME Greg Colla & Michael Zolotarev Baltimore Technologies 47 th IETF Conference Adelaide, March 2000.
Jason Morrill NCOAUG Training Day February, 2008
Exchange of digitally signed SPSCertificate messages Overview of prototype of digital signature applied to SPSCertificate message between national systems.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
ESB Guidance 2.0 Kevin Gock
Cross Vendor Exchange Testing and Certification Plans April 18, 2013.
 Cloud computing  Workflow  Workflow lifecycle  Workflow design  Workflow tools : xcp, eucalyptus, open nebula.
Greg Andolshek Alex Koch Michael McCormick Team Lasso.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
BOB Tech Demo 2003 G2E – Las Vegas. Agenda  Best of Breed – a layering of standards  Standards, messaging, protocols and why you care  From the bottom.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Cross Vendor Exchange Testing and Certification Plans April 18, 2013 Meaningful Use Stage 2 Exchange Summit Avinash Shanbhag, ONC.
An XMPP (Extensible Message and Presence Protocol) based implementation for NHIN Direct 1.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
Presented at: Demonstrations and Prototypes TIM 7 Presented by: Dominic Timoteo / Shoeb Jafri SWIM Implementation Team May 04, 2011 Federal Aviation Administration.
Module 6 Planning and Deploying Messaging Security.
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
TUESDAY, 4:00 – 4:20PM WEDNESDAY, 4:00 – 4:20PM Douglas Hill, NHIN Implementation Lead (Contractor), Office of the National Coordinator for Health IT Vanessa.
Configuring Directory Certificate Services Lesson 13.
MagicNET: Security Architecture for Creation, Classification, and Validation of Trusted Mobile Agents Presented By Mr. Muhammad Awais Shibli.
HEPKI-PAG Policy Activities Group David L. Wasley University of California.
Serving society Stimulating innovation Supporting legislation Danny Vandenbroucke & Ann Crabbé KU Leuven (SADL) AAA-architecture for.
Privacy Communication Privacy Confidentiality Access Policies Systems Crypto Enforced Computing on Encrypted Data Searching and Reporting Fully Homomorphic.
Random Logic l Forum.NET l Web Services Enhancements for Microsoft.NET (WSE) Forum.NET ● October 4th, 2006.
Shibboleth Akylbek Zhumabayev September Agenda Introduction Related Standards: SAML, WS-Trust, WS-Federation Overview: Shibboleth, GSI, GridShib.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
AAI WG EMI Christoph Witzig on behalf of EMI AAI WG.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
ESafe Open Modules Overview Open modules implementing the eSafe document exchange protocol.
Health eDecisions Use Case 2: CDS Guidance Service Strawman of Core Concepts Use Case 2 1.
Identity Proofing, Signatures, & Encryption in Direct esMD Author of Record Workgroup John Hall Coordinator, Direct Project June 13, 2012.
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
Automate Blue Button Initiative Push Workgroup Meeting February 4, 2013.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
Service Component Architecture (SCA) Policy TC … Face to Face Agenda – Jan 24,
Web Services Security Patterns Alex Mackman CM Group Ltd
Standards Implementation and Testing Environment (SITE) Direct Transport Sandbox.
Direct Project Virtual Connect-A-Thon January 2016.
EMI is partially funded by the European Commission under Grant Agreement RI Federated Grid Access Using EMI STS Henri Mikkonen Helsinki Institute.
ESRIN, 15 July 2009 Slide 1 Web Service Security support in the SSE Toolbox HMA-T Phase 2 FP 14 December 2009 S. Gianfranceschi, Intecs.
Internet Business Associate v2.0
Module 8: Securing Network Traffic by Using IPSec and Certificates
2018 Real Cisco Dumps IT-Dumps
Technical Management Processes
Data Security in Local Networks using Distributed Firewalls
Instrument PDR Summary of Objectives
Module 8: Securing Network Traffic by Using IPSec and Certificates
Enforcement and Policy Challenges in Health Information Privacy
Nagios with The Decision Engine Implementing Passive Checks
{Project Name} Organizational Chart, Roles and Responsibilities
Remote ATtestation ProcedureS (RATS)
Presentation transcript:

Direct Project Direct + Policy Enablement

12/06/10 Overview Policy Role In Direct Policy Enablement Security and Trust Support Architecture Tool Demo

12/06/10 Policy Role In Direct Scalable Trust Philosophy for enabling Direct exchange between a large number of endpoints Policy first class citizen in scalable trust Mitigates policy variance Proposed Policy Requirements Federal Community Requirements Governance Trust Bundles Technical solution to scalable trust Bundle profiles define policy requirements Only define and attest policy compliance Can not assert and enforce policy Bundles alone are not enough

12/06/10 Policy Enablement Facilitate Policy Decisions at Runtime Systemic assertion of policy profile compliance Direct 2.0 vs Policy Enablement 2.0 may imply specification changes Potential compatibility issues Policy enablement requires no specification changes Optional module Backward compatible at transport

12/06/10 Security and Trust Support Modular Components Encryption Signature Cert Discovery Trust Chaining Current Policy Ability Simple binary trust decision based on certificate chain validation

12/06/10 Security and Trust Support Current State – Outgoing Message Certificate Store Dual Use Certificates Private Resolver All non-expired All non-revoked Public Resolver All non-expired All non-revoked Trust Chain to trust anchor

12/06/10 Security and Trust Support Current State – Incoming Message Certificate Store Dual Use Certificates Private Resolver All non-expired All non-revoked Verification Message integrity Trust Chain to trust anchor

12/06/10 Security and Trust Support Optional Policy Enablement Module Policy implemented as filters Injected into security and trust process Private Certificate Resolution Public Certificate Resolution Trust Chain Validation Configurable Granularity Message Direction Message Source Message Destination Circles of Trust Can be applied to DNS or LDAP hosting Defined Policy Best Practices

12/06/10 Security and Trust Support Policy Enabled State – Outgoing Message Certificate Store Dual Use or Single Use Certificates Private Resolver All non-expired All non-revoked Public Resolver All non-expired All non-revoked Trust Chain to trust anchor Policy Filter Filter certs that meet configured criteria

12/06/10 Security and Trust Support Policy Enabled State – Incoming Message Certificate Store Dual Use or Single Use Certificates Private Resolver All non-expired All non-revoked Public Resolver All non-expired All non-revoked Verification Message integrity Policy Filter Filter certs that meet configured criteria

Policy Engine Policy Engine (direct-policy.jar) Policy defined in lexicon specific language Definition + X509 Certificate processed by engine Engine evaluates boolean value to indicate certificate compliance with policy Policy filter equates to policy engine process in security and trust agent 12/06/10 Architecture Intermediate State Policy Definition Lexicon Parser Compiler Opcodes Executor Boolean Decision X509 Cert

12/06/10 Policy Engine Use Cases Build Policy Definitions Tooling to build definition file Policy filters in security and trust agent Out of band policy validation Trust bundle profile validation for anchors End entity certificate validation to CP or CPS

12/06/10 Release Schedule Q Policy Engine Security and Trust Agent Configuration Service Command Line Import and Configuration of Definitions Gateway Policy Validator Summer/Early Fall 2013 Visual Policy Builders Config-UI integration Java RI 3.0 to include Q release components

12/06/10 For More Information Direct + Policy Proposal: Scalable Trust Forum: Scalable Trust Summary: summary-of-findings-report.pdfhttp:// summary-of-findings-report.pdf Direct Trust Bundle Workgroup: Scalable Trust Story:

12/06/10 Policy Validation Tool Demo DEMO!!