Download presentation
Presentation is loading. Please wait.
Published byΔάμαλις Ίρις Παπαϊωάννου Modified over 5 years ago
1
CEF eDelivery Digital Service Infrastructure
eInvoicing day CEF eDelivery Digital Service Infrastructure 01 December 2016 João Rodrigues Frade, DIGIT B4
2
1 2 3 Agenda Introduction to eDelivery
eDelivery and eIDAS ERDS in practice 3 PEPPOL and CEF eDelivery Convergence Process
3
Introduction to eDelivery
1 Introduction to eDelivery
4
What happened before eDelivery Stakeholder Days 28/10/2016
TODAY eDelivery Stakeholder Days 28/10/2016 Webinar - How can CEF help you set-up your eDelivery infrastructure? 12/09/2016 Webinar - Electronic Registered Delivery Service (ERDS) and the eIDAS Regulation 26/07/16 CEF eDelivery - What's In It For You 26/05/16 Information session on AS4 Profile 25/05/16 eDelivery Extended Expert Group 19/05/16 CEF Digital Presents at the AMA More information on CEF Digital Event Calendar
5
What is eDelivery? PARTY PARTY eDelivery is a domain neutral message exchange infrastructure Justice Claims Reports eHealth PARTY PARTY PARTY Procurement Invoices Orders … Decisions Orders of Payment Patient Summaries PARTY Complaints Consumer Protection eDelivery enables the exchange of electronic data and documents among public administrations, businesses and citizens in a secure, reliable and trusted way
6
A message exchange infrastructure is
PARTY A message exchange infrastructure is PARTY A combination of a message exchange model, discovery model and security model on top of the internet, or of a private network, to exchange structured or unstructured information wrapped in a messaging envelope. Data Exchange Agreements Payload (structured/unstructured) Message Exchange model Topology Messaging protocol Integration approach (Participant) Discovery model Static vs. Dynamic Security Model Trust Circle Security Controls Network (public/private) PARTY Scope of CEF eDelivery PARTY PARTY PARTY
7
The example of OpenPEPPOL
PARTY The example of OpenPEPPOL PARTY Data Exchange Agreements PEPPOL Transport Infrastructure Agreements (legal framework) Payload PEPPOL Business Interoperability Specifications (document specifications) Message Exchange model 4-corner model (>100 APs) PEPPOL AS2 profile Service Providers (Participant) Discovery model Dynamic discovery with a central SML and over 50 SMPs Security Model PKI-based security Network Internet The Pan-European Public Procurement Online, the LSP of eProcurement, now transferred to the non-profit international association OpenPEPPOL. The purpose of OpenPEPPOL is to enable European businesses to easily deal electronically with any European public sector buyers in their procurement processes, thereby increasing opportunities for greater competition for government contracts and providing better value for tax payers’ money. PARTY Scope of CEF eDelivery PARTY PARTY PARTY
8
eIDAS Electronic Registered Delivery Services (ERDS)
PARTY eIDAS Electronic Registered Delivery Services (ERDS) PARTY Data Exchange Agreements Payload (structured/unstructured) eIDAS Electronic Registered Delivery Services (ERDS) Network (public/private) Source Art. 3 (36) ERDS means a service that makes it possible to transmit data between third parties by electronic means and provides evidence relating to the handling of the transmitted data, including proof of sending and receiving the data, and which protects transmitted data against the risk of loss, theft, damage or any unauthorised alterations. PARTY Scope of CEF eDelivery PARTY PARTY PARTY
9
Reuse of eDelivery by CEF's sectorial projects
Building Block DSIs eDelivery eSignature eID eTranslation eInvoicing Sector Specific DSIs Europeana* DG CONNECT Safer internet* DG CONNECT Public open data DG CONNECT ODR DG JUST eHealth DG SANTE eProcurement DG GROW EESSI DG EMPL EU e-Justice portal DG JUST BRIS (ECP) DG JUST Cybersecurity DG CONNECT eTranslation DGT Commitment to analyse Commitment to reuse Reusing
10
Reuse by projects (without CEF funding)
Building Block DSIs eDelivery eSignature eID eTranslation eInvoicing Sector Specific DSIs FLUX DG MARE CISE DG MARE eParticipation DG CONNECT EU-CEG DG SANTE TRACES DG SANTE LRI DG JUST EUGO DG GROW UUMDS DG TAXUD ECRIS DG JUST PNR DG HOME Tachonet DG MOVE CISP COUNCIL Commitment to analyse Commitment to reuse Reusing
11
CEF eDelivery is not a one-size fits all solution
eDELIVERY MESSAGING INFRASTRUCTURES ePROCUREMENT eJUSTICE MESSAGE EXCHANGE MODEL TOPOLOGY 4-corner model Your choice PROTOCOL PEPPOL AS2 profile e-SENS AS4 profile e-SENS AS4 profile recommended INTEGRATION APPROACH Service Providers (Market) Specific Connector DISCOVERY MODEL Dynamic Static SECURITY MODEL TRUST CIRCLE PKI Mutual trust SECURITY CONTROL + Liberal inner security Inner security with connector Your CEF eDelivery implementation SCOPE OF CEF eDELIVERY
12
CEF eDelivery Components
MESSAGE EXCHANGE MODEL KEY SPECIFICATIONS Access Point e-SENS AS4 profile of the ebMS3/AS4 OASIS Standards PEPPOL AS2 profile of AS2 and SBDH (for the eProcurement only) The approach employed by eDelivery is to promote the use of existing technical specifications and standards rather than to define new ones. The profiling work of e-SENS and PEPPOL on these standards, i.e. constraining configuration choices, is equally taken on board. Security Controls ETSI – Electronic Signatures and Infrastructures profile ETSI REM for evidences Connector SECURITY MODEL DISCOVERY MODEL Service Metadata Locator (SML) Service Metadata Publisher (SMP) e-SENS Profile based on the OASIS BDXL Specification e-SENS ebCore Party ID Profile e-SENS Profile based on the OASIS BDX-SMP Specification
13
CEF Work Programmes: DSIs' funds are planned every year
2014 2015 2016 2017 2018 2019 2020 TRANS-EUROPEAN TELECOMMUNICATIONS CONNECTING EUROPE FACILITY NETWORKS WORK PROGRAMME 201X TRANS-EUROPEAN TELECOMMUNICATIONS CONNECTING EUROPE FACILITY NETWORKS WORK PROGRAMME 201X TRANS-EUROPEAN TELECOMMUNICATIONS CONNECTING EUROPE FACILITY NETWORKS WORK PROGRAMME 201X Procurement by the Commission to offer services to the Member States. Budget allocated for 4 years. ... Total Amount € 86.5 M € 85.2 M € M Example eDelivery DSI € 8 M Core Service Platform € 0 € 1 M € 500k Grants … Typically 'deployment' projects at national level (up to 75% of eligible cost). Allocated every year.
14
eDelivery and eIDAS ERDS in practice
2 eDelivery and eIDAS ERDS in practice
15
CTR1: TLS + Authentication CTR1: TLS + Authentication
Mapping of security controls to the 4-Corner Model End-to-end Security Inner Security Cross-party Security Inner Security C1 C2 C3 C4 Party A CTR1: TLS + Authentication e-SENS AS4 Profile CTR1: TLS + Authentication Party B ORIGINAL SENDER FINAL RECIPIENT Backend REQ4: Recipient /Addressee Identification REQ3: Sender Identification Backend NOTIFY NOTIFY SUBMIT Connector Access Point SEND RECEIVE Access Point Connector DELIVER AS4 ACKNOWLEDGE Internet
16
Summary of security requirements from the eIDAS regulation
Description eIDAS reference REQ1 Message Integrity Messages should be secured against any modification during transmission. Article 3 (36) Article 19 Article 24 Article 44, (d) the sending and receiving of data is secured by an advanced electronic signature or an advanced electronic seal of a qualified trust service provider in such a manner as to preclude the possibility of the data being changed undetectably; REQ2 Message Confidentiality Messages should be encrypted during transmission. Article 5 REQ3 Sender Identification The identity of the sender should be verified. Article 44 (b) they ensure with a high level of confidence the identification of the sender; REQ4 Recipient / Addressee Identification Recipient / addressee Identity should be verified before the delivery of the message. (c) they ensure the identification of the addressee before the delivery of the data; REQ5 Time-Reference The date and time of sending and receiving a message should be indicated via a qualified electronic timestamp. (f) the date and time of sending, receiving and any change of data are indicated by a qualified electronic time stamp. REQ6 Proof of Send/Receive Sender and receiver of the message should be provided with evidence of message sending and receiving. Article 3 (36) “… provides evidence relating to the handling of the transmitted data, including proof of sending and receiving the data…”
17
Mapping of security controls to the 4-Corner Model
End-to-end Security REQ1: Message Integrity REQ2: Message Confidentiality Inner Security Inner Security REQ5: Time Reference CTR1: TLS + Authentication CTR1: TLS + Authentication REQ6: Proof of Send/Receive REQ4: Recipient /Addressee Identification REQ3: Sender Identification e-SENS AS4 Profile C1 C2 C3 C4 ORIGINAL SENDER Party A Party B FINAL RECIPIENT SUBMIT Backend NOTIFY Backend DELIVER 1 or several NOTIFY NOTIFY 1 or several Cross-party Security Connector Access Point SEND RECEIVE Access Point Connector AS4 ACKNOWLEDGE Internet
18
PEPPOL and CEF eDelivery Convergence Process
3 PEPPOL and CEF eDelivery Convergence Process Will go through Services now available Improvements coming in the next few months How we will move forward
19
eDelivery alignment between CEF and PEPPOL
Timeline 2017 2018 2019 20xx Q4 2016 T1: LoU Q4 2017 T2: Phase In ~Q1 2019 T3: Transition TBD T4: Phase Out Milestones AS4 adopted as optional protocol (AS2 Mandatory) Announcement of T3 AS4 Mandatory (AS2 Optional) Only AS4 Criteria 3a 1 a-c 2 a-b 3 b-c 5 a-d 2 c-s 4 a-d 3e Example: There exists a stable, well documented CEF AS4 profile specification, including SMP and PKI implementation.
20
Find out more on CEF Digital
Directorate-General for Informatics DG CONNECT Directorate-General for Communications Networks, Content and Technology ec.europa.eu/cefdigital
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.