24
Security and Interoperability Danny De Cock January 16th, 2012 Moldova Email: [email protected] Slides: godot.be/slides

Security and Interoperabilitydecockd/slides/20120116... · 2012-01-16 · activation code PUK1 7: CA receives certificate requests 8: CA issues two new certificates and issues new

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Security and Interoperabilitydecockd/slides/20120116... · 2012-01-16 · activation code PUK1 7: CA receives certificate requests 8: CA issues two new certificates and issues new

Security and Interoperability

Danny De CockJanuary 16th, 2012

Moldova

E‐mail: [email protected]: godot.be/slides

Page 2: Security and Interoperabilitydecockd/slides/20120116... · 2012-01-16 · activation code PUK1 7: CA receives certificate requests 8: CA issues two new certificates and issues new

Secrets of Successful eID Environments

• 3 High‐level actors• Different sectors

– eGovernment• Collect and store data once, reuse where possible

– eHealth• Make patient records available to health care service providers

– eCommerce & eBusiness• Provide ability to correctly identify involved parties

– Avoiding online fraud, preparing effective anti‐spam measures

Citizen/Customer

BusinessGovernment

Page 3: Security and Interoperabilitydecockd/slides/20120116... · 2012-01-16 · activation code PUK1 7: CA receives certificate requests 8: CA issues two new certificates and issues new

Secrets of Successful eID Environments

• Success depends on joined forces of public and private sector– Private sector requires return on investment (ROI)

• Number of contacts between a citizen and its eGovernment only does not justify huge investments

– Public sector prefers eID enablers for use in public andprivate sector

• Avoid reinventing the wheel– Need to exchange of experience with successes and *failures*

– Risk of lacking focus to create interoperable solutions• Caveat: Systems focusing on any single sector are inherently incompatible with *similar* systems

Page 4: Security and Interoperabilitydecockd/slides/20120116... · 2012-01-16 · activation code PUK1 7: CA receives certificate requests 8: CA issues two new certificates and issues new

Design Decisions – Basic Concepts• Federated architecture

– Each sector operates autonomously– Interfaces with other sectors through bus system

• Built around authoritative sources– Master copy of data is available at exactly one repository– Master copy = authoritative source

• Maximal reuse of information– No data replication– Administrations cannot re‐request data already available

• Integrated system for user and access management– eID for all – Citizens & organizations– Autonomous management of access & use policies

Page 5: Security and Interoperabilitydecockd/slides/20120116... · 2012-01-16 · activation code PUK1 7: CA receives certificate requests 8: CA issues two new certificates and issues new

Design Decisions – Benefits 

• Guaranteed interoperability enhances security!– Modularity respects each organization’s sovereignty

• Prevents vender‐lock‐in– Exchanging information using standard and open protocols and data formats

• Guaranteed flexibility– Modularity allows updating and following

• Security standards• Good/best practices

Page 6: Security and Interoperabilitydecockd/slides/20120116... · 2012-01-16 · activation code PUK1 7: CA receives certificate requests 8: CA issues two new certificates and issues new

Identification & Authentication• Unique identification of

– Citizens– Professionals– Companies and other Service Providers (public and private sector)

• eID for all: Authentication & Identification tokens– Federal token– eID card – Belgian citizens & foreigners– Other tokens – companies, organizations, individuals

Page 7: Security and Interoperabilitydecockd/slides/20120116... · 2012-01-16 · activation code PUK1 7: CA receives certificate requests 8: CA issues two new certificates and issues new

eID Card TypeseID Card TypesCitizensCitizens KidsKids AliensAliens

eID cardeID card KidsKids‐‐IDID ForeignersForeigners’’ cardcard

Page 8: Security and Interoperabilitydecockd/slides/20120116... · 2012-01-16 · activation code PUK1 7: CA receives certificate requests 8: CA issues two new certificates and issues new

eID Card ContenteID Card Content

IDID ADDRESSADDRESS

Authentication

Signature

PKI Citizen Identity Data

RRN = National Register

Root CA CA

RRN

RRN SIGNATURE

RRN SIGNATURE

RRNSIGNATURE

RRNSIGNATURE

140x200 Pixels8 BPP3.224 Bytes

Page 9: Security and Interoperabilitydecockd/slides/20120116... · 2012-01-16 · activation code PUK1 7: CA receives certificate requests 8: CA issues two new certificates and issues new

eID Card = 4 FunctionseID Card = 4 Functions

•• NonNon‐‐electronicelectronic1.1. Visible Identification of a personVisible Identification of a person

•• ElectronicElectronic2.2. Digital identificationDigital identification

•• Data captureData capture3.3. Prove your identityProve your identity

•• Authentication signatureAuthentication signature4.4. Digitally sign informationDigitally sign information

•• NonNon‐‐repudiation signaturerepudiation signature

eFunctionality

Enabler ofeServices

Page 10: Security and Interoperabilitydecockd/slides/20120116... · 2012-01-16 · activation code PUK1 7: CA receives certificate requests 8: CA issues two new certificates and issues new

Levels of Assurance (LoA) of Authentication

• Federated identity management model– E.g., Shibboleth, Liberty Alliance, CardSpace…

LoA 4+  (qualified plus biometric)

Setting access policies

LoA 4(qualified cert with smart card EAL4+)

Sensitive medical records (e.g. HIV), Consultant notes containing opinions. Ability to Break the Glass. Bank to bank transfers

LoA 3 (2‐factor authentication, non‐qualified cert, EAL4 smart card)

Patient confidential records (non‐sensitive) 

LoA 2(one time password)

Some Internet banking applications System administration

LoA 1 (uid/password, Verisign Class 1 cert)

Retrieve degree certificate. Completing public service employment application

LoA 0 (no authentication)

Public data

Page 11: Security and Interoperabilitydecockd/slides/20120116... · 2012-01-16 · activation code PUK1 7: CA receives certificate requests 8: CA issues two new certificates and issues new

eID – Level 3 + 4

Page 12: Security and Interoperabilitydecockd/slides/20120116... · 2012-01-16 · activation code PUK1 7: CA receives certificate requests 8: CA issues two new certificates and issues new

Citizen’s Federal Token – Level 2

Page 13: Security and Interoperabilitydecockd/slides/20120116... · 2012-01-16 · activation code PUK1 7: CA receives certificate requests 8: CA issues two new certificates and issues new

How to Choose a Security Level?

• Responsibility of the service provider under supervision of the Privacy Commission

• Based on risk assessment and depending on– Type of processing: communication, consultation, alteration,…

– Scope of the service: does the processing only concern the user or also concern other persons ?

– Degree of sensitivity of the data processed– Possible impact of the processing

• In addition to right security level– Use of an electronic & time‐stamped signature might be needed

Page 14: Security and Interoperabilitydecockd/slides/20120116... · 2012-01-16 · activation code PUK1 7: CA receives certificate requests 8: CA issues two new certificates and issues new

Interoperable & Secure by Design• Mandates & authorization credentials based on open standards, e.g.,– XACML– SAML

• Revocation services setup by mandate manager and certification authority– OCSP– CRL

• Certificates, Signatures and timestamps, e.g.,– X.509– XADES‐*

• Communication protocols– SSL/TLS

Page 15: Security and Interoperabilitydecockd/slides/20120116... · 2012-01-16 · activation code PUK1 7: CA receives certificate requests 8: CA issues two new certificates and issues new

XAXML – Allow/Deny Service Requests…

Service Provider

Authorization Domain

Policy Enforcement Point

Policy Decision Point

Policy Access Point

PolicyInformation

Point

ExecuteService Y

Retrieve RelevantPolicies

Retrieve PolicyValidation Information

Check Policy Compliance Permit / Deny Service Request

OKExecute Service Y

1

2

3 4

5

6

Joe Service Provider

Authorization Domain

Policy Enforcement Point

Policy Decision Point

Policy Access Point

PolicyInformation

Point

ExecuteService Y

Retrieve RelevantPolicies

Retrieve PolicyValidation Information

Check Policy Compliance Permit / Deny Service Request

OKExecute Service Y

1

2

3 4

5

6

Joe

Page 16: Security and Interoperabilitydecockd/slides/20120116... · 2012-01-16 · activation code PUK1 7: CA receives certificate requests 8: CA issues two new certificates and issues new

Generic Policy Enforcement ModelXACML‐based

InformationRequest/Reply

PolicyRetrieval

Authentic Source

InformationRequest/Reply

PolicyRepository

Manager

PolicyManagement

Authentic Source

PolicyEnforcement

(PEP)Action on

applicationDecisionRequest

DecisionReply

Action onapplication

PERMITTED

Action onapplicationDENIED

User Application

Policy Decision(PDP)

Policy Administration(PAP)

Policy Information(PIP)

Policy Information(PIP)

Slide inspired by Frank Robben

Page 17: Security and Interoperabilitydecockd/slides/20120116... · 2012-01-16 · activation code PUK1 7: CA receives certificate requests 8: CA issues two new certificates and issues new

APPLICATIONSAuthorizationAuthen-

tication PEPRole

Mapper

USER

PAP‘’Kephas’’

RoleMapper

DB

PDPRole

Provider

PIPAttributeProvider

RoleProvider

DB

UMAF

PIPAttributeProvider

DBXYZ

WebAppXYZ

APPLICATIONSAuthorizationAuthen-

tication PEPRole

Mapper

USER

WebAppXYZ

PIPAttributeProvider

PAP‘’Kephas’’

RoleMapper

DB

PDPRole

Provider

RoleProvider

DB

ManagementVAS

PIPAttributeProvider

DBXYZ

PIPAttributeProvider

DBBailiffs

PIPAttributeProvider

DBMandates

Be-Health

APPLICATIONSAuthorizationAuthen-

tication PEPRole

Mapper

USER

PAP‘’Kephas’’

RoleMapper

DB

PDPRole

Provider

PIPAttributeProvider

RoleProvider

DB

RIZIV

PIPAttributeProvider

DBXYZ

WebAppXYZ

ManagementVAS

PIPAttributeProvider

DBMandates

Social sector(CBSS)

Non social FPS(FedICT)

ManagementVAS

DBXYZ

Re‐using Architecture

Slide inspired by Frank Robben

Page 18: Security and Interoperabilitydecockd/slides/20120116... · 2012-01-16 · activation code PUK1 7: CA receives certificate requests 8: CA issues two new certificates and issues new

Conclusion

• eGovernment Services are accessible – Via open standards– With strong authentication & access management

• Federated system permits use of common basic services securely– Without losing any autonomy!

• System allows permanent evolution– Continuously changing user & organization requirements

Page 19: Security and Interoperabilitydecockd/slides/20120116... · 2012-01-16 · activation code PUK1 7: CA receives certificate requests 8: CA issues two new certificates and issues new

Food for Thought

• Trust is Good – Control is Better!

Page 20: Security and Interoperabilitydecockd/slides/20120116... · 2012-01-16 · activation code PUK1 7: CA receives certificate requests 8: CA issues two new certificates and issues new

Th@nk you!

Danny De CockResearcher Applied [email protected] 

Slides: www.godot.be/slides

© fedict 2011. All rights reserved

Page 21: Security and Interoperabilitydecockd/slides/20120116... · 2012-01-16 · activation code PUK1 7: CA receives certificate requests 8: CA issues two new certificates and issues new

eID Card Issuing Procedure

(8)

(9)

(10b)

Citizen PIN & PUK

CertificationAuthority (CA)

Municipality

NationalRegister (RRN)

Card Personalizer (CP)Card Initializer (CI)

(0)

(3)

(4)

(5)

(7)

(6)

(13)(12)

(11)

Citizen

(10a”)

(10a’)

Face to face identification (1)

(2)

Page 22: Security and Interoperabilitydecockd/slides/20120116... · 2012-01-16 · activation code PUK1 7: CA receives certificate requests 8: CA issues two new certificates and issues new

eID Card Issuing Procedure0: Citizen receives a convocation 

letter or takes the initiative1: Visit municipality with photo2: Formal eID request is signed3,4: CP receives eID request via RRN5: CP prints new eID card, CI starts 

on‐card key pairs generation6: RRN receives part of the eID card 

activation code PUK17: CA receives certificate requests8: CA issues two new certificates and 

issues new CRLs

9: CI stores these certificates on the eID card

10a: CI writes citizen data (ID, address,…) to the card, deactivates the card

10b: CI sends invitation letter with citizen’s PIN and activation code PUK2

11: Citizen receives invitation letter 12: Civil servant starts eID card 

activation procedure13: eID card computes a signature 

with each private key, CA removes certificates from CRL

Page 23: Security and Interoperabilitydecockd/slides/20120116... · 2012-01-16 · activation code PUK1 7: CA receives certificate requests 8: CA issues two new certificates and issues new

Certificates for Government web servers, signing citizen files, public

information,…

Card Administration: update address, key

pair generation, store certificates,…

eID Certificates Hierarchy

Card Admin

Cert Admin

Auth Cert

Card Admin

CACRL

CitizenCA

CRL

GovCA

CRL

BelgiumRoot CA

ARL

BelgiumRoot CA

Server Cert

RRNCert

Non-repCert

Code signCert

1024-bit RSA

2048-bit RSA

2048-bit RSA

Auth Cert

Foreign-

ers‘ CA

CRL

Non-repCert

Page 24: Security and Interoperabilitydecockd/slides/20120116... · 2012-01-16 · activation code PUK1 7: CA receives certificate requests 8: CA issues two new certificates and issues new

16 January 201216 January 2012Slide Slide 2424IntroductingIntroducting Belgian eID Cards & Belgian eID Cards & eGovernmenteGovernment

Context 3Context 2

Context 1

Abstract Abstract eGovernmenteGovernment EcosystemEcosystem

AC F

E

GHB

D