Intel s View of Business Requirements and Future Work on the APKI

Size: px
Start display at page:

Download "Intel s View of Business Requirements and Future Work on the APKI"

Transcription

1 Intel s View of Business Requirements and Future Work on the APKI April, 1998 May 6, 1998

2

3 Table of Contents 1 BUSINESS REQUIREMENTS INTRODUCTION TAXONOMY OF BUSINESS REQUIREMENTS FUTURE WORK PKI DEVELOPMENT User Authentication Services Verification Services Local Audit Services PERVASIVE USE OF CDSA CDSA Portability and Interoperability Testing INCREASING ACCESS TO CDSA-BASED SERVICES Other Language Interfaces to CDSA...5 i May 6, 1998

4

5 1 Business Requirements 1.0 Introduction At the Amsterdam meeting of the Security Program Group, Denise Ecklund of Intel presented a number of proposals for the future work of the group. There was debate about the Business Requirements for some of the work; especially for the new technologies being proposed. This document presents the business requirements motivating the proposals, and in the process, clarifies and expands them. 1.1 Taxonomy of Business Requirements The business requirements for security technology (and technology in general) are necessarily indirect, since the intention is to make technology as invisible to users as possible. Given that the technology under discussion is intended to build a Public Key Infrastructure (PKI), it is possible to put requirements in the categories defined below. This list is intended to be in order of importance. 1. Facilitate Application & Middleware Development Buyers require secured, interoperable application products for the broad range of platforms deployed in their organizations. To reduce cost, the option to select among competing products is desired, but interoperability among the selected products is required. To increase application development and reduce the cost of that development, the PKI must provide the services of a trusted computing base. Making it a ubiquitous infrastructure, the burden of development is taken from the application developers (thus giving them more time and resources to concentrate on the application domain). Being part of the infrastructure also ensures that the services will be developed correctly by companies in the security business; thus platforms become richer, more secure, more reliable, and more trustworthy with the addition of the PKI. 2. Support Legacy and Heritage Infrastructure To maintain current business practices while evolving to improved business models, buyers need to support some existing applications and infrastructure, upgrade some existing applications, and integrate new applications. To meet these requirements, the PKI architecture should be architected to support important legacy and heritage technology; thus providing an evolution to new technology. 3. Interoperability (Standard protocols) Multi-platform environments are built to support evolving business practices and to take advantage of new technologies that better support those practices. A standard infrastructure supporting standard protocols provides the interoperability required to construct and operate a multi-vendor network, and also provides vendor independence to the buyer. 4. Portability of Applications & Middleware (APIs/SPIs) Buyers purchase new platforms, systems and applications to reduce maintenance costs, to acquire new features, and to improve system performance. When new platforms are acquired, existing and new applications must be easily ported to the new platforms. A standard infrastructure providing standard APIs allows application developers to support multiple platforms, making the software available on the buyer s platforms of choice. The pervasive infrastructure effectively increases the size of the market for a given application, thus encouraging application development. The effect is to increase the number of applications available on a particular platform. 5. Vendor Independence for Service Providers May 6,

6 Defining an infrastructure that allows service vendors to compete on a level playing field not only increases competition, but also allows the customers to avoid being locked-in to a particular platform vendor. The net result is more choice and better service. 6. Portability of Service Providers (SPIs) As with portable applications, the portability of service providers broadens the market for the services and thus further encourages their development. It also makes the services ubiquitously available on many platforms. 7. Enable Technology Evolution As business practices evolve so must the systems that support those practices. Total replacement is typically not feasible, and the overnight switch from an old system to a new one is extremely risky for any business venture. An extensible infrastructure that provides programming models and frameworks independent of particular technology not only allows for the use of legacy technology, but also allows for that technology to evolve over time. 8. Functional Completeness (of APKI) Buyers who deploy applications require complete, consistent, full-featured systems that can support growing applications without the cost of frequent system replacement or upgrade. No general-purpose infrastructure can ever predict all the uses to which it will be put, and thus should not be limited to only those facilities, features, and options that have been specifically requested by customers. While system architecture should be customer-driven, the architects also have the responsibility to achieve completeness in order to maximize application and service-provider development. 2 Future Work 2.1 PKI Development The Open Group APKI defines a solid base for addressing specific business requirements related to security and security services. We are proposing to further the construction of the OpenGroup s Public Key Infrastructure (PKI) based on new and evolving business requirements. The Security Program Group is in the process of developing a document defining its proposed architecture for the PKI (the APKI document). This will also form the core for security in the IT DialTone Architecture Definition. CDSA provides the foundations for this APKI. In order to develop (or select) technologies to implement the PKI, it is necessary that this technology development proceed in conjunction with the architecture development, providing timely mutual feed-back. And it is also necessary that the APKI achieve a sufficient level of detail to provide criteria for judging the efficacy of the technology. In this synergistic process of technology and architecture development, business requirements are constantly under consideration. Several new PKI Services were proposed: 1. A User Authentication Service (UAS) 2. A Verification Service 3. A Local Audit Service The services in the PKI are layered. For example, Single Sign On (XSSO) needs user authentication to identify the user who is logging on. The Virtual SmartCard Service (aka PSM) needs user authentication to 2 May 6, 1998

7 implement identity-based access control. Many services, such as GSS-IDUP, require the integrity and authentication of data objects. Policy-based services such as Security Context Management require integrity and authentication of executable policy libraries. The following subsections present an overview of each proposed new service, and the additional business requirements addressed by that service User Authentication Services The User Authentication Service is an extension of the CSSM framework (using the Elective Module Manager (EMM) mechanism) to provide authenticated identification of Users. UAS builds on the CDSA and provides a common programming abstraction for User Authentication, independent of the technology or device used to authenticate. And, as an extension to CSSM, the programming model is also platform and vendor independent. This means buyers can select different biometric service providers from various vendors as the authentication mechanisms of choice for different platforms throughout their enterprise. The applications and higher-level security services using these devices call the same interface regardless of the device type or service provider. The UAS Service Providers may also use the integrity library of the CSSM framework to increase the integrity of the stack. UAS provides two plug-in Service Provider Interfaces (SPIs): Authentication Service Providers Policy Service Providers The ability to dynamically select a policy service provider makes it easy for applications and high-level security services to provide features that allow enterprise IT departments to specify and install their own policies. If dynamic policy selection were not possible in the authentication service it would be difficult for developers to provide this and pass the feature along to IT organizations. Empowered with policy definition capabilities, IT organizations can support the current and evolving business practices of their organizations. Methods that can be used to authenticate a user include: knowledge of a password possession of a SmartCard and its pass-phrase various physical attributes of the user (voice, facial image, fingerprints, etc). The UAS not only provides alternatives to passwords, but also provides the opportunity to authenticate the user based on multiple methods. Further, with the use of Policy Service Providers, it is also possible for administrators to control the strength of authentication based upon the value of the assets being protected; rather than leave it up to the user to create weak passwords which, in any case, are independent of asset value. Biometric authentication has the potential to be very useful for high-value authentication. Since it is based on the inherent physical attributes of a user, proof of identity cannot be easily lost, stolen, transferred or otherwise compromised. And this strength can be further enhanced if used in conjunction with conventional authentication mechanisms like SmartCards and Passwords. Whether Biometric technology is ready for Prime Time is moot; APIs are already in the process of development, and products are coming to market. The Open Group must consider the need to include Biometric Authentication in the APKI. We recommend that a general user authentication interface encompassing biometrics and other authentication data be proposed and considered for standardization Verification Services May 6,

8 The Verification Service Library (VSL) is an extension of the CSSM framework (using the Elective Module Manager (EMM) mechanism) to provide generalized verification services for all types of moveable application data objects. All security services must verify the integrity and authenticity of an object before using that object. Integrity and authentication is the minimum requirement to establish a trust relationship. It is critical that the verification service itself be correctly implemented, trustworthy, and not easily spoofed or circumvented. High-level security services and applications could not build upon a verification service that did not provide this degree of trust. Creating a single verification service does not necessarily achieve this goal, but it makes it more achievable by reducing the number of implementations and focusing security analysis on a highly critical component of the system. Buyers would have a difficult time trusting multiple implementations of verification services from many and varied vendors. A sound service supports all higher-level services. VSL builds on the CDSA and provides a common programming abstraction for checking the integrity and authenticity of moveable application-defined data and software objects. Application data objects are owned and managed by applications in the enterprise. If moving data from one storage media to another or from one system to another invalidates the integrity or authenticity of the data, then operating procedures must be changed to account for this problem, or integrity is lost and security is weakened. In the worst case, business practices must be modified to account for the changes in operating procedures. VSL attempts to mitigate this problem for all applications and higher-level security services. Enterprises regain traditional management control of their application data objects without compromising the level of security imposed on those data objects. The ability to securely move objects is critical to IT DialTone. We recommend that a verification services be proposed and considered for standardization Local Audit Services Distributed Audit Services (XDAS) defines an interface for combining audit logs generated by a set of distributed processes systems. This service solves a major security problem for IT organizations that manage many systems. Often, a unified audit log is required to detect attacks upon a distributed system at large. The audit logs being merged via the XDAS interface are generated by single-site and multi-site applications. Each log contributor creates local log entries and uses XDAS interfaces to form a secured and merged log. Currently, each contributor is responsible for securing it s own local log entries before using XDAS. Different operating systems on different platforms provide different native logging services. Typically these logging services do not provide any security over the log. Application developers have two choices: 1. modify their implementations to use different logging (possibly dispensing with security over the log) 2. implement their own local, secured logging mechanism The buyer suffers with either choice. If the local log is not secured, then the contents of a merged, secured log is suspect. This compromises security in the environment. If each vendor implements a local, secured logging mechanism the buyer must pay for redundant implementations on each platform, must trust that each of many implementations is correct, and must trust that the log will be interoperable with any XDAS data format requirements. LAS builds on the CDSA and provides a common programming abstraction for secured local logs. Service providers can be implemented to augment native local logging services with security features or can provide their own implementation. Clearly, multiple service providers are required but the number is small compared with the number of applications and high-level security services that must otherwise implement their own local logging service. 4 May 6, 1998

9 With a secured local audit service, enterprise managers can be assured that their audit logs are secured and meet their business requirements to provide audit trails for legal purposes. We recommend that a local audit services interface be proposed and considered for standardization. 2.2 Pervasive use of CDSA The pervasive use of a CDSA-compliant infrastructure, service providers, and applications results in: improved security through common implementations that have undergone extensive security analysis reduced costs for platform vendors who can deliver and maintain a common solution rather than widely-variant solutions across variations of their platform reduced cost for buyers as a direct result of increased competition, and reduced development and maintenance costs for sellers opportunities for new applications and new layered services CDSA Portability and Interoperability Testing Portability is an essential requirement for an infrastructure; both for the applications that use it, and the service providers that implement it. Intel s proposal consists in developing test suites for both the APIs and SPIs of infrastructure components (starting with CDSA). In addition to developing test suites, it is necessary to provide an environment in which application developers and service providers can get together to allow portability testing on a wide range of platforms and services. This plug fest will not only test the portability of the infrastructure, but may lead to improvements in the infrastructure to improve portability in future releases. 2.3 Increasing Access to CDSA-based Services Other Language Interfaces to CDSA The reference implementation for CDSA was developed in C, and the API is designed for C-based applications. As the world progresses to object development, C++, Java, and COM all become more important considerations to application developers. To address the security needs of applications developed in these languages, it becomes urgent to provide access to CDSA functionality expressed in these languages (particularly Java). CDSA (and the CSSM framework) provides value to three distinct constituencies: application developers service provider developers buyers and users. Additional language interfaces will preserve and enhance this set of values. Additional language interfaces: ensure a uniformly high quality of security is delivered to a wider range of applications by making the same services available through all languages attract new developers to the infrastructure, creating more useful layered products and services reduce the learning curve for development organizations that develop and support applications in multiple languages It is not just the particular language, but also its implementation in terms of the CSSM framework that is important. May 6,

10 Intel has developed some example applications in C++ using CDSA s C language interfaces. While not the best solution, it is currently a workable one. Java is being used by many to develop in-house and commercial Internet applications. COM is also a popular development vehicle. For these reasons, we recommend prioritizing the Java language and that a Java-CDSA interface be proposed and considered for standardization. 6 May 6, 1998

User Authentication Services (UAS) Platform Security Division Intel Corporation April 1998

User Authentication Services (UAS) Platform Security Division Intel Corporation April 1998 Authentication Services () Platform Security Division Intel Corporation April 1998 Identification and Authentication Proof of Identity.. different factors what you know (Password) what you have (SmartCard)

More information

Security Training Seminars An integral part of The Open Group Security Programme

Security Training Seminars An integral part of The Open Group Security Programme Security Training Seminars An integral part of The Open Group Security Programme Dean Adams Director, Security & Electronic Commerce Agenda Check! M Brief Overview of Security Program Key Projects Introduction

More information

Real-time Communications Security and SDN

Real-time Communications Security and SDN Real-time Communications Security and SDN 2016 [Type here] Securing the new generation of communications applications, those delivering real-time services including voice, video and Instant Messaging,

More information

CDSA Technology. Intel Corporation Denise Ecklund July 1998

CDSA Technology. Intel Corporation Denise Ecklund July 1998 CDSA Technology Intel Corporation Denise Ecklund July 1998 Agenda Problem of Protecting Applications The CDSA Solution What is CDSA? Intel s Technology Role CDSA Today CDSA Tomorrow 2 Protecting an Application

More information

Using Biometric Authentication to Elevate Enterprise Security

Using Biometric Authentication to Elevate Enterprise Security Using Biometric Authentication to Elevate Enterprise Security Biometric authentication in the enterprise? It s just a matter of time Mobile biometric authentication is officially here to stay. Most of

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

CISCO SHIELDED OPTICAL NETWORKING

CISCO SHIELDED OPTICAL NETWORKING CISCO SHIELDED OPTICAL NETWORKING Dr. Gaurav Kumar Jain Regional College For Education, Research and Technology Email: gaurav.rinkujain.jain@gmail.com Tarun Kumawat JECRC,UDML,College of Engineering Purabi

More information

Trusted Computing Group

Trusted Computing Group Trusted Computing Group Backgrounder May 2003 Copyright 2003 Trusted Computing Group (www.trustedcomputinggroup.org.) All Rights Reserved Trusted Computing Group Enabling the Industry to Make Computing

More information

CIP Security Pull Model from the Implementation Standpoint

CIP Security Pull Model from the Implementation Standpoint CIP Security Pull Model from the Implementation Standpoint Jack Visoky Security Architect and Sr. Project Engineer Rockwell Automation Joakim Wiberg Team Manager Technology and Platforms HMS Industrial

More information

Sparta Systems TrackWise Digital Solution

Sparta Systems TrackWise Digital Solution Systems TrackWise Digital Solution 21 CFR Part 11 and Annex 11 Assessment February 2018 Systems TrackWise Digital Solution Introduction The purpose of this document is to outline the roles and responsibilities

More information

Rethinking VDI: The Role of Client-Hosted Virtual Desktops. White Paper Virtual Computer, Inc. All Rights Reserved.

Rethinking VDI: The Role of Client-Hosted Virtual Desktops. White Paper Virtual Computer, Inc. All Rights Reserved. Rethinking VDI: The Role of Client-Hosted Virtual Desktops White Paper 2011 Virtual Computer, Inc. All Rights Reserved. www.virtualcomputer.com The Evolving Corporate Desktop Personal computers are now

More information

Open Group Security Forum Overview

Open Group Security Forum Overview Open Group Security Forum Overview To the I3C, July 23, 2003 Mike Jerbic Chair Security Forum Office: 408.257.1648 m.jerbic@opengroup.org www.opengroup.org The Open Group is... A global consortium committed

More information

Mobile Biometric Authentication: Pros and Cons of Server and Device-Based

Mobile Biometric Authentication: Pros and Cons of Server and Device-Based Mobile Biometric Authentication: Pros and Cons of Server and Device-Based Table of Contents 01 Introduction 01 The Ongoing Debate 02 Server-Centric Architecture 02 Device-Centric Architecture 02 Advantages

More information

Content. 1. SYSTEM Design Evolution: NULS 2.0 Microserver Platform - How is it Structured A. Design Reasoning and Explanation...

Content. 1. SYSTEM Design Evolution: NULS 2.0 Microserver Platform - How is it Structured A. Design Reasoning and Explanation... Content 1. SYSTEM Design Evolution: NULS 2.0 Microserver Platform - How is it Structured... 3 A. Design Reasoning and Explanation... 3 B. Plugin... 4 C. Microserver... 5 D. Service Library... 7 E. NULS

More information

Cloud Computing: Making the Right Choice for Your Organization

Cloud Computing: Making the Right Choice for Your Organization Cloud Computing: Making the Right Choice for Your Organization A decade ago, cloud computing was on the leading edge. Now, 95 percent of businesses use cloud technology, and Gartner says that by 2020,

More information

OpEx Drivers in the Enterprise

OpEx Drivers in the Enterprise OpEx Drivers in the Enterprise A Plexxi Perspective PLEXXI WHITE PAPER Affinity Networking for Data Centers and Clouds IDC research indicates that capital costs account for nearly two-thirds of the purchasing

More information

FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication

FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication Jeremy Grant Managing Director, Technology Business Strategy Venable LLP jeremy.grant@venable.com @jgrantindc Digital: The Opportunity

More information

Disk Encryption Buyers Guide

Disk Encryption Buyers Guide Briefing Paper Disk Encryption Buyers Guide Why not all solutions are the same and how to choose the one that s right for you.com CommercialSector Introduction We have written this guide to help you understand

More information

Sparta Systems TrackWise Solution

Sparta Systems TrackWise Solution Systems Solution 21 CFR Part 11 and Annex 11 Assessment October 2017 Systems Solution Introduction The purpose of this document is to outline the roles and responsibilities for compliance with the FDA

More information

An Open Source Java Framework for Biometric Web Authentication based on BioAPI

An Open Source Java Framework for Biometric Web Authentication based on BioAPI An Open Source Java Framework for Biometric Web Authentication based on BioAPI Elisardo González Agulla, Enrique Otero Muras, José Luis Alba Castro, and Carmen García Mateo Department of Signal Theory

More information

Hitachi ID Password Manager Telephony Integration

Hitachi ID Password Manager Telephony Integration Hitachi ID Password Manager Telephony Integration 2016 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Functional integration 2 2.1 Self-service password reset....................................

More information

IDENTITY AND THE NEW AGE OF ENTERPRISE SECURITY BEN SMITH CISSP CRISC CIPT RSA FIELD CTO

IDENTITY AND THE NEW AGE OF ENTERPRISE SECURITY BEN SMITH CISSP CRISC CIPT RSA FIELD CTO IDENTITY AND THE NEW AGE OF ENTERPRISE SECURITY BEN SMITH CISSP CRISC CIPT RSA FIELD CTO (US) @BEN_SMITH IDENTITY = THE MOST CONSEQUENTIAL ATTACK VECTOR Confirmed data breaches involving weak, default

More information

Mobile Data Security Essentials for Your Changing, Growing Workforce

Mobile Data Security Essentials for Your Changing, Growing Workforce Mobile Data Security Essentials for Your Changing, Growing Workforce White Paper February 2007 CREDANT Technologies Security Solutions White Paper YOUR DYNAMIC MOBILE ENVIRONMENT As the number and diversity

More information

Use Case Brief BORDERLESS DATACENTERS

Use Case Brief BORDERLESS DATACENTERS Use Case Brief BORDERLESS DATACENTERS Today s cloud service providers must maintain consistent levels of service for each end user or customer, independent of physical location and hardware. This brief

More information

Cisco Prime Cable Provisioning 5.1

Cisco Prime Cable Provisioning 5.1 Data Sheet Cisco Prime Cable Provisioning 5.1 Cable service providers face tremendous challenges in keeping pace with the rapid evolution of residential subscriber services. In light of intense market

More information

Cybersecurity eit. Software. Certification. Industrial Security Embedded System

Cybersecurity eit. Software. Certification. Industrial Security Embedded System Statement Benefits and limitations of certifications and labels in the context of cyber security Arguments for a balance between customer information and industrial suitability Industrial Security Embedded

More information

Are You Flirting with Risk?

Are You Flirting with Risk? Are You Flirting with Risk? A Review of RSA Authentication Manager 8.x Platform 1 2 3 RSA AUTHENTICATION Agenda MANAGER 8.0 Password Problem The Ultimate Authentication Engine Market overview {Speaker}

More information

Getting Hybrid IT Right. A Softchoice Guide to Hybrid Cloud Adoption

Getting Hybrid IT Right. A Softchoice Guide to Hybrid Cloud Adoption Getting Hybrid IT Right A Softchoice Guide to Hybrid Cloud Adoption Your Path to an Effective Hybrid Cloud The hybrid cloud is on the radar for business and IT leaders everywhere. IDC estimates 1 that

More information

Are You Flirting with Risk?

Are You Flirting with Risk? Are You Flirting with Risk? RSA Live Webcast October 15, 2013 Jessica Stanford Sr. Product Marketing Manager, RSA Authentication 1 2 3 4 5 RSA AUTHENTICATION MANAGER 8.0 Agenda Password Problem Market

More information

white paper SMS Authentication: 10 Things to Know Before You Buy

white paper SMS Authentication: 10 Things to Know Before You Buy white paper SMS Authentication: 10 Things to Know Before You Buy SMS Authentication white paper Introduction Delivering instant remote access is no longer just about remote employees. It s about enabling

More information

Integrated Access Management Solutions. Access Televentures

Integrated Access Management Solutions. Access Televentures Integrated Access Management Solutions Access Televentures Table of Contents OVERCOMING THE AUTHENTICATION CHALLENGE... 2 1 EXECUTIVE SUMMARY... 2 2 Challenges to Providing Users Secure Access... 2 2.1

More information

Proven results Unsurpassed interoperability Fast, secure and adaptable network. Only EnergyAxis brings it all together for the Smart Grid

Proven results Unsurpassed interoperability Fast, secure and adaptable network. Only EnergyAxis brings it all together for the Smart Grid Proven results Unsurpassed interoperability Fast, secure and adaptable network Only EnergyAxis brings it all together for the Smart Grid Outage management & restoration Elster global strength Demand response

More information

Making hybrid IT simple with Capgemini and Microsoft Azure Stack

Making hybrid IT simple with Capgemini and Microsoft Azure Stack Making hybrid IT simple with Capgemini and Microsoft Azure Stack The significant evolution of cloud computing in the last few years has encouraged IT leaders to rethink their enterprise cloud strategy.

More information

Using the Network to Optimize a Virtualized Data Center

Using the Network to Optimize a Virtualized Data Center Using the Network to Optimize a Virtualized Data Center Contents Section I: Introduction The Rise of Virtual Computing. 1 Section II: The Role of the Network. 3 Section III: Network Requirements of the

More information

Security: The Key to Affordable Unmanned Aircraft Systems

Security: The Key to Affordable Unmanned Aircraft Systems AN INTEL COMPANY Security: The Key to Affordable Unmanned Aircraft Systems By Alex Wilson, Director of Business Development, Aerospace and Defense WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY

More information

Choosing a Full Disk Encryption solution. A simple first step in preparing your business for GDPR

Choosing a Full Disk Encryption solution. A simple first step in preparing your business for GDPR Choosing a Full Disk Encryption solution A simple first step in preparing your business for GDPR beinformed Understand the impact Under GDPR, your organisation is required to protect data stored on devices,

More information

THE SECURITY LEADER S GUIDE TO SSO

THE SECURITY LEADER S GUIDE TO SSO THE SECURITY LEADER S TO SSO When security leaders think of single sign-on (SSO), they usually think of user convenience and experience. But SSO also plays a critical role in delivering security for data

More information

Computer Security Policy

Computer Security Policy Administration and Policy: Computer usage policy B 0.2/3 All systems Computer and Rules for users of the ECMWF computer systems May 1995 Table of Contents 1. The requirement for computer security... 1

More information

Agenda. Bibliography

Agenda. Bibliography Humor 2 1 Agenda 3 Trusted Digital Repositories (TDR) definition Open Archival Information System (OAIS) its relevance to TDRs Requirements for a TDR Trustworthy Repositories Audit & Certification: Criteria

More information

ISO27001:2013 The New Standard Revised Edition

ISO27001:2013 The New Standard Revised Edition ECSC UNRESTRICTED ISO27001:2013 The New Standard Revised Edition +44 (0) 1274 736223 consulting@ecsc.co.uk www.ecsc.co.uk A Blue Paper from Page 1 of 14 Version 1_00 Date: 27 January 2014 For more information

More information

Adobe Sign and 21 CFR Part 11

Adobe Sign and 21 CFR Part 11 Adobe Sign and 21 CFR Part 11 Today, organizations of all sizes are transforming manual paper-based processes into end-to-end digital experiences speeding signature processes by 500% with legal, trusted

More information

Protecting the Hosted Application Server

Protecting the Hosted Application Server Protecting the Hosted Application Server Paola Dotti, Owen Rees Extended Enterprise Laboratory HP Laboratories Bristol HPL-1999-54 April, 1999 E-mail: {Paola_Dotti,Owen_Rees}@hpl.hp.com application server,

More information

Open Server Architecture

Open Server Architecture EAB/OP-08:0052 Uen Rev A Open Server Architecture April 2008 Technology Paper The Open Server Architecture is flexible, open and easier to build applications on. This is achieved primarily through open

More information

Evaluator Group Inc. Executive Editor: Randy Kerns

Evaluator Group Inc. Executive Editor: Randy Kerns Avoiding an Infrastructure Cost Explosion as You Move to Exchange 2010 Metalogix Archive Manager Evaluator Group Inc. Technology Insight Series Executive Editor: Randy Kerns Version 1: January 2012 Copyright

More information

Carbon Black PCI Compliance Mapping Checklist

Carbon Black PCI Compliance Mapping Checklist Carbon Black PCI Compliance Mapping Checklist The following table identifies selected PCI 3.0 requirements, the test definition per the PCI validation plan and how Carbon Black Enterprise Protection and

More information

White Paper. The Impact of Payment Services Directive II (PSD2) on Authentication & Security

White Paper. The Impact of Payment Services Directive II (PSD2) on Authentication & Security White Paper The Impact of Payment Services Directive II (PSD2) on Authentication & Security First Edition June 2016 Goode Intelligence All Rights Reserved Published by: Goode Intelligence Sponsored by:

More information

Applying biometric authentication to physical access control systems

Applying biometric authentication to physical access control systems Applying biometric authentication to physical access control systems Published on 24 Jul 2018 Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market

More information

Integration of Agilent OpenLAB CDS EZChrom Edition with OpenLAB ECM Compliance with 21 CFR Part 11

Integration of Agilent OpenLAB CDS EZChrom Edition with OpenLAB ECM Compliance with 21 CFR Part 11 OpenLAB CDS Integration of Agilent OpenLAB CDS EZChrom Edition with OpenLAB ECM Compliance with 21 CFR Part 11 Technical Note Introduction Part 11 in Title 21 of the Code of Federal Regulations includes

More information

HIPAA Compliance Checklist

HIPAA Compliance Checklist HIPAA Compliance Checklist Hospitals, clinics, and any other health care providers that manage private health information today must adhere to strict policies for ensuring that data is secure at all times.

More information

Sustainable Security Operations

Sustainable Security Operations Sustainable Security Operations Optimize processes and tools to make the most of your team s time and talent The number and types of security incidents organizations face daily are steadily increasing,

More information

Sparta Systems Stratas Solution

Sparta Systems Stratas Solution Systems Solution 21 CFR Part 11 and Annex 11 Assessment October 2017 Systems Solution Introduction The purpose of this document is to outline the roles and responsibilities for compliance with the FDA

More information

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions Meeting PCI DSS 3.2 Compliance with Solutions Platform the industry s most comprehensive, intelligent platform for managing cyber risk. 2018, Inc. What s Changing with PCI DSS? Summary of PCI Business

More information

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Continual disclosed and reported

More information

Defender 5: The Right Way to Prove, Identify and Establish Trust

Defender 5: The Right Way to Prove, Identify and Establish Trust Defender 5: The Right Way to Prove, Identify and Establish Trust Introduction Before the Internet, business transactions were typically conducted face-to-face, so establishing your business partner s identity

More information

Overview of CentreWare Page 1 of 6. CentreWare Overview

Overview of CentreWare Page 1 of 6. CentreWare Overview Overview of CentreWare Page 1 of 6 CentreWare Overview A Software Portfolio for Managing Documents, Network Printers, and Peripheral Devices Across Diverse Client/Server Network Environments April 1997

More information

System Development Life Cycle Methods/Approaches/Models

System Development Life Cycle Methods/Approaches/Models Week 11 System Development Life Cycle Methods/Approaches/Models Approaches to System Development System Development Life Cycle Methods/Approaches/Models Waterfall Model Prototype Model Spiral Model Extreme

More information

Cybersecurity ecosystem and TDL Antonio F. Skarmeta

Cybersecurity ecosystem and TDL Antonio F. Skarmeta Cybersecurity ecosystem and TDL Antonio F. Skarmeta University of Murcia (UMU) SPAIN CyberSecurity Challenges in a fully connected World Trust Framework 1. Policies for trust in heterogeneous

More information

Transforming the way people watch TV

Transforming the way people watch TV Transforming the way people watch TV Nokia Siemens Networks Ubiquity Multiscreen TV Platform - Executive summary An open solution for delivering TV and Internet as a single service on any device over any

More information

Security Enhancements

Security Enhancements OVERVIEW Security Enhancements February 9, 2009 Abstract This paper provides an introduction to the security enhancements in Microsoft Windows 7. Built upon the security foundations of Windows Vista, Windows

More information

UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT

UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT 2018 Viasat White Paper August 27, 2018 UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT With Hybrid Adaptive Networking By Craig Miller Vice President, Chief Technical Officer

More information

ITU-T SG 17 Q10/17. Trust Elevation Frameworks

ITU-T SG 17 Q10/17. Trust Elevation Frameworks ITU-T SG 17 Q10/17 Trust Elevation Frameworks Abbie Barbir, Ph.D. ITU-T SG 17 Q10 Rapporteur Martin Euchner SG 17 Advisor ITU Workshop on "Future Trust and Knowledge Infrastructure July 1 2016 Contents

More information

BEYOND TRADITIONAL PASSWORD AUTHENTICATION: PKI & BLOCKCHAIN

BEYOND TRADITIONAL PASSWORD AUTHENTICATION: PKI & BLOCKCHAIN SESSION ID: GPS-R09B BEYOND TRADITIONAL PASSWORD AUTHENTICATION: PKI & BLOCKCHAIN Sid Desai Head of Business Development Remme.io @skd_desai Agenda Our relationship to our digital-selves Evolution of Authentication

More information

Windows 10 IoT Core Azure Connectivity and Security

Windows 10 IoT Core Azure Connectivity and Security Windows 10 IoT Core Azure Connectivity and Security Published July 27, 2016 Version 1.0 Table of Contents Introduction... 2 Device identities... 2 Building security into the platform... 3 Security as a

More information

Vortex Whitepaper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems

Vortex Whitepaper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Vortex Whitepaper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems www.adlinktech.com 2017 Table of Contents 1. Introduction........ P 3 2. Iot and

More information

Simplify IP Telephony with System i. IBM System i IP Telephony

Simplify IP Telephony with System i. IBM System i IP Telephony Simplify IP Telephony with System i IBM System i IP Telephony Highlights Deploy a complete IP telephony suite on one easy-to-manage system, or even part of a system, shared with other applications Integrate

More information

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief RSA Solution Brief The RSA Solution for VMware View: Managing Securing the the Lifecycle Virtual of Desktop Encryption Environment Keys with RSA Key Manager RSA Solution Brief 1 According to the Open Security

More information

SOC 2 examinations and SOC for Cybersecurity examinations: Understanding the key distinctions

SOC 2 examinations and SOC for Cybersecurity examinations: Understanding the key distinctions SOC 2 examinations and SOC for Cybersecurity examinations: Understanding the key distinctions DISCLAIMER: The contents of this publication do not necessarily reflect the position or opinion of the American

More information

Integrated DHCP, DNS & IP Address Management

Integrated DHCP, DNS & IP Address Management Integrated DHCP, DNS & IP Address Management. Cisco Prime Network Registrar Charlie Mascari, Product Manager Network Management Technology Group September 2011 2010 Cisco and/or its affiliates. All rights

More information

Compliance Matrix for 21 CFR Part 11: Electronic Records

Compliance Matrix for 21 CFR Part 11: Electronic Records Compliance Matrix for 21 CFR Part 11: Electronic Records Philip E. Plantz, PhD, Applications Manager David Kremer, Senior Software Engineer Application Note SL-AN-27 Revision B Provided By: Microtrac,

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in InCommon Federation ( Federation ) enables the participant to use Shibboleth identity attribute sharing technologies to manage access

More information

NEXT GENERATION CMTS CHARACTERISTICS INCLUDING IP MULTICAST. Doug Jones YAS Broadband Ventures

NEXT GENERATION CMTS CHARACTERISTICS INCLUDING IP MULTICAST. Doug Jones YAS Broadband Ventures NEXT GENERATION CMTS CHARACTERISTICS INCLUDING IP MULTICAST Doug Jones YAS Broadband Ventures Abstract The cable industry is currently faced with upgrading from DOCSIS v1.0 CMTS equipment to DOCSIS v1.1

More information

Applying MDA Modeling to Development of Real-Time Software

Applying MDA Modeling to Development of Real-Time Software Applying MDA Modeling to Development of Real-Time Software Using a model-driven architecture approach to developing real-time systems offers developers enhanced communication of the requirements from domain

More information

ARM Security Solutions and Numonyx Authenticated Flash

ARM Security Solutions and Numonyx Authenticated Flash ARM Security Solutions and Numonyx Authenticated Flash How to integrate Numonyx Authenticated Flash with ARM TrustZone* for maximum system protection Introduction Through a combination of integrated hardware

More information

DMR Interoperability Process DMR Association

DMR Interoperability Process DMR Association DMR Interoperability Process DMR Association Introduction This white paper gives the background to the development of the DMR Interoperability Process by the DMR Association, explains the value of the

More information

Ulster University Standard Cover Sheet

Ulster University Standard Cover Sheet Ulster University Standard Cover Sheet Document Title Portable Devices Security Standard 1.5 Custodian Approving Committee Deputy Director of Finance and Information Services (Information Services) Information

More information

Windows 10. Tech Note. Open the Window to Endless Possibilities. Windows for the Enterprise. Universal App Experience

Windows 10. Tech Note. Open the Window to Endless Possibilities. Windows for the Enterprise. Universal App Experience Windows 10 ENTERPRISE MOBILITY MANAGEMENT Tech Note Open the Window to Endless Possibilities Windows 10 shows a renewed focus on the Enterprise. It successfully harmonizes user experience and device management

More information

How Next Generation Trusted Identities Can Help Transform Your Business

How Next Generation Trusted Identities Can Help Transform Your Business SESSION ID: SPO-W09B How Next Generation Trusted Identities Can Help Transform Your Business Chris Taylor Senior Product Manager Entrust Datacard @Ctaylor_Entrust Identity underpins our PERSONAL life 2

More information

Keep the Door Open for Users and Closed to Hackers

Keep the Door Open for Users and Closed to Hackers Keep the Door Open for Users and Closed to Hackers A Shift in Criminal Your Web site serves as the front door to your enterprise for many customers, but it has also become a back door for fraudsters. According

More information

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013 Securing Wireless Mobile Devices Lamaris Davis East Carolina University 11/15/2013 Attract As more employees prefer to use mobile devices in the workplace, organizations are starting to adopt the Bring

More information

SafeNet Authentication Client

SafeNet Authentication Client SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto and/or its subsidiaries who shall have and keep the

More information

Grow Your Services Business

Grow Your Services Business Grow Your Services Business Cisco Services Channel Program One Experience. Expanding Opportunities. Expand Your Services Practice More Profitably Together with Cisco Our customers face tough business

More information

1. Federation Participant Information DRAFT

1. Federation Participant Information DRAFT INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES [NOTE: This document should be considered a as MIT is still in the process of spinning up its participation in InCommon.] Participation in InCommon

More information

M-Commerce and its features

M-Commerce and its features M-Commerce and its features Abstract: Purpose of this article is to elaborate the concept of electronic commerce and its red hot issue, mobile commerce. In this article I define E-commerce as: Electronic

More information

PKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006

PKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006 PKI-An Operational Perspective NANOG 38 ARIN XVIII October 10, 2006 Briefing Contents PKI Usage Benefits Constituency Acceptance Specific Discussion of Requirements Certificate Policy Certificate Policy

More information

White Paper February McAfee Network Protection Solutions. Encrypted Threat Protection Network IPS for SSL Encrypted Traffic.

White Paper February McAfee Network Protection Solutions. Encrypted Threat Protection Network IPS for SSL Encrypted Traffic. White Paper February 2005 McAfee Network Protection Solutions Encrypted Threat Protection Network IPS for SSL Encrypted Traffic Network IPS for SSL Encrypted Traffic 2 Introduction SSL Encryption Overview

More information

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems Technical Overview of in Windows 7 and Windows Server 2008 R2 Microsoft Windows Family of Operating Systems Published: January 2009 This document supports a preliminary release of a software product that

More information

Networking Infrastructure

Networking Infrastructure Unit 43: Networking Infrastructure Unit code: A/601/1964 QCF Level 5: BTEC Higher National Credit Value 15 Aim To provide learners with an understanding of networking infrastructures, the directory based

More information

Smart Card and Biometrics Used for Secured Personal Identification System Development

Smart Card and Biometrics Used for Secured Personal Identification System Development Smart Card and Biometrics Used for Secured Personal Identification System Development Mădălin Ştefan Vlad, Razvan Tatoiu, Valentin Sgârciu Faculty of Automatic Control and Computers, University Politehnica

More information

PSEG Nuclear Cyber Security Supply Chain Guidance

PSEG Nuclear Cyber Security Supply Chain Guidance PSEG Nuclear Cyber Security Supply Chain Guidance Developed by: Jim Shank PSEG Site IT Manager & Cyber Security Program Manager Presented at Rapid 2018 by: Bob Tilton- Director Procurement PSEG Power Goals

More information

Digital Identity Guidelines aka NIST SP March 1, 2017 Ken Klingenstein, Internet2

Digital Identity Guidelines aka NIST SP March 1, 2017 Ken Klingenstein, Internet2 Digital Identity Guidelines aka NIST SP 800-63 March 1, 2017 Ken Klingenstein, Internet2 Topics 800-63 History and Current Revision process Caveats and Comments LOA Evolution Sections: 800-63A (Enrollment

More information

DIGITAL IDENTITY TRENDS AND NEWS IN CHINA AND SOUTH EAST ASIA

DIGITAL IDENTITY TRENDS AND NEWS IN CHINA AND SOUTH EAST ASIA DIGITAL IDENTITY TRENDS AND NEWS IN CHINA AND SOUTH EAST ASIA 1 SECURING DIGITAL IDENTITY THE KEY TO ASIA S VAST POTENTIAL IN E-COMMERCE We are living through an exciting time for digital commerce in Asia.

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

NORTH CAROLINA NC MRITE. Nominating Category: Enterprise IT Management Initiatives

NORTH CAROLINA NC MRITE. Nominating Category: Enterprise IT Management Initiatives NORTH CAROLINA MANAGING RISK IN THE INFORMATION TECHNOLOGY ENTERPRISE NC MRITE Nominating Category: Nominator: Ann V. Garrett Chief Security and Risk Officer State of North Carolina Office of Information

More information

The Forensic Chain-of-Evidence Model: Improving the Process of Evidence Collection in Incident Handling Procedures

The Forensic Chain-of-Evidence Model: Improving the Process of Evidence Collection in Incident Handling Procedures The Forensic Chain-of-Evidence Model: Improving the Process of Evidence Collection in Incident Handling Procedures Atif Ahmad Department of Information Systems, University of Melbourne, Parkville, VIC

More information

Single Secure Credential to Access Facilities and IT Resources

Single Secure Credential to Access Facilities and IT Resources Single Secure Credential to Access Facilities and IT Resources HID PIV Solutions Securing access to premises, applications and networks Organizational Challenges Organizations that want to secure access

More information

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK KEY BENEFITS AT A GLANCE Ensure your journey to the cloud is secure and convenient, without compromising either. Drive business agility

More information

iclass SE Platform Solutions The New Standard in Access Control

iclass SE Platform Solutions The New Standard in Access Control iclass SE Platform Solutions The New Standard in Access Control iclass SE Platform iclass SE SOLUTIONS Next generation access control solutions for increased security, adaptability, and enhanced performance.

More information

Use Case Brief BUILDING A PRIVATE CLOUD PROVIDING PUBLIC CLOUD FUNCTIONALITY WITHIN THE SAFETY OF YOUR ORGANIZATION

Use Case Brief BUILDING A PRIVATE CLOUD PROVIDING PUBLIC CLOUD FUNCTIONALITY WITHIN THE SAFETY OF YOUR ORGANIZATION Use Case Brief BUILDING A PRIVATE CLOUD PROVIDING PUBLIC CLOUD FUNCTIONALITY WITHIN THE SAFETY OF YOUR ORGANIZATION At many enterprises today, end users are demanding a powerful yet easy-to-use Private

More information

Securing Today s Mobile Workforce

Securing Today s Mobile Workforce WHITE PAPER Securing Today s Mobile Workforce Secure and Manage Mobile Devices and Users with Total Defense Mobile Security Table of Contents Executive Summary..................................................................................

More information

Guide. A small business guide to data storage and backup

Guide. A small business guide to data storage and backup Guide A small business guide to data storage and backup 0345 600 3936 www.sfbcornwall.co.uk Contents Introduction... 3 Why is data storage and backup important?... 4 Benefits of cloud storage technology...

More information