ASIA PKI Forum Overcome PKI Deployment Obstacles. Terry Leahy, CISSP Vice President, Wells Fargo Sept 15th, 2003

Similar documents
PKI is Alive and Well: The Symantec Managed PKI Service

How Next Generation Trusted Identities Can Help Transform Your Business

PKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman

Strong Security Elements for IoT Manufacturing

The Arab ICT Organization

Analysis of August 2003 Follow-up Survey on Obstacles to PKI Deployment and Usage

OASIS PKI Action Plan Overcoming Obstacles to PKI Deployment and Usage

Securing your Standards Based Services. Rüdiger Gartmann (con terra GmbH) Satish Sankaran (Esri)

eid Interoperability for PEGS WS-Federation

e-security Task Group Hong Kong Post e-cert: Enabling Secure Electronic Transactions

VMware AirWatch Integration with SecureAuth PKI Guide

Analysis of June 2003 Survey on Obstacles to PKI Deployment and Usage

Electronic Signature Policy

Digital Certificates Demystified

1. Publishable Summary

Trusted Identities That Drive Global Commerce

Séminaire sur la Certification Electronique

PAA PKI Mutual Recognition Framework. Copyright PAA, All Rights Reserved 1

Interagency Advisory Board Meeting Agenda, Wednesday, April 24, 2013

Workspace ONE UEM Certificate Authority Integration with JCCH. VMware Workspace ONE UEM 1810

INTEGRATED SECURITY SYSTEM FOR E-GOVERNMENT BASED ON SAML STANDARD

VMware AirWatch Integration with RSA PKI Guide

A Better Approach to Leveraging an OpenStack Private Cloud. David Linthicum

Federal Voting Assistance Program (FVAP)

Leveraging HSPD-12 to Meet E-authentication E

U.S. E-Authentication Interoperability Lab Engineer

Endpoint Protection with DigitalPersona Pro

Single Sign-On Architectures. Jan De Clercq Senior Member of Technical Staff Technology Leadership Group Hewlett-Packard

Software Development & Education Center Security+ Certification

Leveraging the LincPass in USDA

Massachusetts Health Data Consortium CAQH CORE - NEHEN - VeriSign/Symantec Pilot. September 2010

Java Card Technology-based Corporate Card Solutions

Development of smart authentication and identification in Asia

Public Key Infrastructure

GLOBAL PKI TRENDS STUDY

Technologies for Securing the Networked Supply Chain. Alex Deacon Advanced Products and Research Group VeriSign, Inc.

Workspace ONE UEM Integration with RSA PKI. VMware Workspace ONE UEM 1810

Trusted Computing Group

QUANTUM SAFE PKI TRANSITIONS

ArcGIS Server and Portal for ArcGIS An Introduction to Security

CSE 565 Computer Security Fall 2018

Transforming the Document Signing Process

Certification Authority

Delivering Windows-based Client-Server Applications Anywhere, On Demand with Presentation Server 4.5

Making the Case for Digital Signatures

Inside Symantec O 3. Sergi Isasi. Senior Manager, Product Management. SR B30 - Inside Symantec O3 1

How Your Organization Can Drive Success in the Age of Digital Disruption

About & Beyond PKI. Blockchain and PKI. André Clerc Dipl. Inf.-Ing. FH, CISSP, CAS PM TEMET AG, Zürich. February 9, 2017

Higher Education PKI Initiatives

An Enterprise Guide to Understanding Key Management

Business Technology Briefing: Fear of Flying, And How You Can Overcome It

Kroll Ontrack VMware Forum. Survey and Report

Unlocking The CHUID. Practical Considerations and Lessons Learned for PIV Deployments. Eric Hildre 07/18/2006

Who s Protecting Your Keys? August 2018

Ramnish Singh IT Advisor Microsoft Corporation Session Code:

Arcot Universal Client SAFE-Compliant Digital Signatures

PKI at the Crossroads: the Impact of the IoT and more! Amogh Ranade

Microsoft DirectAccess

Effective Information Management and Governance: Building the Business Case for Taxonomy

Development Authority of the North Country Governance Policies

Enterprise SOA Experience Workshop. Module 8: Operating an enterprise SOA Landscape

Microsoft IT deploys Work Folders as an enterprise client data management solution

HOMELESS INDIVIDUALS AND FAMILIES INFORMATION SYSTEM HIFIS 4.0 TECHNICAL ARCHITECTURE AND DEPLOYMENT REFERENCE

Commonwealth of Pennsylvania - Justice Network

AirWatch Mobile Device Management

The Device Has Left the Building

You re Leaking: Incident Response in the World of DevOps Jerry Dixon & Levi Gundert

Strategies for the Implementation of PIV I Secure Identity Credentials

Cloud Link Configuration Guide. March 2014

VMware AirWatch Certificate Authentication for Cisco IPSec VPN

Chapter 17 Web Services Additional Topics

The Case for Virtualizing Your Oracle Database Deployment

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

AN IPSWITCH WHITEPAPER. The Definitive Guide to Secure FTP

The Mobile Finnish Identity Certificate

Certificate Enrollment for the Atlas Platform

Ten Risks of PKI : What You re not Being Told about Public Key Infrastructure By Carl Ellison and Bruce Schneier

CS155b: E-Commerce. Lecture 6: Jan. 25, Security and Privacy, Continued

Enterprise Key Management Infrastructure: Understanding them before auditing them. Arshad Noor CTO, StrongAuth, Inc. Chair, OASIS EKMI-TC

Wireless Network Security Fundamentals and Technologies

Federated Web Services with Mobile Devices

AtoS IT Solutions and Services. Microsoft Solutions Summit 2012

Busting the top 5 myths of cloud-based authentication

PKI Deployment Business Issues

Digital Certificate Operation in a Complex Environment PKI ARCHITECTURE QUESTIONNAIRE

COURSE BROCHURE CISA TRAINING

US Federal PKI Bridge. Ram Banerjee VP Vertical Markets

NERC Staff Organization Chart Budget 2018

Windows 2000 Security. Security. Terminology. Terminology. Terminology. Terminology. Security. Security. Groups. Encrypted File Security (EFS)

Government PKI Factors Influencing Architecture for the Equal Employment Opportunity Commission

A privacy-preserving authentication service using mobile devices

Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810

SC27 WG4 Mission. Security controls and services

SafeNet Securing Microsoft Solutions

Implementation Guide for protecting. CheckPoint Firewall-1 / VPN-1. with. BlackShield ID

Single Sign-On Showdown

Security and Architecture SUZANNE GRAHAM

Single Secure Credential to Access Facilities and IT Resources

Hybrid IT for SMBs. HPE addressing SMB and channel partner Hybrid IT demands ANALYST ANURAG AGRAWAL REPORT : HPE. October 2018

Transcription:

ASIA PKI Forum Overcome PKI Deployment Obstacles Terry Leahy, CISSP Vice President, Wells Fargo Sept 15th, 2003

Agenda PKI technology and business benefits Deployment related obstacles Closer look of obstacles and ways to manage obstacles Area where Return of Investment can be gained Review of Key success factors Q & A 3

The Technology and Business Benefits PKI is an Infrastructure rather than a specific technology Various components together provide the ability to deliver: Authentication, Confidentiality, Integrity and Non repudiation Infrastructure is not valuable unless business processes are supported What are the business benefits? 4

Deployment related Obstacles Lack of Software Application Cost too High Poorly Understood Lack of Interoperability Too Complex to build Difficult to use Lack of Management Support Too much Legal Work 5

Closer Look at Obstacles Obstacles How to Manage Software applications Cost Too High Poorly Understood Poor Interoperability Over time, many applications become certificate aware. Vendor respond to business need Industry respond to streamlining the need for complex requirement and thus drive down the cost Continued education at the senior management level. Emphasize on the business benefits rather than technology play Industry to standardize related protocols and ensure vendor are in sync 6

Closer Look at Obstacles Obstacles How to Manage Too Complex Difficult to use Lack of Management Support Too Much Legal Work Industry and vendor starting to address practicality and usability including Identrus Usability should be the number one concern (number of suggestions to share ) Explain benefits in business terms, Management support is absolutely a must Only when external facing, Internal use can be simplified 7

Area Where PKI usage is most important in terms of ROI (2003 OASIS PKI TC Survey) Document Signing Web Server Security Secure E-Mail Web Service Security Virtual Private Network E-Commerce Single Sign On Code Signing 8

ROI and Success Factor Document Signing Recognize that digital signature is truly stand up in the court of law Provide a hosted internal solution for those document require higher level of authorization can speed up the time to market Start with limited pilot prior to mass deployment 9

ROI & Success Factor - Cont. Secure Web Server SSL security is universal For internal facing Web Server, no reason to purchase commercial SSL certs, as a result save expenditures External facing Web Server, consider linking up to Well Known Root 10

ROI & Success Factors - Cont. Secure E-Mail Exchange confidential information internally and externally Make sure that it is easy and straight forward for the end-user Leverage Microsoft Exchange and 2000 infrastructure Make certificate part of the Exchange Global Address List 11

ROI & Success Factors - Cont. Web Service Security Many common used functions are migrating toward Web Services Mutual authentication is a must have in that environment Digital Certificate is the means to enable mutual authentication An area where usage will increase 12

ROI & Success Factors - Cont. Virtual Private Network Utilize digital certificates to establish VPN Many of the Remote Access Tool supports the usage of digital certificates Certificates can act as the strong authentication factor replacing high cost tokens 13

ROI & Success Factors - Cont. E- Commerce A universal Infrastructure allowing the exchange of information from enterprise to enterprise A set of process, procedures and common customer authentication and validation process which allows the exchange of transaction to take place PK Infrastructure is the vehicle to make E- Commerce a reality Consider Identrus 14

ROI & Success Factors - Cont. Single Sign-On Must have Strong Authentication One Credential which can be recognizes cross platforms Digital Certificates is one of the vehicles to make that a reality Start with the common few and expand 15

ROI & Success Factors - Cont Code Signing Microsoft 2000 require document/excel spreadsheet to be digitally signed Internally issued certificates can save money and time Custom wrapper such as renewal and distribution process can be of great assistance Communication and training are just as important 16

Q & A Share Experience and lesson Learned Answer any question regarding the material Others 17