Thursday, May 15 Track D Security & Access Control Session: PKI Logical Access Technology & Applications Time: 10:15 AM 12:00 PM Room: W204 D Moderator: Steve Howard VP, Business Development, Identity Management Thales e-security, Inc. Speakers: Donald Malloy Director, Business Development Incard Technology Iana Bohmer Director, Identity Management Solutions Northrop Grumman (TSCP) Jim Gross SVP Wells Fargo
Secure Access through Federation Iana Bohmer Director, Identity Management Northrop Grumman May 15, 2008 Topics TSCP Membership TSCP Origin TSCP Mission & Vision Common Framework for Secure & Federated Collaboration Challenge of Domain Awareness Certipath Trust Hub for Federation Business Challenges that TSCP Aims to Solve TSCP Specification: Secure E-Mail Upcoming Specifications Summary: Membership Benefits 1
TSCP Membership Government-industry partnership focused on facilitating solutions to the most critical issues in Aerospace and Defense (A&D) today. TSCP Origin Created in 2002 by U.K. MoD, U.S. DoD and global A&D companies, the original goal was to define secure data sharing and collaboration for the entire supply chain, even when it begins with a government customer. The collaboration environment was characterized by: Large defense contracts involving thousands of companies Information sharing across company and country boundaries Different policies/laws in each company and country Increasing risks of data breaches or violating import/export regulations Unproven and inconsistent identity vetting and management Non-existent information and personal profiling 2
TSCP Vision & Mission Vision: International government-a&d industry partnership that seeks: Risk Mitigation. Mitigation of inherent IT risks in large multi-national collaborative programs: Complexity Cost Compliance Frameworks. Establish frameworks for secure collaboration and informationsharing while protecting IP. Interoperability. Cooperative effort to establish interoperability specifications: Determine impediments to sensitive data sharing Define requirements for solution Implement prototype to test the specification Encourage vendors to create compliant solutions Mission: TSCP s mission is to establish an environment in which employees, contractors and suppliers can securely access data required to execute on contracts and programs. Common Framework for Secure & Federated Collaboration Meet government agencies emerging requirements for identity assurance across domains Demonstrate compliance with export control regulations Protect corporate IP in collaborative and other information sharing programs Protect personal privacy data of employees Have collaborative toolsets that will interoperate with customers and suppliers Re-use collaborative capabilities among multiple programs Provide assurance that collaborative partners can be trusted 3
Challenge of Domain Awareness Large, Complex Space. Difficult to monitor a large global space. No Central Authority. No single or centralized authority. Pervasive Threat. Small cells create pervasive threats to large nation states CertiPath Trust Hub for Federation Trust. Mechanism by which member companies and governments can use trusted digital IDs. Identity Assurance. Central, trusted authority that issues CertiPathenabled digital identities, which assures that identities are verified and validated. Interoperability. System that providing interoperability of participants credentials across industry & government. Companies which do not want to operate their own CA s CA Providers: - ARINC - Exostar - SITA Other governments TBD UK MoD (in process) Other industry Bridges (automotive, transportation/cargo, banking, etc.) Boeing Northrop CertiPath BAE Lockheed Martin US Federal Bridge CA EADS DoD NASA DoT DHS Bridge Model 8 4
Business Challenges that TSCP Aims to Solve Mutual Confidence (Trust) Mitigating risk and ensuring quality between parties in the circle of trust can be performed through: Definition of business standards Definition of minimum requirements Enforcement through certification and audits Liability Allocation of liability in the event of failure of a critical transaction due to malfunction of a shared authentication component: Extent of liability Definition of dispute resolution process Risk Pooled Knowledge: sharing of customer information (e.g. # of customers, customer names, etc...) between enterprises Revocation Procedures: increased reliance on third parties for authentication Fraud Protection: broadened potential for fraud if an identity is ever compromised Security Incident Procedures: coordinated effort for analysis and correlation of audit logs among parties involved Compliance Privacy Legislation: ensure privacy terms are not violated when federating an identity between enterprises TSCP Specification: Secure E-mail TSCP has established specification for secure collaborative e-mail: Organizations can trust and identify e-mail senders and recipients Eliminates inherent identity and data transmission security flaws E-mail can only be shared by trusted, vetted parties Based on users and desktops Available to all A&D industry and beyond Free step-by-step guide on TSCP.org Developed with COTS products and open-source software Leverages CertiPath trust federation Controlled Unclassified Information and sensitive program data can be shared among thousands of partners For Microsoft Outlook and Lotus Notes 5
Upcoming Specifications TSCP is working on specifications that will be available in the near future: PKI Authentication: IP protection and export control inside of a (PLM) environment In production in 2008 Information Asset Protection: IP protection and export controls in realtime collaboration, such as online white boarding. Proof of concept in 2008 Document Sharing with Identity Federation (DSIF): Sharing of documents across member domains using federation for authentication of identities. Pilot in 2008 Same process as with Secure E-mail Free step-by-step guide on TSCP.org Developed with COTS products and open-source software Leverages CertiPath trust federation Summary: Membership Benefits TSCP Microsoft meeting Feb 2007. On any given day, over 100 engineers are working on TSCP projects To Governments & Prime Contractors/OEMs Influence to drive a common approach and specifications Efficiency of working together on common problems Mitigation of risk exposure in reference to the insecurity of data sharing Reusable specifications that reduce integration complexity, coordination time and collaboration costs To Solution Providers/Vendors Exposure to motivated customer base and goodwill Defined roadmap and business case Working prototypes that ease development costs Reusable specifications 6
QUESTIONS and DISCUSSION Contact Information: www.tscp.org 7
Identity Convergence: Logical, Physical, Mobile, Virtual Jim Gross Senior Vice President WellsSecure Identity Assurance Page 1 The General Identity Ecology Identity Reliance Commercial Family/ Friends Identity Assertion Employers Comm. Networks People, Entities, Machines More? Industry Financial Government Institutions Page 2 1
Getting More Complex All The Time Family/ Commercial Friends Employers Comm. Networks People, Entities, Machines More? Industry Financial Government Institutions Page 3 And It s About More Than Logging In Family/ Friends Commercial Employers Buying Stuff Comm. Networks People, Entities, Machines More? Industry Getting In The Door My 2.0 Agents Financial Government Institutions Always With Me Page 4 2
My 2.0 Agents Buying Stuff Getting In The Door Always With Me Page 5 It Takes Two To Tango Interoperable Business Policy, Rules and Contractual Framework Interoperable Hardware, Code and Network Specs. Young Adult Gangly Adolescent Common Drive Train Across The Identity Ecology Page 6 3
Key Technology Drivers Toward Mature Convergence For physical: HSPD-12/FIPS 201/PIV twins Finally brought certification to smart card reader interoperability NIST 800-16 (draft out for review) further refines physical access specs. to support identity assurance level For mobile: secure contactless access to SIM chip For Web 2.0: rich metadata To enable a service And, to allow dynamic linkage decisioning Standard identity services are at the top of the list! Page 7 Key Business Driver Towards Mature Convergence Liberty Alliance IAF (Identity Assurance Framework) Objective is to create a framework of baseline policies, business rules and commercial terms against which identity assurance services can be assessed and certified Standard, broadly accepted Levels of Assurance allow relying parties (or their agents) to readily determine, on the fly, their confidence in an identity credential Desired results are: Operational streamlining of identity service provider certification/accreditation processes for entire industry Less complex/more rapid deployment of digital identity services Page 8 4
How IAF Certification Will Unfold Initially focused on the use of credentials for authentication, targeting CSP s (Credential Service Providers) Liberty Alliance (LAP) provides accreditation of assessors who will perform certification assessment Federation Operators will require LAP-accredited assessments Provides guidelines for how all involved parties (relying parties, CSP s and Federation Operators) may work together LAP will maintain the Identity Assurance Framework and provide a current list of accredited assessors Page 9 Converged Use Case: Payments Initiation/release of $1MM wire Basic relying party (e.g. financial institution) requirement: requestor authentication onto network in order to submit request. Existing tools satisfy requirement. Further relying party requirement: requestor authorization to submit request. Existing tools satisfy requirement. But, do I have high assurance that the identity credential submitted can non-repudiably represent the customer? IAF framework and supporting network deliver this capability. Page 10 5
Converged Use Case Physical Physical access to storage facility for negotiable documents Facility maintains directory of identities authorized to enter Person x is authorized to enter, but does not have a facility access card to allow authorized entry Person x does holds a payment card that also holds a high assurance identity credential Person x can be authorized to enter without further effort via assurance level match Page 11 Identity Framework Data Services Will Be Increasingly Essential Identity Infrastructure Personal Identifiable Information (PII) Retained Federal HSPD-12 Credential State/Local FRAC Web-based Public CRLs Trusted : Trusted : Trusted : Private Sector FRAC Assurance Level Assigned Key: AHJ - Authority Having Jurisdiction CRLs - Certificate Revocation Lists FRAC - First Responder Authentication Credential PIV Auth Cert FIPS 201 Personal ID Verification Authorization Certificate Attribute Infrastructure No PII Retained Assurance Level Consumed FEMA Attribute Repository Electronic Attributes Agency or AHJ Attribute Administrator FIPS 201 Cert Valid Valid Valid Validation Infrastructure Validated Information Retained Consolidated Information = PIV Auth Cert + Electronic Attribute Standardized FIPS 201 Credential & Attribute Validation Process For Official Use Only (FOUO) Graphic and content courtesy of Tom Lockwood, DHS Page 12 6
Contact Information Jim Gross Senior Vice President Wells Fargo One Front Street MAC A0195-204 20 th Floor San Francisco, CA V: (415) 222-5007 F: (415) 788-3039 jgross@wellsfargo.com Page 13 7
NOTES