Bridge-to-Bridge Working Group (BBWG) Debb Blanchard, Cybertrust EDUCAUSE Federal and Higher Education PKI Coordination Meeting June 16, 2005 The Fairmont.

Slides:



Advertisements
Similar presentations
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Seminar on Standardization and ICT Development for the Information.
Advertisements

PKI Solutions: Buy vs. Build David Wasley, U. California (ret.) Jim Jokl, U. Virginia Nick Davis, U. Wisconsin.
Levels of Assurance: An Overview Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority.
AFACT eCOO WG interim meeting - Conference Call 1st March of 2011 Mahmood Zargar eCOO Experiences and Standards.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
Policy interoperability in electronic signatures Andreas Mitrakas EESSI International event, Rome, 7 April 2003.
Certificate Interoperability S&I Framework Initiative Final Report August 17, 2011.
15June’061 NASA PKI and the Federal Environment 13th Fed-Ed PKI Meeting 15 June ‘06 Presenter: Tice DeYoung.
1 © Cooley Godward 2001 PKI A SSESSMENT The process of evaluating, verifying, and certifying your PKI Presented by: Randy V. Sabett Vanguard Enterprise.
Copyright Judith Spencer This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
SAFE BioPharma Association CONFIDENTIAL1 SAFE Public Key Infrastructure (PKI) 2005 EDUCAUSE/Dartmouth PKI Deployment Summit.
David L. Wasley Office of the President University of California A PKI Certificate Policy for Higher Education A Work in Progress Draft David L.
Identity Standards (Federal Bridge Certification Authority – Certificate Lifecycle) Oct,
Helena Sims NACHA – The Electronic Payments Association Overview of The Electronic Authentication Partnership Tenth Federal & Higher Education PKI Coordination.
PKI in US Higher Education TAGPMA Meeting, March 2006 Rio De Janeiro, Brazil.
Uncle Sam, Meet The PKI! Richard Guida Chair, Federal PKI Steering Committee Michèle Rubenstein Department of the Treasury,
Higher Education Bridge Certificate Authority (HEBCA) Project Progress Fed/Ed June 2005.
The U.S. Federal PKI and the Federal Bridge Certification Authority
COEN 351: E-Commerce Security Public Key Infrastructure Assessment and Accreditation.
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
The 4BF The Four Bridges Forum Higher Education Bridge Certificate Authority.
Emergence of Identity Management: A Federal Perspective Dr. Peter Alterman Chair, Federal PKI Policy Authority.
In the CA I trust. A look at Certification Authorities James E. Shearer CSEP 590 March 8 th 2006.
Higher Education Bridge Certificate Authority (HEBCA) Project Progress Fed/Ed December 2004.
Higher Education Bridge Certificate Authority (HEBCA) Project Progress July 2004 Dartmouth PKI Summit.
HEBCA – Higher Education Bridge Certification Authority Presented by Scott Rea and Mark Franklin, Fed/Ed Meeting, 12/14/2005.
The E-Authentication Initiative An Overview Peter Alterman, Ph.D. Assistant CIO for e-Authentication, NIH and Chair, Federal PKI Policy Authority The E-Authentication.
1 USHER Update Fed/ED December 2007 Jim Jokl University of Virginia.
The Federal Bridge Certification Authority – Description and Current Status Peter Alterman, Ph.D. Senior Advisor to the Chair, Federal PKI Steering Committee.
The U.S. Federal PKI, 2004: Report to EDUCAUSE Peter Alterman, Ph.D. Assistant CIO for E-Authentication National Institutes of Health.
National Smartcard Project Work Package 8 – Security Issues Report.
David L. Wasley Office of the President University of California Higher Ed PKI Certificate Policy David L. Wasley University of California I2 Middleware.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Introduction In 1992, the Committee Of Sponsoring Organizations of the Treadway Commission (COSO) published Internal Control-Integrated Framework (1992.
+1 (801) Standards for Registration Practices Statements IGTF Considerations.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
HIT Policy Committee NHIN Workgroup Recommendations Phase 2 David Lansky, Chair Pacific Business Group on Health Danny Weitzner, Co-Chair Department of.
The NIH PKI Pilots Peter Alterman, Ph.D. … again.
HEPKI-PAG Policy Activities Group David L. Wasley University of California.
Board Orientation. BCA Mission The mission of the Building Commissioning Association is to guide the building commissioning industry through advancing.
Legislation and Market Forces: PKI Drivers for the U. S. Mortgage Industry November 27, 2006 R. J. Schlecht Director, Industry Technology – Security &
A Brief Overview of draft-ietf-sidr-cp-01.txt draft-ietf-sidr-cps-rirs-01.txt draft-ietf-sidr-cps-isp-00.txt Steve Kent BBN Technologies.
Higher Education PKI Summit Meeting August 8, 2001 The ABA PAG Rodney J. Petersen, J.D. Director, Policy and Planning Office of Information Technology.
PKI and the U.S. Federal E- Authentication Architecture Peter Alterman, Ph.D. Assistant CIO for e-Authentication National Institutes of Health Internet2.
The Federal Bridge A Brief Overview 1. 4BF Industry Forum April Fed PKI: View from 20,000 km FBCA C4 Common Policy CA (HSPD-12) CertiPath SSPs.
I-CIDM Bridge to Bridge Working Group (BBWG) Purpose and Activities Fed-Ed Meeting The Fairmont Hotel Washington, DC December 14, 2004 Debb Blanchard Enspier.
© 2003 The MITRE Corporation. All rights reserved For Internal MITRE Use Addressing ISO-RTO e-MARC Concerns: Clarifications and Ramifications Response.
Jimmy C. Tseng Assistant Professor of Electronic Commerce
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
Identity Federations and the U.S. E-Authentication Architecture Peter Alterman, Ph.D. Assistant CIO, E-Authentication National Institutes of Health.
1 Federal Identity Management Initiatives Federal Identity Management Initatives David Temoshok Director, Identity Policy and Management GSA Office of.
Higher Ed Bridge CA Extending Trust Across Higher Education - And Beyond David L. Wasley University of California.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
HEBCA – The Operating Authority July 2005 Dartmouth PKI Summit.
HIT Policy Committee Meeting Nationwide Health Information Network Governance June 25, 2010 Mary Jo Deering, PhD ONC, Office of Policy and Planning NHIN.
PKI Policy Determination Process Input from PKI Decision Process PKI Policy Determination Process Application(s) Workflows Players.
Electronic Security and PKI Richard Guida Chair, Federal PKI Steering Committee Chief Information Officers Council
Federal PKI Update Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority.
Federal PKI Update Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority.
Trusted Electronic Communications for Federal Student Aid Mark Luker Vice President EDUCAUSE Copyright Mark Luker, This work is the intellectual.
Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority Meet FedFed.
Higher Education Bridge Certification Authority Scaleable Linking of PKI trust domains Scaleable Linking of PKI trust domains David L. Wasley Fall 2006.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
1 US Higher Education Root CA (USHER) Update Fed/Ed Meeting December 14, 2005 Jim Jokl University of Virginia.
Federal Initiatives in IdM Dr. Peter Alterman Chair, Federal PKI Policy Authority.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
U.S. Federal e-Authentication Initiative
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Fed/ED December 2007 Jim Jokl University of Virginia
Appropriate Access InCommon Identity Assurance Profiles
Presentation transcript:

Bridge-to-Bridge Working Group (BBWG) Debb Blanchard, Cybertrust EDUCAUSE Federal and Higher Education PKI Coordination Meeting June 16, 2005 The Fairmont Hotel Washington, DC

Agenda Purpose and Goals of BBWG Bridge Certification Authority Participants Issues and Status Conclusion

Purpose and Goals Purpose To provide a mechanism to gather input from the communities of interest, and identify, vet, resolve and document all technical and policy related issues associated with cross-certification of BCAs. Goals Interoperability, collaboration and trust with other BCAs Trust that the other BCA will manage and map its policies in strict accordance with the policy advertised by that BCA and will properly manage the cross-certified relationships between that BCA and the Participating CAs within that community of the BCA

Bridge Certification Authority Participants Federal Bridge Certification Authority PKI cross-certification and interoperability issues within the US Federal Government - specifically, between US Federal Government agencies deploying their own PKIs. Will also cross-certify with commercial entities if a BCA is not available for that community Is cross-certifying with foreign governments, e.g., UK MOD, Australia, Government of Canada Higher Education Bridge Certification Authority To facilitate trusted electronic communications within and between institutions of higher education as well as with federal and state governments to facilitate trusted electronic communications within and between institutions of higher education as well as with federal and state governments Secure Access for Everyone (SAFE) The BioPharmaceutical Industry standard and infrastructure services necessary to support unique electronic identity (eIdentity) credentials, enabling legally enforceable & regulatory compliant digital signatures, for business-to-business and business to regulator transactions CertiPath Design, implement, maintain and market a secure public key infrastructure communications bridge, initially focused on the aerospace and defense industry. To enable the transfer of secured and authenticated information globally between subscribing companies; and between such companies and a number of domestic and foreign government agencies

Issues and Remedies Issues Policy Mapping Charter Disclosure Statements Audit Requirements Governance Common lexicon Compliance with open standards Liability Trusted Roles and Citizenship.

Policy Mapping Involves the comparison of CA Certificate Policies to determine whether the assurance offered by the two policies is comparable Other documentation that is needed: Mapping methodology used by the policy authority of the BCA used to determine the requirements of the Participating CAs that comprise that BCA The charter of rules or charter disclosure statement for a BCA determines the rules and business procedures and processes under which a BCA operates Audit results of the BCA Status – on hold while waiting for the results of the Audit and Legal sub-working group and Citizenship results

Charter disclosure statements Charter Disclosure Statement should declare the business of the BCA and should be audited Need to identify: Purpose of the BCA Organizational structure of the BCA including separation of operational and policy responsibilities Liability framework Policy authority and governance structure Contract infrastructure (e.g., relying party and subscriber agreements, insurance policies) General operational environment (i.e., the communities of interest in which the applicant BCA participates either directly and indirectly).

Charter Disclosure Statements (contd) Issues that need to be addressed in the charter are, but not limited to: If a Participating CA leaves a BCA, identification of the process for notification of other BCAs and Participating CAs for the certificate path processing needs to be outlined. The dispute procedure that is included in the MOA with specifics that address how a federation or BCA does business to notify others.. The perceived need for entities to have visibility into the CPSs and audit results of specific PKIs beyond their BCA domain, including the potential for PKIs hanging off of inter-connected BCAs, e.g., DoD to have visibility into the CPS of HEBCA as well as the CPS of Duke University, assuming that HEBCA is fully cross-certified with the FBCA Charter Disclosure Statement should be audited Status - on hold while waiting for the results of the Audit and Legal sub-working group and Citizenship results

Governance BCAs are autonomous peers that agree to interoperate contractually within the context of laws of international commerce and the laws of the nation within which it operates BCA approach uniquely brings policy and technical cohesion (or governance), as well as trust promulgation to otherwise autonomous and independent entities, without enforcing a strict hierarchy. Governance structures and the extent of the authority of a particular BCA could be vastly different and incompatible with that of another BCA. This is true in large part because the governance mechanism is a reflection of the interest and characteristics of the community. The governance of the BCA should address how it does business and how it is governed Status - on hold while waiting for the results of the Audit and Legal sub-working group and Citizenship results

Audit Requirements Standards do not exist for performing audits for a BCA BBWG created a sub-committee to determine the standards for auditing a BCA. The work of that sub-committee is still on-going Recommendations to include the following: the requirements for the persons who will be performing the audit, the documents that are needed to support the auditors, the audit standards for a Bridge-to-Bridge environment Auditing needs to be done at 2 levels: first at the CP and CPS second the actual steps for completing the annual audit of the BCA Need to cover policy mapping Audits and their results are not solely for Bridge-to-Bridge certification, but to also allow the participating CAs to review the operations of their bridges and to review the accreditations of external bridges with which their bridge will/may/have cross-certified Status - Work is still on-going in this area

Common Lexicon Each community of interest tends to define its lexicon in a language that the community understands. In a Bridge-to-Bridge environment, definitions and terminology should be included as part of the mapping methodology Necessary to facilitate common terms of reference and to provide a common lexicon. In an attempt to put together definitions for the Bridge- to-Bridge environment, members of the group synthesized definitions and terminology from a variety of sources Status A couple of definitions need to be included. For the most part, this list is complete as of 1/2005.

Compliance with Open Standards Need for BCAs to insist on full compliance to open standards. Too many vendors do not implement the full standards thereby causing a deterrent to interoperability. Vendors also tend to “bend” standards to create rule-sets which create a closed community, thus, making interoperability difficult if not impossible. Standards need to be identified from the National Institutes of Standards and Technology (NIST) as well as the IETF, ISO, and European Union to allow for Bridge-to-Bridge interoperability in a global environment. Status - Standards identified for PKI for the group and seem to be complete as of 1/2005

Liability An important issue that would not necessarily show up when mapping Certificate Policies. Liability concerns do need to be addressed early in the formation of the BCA Situations need to be compared for each of the BCAs, which include limits on liability and an appropriate indemnification clause where possible Within the context of a BCA, liability does not exist with data management. Liability is addressed in the internal processes and may be a way of managing risk Different liability issues exist depending upon the community - the Federal government versus the commercial private sector and the types of liability, such as contractual liability, negligence liability, and strict liability. The subtlety of these liabilities as they pertain to the Bridge-to- Bridge environment needs to be discussed further The MOA between these entities should explicitly disallow waivers to the CP/CPS and to the MOA itself Status - Work is still on-going in this area.

Trusted Roles and Citizenship Status/Resolution Update (as of 6/3/2005) per FBCA Creating two new policies, with OIDS, termed medium-cbp and medium hardware-cbp (for “commercial best practice”). These two new policies will be identical to the existing medium and new medium hardware except for the absence of any mention of citizenship of trusted operators. Medium-cbp and medium hardware-cbp are considered by the FPKI PA as identical in trustworthiness to the existing medium and new medium hardware. All policies will include re-defined requirements for trustworthiness, loyalty and integrity, and all four medium policies will have the identical TLI requirement. The current medium and new medium hardware will include language that addresses the citizenship requirements for CAs run in foreign countries and CAs run by multinational entities. Note: this language will NOT be in medium-cbp or medium hardware-cbp, which are citizenship-blind policies. FBCA will drop the citizenship requirement for trusted operators from Rudimentary and Basic Assurance levels

Trusted Roles and Citizenship (contd) Status/Resolution Update (as of 6/3/2005) per FBCA FBCA has not at this time chosen to create a high-cbp policy since the government’s EAuthentication Initiative has defined medium hardware (and the proposed medium hardware-cbp) as satisfying the requirements for EAuthentication Level 4 (highest level) for all eGov applications. This means that in practice no external entity will ever be required to have a high assurance certificate to do business with an eGov application. Any PKI, or bridge, may run at high assurance without cross-certifying with the Federal Bridge at high assurance. So, for example, if FBCA cross-certifies with HEBCA at medium hardware-cbp, any PKI cross-certified with HEBCA at that LOA or better would see its credentials accepted by any eGov application, all the way up to Level 4, the highest FBCA will cross-certify at a High LOA with only other another government entity. Therefore, HEBCA and FBCA both run at high but FBCA cross-certifies with HEBA at medium hardware-cbp. FBCA is required to do this to avoid certain international trade policy problems Next steps – this is awaiting final confirmation by the FPKI CPWG and membership agencies

Conclusion A lot of work has been completed to date on Bridge-to- Bridge interoperability, yet more needs to be done. Technical issues, such as name constraints and certificate path validation, need to be considered. However, because these technical issues also impact other interoperability areas, such as applications and authorizations, they are not addressed by the BBWG. At the core, foundation of all of this is: the identity proofing and vetting of individuals by organizations the impact of HSPD-12 and FIPS 201 across the entire infrastructure

Questions?

For More Information Debb Blanchard, Cybertrust Senior Program Specialist Former Chair, BBWG Office-1: Office-2: Cell: Dr. Peter Alterman, NIH Chair, FPKI PA Office: Cell: Mark Luker, EDUCAUSE Vice President Office: Steve Worona, EDUCAUSE Director of Policy and Networking Programs Office: