Den Gode Webservice - Security Analysis
|
|
|
- Ronald Sullivan
- 9 years ago
- Views:
Transcription
1 Den Gode Webservice - Security Analysis Cryptomathic A/S September, 2006
2 Executive Summary This report analyses the security mechanisms provided in Den Gode Web Service (DGWS). DGWS provides a framework securing messages at 5 different security levels based on IDCards with authentication level 1, 2, 3 or 4. Security level 1 only provides identification, level 2-4 provides some level of authentication (i.e., proof of identity) and level 5 provides message authentication. Security levels 1, 2, 3 and 4 add very little security as the mechanisms at this level are vulnerable to replay attacks and these mechanisms depend completely on the confidentiality and integrity provided by the network. The main recommendation is therefore to concentrate DGWS on transactions at security level 5 and develop profiles for different usages of digital signatures. Depending on whether MOCES or VOCES certificates are used, it is possible to define different security levels depending on whether the service requires message authentication or non-repudiation. It is further suggested that DGWS clarifies the risk of using a revoked certificate when relying on IDCards signed by the Identity Provider. The consequences of this depend on the sensitivity of the service and must be well understood. 2
3 Table of Contents Executive Summary...2 References Introduction Purpose Scope Target Document Organisation Terminology Overview of DGWS Entities and Services IDCard Envelopes Security Levels Analysis Cryptographic Issues Certificate Management Identification and Authentication Message Authentication Single Sign-On Request-Response and Sessions Confidentiality Integrity Conclusion and Recommendations
4 References [CPMOCES] [CPVOCES] Certifikatpolitik for OCES-medarbejdercertifikater (Offentlige Certifikater til Elektronisk Service). Version 4.0, August See Certifikatpolitik for OCES-virksomhedscertifikater (Offentlige Certifikater til Elektronisk Service). Version 3.0, August See [DGWS] Den Gode Webservice, MedCom. Version 1.0, July 13, [DGWSB] Den Gode Webservice - Bilag, MedCom. Version 1.0, July 13,
5 1 Introduction 1.1 Purpose The purpose of this document is to analyse the security offered by Den Gode Webservice (DGWS) as described in [DGWS]. This includes describing the features and limitations of the security mechanisms within DGWS and identifying prerequisites for exploiting these. 1.2 Scope DGWS defines a web service profile specifying how a number of standards must be used for web services within the Danish Health Care. As part of this, mechanisms for identification and authentication of the sender of a message are defined. This document analyses these security mechanisms and identifies possible security problems when basing transactions on DGWS. Prerequisites for utilising these mechanisms are identified and a few recommendations are given. Only the profile defined in [DGWS] is considered. This document does not deal with actually implemented services based on the profile. DGWS is based on a number of standards including standards for secure web services. This document neither analyses these standards nor the actual use of them. Only the resulting security mechanisms are considered. In order to establish a secure system, the platforms running the components must be secured. This includes (but is not limited to) proper network configuration and protection against malware. It is out of the scope to consider methods for securing the platform. 1.3 Target This document targets readers interested in the security properties of DGWS either as part of implementing systems/services based on DGWS or as part of evaluating the security of actual services based on DGWS. 1.4 Document Organisation It is assumed that the reader knows DGWS, but in order to make the document selfcontained, the central (security) mechanisms used by DGWS are briefly reviewed in section 3. The actual analysis is presented in section 4 and conclusions as well as recommendations are given in section 5. 5
6 2 Terminology Authentication Availability Confidentiality Identification Integrity Message Authentication MOCES certificate MOCES signature VOCES certificate VOCES signature Ensuring that an entity has the claimed identity. Reliability and accessibility of data and resources Protecting the data from being disclosed to unauthorised parties. Identifying an entity. Ensuring that data are not changed by unauthorised entities. Ensuring that a message originates from a particular user. Implies integrity. Danish Medarbejder OCES certificate Digital signature created with private key corresponding to MOCES certificate. Danish Virksomheds OCES certificate (certificate belonging to company typically used by several systems within the company). Digital signature created with private key corresponding to VOCES certificate. 6
7 3 Overview of DGWS A comprehensive description of DGWS can be found in [DGWS, DGWSB]. Briefly, the goal of DGWS is to provide a profile for securing Web services. While information security generally deals with availability, confidentiality and integrity, the purpose of DGWS is to support mechanisms for identification, authentication and message authentication. Confidentiality and availability are not within the scope of DGWS. Furthermore, for mechanisms providing identification and authentication, integrity must be ensured by different means. In order to obtain confidentiality and integrity, [DGWS] recommends running DGWS over networks using either VPN (as in the closed health care network) or SSL. Availability is not addressed in [DGWS] and, although essential, will not be discussed further here. The overview below describes how DGWS provides identification and (message) authentication. 3.1 Entities and Services DGWS covers the following entities: A number of clients. A number of service providers. An Identity Provider (IdP), which is a special service provider issuing IDCards (see section 3.2). A Web service consists of one or more pairs of (request, response). The following three types of services are supported in DGWS: Inquiry Message Session Client requests data from service provider. Client provides information to service provider (the response is a receipt). A number of inquiries and messages linked together. 3.2 IDCard All requests and certain responses contain an IDCard. An IDCard contains the following information: Validity period (typically 24 hours). Card information (including information about issuer of card). User Information identifies the owner of the IDCard. System Information. 7
8 Security credentials. The detailed content depends on the authentication level (1, 2, 3 or 4) and is described in [DGWSB]. For this analysis, it is important to understand the security related information (in particular security credentials) within the card. At level 3 and 4, either the client or the IdP signs the card: Authentication level 1 None. Security information 2 Username and password 3 (ID card signed by user) 3 (ID card signed by IdP) 4 (ID card signed by user) 4 (ID card signed by IdP) Card Information contains hash of client VOCES certificate. Security credentials contain Clients VOCES certificate Signature on IDCard using private key corresponding to client VOCES certificate Card Information contains hash of client VOCES certificate. Security credentials contain IdP VOCES certificate *) Signature on IDCard using private key corresponding to IdP VOCES certificate Card Information contains hash of client MOCES certificate. Security credentials contain Clients MOCES certificate Signature on IDCard using private key corresponding to client MOCES certificate Card Information contains hash of client MOCES certificate. Security credentials contain IdP VOCES certificate *) Signature on IDCard using private key corresponding to IdP VOCES certificate * ) When IdP signs the card, it either includes its certificate or a reference to its certificate. As part of issuing an IDCard, the IdP verifies that the client certificate is not revoked. A service provider trusting IdP can therefore assume that the client certificate was valid at the time the IDCard was issued and may therefore opt not to validate the client certificate itself, thereby avoiding the trouble of checking revocation. 8
9 3.3 Envelopes Requests and responses are transmitted in SOAP envelopes. Such an envelope contains a header and a body. The actual payload of the request/response is in the body. The IDCard is inserted in the header. If the IDCard has authentication level 3 or 4, the header may, in addition, contain a signature on the entire envelope (i.e. including the IDCard). This signature also contains the client certificate and is validated in the following three steps (in addition to validation of certificate status): 1. Validate IDCard (against known IdP certificate or client certificate within IDCard). 2. Validate signature on envelope against client certificate included in signature. 3. Validate client certificate in envelope signature against hash value of client certificate within IDCard information. [DGWS] and [DGWSB] focus on the use of IDCards in relation to requests from clients. However, it is understood that IDCards and signed envelopes can also be applied to responses from the service provider to a client, if necessary. 3.4 Security Levels DGWS defines the security of a particular web service by two parameters: security level (1, 2, 3, 4 or 5) and time-out (levels 1, 2, 3 or 4). Security levels 1, 2, 3 and 4 are equivalent to using cards with the corresponding authentication level as defined above. Security level 5 is equivalent to using a level 3 or 4 card with a digital signature on the envelope as described in section 3.3. Time-out levels define how long the service provider will accept the IDCard after it has been issued (24 hours, 8 hours, 30 minutes or 5 minutes). 9
10 4 Analysis The analysis is structured in a bottom up fashion first considering the cryptographic primitives and certificate handling, then the security mechanisms supported by DGWS and finally some thoughts on the overall security. In the analysis below, the term relying party denotes the entity validating an IDCard or, for security level 5, a signature on an envelope. In most cases, the relying party will be a service provider, but it could also be the client system. 4.1 Cryptographic Issues DGWS uses RSA and SHA-1. The choice of RSA for signing is enforced by OCES and is in line with current practice. In recent years, the security of SHA-1 has been questioned by improved cryptographic attacks. Although there is no reason to immediately stop using SHA-1, it is recommended that DGWS be prepared for using other hash functions. 1 While it may be difficult for DGWS to unilaterally replace SHA-1 in digital signatures as the OCES certificates are used with different applications, it could be considered to use SHA-256 when computing the hash value of the client certificate in level 3 and 4 cards. The security of IDCards of authentication level 3 and 4 depends crucially on the security of the private keys used to sign them. These keys must therefore be managed very securely in clients and service providers. Private keys corresponding to VOCES certificates may be used by several systems and activated by several users within a company or institution. Procedures controlling access to these keys (including password control) must therefore be carefully implemented at client systems as well as service providers. Special attention must be paid to the private key of IdP, since a number of service providers are expected to rely on the IDCards it issues. Access to this key can be better controlled by placing the IdP system in a secure rooms and/or having the private key in secure cryptographic hardware security modules. 4.2 Certificate Management Relying parties validating IDCards and signed messages must have installed the TDC OCES CA root certificate and ensure that the signature is validated against it. If the relying party has installed other trusted certificates, it must be ensured that the certificate is validated against the TDC OCES CA certificate. If the relying party is a client using a browser based application, special care should be taken to prevent validation against other CA certificates, which are installed as trusted in the browser. Otherwise a door for accepting fake certificates may be opened. 1 There are activities towards recommending a replacement for SHA-1. While these are still in progress, the currently best candidate is SHA
11 It is assumed in this analysis that when IdP issues an IDCard, it has properly validated the client certificate against the TDC root and against the latest revocation information from TDC 2. This may reduce the burden of the service provider, but introduces the risk that the certificate has been revoked after the IdP issued the IDCard, but before the card is used. If the relying party does not validate the certificate status, the period for using a revoked certificate is increased from 1 minute and up to the service time-out period. This risk must be weighed against the computational and administrative advantages for each service provider taking the sensitivity of the service into account. An IDCard issued by IdP refers to IdP s certificate using a serial number. The specification is not clear here: In [DGWS, p16] the subject serial number (cvr-rid value) is suggested to be used. However, this value is not likely to be changed when the certificate is renewed. Using this value therefore enables a situation where an IDCard can be validated against the wrong (expired) key. In [DGWSB, p52] the certificate serial number is suggested. This serial number is unique for a particular CA and therefore provides a better reference. However, certificates issued by other CAs may potentially have the same serial number. Therefore the relying party must, as discussed above, ensure that IdP s certificate is issued by TDC OCES CA. In general, procedures must be established for installing IdP s certificate correctly at all relying parties. This includes validating that the correct certificate is installed, effecting procedures for updating it and continuous validating that it is not changed (e.g. by malware). Procedures for handling revoked IdP certificate must be in place at all relying parties. 4.3 Identification and Authentication The following considers messages on security level 1, 2, 3 and 4. An IDCard identifies a certain party in the system. The IDCard is neither linked to a particular relying party (e.g., a service provider) nor to a particular message. This means that the same IDCard can be used in a number of different transactions. IDCards at authentication level 1 are not secured (except for the security offered by the network) and are only used to convey identification. For authentication level 2, the IDCard can only be used with relying parties for which the username and password are registered. It does not appear clearly from [DGWS] if the same username/password can be used with more than one service provider, but DGWS does not restrict the IDCard to a single provider. If a malicious party gets a level 2 card, it also gets the corresponding username/password, and can therefore construct such cards 2 When a certificate is revoked, TDC must provide an updated CRL within one minute (see [CPMOCES, CPVOCES]) 11
12 by itself at any time. Thus the confidentiality provided by the system (including, but not limited to, the network) is essential for the reliability of authentication at this level. For cards with authentication level 3 and 4, the IDCard can be used with all service providers accepting the corresponding security level. In particular, if a malicious party gets the IDCard of another entity, that malicious part can use the IDCard in the same transactions as the rightful owner (masquerading) during the given validity period and limited by the service time-out. Forging or changing existing IDCards of level 3 or 4 requires a digital signature. If the owner s private key is not compromised, this can be assumed infeasible. Therefore, the malicious party can only use the eavesdropped IDCard during its validity period (again limited by the time-out policy of the service provider). [DGWS, p. 22] mentions that some service providers require that the user enter a new password at every message. This is enforced by having a 5-minute time-out. However, as mentioned above the same IDCard may potentially be used with different service providers and therefore this requirement is not strictly enforced by a 5-minute time-out. Furthermore, even if the card can only be used with one service provider (possible at authentication level 2), several transactions can be made within 5 minutes using the same card. This can be remedied using the following mechanisms for level 3 and 4 cards: IDCard (preferably the entire transaction) is made dependent on service provider; and service provider ensures that a particular card is only accepted once. 4.4 Message Authentication Message authentication is only supported at security level 5, where cards with authentication level 3 and 4 are used with enveloped signing. The receiving entity will in all other situations (i.e., security level 1-4) have no guarantee about the integrity and origin of the message except what is provided by the underlying network. If level 3 cards are used in combination with envelope signing, the recipient is guaranteed that the message originates from a system having access to the private key. By the properties of VOCES certificates, this does not guarantee that the message originates from a particular user. An audit log within the originating system should be maintained in order to identify the originator. If level 4 cards are used in combination with envelope signing, the recipient is guaranteed that the message originates from the person identified in the MOCES certificate (assuming the key is not compromised). In [DGWS], security level 5 is called non-repudiation. It is worth recalling the difference between VOCES and MOCES signatures and remembering that nonrepudiation requires more than just a digital signature (such as procedures and mechanisms for storage, retrieval and independent signature validation). For this reason, the term message authentication is applied here, and it is noted that MOCES signatures can be used as a first step towards non-repudiation. 12
13 It may be considered to combine IDCards at level 4 with VOCES signatures on the transaction in cases where message authentication, but not non-repudiation is required: While the card ensures that the user has been logged on (when making the card), the VOCES signature provides message authentication. The value of this combination depends on the actual services. It can be included in the current profile by extending IDCards to contain both MOCES and VOCES certificates. Finally, it is noted that even if a malicious party obtains another entity s IDCard, that party cannot sign the envelope. Therefore security level 5 enables strong linking of request and responses (see also section 4.6 regarding linking) as well as strong linking of transactions to clients and service providers preventing a number of replay attacks. However, to fully benefit from this, DGWS must define a profile for signed messages defining required attributes. 4.5 Single Sign-On The security properties of level 3 and 4 IDCards are independent of whether the IdP or the owner signs the card, except that relying parties, as discussed in section 4.2, may save some certificate validation when the IdP has signed the card. It is worth noting, however, that a malicious party observing the request for an IDCard at the IdP may replay this request in order to get another IDCard (for the original entity) signed by IdP. In transactions with security level 3 and 4, this card can be (mis)used in the same way as a copied card (see section 4.3). This card will be slightly different from the one obtained by the owner and can therefore be used in transactions of level 3 and 4, even if the service provider tries to avoid accepting the same card twice. The IdP must prevent this by storing requests of IDCards until the card in the request expires. [DGWS] does not specify the validity period of an IDCard issued by IdP. If it is valid for 24 hours after the IdP signs the card, an eavesdropped card signed by the owner can in principle be used for up to 48 hours. Namely, first the eavesdropped card is used for almost 24 hours and then, just before it expires, the attacker uses it in a request for a new card at the IdP. This card issued by the IdP can then be used for up to 24 hours. 4.6 Request-Response and Sessions Messages are made unique by inserting a unique message ID in each message. A recipient can therefore in principle detect replay by storing all received message IDs (as long as the message is valid). This mechanism does not, however, prevent a malicious party from replaying a message with a new message ID. Even if the network provides adequate integrity protection, the replayed message could be injected. DGWS does not securely link the response to the request. Unless the underlying network security prevents it, an attacker can therefore insert an arbitrary answer. If the response is signed, a link to the request can be added in the body, and the signature will then prevent replays of responses (see discussion in section 4.4). 13
14 All messages in a session (except the first request) contain FlowID, which is unique for that session. This allows both client and service provider to link envelopes in the session. Obviously this linking is only guaranteed to the extent that integrity is provided (by the network and/or digital signatures). 4.7 Confidentiality DGWS does not provide any mechanisms ensuring confidentiality. As discussed above IDCards with authentication level 1, 2, 3 and 4 can be re-used by malicious parties (except in transactions of security level 5). It is therefore essential that the underlying network provide confidentiality in order to ensure the confidentiality of IDCards as well payload data. [DGWS] suggests using VPN or SSL. Analysis of these mechanisms is out of the scope of this document, but some care is required if SSL is used, as there are advanced attacks (e.g., related to Internet banking) on web based applications, in which a user can be lured to malicious Web servers and perform transactions here, even if SSL is applied. Such a malicious Web server could also be used to obtain e.g., level 2, 3 or 4 ID Cards from a client system. 4.8 Integrity As discussed above, only DGWS transactions of security level 5 provide message authentication. Transactions on security level 1, 2, 3 and 4 do not provide any authentication of the transmitted data. 14
15 5 Conclusion and Recommendations DGWS provides a framework securing messages in Web services. It is recommended to implement this in such a way that the cryptographic hash function (SHA-1) can easily be replaced. Furthermore, SHA-256 should be used where possible. DGWS uses IDCards with authentication level 1, 2, 3 or 4. Security level 1 only provides identification, level 2-4 provides some level of authentication and level 5 provides message authentication. As security levels 3, 4 and 5 rely on public-key technology, all entities must manage keys and certificates carefully. Although self-evident, this point is often ignored. As the IdP is a trusted party, special attention must be paid to the private key of the IdP and relying parties must manage the certificate of IdP very cautiously. It is recommended to base the implementation and policies of IdP on existing standards for trusted authorities. For messages on security level 2-4, the authentication mechanism is only reliable to the extent that the underlying network provides confidentiality and integrity. However, independently of the network security, a receiving party (e.g., a malicious service provider) may reuse the IDCard (security level 2-4) in a masquerading attack. There are a number of examples of such malicious servers when SSL is the only network protection. A properly controlled, closed network (e.g., VPN) can be considered harder to infiltrate. The eavesdropped card can be used as follows: A malicious party can use an eavesdropped level 2 IDCard to create new valid IDCards for the original owner. A malicious party can use an eavesdropped level 3 or 4 IDCard in other transactions during the validity period of the IDCard. However, the malicious party cannot create new cards (as for level 2 cards), as this requires a digital signature. IDCards at level 3 ensures that a particular system or company has participated in creating the cards. At level 4, it is ensured that a particular person has participated. In general, IDCards at security levels 2, 3 and 4 add very little security on their own as they are subject to replay attacks and these mechanisms depend completely on the confidentiality and integrity provided by the complete system (including service providers and network). If the network does not provide sufficient integrity, level 3 and 4 cards can be used in combination with digital signatures to protect the authenticity and hence integrity of the messages. In order to reduce the dependency on the security features of the network, it is, in any case, recommended to digitally sign transactions (i.e., level 5 is the preferred security level). Related to this, DGWS should be extended with a more detailed profile of signed envelopes (e.g., defining attributes for time stamps, recipient, linking of messages, ). If the message is signed corresponding to a VOCES certificate, it is ensured that the message originates from a particular system. But if the message is signed corresponding 15
16 to a MOCES certificate, it is ensured that the message originates from a particular user. It is suggested to consider the possibility of mixing level 4 IDCards with VOCES signatures on the transactions in the light of the required web services. If the network cannot be trusted to provide confidentiality, it could be considered to integrate mechanisms for encrypting messages in DGWS. This is feasible as the required key material is available. Finally, each service provider must carefully consider the level of trust to place in IDCards signed by IdP against the risk of accepting a revoked certificate. DGWS defines a time-out period for all services for managing this risk. However, the use of this parameter should be defined in more detail in relation to the sensitivity of the services. The use of a 5-minutes time-out to ensure that an IDCard is only used once is, at best, questionable. This goal is better achieved by using signed envelopes (security level 5) with strong links to the particular service. 16
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
How To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series
User Guide Supplement S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series SWD-292878-0324093908-001 Contents Certificates...3 Certificate basics...3 Certificate status...5 Certificate
L@Wtrust Class 3 Registration Authority Charter
Class 3 Registration Authority Charter Version 1.0 applicable from 09 November 2010 Building A, Cambridge Park, 5 Bauhinia Street, Highveld Park, South Africa, 0046 Phone +27 (0)12 676 9240 Fax +27 (0)12
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Chapter 7 Managing Users, Authentication, and Certificates
Chapter 7 Managing Users, Authentication, and Certificates This chapter contains the following sections: Adding Authentication Domains, Groups, and Users Managing Certificates Adding Authentication Domains,
X.509 Certificate Generator User Manual
X.509 Certificate Generator User Manual Introduction X.509 Certificate Generator is a tool that allows you to generate digital certificates in PFX format, on Microsoft Certificate Store or directly on
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Neutralus Certification Practices Statement
Neutralus Certification Practices Statement Version 2.8 April, 2013 INDEX INDEX...1 1.0 INTRODUCTION...3 1.1 Overview...3 1.2 Policy Identification...3 1.3 Community & Applicability...3 1.4 Contact Details...3
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Executive Summary...3 Background...4 Internet Growth in the Pharmaceutical Industries...4 The Need for Security...4
PASSWORD MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
PASSWORD MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Purpose of PKI PUBLIC KEY INFRASTRUCTURE (PKI) Terminology in PKIs. Chain of Certificates
Purpose of PKI PUBLIC KEY INFRASTRUCTURE (PKI) Purpose, Methods, Revocation, PKIX To distribute public keys securely Requires - Certificates and Certification Authorities - Method for retrieving certificates
Hang Seng HSBCnet Security. May 2016
Hang Seng HSBCnet Security May 2016 1 Security The Bank aims to provide you with a robust, reliable and secure online environment in which to do business. We seek to achieve this through the adoption of
CERTIFICATION POLICY OF KIR for TRUSTED NON-QUALIFIED CERTIFICATES
Krajowa Izba Rozliczeniowa S.A. CERTIFICATION POLICY OF KIR for TRUSTED NON-QUALIFIED CERTIFICATES Version 1.5 Document history Version Number Status Date of Issue 1.0 Document approved by the Management
National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016
National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy Version 1.1 February 2, 2016 Copyright 2016, Georgia Tech Research Institute Table of Contents TABLE OF CONTENTS I 1 INTRODUCTION
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT
Secure Email Frequently Asked Questions
Secure Email Frequently Asked Questions Frequently Asked Questions Contents General Secure Email Questions and Answers Forced TLS Questions and Answers SecureMail Questions and Answers Glossary Support
HMRC Secure Electronic Transfer (SET)
HM Revenue & Customs HMRC Secure Electronic Transfer (SET) Installation and key renewal overview Version 3.0 Contents Welcome to HMRC SET 1 What will you need to use HMRC SET? 2 HMRC SET high level diagram
Authentication Application
Authentication Application KERBEROS In an open distributed environment servers to be able to restrict access to authorized users to be able to authenticate requests for service a workstation cannot be
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
Lecture VII : Public Key Infrastructure (PKI)
Lecture VII : Public Key Infrastructure (PKI) Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University 2 Problems with Public
SECURITY IN ELECTRONIC COMMERCE - SOLUTION MULTIPLE-CHOICE QUESTIONS
MULTIPLE-CHOICE QUESTIONS Each question has only one correct answer, which ought to be clearly pointed out with an 'X'. Each question incorrectly answered will be evaluated as minus one third of the mark
Module 7 Security CS655! 7-1!
Module 7 Security CS655! 7-1! Issues Separation of! Security policies! Precise definition of which entities in the system can take what actions! Security mechanism! Means of enforcing that policy! Distributed
CoSign for 21CFR Part 11 Compliance
CoSign for 21CFR Part 11 Compliance 2 Electronic Signatures at Company XYZ Company XYZ operates in a regulated environment and is subject to compliance with numerous US government regulations governed
Arkansas Department of Information Systems Arkansas Department of Finance and Administration
Arkansas Department of Information Systems Arkansas Department of Finance and Administration Title: Electronic Signature Standard Document Number: SS 70 011 Effective Date: Act 722 of 2007 requires state
Certificate Management. PAN-OS Administrator s Guide. Version 7.0
Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Apple Corporate Email Certificates Certificate Policy and Certification Practice Statement. Apple Inc.
Apple Inc. Certificate Policy and Certification Practice Statement Version 2.0 Effective Date: April 10, 2015 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2. Table of acronyms... 4 1.3.
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Controller of Certification Authorities of Mauritius
Contents Pg. Introduction 2 Public key Infrastructure Basics 2 What is Public Key Infrastructure (PKI)? 2 What are Digital Signatures? 3 Salient features of the Electronic Transactions Act 2000 (as amended)
IBM i Version 7.3. Security Digital Certificate Manager IBM
IBM i Version 7.3 Security Digital Certificate Manager IBM IBM i Version 7.3 Security Digital Certificate Manager IBM Note Before using this information and the product it supports, read the information
You re FREE Guide SSL. (Secure Sockets Layer) webvisions www.webvisions.com +65 6868 1168 [email protected]
SSL You re FREE Guide to (Secure Sockets Layer) What is a Digital Certificate? SSL Certificates, also known as public key certificates or Digital Certificates, are essential to secure Internet browsing.
Why you need secure email
Why you need secure email WHITE PAPER CONTENTS 1. Executive summary 2. How email works 3. Security threats to your email communications 4. Symmetric and asymmetric encryption 5. Securing your email with
MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
BlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
This Working Paper provides an introduction to the web services security standards.
International Civil Aviation Organization ATNICG WG/8-WP/12 AERONAUTICAL TELECOMMUNICATION NETWORK IMPLEMENTATION COORDINATION GROUP EIGHTH WORKING GROUP MEETING (ATNICG WG/8) Christchurch New Zealand
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
OPENID AUTHENTICATION SECURITY
OPENID AUTHENTICATION SECURITY Erik Lagercrantz and Patrik Sternudd Uppsala, May 17 2009 1 ABSTRACT This documents gives an introduction to OpenID, which is a system for centralised online authentication.
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
Strong Encryption for Public Key Management through SSL
Strong Encryption for Public Key Management through SSL CH.SUSHMA, D.NAVANEETHA 1,2 Assistant Professor, Information Technology, Bhoj Reddy Engineering College For Women, Hyderabad, India Abstract: Public-key
HKUST CA. Certification Practice Statement
HKUST CA Certification Practice Statement IN SUPPORT OF HKUST CA CERTIFICATION SERVICES Version : 2.1 Date : 12 November 2003 Prepared by : Information Technology Services Center Hong Kong University of
Danske Bank Group Certificate Policy
Document history Version Date Remarks 1.0 19-05-2011 finalized 1.01 15-11-2012 URL updated after web page restructuring. 2 Table of Contents 1. Introduction... 4 2. Policy administration... 4 2.1 Overview...
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
X.509 Certificate Revisited
X.509 Certificate Revisited Tohari Ahmad Informatics Department, Faculty of Information Technology - FTIF, ITS Surabaya Email: [email protected] Abstract A digital certificate is used for identifying
Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015
Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015 Table of Contents 1. Introduction... 5 1.1. Trademarks...
White Paper BMC Remedy Action Request System Security
White Paper BMC Remedy Action Request System Security June 2008 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain information
NIST ITL July 2012 CA Compromise
NIST ITL July 2012 CA Compromise Prepared for: Intelligent People [email protected] 1 NIST ITL Bulletin on CA Compromise http://csrc.nist.gov/publications/nistbul/july-2012_itl-bulletin.pdf These
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
Copyright: WhosOnLocation Limited
How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and
Ciphire Mail. Abstract
Ciphire Mail Technical Introduction Abstract Ciphire Mail is cryptographic software providing email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the
Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software
WHITE PAPER: COMPARING TCO: SYMANTEC MANAGED PKI SERVICE........ VS..... ON-PREMISE........... SOFTWARE................. Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software
Securing your Online Data Transfer with SSL
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4. What does
OIO SAML Profile for Identity Tokens
> OIO SAML Profile for Identity Tokens Version 1.0 IT- & Telestyrelsen October 2009 Content > Document History 3 Introduction 4 Related profiles 4 Profile Requirements 6 Requirements 6
Certification Practice Statement
FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification
CERTIFICATION PRACTICE STATEMENT UPDATE
CERTIFICATION PRACTICE STATEMENT UPDATE Reference: IZENPE-CPS UPDATE Version no: v 5.03 Date: 10th March 2015 IZENPE 2015 This document is the property of Izenpe. It may only be reproduced in its entirety.
IY2760/CS3760: Part 6. IY2760: Part 6
IY2760/CS3760: Part 6 In this part of the course we give a general introduction to network security. We introduce widely used security-specific concepts and terminology. This discussion is based primarily
Concept of Electronic Approvals
E-Lock Technologies Contact [email protected] Table of Contents 1 INTRODUCTION 3 2 WHAT ARE ELECTRONIC APPROVALS? 3 3 HOW DO INDIVIDUALS IDENTIFY THEMSELVES IN THE ELECTRONIC WORLD? 3 4 WHAT IS THE TECHNOLOGY
Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.
Entrust Managed Services PKI Getting an end-user Entrust certificate using Entrust Authority Administration Services Document issue: 2.0 Date of issue: June 2009 Revision information Table 1: Revisions
Using etoken for Securing E-mails Using Outlook and Outlook Express
Using etoken for Securing E-mails Using Outlook and Outlook Express Lesson 15 April 2004 etoken Certification Course Securing Email Using Certificates Unprotected emails can be easily read and/or altered
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile
Certificate Policy for OCES Employee Certificates (Public Certificates for Electronic Services) Version 5
Certificate Policy for OCES Employee Certificates (Public Certificates for Electronic Services) Version 5 - 2 - Contents Rights...4 Preface...5 Introduction...6 1 Overview and scope...7 2 References...8
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
Notes on Network Security - Introduction
Notes on Network Security - Introduction Security comes in all shapes and sizes, ranging from problems with software on a computer, to the integrity of messages and emails being sent on the Internet. Network
Securing your Online Data Transfer with SSL A GUIDE TO UNDERSTANDING SSL CERTIFICATES, how they operate and their application INDEX 1. Overview 2. What is SSL? 3. How to tell if a Website is Secure 4.
State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008
State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008 Background In the last ten years Arkansas has enacted several laws to facilitate electronic transactions
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions May 3, 2004 TABLE OF CONTENTS GENERAL PKI QUESTIONS... 1 1. What is PKI?...1 2. What functionality is provided by a
Security Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
The Benefits of SSL Content Inspection ABSTRACT
The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic
You can also find the conditions at www.nemid.nu.
NemID conditions for online banking and public digital signatures, v.5 1 Introduction NemID is a security solution that you can use for accessing your online banking service, public authority websites
apple WWDR Certification Practice Statement Version 1.8 June 11, 2012 Apple Inc.
Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.8 Effective Date: June 11, 2012 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2.
Online Banking Security Guide Internet-based version
Online Banking Security Guide Internet-based version Contents Introduction to the Security Guide... 2 Security Guide... 2 Using the internet securely... 2 Security solutions in Online Banking... 3 What
WEB SERVICES SECURITY
WEB SERVICES SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
EUCIP - IT Administrator. Module 5 IT Security. Version 2.0
EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single
Business Issues in the implementation of Digital signatures
Business Issues in the implementation of Digital signatures Much has been said about e-commerce, the growth of e-business and its advantages. The statistics are overwhelming and the advantages are so enormous
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
Configuring SSL Termination
CHAPTER 4 This chapter describes the steps required to configure a CSS as a virtual SSL server for SSL termination. It contains the following major sections: Overview of SSL Termination Creating an SSL
BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS
BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS Published by Tony Porterfield Feb 1, 2015. Overview The intent of this test plan is to evaluate a baseline set of data security practices
[SMO-SFO-ICO-PE-046-GU-
Presentation This module contains all the SSL definitions. See also the SSL Security Guidance Introduction The package SSL is a static library which implements an API to use the dynamic SSL library. It
Introduction to NemID and the NemID Service Provider Package
Nets DanID A/S Lautrupbjerg 10 DK 2750 Ballerup T +45 87 42 45 00 F +45 70 20 66 29 [email protected] www.nets-danid.dk CVR no. 30808460 Introduction to NemID and the NemID Service Provider Package Page 1
Microsoft Trusted Root Certificate: Program Requirements
Microsoft Trusted Root Certificate: Program Requirements 1. Introduction The Microsoft Root Certificate Program supports the distribution of root certificates, enabling customers to trust Windows products.
Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI) In this video you will learn the quite a bit about Public Key Infrastructure and how it is used to authenticate clients and servers. The purpose of Public Key Infrastructure
Welcome to the Protecting Your Identity. Training Module
Welcome to the Training Module 1 Introduction Does loss of control over your online identities bother you? 2 Objective By the end of this module, you will be able to: Identify the challenges in protecting
Chapter 9 Key Management 9.1 Distribution of Public Keys 9.1.1 Public Announcement of Public Keys 9.1.2 Publicly Available Directory
There are actually two distinct aspects to the use of public-key encryption in this regard: The distribution of public keys. The use of public-key encryption to distribute secret keys. 9.1 Distribution
Cryptography and Network Security Chapter 14
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
Guidelines Related To Electronic Communication And Use Of Secure E-mail Central Information Management Unit Office of the Prime Minister
Guidelines Related To Electronic Communication And Use Of Secure E-mail Central Information Management Unit Office of the Prime Minister Central Information Management Unit Office of the Prime Minister
TELSTRA RSS CA Subscriber Agreement (SA)
TELSTRA RSS CA Subscriber Agreement (SA) Last Revision Date: December 16, 2009 Version: Published By: Telstra Corporation Ltd Copyright 2009 by Telstra Corporation All rights reserved. No part of this
Certification Practice Statement
Certification Practice Statement Revision R1 2013-01-09 1 Copyright Printed: January 9, 2013 This work is the intellectual property of Salzburger Banken Software. Reproduction and distribution require
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
The name of the Contract Signer (as hereinafter defined) duly authorized by the Applicant to bind the Applicant to this Agreement is.
Trustwave Subscriber Agreement for Digital Certificates Ver. 11JUL14 PLEASE READ THIS AGREEMENT AND THE TRUSTWAVE CERTIFICATION PRACTICES STATEMENTS ( CPS ) CAREFULLY BEFORE USING THE CERTIFICATE ISSUED
GlobalSign Subscriber Agreement for DocumentSign Digital ID for Adobe Certified Document Services (CDS)
GlobalSign Subscriber Agreement for DocumentSign Digital ID for Adobe Certified Document Services (CDS) Version 1.1 PLEASE READ THIS AGREEMENT CAREFULLY BEFORE USING THE DIGITAL CERTIFICATE ISSUED TO YOU
