CA & PKI Certificate Authority s Perspective. FOO Jong Ai Chief Executive Officer Netrust Pte Ltd jongai.foo@netrust.net

Size: px
Start display at page:

Download "CA & PKI Certificate Authority s Perspective. FOO Jong Ai Chief Executive Officer Netrust Pte Ltd Email: jongai.foo@netrust.net"

Transcription

1 CA & PKI Certificate Authority s Perspective FOO Jong Ai Chief Executive Officer Netrust Pte Ltd jongai.foo@netrust.net

2 Agenda Brief introduction of Netrust What is Important to a CA? Applications & Applications Support. Technology & Processes Conclusion

3 Brief Profile of Netrust First Public Certificate Authority (CA) in Asia. Company started in Only licensed CA in Singapore. Provider of cryptographic solutions to enable customers to maximize their returns on investment on security infrastructure. Turnkey project deployment partner for organizations implementing security and identity frameworks.

4 Netrust is the Only Public Licensed CA Only CAs that meet high integrity and operational standards will qualify for a license Evidence of sound financial standing, approved operational practices, and security cleared staff. Subjected to annual security audits. The CA license affirms Netrust s commitment to offer services at the highest level of integrity and security.

5 Netrust s Focus Identity Management (Licensed CA) Integrated Identity Mgt Infra Server and client single factor dual factor mobile PKI Public directory services Entrust SSL Applications (COTS) (Single certificate, multiple uses) Document signing Secure , Desktop security Secure remote access Single sign-on Entrust Authority (PKI) Winmagic hard-disk encryption National Identity Service Provider Consultancy/ Services CA setup (Pte, Pte Label) CA hosting (Pte Label) Training Security Framework CP/ CPS/ Operational Procedures Turnkey PKI and Directory deployment Security Solutions Solutions to protect data in transit or at rest Secure transaction platform Securing data in databases, e-registries Securing file transfers via FTP Restricting secure data distribution Secure server messaging

6 What is the key source of CA s revenue?

7 Sale of Digital Certificates CA s key source of revenue comes from issuing Digital Certificates. Where do demand comes from? From PKI-enabled applications.

8 Examples of PKI-enabled Applications

9 Partner in Transforming the Singapore Government Singapore has consistently been ranked amongst the top in global egovernment ranking.

10 Partial List of Clients for Certificate/Directory Services Singapore Government Public Service Card Provision of digital certificates for civil servants GEBIZ / Ministry of Finance GEBIZ Partners Integrated, one stop centre for Trading Partners to interact with the Government for business activities. Building and Construction Authority/ Ministry of National Development CORENET e-submissions Electronic submission of building project documents. Central Provident Fund Board CPF Online Allows members to securely access their CPF account online for ments, fund transfers and change of PIN Custom and Excise Department / Ministry of Home Affairs Warehouse Inventory Submission System (WISE) An Internet application system that allows Bonded Warehouse Licensees to submit daily inventory ments to Customs Petrolink To enable petroleum installations and refineries to submit their stock movements and inventory ments to the department via Internet Intellectual Property Office of Singapore, Ministry of Law E-Patent Services One-Stop website for electronic filing of patent transaction and patent search

11 Partial List of Clients for Certificate/Directory Services Land Transport Authority / Ministry of Transport Road Tax Online For LTA Authorised Collection Centres to renew road tax for vehicles Ministry of Defence Mindef Internet Procurement System A supply management system developed by MINDEF Singapore Land Authority / Ministry of Law Integrated Land Information System A one-stop online service that provides property buyers, lawyers, real e agents, valuers, developers, surveyors, and the general public with easy access to land information STARS elodgement System An application for law firms to lodge caveats, land documents, register title deeds and do searches from anywhere, on the Internet. Urban Redevelopment Authority Electronic Development Applications Allows for submission of Development Applications (DA) electronically Public Service Infrastructure PSOnline PSI acts as a common services platform for E-Government services deployment

12 CORENET e-submission Features Provides One stop convenience to both private and public sector in submitting and processing building/ construction-related documents. Participants include MND, BCA, Nparks, URA, HDB, ENV, Fire Safety Bureau, MCIT, PUB, JTC, SingPower, Industry Associations. Benefits Single point of submission and retrieval of project-related documents. Increased efficiency and workflow management. Digital archival. Incorporates multiple signatures.

13 Legal Sector Submission of legal documents, patent filing, property transactions, etc..

14 Netrust NServer

15 Vehicle Registration & Licensing System (LTALink) Submission of vehicle registration, licensing, insurance and other information

16 Launched in October 2007, TradeXchange provides seamless inter-connectivity among commercial and regulatory systems for the Singapore trade and logistics community. It offers a single electronic window for integrated workflow, submissions and enquiries to the Sea Ports, Airports, Maritime Authorities, Customs and Controlling Agencies. TradeXchange TradeXchange is a neutral and secure trade platform that facilitates the exchange of information within the trade and logistics community.

17 Examples of PKI-enabled Applications in Private Sector

18 enets (Online Payment Solutions) Features Online payment solution for merchants Supports payment via direct debit, credit cards, cash cards Certificates used for server to server authentication and security Benefits Secure online authentication and encryption Fast rollout and connectivity

19 PKI is less susceptible to attacks. Online Banking A potentially major application. CA can support multiple banks easily compared to other 2FA technology.

20 Online Banking Misconception of CA s role as Trusted Third Party. CA acted as a third party that issues certificates, but trust is still directly between the individual bank and customers.

21 Support Applications Development PKI requires expertise that may not be readily available. CA must have ready pool of cryptographic expertise to support development and maintenance. Rapid rollout of applications is key to CA s business growth.

22 PKI Technology PKI Systems From Different Vendors Are Not The Same

23 Entrust Authority Integrated Certificate Management System o Automatic key/certificate update eliminates need to continually administer each user Key Expiry Key Generation Key expiry and automatic renewal Key histories CA key update User archival DN changes User CA to CA transfer Revocation Certificate Valid n Certificate Issuance Key Usage

24 Entrust Support For Client Apps

25 Certification Authority and Processes

26 RA Processes Basic RA procedure Identify user (document check) Check eligibility Create user data (Data entry) Authorize addition of data to Entrust Issue Auth / Ref code to user Three basic options Face to Face Registration Centralized Registration Organizational RA Other issues to Consider Data Entry & user creation split? Multiple officers to create user (M of N) Types of documents for verification Type of authorization for eligibility Who holds the paper records

27 Face to Face Registration

28 Centralized Registration /Decentralised Verification

29 Organizational Registration Agency (ORA)

30 Conclusion and Summary Applications are key to success of a CA. CA needs to be able to support PKIapplications development. The correct choice of technology can impact scalability. CA operations is about processes.

31 Netrust s Strengths & Capabilities 12 x Year experience in CA operations, and in supporting Government and Businesses. A Licensed CA in Singapore compliance with stringent security requirements and processes. Provider of customized cryptographic solutions. Experience in supporting SIs in PKI-enabling applications. Experienced in turnkey CA/ PKI deployment, and PKD deployment. Consultancy on all aspects of PKI policies, implementation and processes.

32 Contact Details FOO Jong Ai Chief Executive Officer Netrust Pte Ltd URL:

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006 Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark

More information

TELSTRA RSS CA Subscriber Agreement (SA)

TELSTRA RSS CA Subscriber Agreement (SA) TELSTRA RSS CA Subscriber Agreement (SA) Last Revision Date: December 16, 2009 Version: Published By: Telstra Corporation Ltd Copyright 2009 by Telstra Corporation All rights reserved. No part of this

More information

U. S. Department of Justice Information Technology Strategic Plan. Appendix E. Public Key Infrastructure at the Department of Justice.

U. S. Department of Justice Information Technology Strategic Plan. Appendix E. Public Key Infrastructure at the Department of Justice. U. S. Department of Justice Information Technology Strategic Plan Public Key Infrastructure at the Department of Justice White Paper * Introduction As part of its strategic plan, the Department of Justice

More information

Using Entrust certificates with VPN

Using Entrust certificates with VPN Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark

More information

Netrust SSL Web Server Certificate New Application Enrolment Guide

Netrust SSL Web Server Certificate New Application Enrolment Guide Netrust SSL Web Server Certificate New Application Enrolment Guide Updated: September 2010 Version: 2.0 Table of Contents 1 Introduction 3 2 Requirements 3 3 Launching Netrust SSL Web Server Certificate

More information

apple WWDR Certification Practice Statement Version 1.8 June 11, 2012 Apple Inc.

apple WWDR Certification Practice Statement Version 1.8 June 11, 2012 Apple Inc. Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.8 Effective Date: June 11, 2012 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2.

More information

L@Wtrust Class 3 Registration Authority Charter

L@Wtrust Class 3 Registration Authority Charter Class 3 Registration Authority Charter Version 1.0 applicable from 09 November 2010 Building A, Cambridge Park, 5 Bauhinia Street, Highveld Park, South Africa, 0046 Phone +27 (0)12 676 9240 Fax +27 (0)12

More information

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015 Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015 Table of Contents 1. Introduction... 5 1.1. Trademarks...

More information

Ericsson Group Certificate Value Statement - 2013

Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 1 (23) Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 2 (23) Contents 1 Ericsson Certificate Value Statement... 3 2 Introduction... 3 2.1 Overview... 3 3 Contact information...

More information

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C

Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C Cunsheng Ding, HKUST Lecture 06: Public-Key Infrastructure Main Topics of this Lecture 1. Digital certificate 2. Certificate authority (CA) 3. Public key infrastructure (PKI) Page 1 Part I: Digital Certificates

More information

How To Understand And Understand The Security Of A Key Infrastructure

How To Understand And Understand The Security Of A Key Infrastructure Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used

More information

Comodo Certificate Manager. Centrally Managing Enterprise Security, Trust & Compliance

Comodo Certificate Manager. Centrally Managing Enterprise Security, Trust & Compliance Centrally Managing Enterprise Security, Trust & Compliance SSL Certificate Management - PKI With an ever-increasing abundance of web-enabled, collaborative and mobile applications, as well as netaccessible

More information

Danske Bank Group Certificate Policy

Danske Bank Group Certificate Policy Document history Version Date Remarks 1.0 19-05-2011 finalized 1.01 15-11-2012 URL updated after web page restructuring. 2 Table of Contents 1. Introduction... 4 2. Policy administration... 4 2.1 Overview...

More information

Public Key Infrastructure for a Higher Education Environment

Public Key Infrastructure for a Higher Education Environment Public Key Infrastructure for a Higher Education Environment Eric Madden and Michael Jeffers 12/13/2001 ECE 646 Agenda Architectural Design Hierarchy Certificate Authority Key Management Applications/Hardware

More information

esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used?

esign FAQ 1. What is the online esign Electronic Signature Service? 2. Where the esign Online Electronic Signature Service can be used? esign FAQ 1. What is the online esign Electronic Signature Service? esign Electronic Signature Service is an innovative initiative for allowing easy, efficient, and secure signing of electronic documents

More information

INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456. Aristotle University of Thessaloniki PKI (www.pki.auth.gr) WHOM IT MAY CONCERN

INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456. Aristotle University of Thessaloniki PKI (www.pki.auth.gr) WHOM IT MAY CONCERN Title INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456 Customer Aristotle University of Thessaloniki PKI (www.pki.auth.gr) To WHOM IT MAY CONCERN Date 18 March 2011 Independent Audit

More information

Certification Practice Statement

Certification Practice Statement FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification

More information

Comodo Certification Practice Statement

Comodo Certification Practice Statement Comodo Certification Practice Statement Notice: This CPS should be read in conjunction with the following documents:- * LiteSSL addendum to the Certificate Practice Statement * Proposed Amendments to the

More information

Why outsourcing your PKI provides the best value A Total Cost of Ownership analysis

Why outsourcing your PKI provides the best value A Total Cost of Ownership analysis A Total Cost of Ownership analysis July 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. Entrust is

More information

esign Online Digital Signature Service

esign Online Digital Signature Service esign Online Digital Signature Service Government of India Ministry of Communications and Information Technology Department of Electronics and Information Technology Controller of Certifying Authorities

More information

White paper. Implications of digital certificates on trusted e-business.

White paper. Implications of digital certificates on trusted e-business. White paper Implications of digital certificates on trusted e-business. Abstract: To remain ahead of e-business competition, companies must first transform traditional business processes using security

More information

ITL BULLETIN FOR JULY 2012. Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance

ITL BULLETIN FOR JULY 2012. Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance ITL BULLETIN FOR JULY 2012 Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance Paul Turner, Venafi William Polk, Computer Security Division, Information

More information

DEADLINES FOR PROJECTS REQUIRING MANDATORY BIM (BUILDING INFORMATION MODELLING) E-SUBMISSION FOR REGULATORY APPROVAL

DEADLINES FOR PROJECTS REQUIRING MANDATORY BIM (BUILDING INFORMATION MODELLING) E-SUBMISSION FOR REGULATORY APPROVAL Our Ref: APPBCA-2015-07 15 Apr 2015 See Distribution Dear Sir/Madam DEADLINES FOR PROJECTS REQUIRING MANDATORY BIM (BUILDING INFORMATION MODELLING) E-SUBMISSION FOR REGULATORY APPROVAL Objective This circular

More information

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.

More information

HKUST CA. Certification Practice Statement

HKUST CA. Certification Practice Statement HKUST CA Certification Practice Statement IN SUPPORT OF HKUST CA CERTIFICATION SERVICES Version : 2.1 Date : 12 November 2003 Prepared by : Information Technology Services Center Hong Kong University of

More information

What Are They, and What Are They Doing in My Browser?

What Are They, and What Are They Doing in My Browser? Digital Certificates, p.1 07/29/02 Digital Certificates What Are They, and What Are They Doing in My Browser? By Judith V. Boettcher and Amanda Powell Digital certificates provide a means to authenticate

More information

IT Security in Banque du Liban

IT Security in Banque du Liban IT Security in Banque du Liban Zeina AOUN Head of Security Division IT Department BANQUE DU LIBAN Workshop on Building Trust and Confidence in Arabic e-services 25-27 May 2010 AGENDA BDL Security Drivers

More information

Protect Identities for people, workstations, mobiles, networks

Protect Identities for people, workstations, mobiles, networks ot Corporate ID Protect Identities for people, workstations, mobiles, networks Address your security needs with the leader in the corporate identity market Corporate security challenges The security of

More information

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2. Entrust Managed Services PKI Getting an end-user Entrust certificate using Entrust Authority Administration Services Document issue: 2.0 Date of issue: June 2009 Revision information Table 1: Revisions

More information

NCSU SSO. Case Study

NCSU SSO. Case Study NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must

More information

ConCERTO Secure Solutions for Converged Systems

ConCERTO Secure Solutions for Converged Systems ConCERTO Secure Solutions for Converged Systems Distribution for Switzerland: insinova ag www.insinova.ch Jens Albrecht Email: jens.albrecht@insinova.ch Phone: +41 41 748 72 05 September 2011 SCM Microsystems

More information

Administering the Web Server (IIS) Role of Windows Server

Administering the Web Server (IIS) Role of Windows Server Course 10972A: Administering the Web Server (IIS) Role of Windows Server Course Details Course Outline Module 1: Overview and Installing Internet Information Services In this module students will learn

More information

Part III-a. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT

Part III-a. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT Part III-a Contents Part III-a Public-Key Infrastructure (PKI) Definition of a PKI and PKI components PKI Trust Models Digital Certificate, X.509 Certificate Management and Life Cycle Public Key Infrastructure

More information

HIPAA Security Regulations: Assessing Vendor Capabilities and Negotiating Agreements re: PKI and Security

HIPAA Security Regulations: Assessing Vendor Capabilities and Negotiating Agreements re: PKI and Security HIPAA Security Regulations: Assessing Vendor Capabilities and Negotiating Agreements re: PKI and Security March 2, 2001 Cy D. Ardoin, Ph.D. 2 Agenda Quick View of Security Strategy for Security Quick View

More information

Introduction. About Image-X Enterprises. Overview of PKI Technology

Introduction. About Image-X Enterprises. Overview of PKI Technology Digital Signature x Introduction In recent years, use of digital or electronic signatures has rapidly increased in an effort to streamline all types of business transactions. There are two types of electronic

More information

Save paper, save trees, save storage, save money.

Save paper, save trees, save storage, save money. Save paper, save trees, save storage, save money. Agilysys DataMagine Document Management Solution Suite technology innovation solutions Simplify document management. All businesses, from small-scale office

More information

Technical Certificates Overview

Technical Certificates Overview Technical Certificates Overview Version 8.2 Mobile Service Manager Legal Notice This document, as well as all accompanying documents for this product, is published by Good Technology Corporation ( Good

More information

Using etoken for Securing E-mails Using Outlook and Outlook Express

Using etoken for Securing E-mails Using Outlook and Outlook Express Using etoken for Securing E-mails Using Outlook and Outlook Express Lesson 15 April 2004 etoken Certification Course Securing Email Using Certificates Unprotected emails can be easily read and/or altered

More information

Trustis FPS PKI Glossary of Terms

Trustis FPS PKI Glossary of Terms Trustis FPS PKI Glossary of Terms The following terminology shall have the definitions as given below: Activation Data Asymmetric Cryptosystem Authentication Certificate Certificate Authority (CA) Certificate

More information

Understanding the Role of Hardware Data Encryption in EMV and P2PE from the CEO s Perspective

Understanding the Role of Hardware Data Encryption in EMV and P2PE from the CEO s Perspective Understanding the Role of Hardware Data Encryption in EMV and P2PE from the CEO s Perspective Futurex. An Innovative Leader in Encryption Solutions. For over 30 years, more than 15,000 customers worldwide

More information

Apple Corporate Email Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

Apple Corporate Email Certificates Certificate Policy and Certification Practice Statement. Apple Inc. Apple Inc. Certificate Policy and Certification Practice Statement Version 2.0 Effective Date: April 10, 2015 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2. Table of acronyms... 4 1.3.

More information

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Executive Summary...3 Background...4 Internet Growth in the Pharmaceutical Industries...4 The Need for Security...4

More information

TYPE APPROVALS FOR VERTICAL PLATFORM LIFTS AND STAIRLIFTS COMPYLING WITH EUROPEAN DIRECTIVE 98/37/E, 95/16/EC OR BS 5776:1996 TO LAPSE

TYPE APPROVALS FOR VERTICAL PLATFORM LIFTS AND STAIRLIFTS COMPYLING WITH EUROPEAN DIRECTIVE 98/37/E, 95/16/EC OR BS 5776:1996 TO LAPSE Our Ref: BCA BC 15.0.3 Building Plan and Management Group 18 February 2014 See Distribution Dear Sir/Madam TYPE APPROVALS FOR VERTICAL PLATFORM LIFTS AND STAIRLIFTS COMPYLING WITH EUROPEAN DIRECTIVE 98/37/E,

More information

Deploying Smart Cards in Your Enterprise

Deploying Smart Cards in Your Enterprise www.css-security.com 425.216.0720 WHITE PAPER The merging of physical access technology with public key-enabled smart card technology has been an emerging trend that has occurred in the security industry

More information

Comodo Certification Practice Statement

Comodo Certification Practice Statement Comodo Certification Practice Statement Comodo CA, Ltd. Version 3.0 22 September 2006 3rd Floor, Office Village, Exchange Quay, Trafford Road, Salford, Manchester, M5 3EQ, United Kingdom Tel: +44 (0) 161

More information

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication Certificate Based 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 31 Disclaimer Disclaimer of

More information

ESnet SSL CA service Certificate Policy And Certification Practice Statement Version 1.0

ESnet SSL CA service Certificate Policy And Certification Practice Statement Version 1.0 ESnet SSL CA service Certificate Policy And Certification Practice Statement Version 1.0 June 30, 2004 Table of Contents Table of Contents...2 1 Introduction...3 1.1 Overview...3 1.1.1 General Definitions...4

More information

Service Description. 3SKey. Connectivity

Service Description. 3SKey. Connectivity Connectivity 3SKey Service Description This document describes the features and functions of the components of the 3SKey solution and the roles and responsibilities of all parties involved in the 3SKey

More information

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard

Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.

More information

Certification Program Pre-Engagement Questionnaire

Certification Program Pre-Engagement Questionnaire Certification Program Pre-Engagement Questionnaire Page 1 of 8 2005 Visa Asia Pacific, VPSS Certification Program Pre-Engagement Questionnaire 1 Introduction A first step towards Visa Payment Security

More information

Ship management operations simplified and redefined using a web based integrated fleet management system. Mark Moerman, Managing Director, SDSD

Ship management operations simplified and redefined using a web based integrated fleet management system. Mark Moerman, Managing Director, SDSD Ship management operations simplified and redefined using a web based integrated fleet management system Mark Moerman, Managing Director, SDSD 1 Why simplify and re-define? Common challenges Remote Access

More information

CERTIMETIERSARTISANAT and C@RTEUROPE ELECTRONIC SIGNATURE SERVICE SUBSCRIPTION CONTRACT SPECIFIC TERMS AND CONDITIONS

CERTIMETIERSARTISANAT and C@RTEUROPE ELECTRONIC SIGNATURE SERVICE SUBSCRIPTION CONTRACT SPECIFIC TERMS AND CONDITIONS CERTIMETIERSARTISANAT and C@RTEUROPE ELECTRONIC SIGNATURE SERVICE SUBSCRIPTION CONTRACT SPECIFIC TERMS AND CONDITIONS Please fill in the form using BLOCK CAPITALS. All fields are mandatory. 1 1. SUBSCRIBER

More information

Deputy Chief Executive Netrust Pte Ltd

Deputy Chief Executive Netrust Pte Ltd ICAO Public Key Directory R Rajeshkumar R Rajeshkumar Deputy Chief Executive Netrust Pte Ltd The trust imperative E-Passports are issued by entities that assert trust Trust depends on the requirements

More information

SECURE IDENTITY MANAGEMENT. Globally recognised identity management expertise

SECURE IDENTITY MANAGEMENT. Globally recognised identity management expertise w w w. t h a l e s g r o u p. c o m SECURE IDENTITY MANAGEMENT Globally recognised identity management expertise Integrated identity management solutions As a global technology leader for the Aerospace

More information

ORDINANCE ON THE ELECTRONIC SIGNATURE CERTIFICATES IN THE. Chapter One GENERAL PROVISIONS

ORDINANCE ON THE ELECTRONIC SIGNATURE CERTIFICATES IN THE. Chapter One GENERAL PROVISIONS ADMINISTRATIONS Effective as of 13 June 2008 Adopted by Decree of the Council of Ministers No 97 of 16 May 2008 Promulgated SG, No. 48 of 23 May 2008 Chapter One GENERAL PROVISIONS Article 1. This Ordinance

More information

REPORT OF INDEPENDENT CERTIFIED PUBLIC ACCOUNTANTS

REPORT OF INDEPENDENT CERTIFIED PUBLIC ACCOUNTANTS REPORT OF INDEPENDENT CERTIFIED PUBLIC ACCOUNTANTS To the Management of Internet Security Research Group: We have examined the assertion by the management of the Internet Security Research Group ( ISRG

More information

Bangladesh Bank Certification Authority (BBCA) Certification Practice Statement (CPS)

Bangladesh Bank Certification Authority (BBCA) Certification Practice Statement (CPS) [Draft] Bangladesh Bank Certification Authority (BBCA) Certification Practice Statement (CPS) Version: 1.00 August, 2015 Bangladesh Bank Page 2 of 42 Document Reference Title Document Type Bangladesh Bank

More information

REGISTRATION AUTHORITY (RA) POLICY. Registration Authority (RA) Fulfillment Characteristics SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A.

REGISTRATION AUTHORITY (RA) POLICY. Registration Authority (RA) Fulfillment Characteristics SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A. REGISTRATION AUTHORITY (RA) POLICY Registration Authority (RA) Fulfillment Characteristics SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A. INDEX Contenido 1. LEGAL FRAMEWORK... 4 1.1. Legal Base...

More information

National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016

National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016 National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy Version 1.1 February 2, 2016 Copyright 2016, Georgia Tech Research Institute Table of Contents TABLE OF CONTENTS I 1 INTRODUCTION

More information

MS 10972A Administering the Web Server (IIS) Role of Windows Server

MS 10972A Administering the Web Server (IIS) Role of Windows Server MS 10972A Administering the Web Server (IIS) Role of Windows Server Description: Days: 5 Prerequisites: This course provides students with the fundamental knowledge and skills to configure and manage Internet

More information

Transnet Registration Authority Charter

Transnet Registration Authority Charter Registration Authority Charter Version 3.0 is applicable from Effective Date Inyanda House 21 Wellington Road Parktown, 2193 Phone +27 (0)11 544 9368 Fax +27 (0)11 544 9599 Website: http://www.transnet.co.za/

More information

WHITE PAPER. Identikey Server 3.1 Strong Authentication solution against MITM Attacks for e-banking

WHITE PAPER. Identikey Server 3.1 Strong Authentication solution against MITM Attacks for e-banking WHITE PAPER Identikey Server 3.1 Strong Authentication solution against MITM Attacks for e-banking Protection against Man-in-the-Middle attacks As the global leader in two-factor authentication solutions

More information

Mobile Wallet Platform. Next generation mobile wallet solution

Mobile Wallet Platform. Next generation mobile wallet solution Mobile Wallet Platform Next generation mobile wallet solution Introduction to mwallet / Mobile Wallet Mobile Wallet Account is just like a Bank Account User s money lies with the Mobile Wallet Operator

More information

Microsoft 10972 - Administering the Web Server (IIS) Role of Windows Server

Microsoft 10972 - Administering the Web Server (IIS) Role of Windows Server 1800 ULEARN (853 276) www.ddls.com.au Microsoft 10972 - Administering the Web Server (IIS) Role of Windows Server Length 5 days Price $4169.00 (inc GST) Version B Overview This course provides students

More information

Advanced Authentication Methods Determining the Best Fit for Your Agency. Strong Authentication. Simplified.

Advanced Authentication Methods Determining the Best Fit for Your Agency. Strong Authentication. Simplified. Advanced Authentication Methods Determining the Best Fit for Your Agency Strong Authentication. Simplified. Agenda About 2FA CJIS Security Policy 5.1 Advanced Authentication Encryption, Secure Connectivity

More information

Egypt s E-Signature & PKInfrastructure

Egypt s E-Signature & PKInfrastructure EGYPT-MCIT ITIDA Egypt s E-Signature & PKInfrastructure Seminar on Electronic Signature Algeria 8-9 Dec. 2009 By: Hisham Mohamed Abdel Wahab Head of the E-Signature CA Licensing ITIDA- MCIT EGYPT Email:

More information

10972-Administering the Web Server (IIS) Role of Windows Server

10972-Administering the Web Server (IIS) Role of Windows Server Course Outline 10972-Administering the Web Server (IIS) Role of Windows Server Duration: 5 days (30 hours) Target Audience: This course is intended for IT Professionals already experienced in general Windows

More information

HOTPin Integration Guide: DirectAccess

HOTPin Integration Guide: DirectAccess 1 HOTPin Integration Guide: DirectAccess Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; Celestix assumes no responsibility

More information

ITAccountants Association. Sammy So

ITAccountants Association. Sammy So ITAccountants Association Sammy So Challenges to the Industry Competitive market High cost of operation Lack of global data standard Lack of effective management tools Some useful technologies 1. CLOUD

More information

Agenda. How to configure

Agenda. How to configure dlaw@esri.com Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services

More information

Ford Motor Company CA Certification Practice Statement

Ford Motor Company CA Certification Practice Statement Certification Practice Statement Date: February 21, 2008 Version: 1.0.1 Table of Contents Document History... 1 Acknowledgments... 1 1. Introduction... 2 1.1 Overview... 3 1.2 Ford Motor Company Certificate

More information

RFI Template for Enterprise MDM Solutions

RFI Template for Enterprise MDM Solutions RFI Template for Enterprise MDM Solutions 2012 Zenprise, Inc. 1 About This RFI Template A secure mobile device management solution is an integral part of any effective enterprise mobility program. Mobile

More information

Subject: Public Key Infrastructure: Examples of Risks and Internal Control Objectives Associated with Certification Authorities

Subject: Public Key Infrastructure: Examples of Risks and Internal Control Objectives Associated with Certification Authorities United States Government Accountability Office Washington, DC 20548 August 10, 2004 The Honorable Tom Davis Chairman, Committee on Government Reform House of Representatives Dear Mr. Chairman: Subject:

More information

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public

More information

The Costs of Managed PKI:

The Costs of Managed PKI: The Costs of Managed PKI: In-House Implementation of PKI vs. Traditional Managed PKI vs. ON-Demand PKI A TC TrustCenter Whitepaper Last Updated: February 2008 Introduction Until recently, organizations

More information

Vodafone Group CA Web Server Certificate Policy

Vodafone Group CA Web Server Certificate Policy Vodafone Group CA Web Server Certificate Policy Publication Date: 06/09/10 Copyright 2010 Vodafone Group Table of Contents Acknowledgments... 1 1. INTRODUCTION... 2 1.1 Overview... 3 1.2 Document Name

More information

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, 2002. Page 1

Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, 2002. Page 1 PKI Tutorial Jim Kleinsteiber February 6, 2002 Page 1 Outline Public Key Cryptography Refresher Course Public / Private Key Pair Public-Key Is it really yours? Digital Certificate Certificate Authority

More information

Public Key Infrastructure. A Brief Overview by Tim Sigmon

Public Key Infrastructure. A Brief Overview by Tim Sigmon Public Key Infrastructure A Brief Overview by Tim Sigmon May, 2000 Fundamental Security Requirements (all addressed by PKI) X Authentication - verify identity of communicating parties X Access Control

More information

Access Database Hosting. An introduction to Cloud Hosting Access databases from Your Office Anywhere

Access Database Hosting. An introduction to Cloud Hosting Access databases from Your Office Anywhere Access Database Hosting An introduction to Cloud Hosting Access databases from Your Office Anywhere Microsoft Access is a powerful way of creating bespoke database applications for either your own business

More information

Smark Global (Holdings) Ltd

Smark Global (Holdings) Ltd About Us Smark Global (Holdings) Ltd www.smarkglobal.com P.2 Smark Global (Holdings) Ltd was established in 2001 and specialized in business consultation and training. In 2004, Smark Global was detached

More information

Certification Practice Statement

Certification Practice Statement Certification Practice Statement Revision R1 2013-01-09 1 Copyright Printed: January 9, 2013 This work is the intellectual property of Salzburger Banken Software. Reproduction and distribution require

More information

U.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE. Privacy Impact Assessment

U.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE. Privacy Impact Assessment U.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE Privacy Impact Assessment Enterprise Software Services PTOI-020-00 July 8, 2015 Privacy Impact Assessment This Privacy Impact Assessment

More information

1 Public Key Cryptography and Information Security

1 Public Key Cryptography and Information Security International Carpathian Control Conference ICCC 2002 MALENOVICE, CZECH REPUBLIC May 27-30, 2002 IMPLEMENTATION ISSUES OF PKI TECHNOLOGY Victor-Valeriu PATRICIU, Marin BICA and Ion BICA Department of Computer

More information

CERTIFICATION PRACTICE STATEMENT UPDATE

CERTIFICATION PRACTICE STATEMENT UPDATE CERTIFICATION PRACTICE STATEMENT UPDATE Reference: IZENPE-CPS UPDATE Version no: v 5.03 Date: 10th March 2015 IZENPE 2015 This document is the property of Izenpe. It may only be reproduced in its entirety.

More information

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software WHITE PAPER: COMPARING TCO: SYMANTEC MANAGED PKI SERVICE........ VS..... ON-PREMISE........... SOFTWARE................. Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

More information

Managing SSL Security

Managing SSL Security May 2007 Copyright 2007 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. Entrust is a registered trademark of Entrust Limited

More information

Enterprise Single Sign-On SOS. The Critical Questions Every Company Needs to Ask

Enterprise Single Sign-On SOS. The Critical Questions Every Company Needs to Ask Enterprise Single Sign-On SOS The Critical Questions Every Company Needs to Ask Enterprise Single Sign-On: The Critical Questions Every Company Needs to Ask 1 Table of Contents Introduction 2 Application

More information

Smart Meter PKI - Make or Buy?

Smart Meter PKI - Make or Buy? ID WORLD Frankfurt 20.11.2014 11:15 11:45 Uhr Smart Meter PKI - Make or Buy? Dr.-Ing. Lutz Martiny achelos GmbH Paderborn Why PKI? Legal Background: Energiewirtschaftsgesetz Technical Background: Technical

More information

API-Security Gateway Dirk Krafzig

API-Security Gateway Dirk Krafzig API-Security Gateway Dirk Krafzig Intro Digital transformation accelerates application integration needs Dramatically increasing number of integration points Speed Security Industrial robustness Increasing

More information

Enterprise SSL FEATURES & BENEFITS

Enterprise SSL FEATURES & BENEFITS Enterprise SSL FEATURES & BENEFITS What s included: - Powerful 1024-bit signed RSA certificates - Centralised, web-based administrative portal for certificate management - Dynamically-generated site seal

More information

Enterprise effectiveness of digital certificates: Are they ready for prime-time?

Enterprise effectiveness of digital certificates: Are they ready for prime-time? Enterprise effectiveness of digital certificates: Are they ready for prime-time? by Jim Peterson As published in (IN)SECURE Magazine issue 22 (September 2009). www.insecuremag.com www.insecuremag.com 1

More information

Design of one trust center

Design of one trust center Design of one trust center Certification Authority or Trust center 1 2 Trust center Registration Authority public key guarantees binding identity 3 4 Goal: 1. identity public key 2. public key identity

More information

COMMUNICATING ELECTRONICALLY WITH CUSTOMS

COMMUNICATING ELECTRONICALLY WITH CUSTOMS COMMUNICATING ELECTRONICALLY WITH CUSTOMS This fact sheet deals with communicating electronically with Customs via the Integrated Cargo System (ICS). The main elements covered by this fact sheet are: communication

More information

Deploying and Managing a Public Key Infrastructure

Deploying and Managing a Public Key Infrastructure Deploying and Managing a Public Key Infrastructure 2821: Deploying and Managing a Public Key Infrastructure (4 Days) About this Course This four-day, instructor-led course provides students with the knowledge

More information

VASCO: Compliant Digital Identity Protection for Healthcare

VASCO: Compliant Digital Identity Protection for Healthcare VASCO: Compliant Digital Identity Protection for Healthcare Compliant Digital Identity Protection for Healthcare The proliferation of digital patient information and a surge in government regulations are

More information

AUTOMATED SUPPORTS BOCHK TO

AUTOMATED SUPPORTS BOCHK TO [For Immediate Release] AUTOMATED SUPPORTS BOCHK TO ENHANCE INTERNET BANKING SERVICES WITH I-SPRINT AND VASCO TECHNOLOGIES (Hong Kong, 7 March 2013) - Automated Systems Holdings Limited ( ASL or the Group

More information

The Use of the Simple Certificate Enrollment Protocol (SCEP) and Untrusted Devices

The Use of the Simple Certificate Enrollment Protocol (SCEP) and Untrusted Devices The Use of the Simple Certificate Enrollment Protocol (SCEP) and Untrusted Devices Essay Authors Ted Shorter, CTO, Certified Security Solutions, Inc. Wayne Harris, PKI Practice Lead, Certified Security

More information

Capitalized terms not defined below shall have the meaning given to them in the applicable CP/CPS, unless the context requires otherwise.

Capitalized terms not defined below shall have the meaning given to them in the applicable CP/CPS, unless the context requires otherwise. HydrantID SSL Certificate Services Agreement HYDRANTID SSL CERTIFICATE SERVICES AGREEMENT THIS HYDRANTID CERTIFICATE SERVICES AGREEMENT ( AGREEMENT ) IS ENTERED INTO BETWEEN HYDRANTID AND THE ENTITY YOU

More information

Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1

Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1 Chapter 15 Key Management Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1 Symmetric-key Distribution Symmetric-key cryptography is more efficient than asymmetric-key

More information

Lecture VII : Public Key Infrastructure (PKI)

Lecture VII : Public Key Infrastructure (PKI) Lecture VII : Public Key Infrastructure (PKI) Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University 2 Problems with Public

More information