Alliance Key Manager A Solution Brief for Technical Implementers

Similar documents
Alliance Key Manager Solution Brief

Alliance Key Manager Cloud HSM Frequently Asked Questions

Alliance AES Encryption for IBM i Solution Brief

RELEASE NOTES. Table of Contents. Scope of the Document. [Latest Official] ADYTON Release corrections. ADYTON Release 2.12.

Certificate technology on Pulse Secure Access

Certificate technology on Junos Pulse Secure Access

This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1.

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Security Policy Revision Date: 23 April 2009

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

The syslog-ng Store Box 3 F2

Configuration Guide BES12. Version 12.2

Course Overview. What You Will Learn

Copyright 2012 Trend Micro Incorporated. All rights reserved.

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

Generating and Installing SSL Certificates on the Cisco ISA500

vsphere Upgrade vsphere 6.0 EN

PUBLIC Secure Login for SAP Single Sign-On Implementation Guide

Key Management Best Practices

Configuration Guide BES12. Version 12.3

Xerox Mobile Print Cloud

Backup and Archiving Explained. White Paper

A Strategic Approach to Enterprise Key Management

Release Version 4.1 The 2X Software Server Based Computing Guide

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Configuring Security Features of Session Recording

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2

How To Understand The Architecture Of An Ulteo Virtual Desktop Server Farm

IBM Security QRadar Vulnerability Manager Version User Guide

Oracle Database 11g: Security. What you will learn:

Axway Validation Authority Suite

Table of Contents Introduction and System Requirements 9 Installing VMware Server 35

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

Complying with PCI Data Security

FISMA / NIST REVISION 3 COMPLIANCE

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Nasuni Management Console Guide

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

VMware vcenter Log Insight Security Guide

Townsend Security Addendum to VMware Product Applicability Guide for Payment Card Industry Data Security Standard (PCI DSS) version 3.

Thales ncipher modules. Version: 1.2. Date: 22 December Copyright 2009 ncipher Corporation Ltd. All rights reserved.

Release Version 3 The 2X Software Server Based Computing Guide

Configuring Digital Certificates

WHY DO I NEED FALCONSTOR OPTIMIZED BACKUP & DEDUPLICATION?

EMC DATA DOMAIN ENCRYPTION A Detailed Review

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

LumInsight CMS Installation Guide

RSA envision Windows Eventing Collector Service Deployment Overview Guide

TimePictra Release 10.0

RuggedCom Solutions for

GE Measurement & Control. Cyber Security for NEI 08-09

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February

DS Series Solutions Integrated Solutions for Secure, Centralized Data Center Management

RSA SecurID Ready Implementation Guide

Encryption Key Management for Microsoft SQL Server 2008/2014

Subject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event Management (SIEM) Project.

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

Key Management in the Multi-Platform Environment

SECUR IN MIRTH CONNECT. Best Practices and Vulnerabilities of Mirth Connect. Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions

Configuration Guide BES12. Version 12.1

CENTRAL MONITORING AND MANAGEMENT. CMX SERIES DATASHEET CENTRALIZED MANAGEMENT

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)

EVault Technology Build Cloud-Connected Backup and Recovery Services for Datacenter

VMware vcenter Log Insight Security Guide

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014

ENCRYPTION KEY MANAGEMENT SIMPLIFIED A BEGINNER S GUIDE TO ENCRYPTION KEY MANAGEMENT

Top 7 Tips for Better Business Continuity

IBM Security QRadar Vulnerability Manager Version User Guide IBM

Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant

Jitterbit Technical Overview : Microsoft Dynamics CRM

CA Performance Center

SolarWinds Log & Event Manager

Introducing ZENworks 11 SP4. Experience Added Value and Improved Capabilities. Article. Article Reprint. Endpoint Management

Table of Contents. Introduction. Audience. At Course Completion

Administering the Web Server (IIS) Role of Windows Server

Certificate Management

2013 AWS Worldwide Public Sector Summit Washington, D.C.

Table of Contents. Chapter 1: Installing Endpoint Application Control. Chapter 2: Getting Support. Index

Using BroadSAFE TM Technology 07/18/05

About Network Data Collector

VMware vsphere Data Protection 6.0

SECURITY DOCUMENT. BetterTranslationTechnology

SonicWALL PCI 1.1 Implementation Guide

BMC s Security Strategy for ITSM in the SaaS Environment

Automatic Encryption With V7R1 Townsend Security

That Point of Sale is a PoS

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

Introducing FUJITSU Software Systemwalker Centric Manager V15.1.1

Clearswift Information Governance

BlackBerry Enterprise Service 10. Version: Configuration Guide

Oracle Database 11g: Security

RSA Authentication Manager 8.1 Setup and Configuration Guide. Revision 2

Transcription:

KEY MANAGEMENT Alliance Key Manager A Solution Brief for Technical Implementers Abstract This paper is designed to help technical managers, product managers, and developers understand how Alliance Key manager works, how user applications manage encryption keys on the key server, and the scope of effort required to deploy encryption key management in your applications. The goal of this paper is to describe the technical issues related to key management integration, and not to provide actual programming samples. The intended audience is technical managers, product managers, and application developers in our partner community. Customization Alliance Key Manager works with all major business platforms, leading encryption applications, and even legacy devices connected via serial port. Certifications NIST FIPS-140-2 Level 1 (in process) Comprehensive Automate all aspects of encryption key management process: generation, retrieval, expiring, revoking, rotating, archival and deletion. www.townsendsecurity.com 724 Columbia Street NW, Suite 400, Olympia, WA 98501 800 357 1019 +1 360 359 4400 Fax 360.357.9047

The Alliance Key Manager Server Alliance Key Manager is a symmetric key management solution deployed on a hardware or software appliance. It is designed to properly create, activate, distribute, expire, and escrow encryption keys using industry best practices. You can think of the AKM solution as a secure vault for your encryption keys. Properly managing encryption keys is an important component of a data encryption strategy and is required by many compliance regulations. ISV and OEM partners are an important customer segment for Alliance Key Manager. Townsend Security (Townsend Security) works with a number of partners who need to integrate key management into their own solutions. We help our partners through the technical implementation, testing, and certification of the solution. How Keys Are Managed Encryption keys are managed by a security administrator, or by an application that is performing the role of a security administrator. A Java GUI application that runs on a Windows PC is used by a security administrator to create and manage encryption keys. If your application needs to retrieve encryption keys for use, you can deploy the Java GUI client for your customers to use to create encryption keys. There is another alternative available to partners for key management: You can write applications that directly communicate with the key manager and perform key management functions. How Keys Are Retrieved For Use Encryption keys are retrieved by user applications that open a secure SSL/TLS connection to the server, format a key retrieval request, send the request to the server, receive the response from the server that includes the encryption key, and then uses the key to encrypt or decrypt sensitive data. The key retrieval request is a very simple transaction. The communication session lasts for a very short period of time, and then is terminated. Once an encryption key is retrieved it can be used for many encryption and decryption tasks. Additionally, it can even be cached by your application for use by several tasks. Key Management SSL/TLS Services Encryption keys are sensitive data that must be protected at every step. The connection between your application that uses the encryption key, and the Alliance Key Manager server is an encrypted and authenticated SSL/TLS session. No encryption key data is exposed on the network when you retrieve the key. The security for this SSL/TLS session is more stringent than for normal network connections that use SSL. The Alliance Key Manager server will validate the X509 certificate presented by the client application, and will only allow known client-side certificates to make a key retrieval request. In addition, the information on the X509 certificate s Subject distinguished name (DN) field is used to provide additional security controls. The client side can also authenticate the key server s certificate to insure that a connection has been made to an actual instance of Alliance Key Manager, and not a surrogate server. This allows for mutual authentication by both the client and server. No communication is allowed with the key management server using unsecure connections, invalid certificates, or un-authenticated sessions. Communications Service Architecture The Alliance Key Manager exposes four services on the server: HTTPS service on port 3886 for browser-based server management SSL/TLS key retrieval service on port 6000 SSL/TLS key management service on port 6001 SSL/TLS mirroring service on port 6002 These services can be configured for other ports if desired. No other services are exposed on the key server. The HTTPS web browser service is designed for server management (IP address configuration, starting and Page 2

stopping the server, backup and recovery, etc.). This service is not used by partner applications for key management and retrieval. The mirroring service is not for use by partner applications. This service is used by the Alliance Key Manager application for real time distribution of encryption keys to remote failover servers. Partner applications use the key retrieval service to retrieve encryption keys. Partner applications can also use the key management service to create and manage encryption keys if desired. The SSL/TLS communications interfaces are multi-threaded and interleaved. That is, multiple applications can make simultaneous key retrieval and key management requests. There is no enforced limit to the number of requests that can made at the same time. The Role of X509 Certificates X509 certificates, RSA private keys, and related PKI infrastructure are critical to the protection of data encryption keys as they are retrieved from the key server. Alliance Key Manager requires a Certificate Authority (CA) certificate, and a server certificate in order to work properly. Client applications that communicate with the key server also need client-side X509 certificates that are signed by the same Certificate Authority. Improperly created certificates will cause the key server to reject key management and key retrieval requests. You can use a private or public Certificate Authority. For example, you can provide your own private CA infrastructure using an application like openssl. The Alliance Key Manager documentation describes how to do this. You can even automate certificate management through this application. An alternative is to use a public certificate authority like Verisign or Thawte. In this case you will purchase certificates from the public certificate authority and install them on the key server and in client applications. The Key Management Data Protocol Alliance Key Manager interfaces are agent-less. That is, any application that is capable of creating an SSL/TLS communications session, which has the appropriate X509 certificates, and which makes a request in the proper data format, can manage and retrieve encryption keys. No software from Townsend Security is required for this connection. This is sometimes referred to as a Wire protocol. This is in contrast to an API protocol where a vendor s software must be installed on the client system. The Alliance Key Manager interface requires no client-side software from Townsend Security. Of course, Alliance Key Manager provides software to help you get started faster on the client side (more on this below). The advantages of a wire protocol to an ISV or OEM partner are the following: No requirement for vendor software on the client system Very small software footprint on the client side Minimal or no impacts related to client OS upgrades, patches, etc. Minimal or no impacts related to key server OS upgrades, patches, etc. Alliance Key Manager Client Libraries To help our partners get up and running fast, Townsend Security provides client-side libraries for a number of common server platforms. You can use our libraries directly in your applications. Provided libraries are for the following platforms: Linux Microsoft.NET (C#) IBM z (Mainframe) IBM i (AS/400) Java The above libraries are also used by customers who need to retrieve keys from the Alliance Key Manager server. Alliance Key Manager Client Sample Code For customers who can t use the Alliance Key Manager binary libraries, we provide source code for a variety of platforms. The source code can help customers with operating systems or client platforms where Townsend Security does not have binary implementations. Sample source is available for: Linux Microsoft.NET (C#) IBM z (Mainframe) IBM i (AS/400) Java Page 3

Error Handling All of the Alliance Key Manager APIs and commands return an error code indicating success or failure. You can fully automate applications that use Alliance Key Manager and know that all error conditions will be reported with a unique error indicator. Alliance Key Manager Diagnostic Logging Alliance Key Manager implements a variety of diagnostic logging functions as well as audit trails. This can greatly help the ISV partner analyze problems for their end customers. A basic level of diagnostic logging is enabled by default and output goes to a simple text log file. The log file can be viewed at any time using the server web browser session. For more complex problems Alliance Key Manager enables verbose diagnostic logging. This helps the partner s customer support team, and the Townsend Security support team, understand and react to problems quickly. All diagnostic logs are placed under syslog and log-rotate controls. Problems can easily be routed to a log collection server or SIEM solution. Backup and Recovery Backup and recovery operations are included with the Alliance Key Manager web management application. Partners do not need to do any additional development work to take advantage of this built-in capability. End customers can use a familiar secure web browser session to back up the server. All backups are encrypted to protect the encryption keys, and key-encrypting keys are backed up separately from the data encryption key database. Mirroring, High Availability, and Load Balancing Alliance Key Manager includes real-time mirroring capabilities to provide for high availability failover, data redundancy, and load balancing support. Partners do not need to provide any additional development resources to enable this capability. Mirroring is enabled through simple configuration options in the web management interface. Encryption keys can be selectively mirrored to the backup server. When you create an encryption key you assign the mirroring policy to the key. You can specify that some keys are mirrored to a mirror server, while other keys can remain resident on the key server without mirroring. Key Import and Export Alliance Key Manager supports a number of key import and export formats. Key import is available to the partner through the standard key management SSL/TLS interface. It can be completely automated if desired. Keys can be exported in RSA encrypted format for secure transfer to another key manager. If needed, Alliance Key Manager can also export encryption keys in binary, Base64, and Base16 (hex) formats. The ability to import and export keys through an automated interface provides an excellent method of migrating encryption keys from less secure environments to AKM for professional key management. Product Evaluation Partners can evaluate the Alliance Key Manager solution by downloading the VMware instance of the server from the Townsend Security web site. This demonstration server is fully functional and comes pre-loaded with license, certificates, and a common configuration. In addition to the VMware instance of the key server, the demonstration software includes a Java GUI console application for creating and managing keys, and a Java GUI sample application for key retrieval. The key retrieval application includes an Eclipse project and source code. Partners can quickly install and use the key server for evaluation. Custom Configurations and Services Townsend Security values its partner customers and offers a variety of services designed to make partners successful. If you have special needs for key management we can work with your development team to extend AKM functionality. While the AKM server works without modifications for most of our partners, we know that one size does not fit all. We ll help you get the solution you need. Page 4

NIST Certification Services Many of our partners want to sell a solution under their own brand name, and with their own NIST FIPS-140 certification. We work closely with an NVLAP certification laboratory and can help you achieve this as quickly as possible. The current AKM FIPS-140 certification was prepared in a way designed to help our OEM partners achieve certification quickly. If you are new to the FIPS-140 certification process we will coach you through the many steps needed to satisfy NIST requirements. Townsend Security Townsend Security provides data encryption & tokenization, key management, secure communications, and compliance logging solutions to Enterprise customers on a variety of server platforms including IBM i, IBM z, Windows, and Linux. The company can be reached on the web at www.townsendsecurity.com, or (800) 357-1019. Page 5