A Maturity Model for Enterprise Key Management. Lessons Learned



Similar documents
Key Management Interoperability Protocol (KMIP)

apple WWDR Certification Practice Statement Version 1.8 June 11, 2012 Apple Inc.

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February

Enterprise Key Management. A Publication of the BITS Security Working Group

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

SP A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter

Apple Corporate Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

Neutralus Certification Practices Statement

Data Protection: From PKI to Virtualization & Cloud

DRAFT Standard Statement Encryption

PCI Data Security and Classification Standards Summary

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015

Call: Disaster Recovery/Business Continuity (DR/BC) Services From VirtuousIT

Key Management Interoperability Protocol (KMIP)

Certification Practice Statement

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery

Gatekeeper PKI Framework. February Registration Authority Operations Manual Review Criteria

Credit Card Security

FileCloud Security FAQ

7 Key Management and PKIs

HIPAA Compliance Review Analysis and Summary of Results

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

ESnet SSL CA service Certificate Policy And Certification Practice Statement Version 1.0

A Strategic Approach to Enterprise Key Management

Encryption Security Standard

How To Write A Health Care Security Rule For A University

An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation

Supplier Information Security Addendum for GE Restricted Data

Deploying EFS: Part 1

Managed Hosting & Datacentre PCI DSS v2.0 Obligations

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

Cryptography and Key Management Basics

Securing Distribution Automation

Payment Card Industry Data Security Standard

How To Encrypt Data With Encryption

EMC DATA DOMAIN ENCRYPTION A Detailed Review

Healthcare IT Compliance Service. Services > Overview MaaS360 Healthcare IT Compliance Service

COMODO CERTIFICATE MANAGER. Simplify SSL Certificate Management Across the Enterprise

Danske Bank Group Certificate Policy

How To Use Pki On A Pc (For A Non-Profit)

Comodo Certificate Manager Software Version 4.6

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016

Exhibit to Data Center Services Service Component Provider Master Services Agreement

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Land Registry. Version /09/2009. Certificate Policy

Management: A Guide For Harvard Administrators

Expert Reference Series of White Papers. Fundamentals of the PKI Infrastructure

Credit Unions and The Cloud. By: Chris Sachse

Alliance Key Manager A Solution Brief for Technical Implementers

Excerpt of Cyber Security Policy/Standard S Information Security Standards

Comodo Certification Practice Statement

Central Agency for Information Technology

A Modern Guide to Optimizing Data Backup and Recovery

How To Understand And Understand The Security Of A Key Infrastructure

Supplier IT Security Guide

HP Adaptive Backup and Recovery

PASSWORD MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

PCI DSS requirements solution mapping

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)

Using the NDMP File Service for DMA- Driven Replication for Disaster Recovery. Hugo Patterson

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing

Addressing Cloud Computing Security Considerations

Trustis FPS PKI Glossary of Terms

State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP)

When Data Loss Prevention Is Not Enough:

Exam Papers Encryption Project PGP Universal Server Trial Progress Report

Guidelines on use of encryption to protect person identifiable and sensitive information

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version and higher

Things You Need to Know About Cloud Backup

Meeting Technology Risk Management (TRM) Guidelines from the Monetary Authority of Singapore (MAS)

State of Michigan Records Management Services. Frequently Asked Questions About E mail Retention

PKI Uncovered. Cisco Press. Andre Karamanian Srinivas Tenneti Francois Dessart. 800 East 96th Street. Indianapolis, IN 46240

Encryption Policy Version 3.0

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

THE WALT DISNEY COMPANY PUBLIC KEY INFRASTRUCTURE CERTIFICATE POLICY. July 2011 Version 2.0. Copyright , The Walt Disney Company

Designtech Cloud-SaaS Hosting and Delivery Policy, Version 1.0, Designtech Cloud-SaaS Hosting and Delivery Policy

Online Backup Plus Frequently Asked Questions

CERTIFICATE. certifies that the. Info&AA v1.0 Attribute Service Provider Software. developed by InfoScope Ltd.

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

University of Illinois at Chicago Health Sciences Colleges Information Technology Group Security Policies Summary

Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Transcription:

A Maturity Model for Enterprise Key Management Lessons Learned

Agenda Problem statement Approach Framework Maturity model Applying the model Gaps and lessons learned Conclusions Page 2

Problem statement Companies have struggled with How to manage encryption keys Provide consistent guidance to key custodians Measure successful key management programs Of particular concern was the last item measuring a program Approached by a client to assist them in developing a methodology to review key management practices and provide a means of measuring improvement over time Page 3

Approach Define the framework for key management Examined NIST, ANSI and BITS Client is financial services Chose a little from each, however, used BITS as the primary basis Develop a maturity model for key management Generation Recovery Distribution Revocation Backup/archive/escrow Disposal Storage Update/renewal Client desired a maturity model approach; applied a model to each phase of key management Apply the framework Select several enterprise solutions that use key management Measure the implementations against the model Page 4

Key lifecycle management The re-establishment of a key either through a key derivation of an existing key, or the replacement of a key with a new one The creation of the keys according to the mathematical necessities tied to the algorithm with which the key is intended to be used, or the which the enterprise wishes to enforce Key Generation The process of delivering the generated key to its intended recipient along with the assurance that the recipient is the correct entity for the key and it was delivered unaltered Function of creating a backup copy or other recoverable version of the active key, although possibly in different periods in the lifecycle of the key Distribution Backup Update / Renewal - Expiration - User/Business Request Key Storage Key Usage (Active) Recovery Lost User/Business Request Retention Archive The security controls surrounding the protection of the key store; and usage of active and personally archived keys The process of acquiring a key from a backup or archive process The process of removing a key from its functional use, normally before the end of its established lifetime Revocation Deletion Function of creating an archive copy or other recoverable versions of the de-registered keys, although possibly in different periods in the lifecycle of the key Disposal The removal of a key permanently (from the user and any back up and archives) as well as all traces of its use, e.g., any material encrypted by that key Page 5

Developing the model Started with capability maturity model as defined by Carnegie Mellon University (CMU) CMMs are great for process oriented maturity levels; not everything in key management was a perfect fit Started redefining maturity with a new concept Initial Repeatable Defined Managed Optimized Ad hoc Repeatable Standards Enterprise Continuous Improvement (we still used the traditional labels however) Page 6

Maturity model - generation Generation The creation of the keys (any type) according to the mathematical necessities tied to the algorithm with which the key is intended to be used, or the which the enterprise wishes to enforce Level 1 - Initial Level 2 - Repeatable Level 3 - Defined Level 4 - Managed Level 5 - Optimized Key generation is not controlled or managed Keys are generated Key generation is consistent within applications Differing applications may A standard, or multiple exist that applications and hardware Standards are managed at the enterprise level Enterprise and Continuous testing of applications to ensure compliance inconsistently, often never the same way or with the same parameters not use the same security devices use to consistently generate strong keys in the environment Symmetric and asymmetric key generation are defined applications use defined Applications are inventories and measured against compliance Technology implementation consistent with are used throughout all applications in the enterprise Processes are in place to evaluate, redefine and disseminate new key generation Continuous evaluation of technology support for the enterprise is performed Page 7

Maturity model - distribution Distribution The process of delivering the generated key to its intended recipient along with the assurance that the recipient is the correct entity for the key and it was delivered unaltered Level 1 - Initial Level 2 - Repeatable Level 3 - Defined Level 4 - Managed Level 5 - Optimized Key distribution is not controlled or managed Key distribution is in band and Key distribution is consistent within applications Recipients are A standard, or multiple exist that applications use for Standards are managed at the enterprise level Enterprise and Continuous testing of applications to ensure compliance unencrypted Little to no authentication of the recipient is performed authenticated before receiving a key Differing applications may not use the same ; distribution consistent key distribution Symmetric and asymmetric key distribution are always mutually authenticated and secured applications use defined consistently Technology implementation consistent with are used throughout all applications in the enterprise Processes are in place to evaluate, redefine and disseminate new key distribution Continuous evaluation of technology support for the enterprise is performed Page 8

Maturity model - storage Storage The security controls surrounding the protection of the key store Level 1 - Initial Level 2 - Repeatable Level 3 - Defined Level 4 - Managed Level 5 - Optimized Key are stored insecurely Key storage is not controlled or managed Secure key storage is consistent within applications Access to key A standard, or multiple exist that applications use for Standards are managed at the enterprise level Technology implementation Continuous testing of applications to ensure compliance Uncontrolled access to the key storage containers outside of the key holder storage containers is controlled per individual application process Differing applications may not use the same ; key storage consistent key storage Key storage containers are secured and distributed (transmitted) through defined and secure authenticating the recipient consistent with are used throughout all applications in the enterprise Enterprise and applications use defined Processes are in place to evaluate, redefine and disseminate new key storage Continuous evaluation of technology support for the enterprise is performed Page 9

Maturity model backup / archive / escrow Backup / Archive / Escrow These functions involve creating a copy, or other recoverable version of the key, although possibly in different periods in the lifecycle of the key Level 1 - Initial Level 2 - Repeatable Level 3 - Defined Level 4 - Managed Level 5 - Optimized Key backup/archive/ escrow (referred to as simply backup ) not Key backup is consistent within applications Access to backup containers is A standard, or multiple exist that applications use for Standards are managed at the enterprise level Enterprise and Continuous testing of applications to ensure compliance performed Key backup is not controlled or managed Uncontrolled access to the backup key outside of the key holder controlled per individual application process Differing applications may not use the same ; backup consistent it tkey backup Backup containers are secured and distributed (transmitted) through defined and secure Integrated with overall key storage applications use defined consistently Technology implementation consistent with are used throughout all applications in the enterprise Processes are in place to evaluate, redefine and disseminate new key backup Continuous evaluation of technology support for the enterprise is performed Page 10

Maturity model update / renewal Update / Renewal / Expiration The re establishment of a key either through a key derivation of an existing key, or the replacement of a key with a new one Level e 1 - Initial Level e 2 - Repeatable e Level e 3 - Defined ed Level e 4 - Managed aged Level e 5 - Optimized Key are not updated or renewed, or not performed on a consistent basis Key update and renewal processes are not performed securely either in band or outof band Little to no authentication of entity performing renewal or update Key do not have consistent or any expiration Secure update and renewal is consistent within applications Keys expire in a timely manner but without defined to guide them Key update and renewal processes authenticate the key holder performing the update/renewal Differing applications may not use the same ; key update and renewal A standard, or multiple exist that applications use for consistent key update and renewal Automated capabilities to perform update and renewal on behalf of users and applications Standards are managed at the enterprise level Technology implementation consistent with are used throughout all applications in the enterprise Enterprise and applications implement defined Continuous testing of applications to ensure compliance Processes are in place to evaluate, redefine and disseminate new key update and renewal Continuous evaluation of technology support for the enterprise is performed Page 11

Maturity model recovery Recovery Acquiring a key from a backup or archive process Level 1 - Initial Level 2 - Repeatable Level 3 - Defined Level 4 - Managed Level 5 - Optimized No recovery capability exists, or, only ad hoc user defined processes are implemented Per application recovery processes are implemented Consistent only within A standard, or multiple exist that applications use for consistent key Standards are managed at the enterprise level Technology implementation consistent with Continuous testing of applications to ensure compliance Processes are in Existing ad hoc processes are not integrated with backup and/or archive application sets; inconsistent between applications Differing applications may not use the esame ; key recovery Recovery management is user driven recovery Recovery management is a defined set of processes with integrated access control o of recovery keys, authentication of recovery manager, and secure distribution of recov ered keys are used throughout all applications in the enterprise Enterprise and applications implement defined place to evaluate, redefine and disseminate new key recovery Continuous evaluation of technology support for the enterprise is performed Page 12

Maturity model revocation Revocation Removing a key from its functional use, normally before the end of its established lifetime Level 1 - Initial Level 2 - Repeatable Level 3 - Defined Level 4 - Managed Level 5 - Optimized Keys are not revoked upon compromise or loss, or, only ad hoc user defined processes are Per application revocation processes are implemented Consistent only within A standard, or multiple exist that applications use for consistent key Standards are managed at the enterprise level Technology implementation consistent with Continuous testing of applications to ensure compliance Processes are in implemented Existing ad hoc processes are not integrated with recovery processes application sets; inconsistent between applications Differing applications may not use the esame ; key revocation Revocation management is user driven revocation Revocation management is a defined set of processes with integrated notification, o key generation, and key distribution of new keys are used throughout all applications in the enterprise Enterprise and applications implement defined place to evaluate, redefine and disseminate new key revocation Continuous evaluation of technology support for the enterprise is performed Page 13

Maturity model disposal Disposal The removal of key permanently (from the user and any back up and archives) as well as all traces of its use, e.g., any material encrypted by that key Level 1 - Initial Level 2 - Repeatable Level 3 - Defined Level 4 - Managed Level 5 - Optimized Keys are not disposed of upon end of life, compromise or Per application disposal processes are implemented A standard, or multiple exist that applications Standards are managed at the enterprise level Technology Continuous testing of applications to ensure loss, or, only ad hoc user defined processes are implemented Consistent only within application sets; inconsistent between applications Differing applications may not use the same ; key disposal use for consistent key disposal Removal of material encrypted by the key removed according to implementation consistent with are used throughout all applications in the enterprise Enterprise and applications implement defined Removal of material encrypted by the key removed consistently throughout the enterprise compliance Processes are in place to evaluate, redefine and disseminate new key disposal Continuous evaluation of technology support for the enterprise is performed Page 14

Applying the model Client wanted an examination of seven solutions; Applied model per solution PKI VPN SSL management Secure email FDE Tape backup SFTP Interview application/solution owners; key managers Discussion / documentation Understand what is implemented Map implementation to maturity level, all phases Needed d an additional parameter Effectiveness E.g., a standard may say to use 56 bit DES, however, the effectiveness of that standard is unacceptable Page 15

Moving from 3 to 4 Initially difficult to define Meets key management Meets key management ; per ; infrastructure application support Consensus centered around 2 elements 1. Reduction in implementation (technology) of 2. Gain in automation (efficiency) Moving from 3 4 needed to address two things 1. Is the associated cost (app and resources) worth the investment? 2. Is there even a technology available to make it happen? Page 16

Applying the model Public key infrastructure (PKI) solution 1 2 3 4 5 Generation Distribution Backup/archive Storage Update/renew Recovery Revocation Disposal Page 17

Applying the model remediation areas Public key infrastructure (PKI) solution 1 2 3 4 5 Generation Distribution Backup/archive Storage Update/renew Recovery Revocation Disposal Page 18

Applying the model Full disk encryption (FDE) solution 1 2 3 4 5 Generation Distribution Backup/archive Storage Update/renew Recovery Revocation Disposal Page 19

Applying the model remediation areas Full disk encryption (FDE) solution 1 2 3 4 5 Generation Distribution Backup/archive Storage Update/renew Recovery Revocation Disposal Page 20

Applying the model SSL certificate and key management 1 2 3 4 5 Generation Distribution Backup/archive Storage Update/renew Recovery Revocation Disposal Page 21

Applying the model remediation areas SSL certificate and key management 1 2 3 4 5 Generation Distribution Backup/archive Storage Update/renew Recovery Revocation Disposal Page 22

Risk analysis of results - dashboard Current State Future Statet Remediation Duration Cost PKI X 1-3 mo $ FDE X 2-4 mo $$ Tape backup X 1-3 mo $ VPN X 6-8 mo $$ SSL X 6-8 mo $$ Secure email X 8-10 mo $$$ SFTP Remediation roadmap created for each area needing improvement Page 23

Gaps and lessons learned Creating a maturity model addressing only the phases of key lifecycle management was not enough The model allowed us to examine how individual applications managed keys Website SSL keys and certificates Endpoint (laptop) encryption Secure email Tape backup encryption Secure file transfer Secure VPN for remote access What was missing Policies and Roles, responsibilities and ownership issues Compliance Governance Page 24

Gaps and lessoned learned The model provided less value than anticipated What we learned: It s okay to be a 3 Standards, and adherence to those was the most significant aspect of good key management Recommendation in the end Hone the ; make applicable to Symmetric / asymmetric User / device / infrastructure Create a compliance program around the Measure compliance Develop remediation plan to close the gap from current state to compliance Track remediation Page 25

Questions? Page 26

Contact Chris Kostick Executive Director christopher.kostick@ey.com 410-783-3838 Page 27