Key Management Interoperability Protocol (KMIP)



Similar documents
Key Management Interoperability Protocol (KMIP)

Crittografia e Enterprise Key Management una sfida possibile da affrontare

Key Management Best Practices

A Draft Framework for Designing Cryptographic Key Management Systems

Credit Card Security

SP A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter

Transparent Data Encryption: New Technologies and Best Practices for Database Encryption

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Introduction to Key Management Services Managing keys in the data center

An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation

How To Understand And Understand The Security Of A Key Infrastructure

EMC DATA DOMAIN ENCRYPTION A Detailed Review

Key Management Issues in the Cloud Infrastructure

Security Digital Certificate Manager

KMx Enterprise: Integration Overview for Member Account Synchronization and Single Signon

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

Chapter 23. Database Security. Security Issues. Database Security

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February

Securing your Online Data Transfer with SSL

Security Digital Certificate Manager

SSL/TLS: The Ugly Truth

Alliance Key Manager Solution Brief


Solutions for Encrypting Data on Tape: Considerations and Best Practices

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

FileCloud Security FAQ

apple WWDR Certification Practice Statement Version 1.8 June 11, 2012 Apple Inc.

A Maturity Model for Enterprise Key Management. Lessons Learned

CRYPTOGRAPHY AS A SERVICE

Securing an IP SAN. Application Brief

White Paper: PGP Key Management Server from Symantec

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

XTREMIO DATA AT REST ENCRYPTION

SecureDoc Disk Encryption Cryptographic Engine

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

A Strategic Approach to Enterprise Key Management

DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES

PLATFORM ENCRYPTlON ARCHlTECTURE. How to protect sensitive data without locking up business functionality.

Audit Logging. Overall Goals

Online signature API. Terms used in this document. The API in brief. Version 0.20,

OPEN DATA CENTER ALLIANCE USAGE: Data Security Rev. 1.0

Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn

Applying Cryptography as a Service to Mobile Applications

ios Team Administration Guide (Legacy)

Certification Practice Statement

Chapter 4 Virtual Private Networking

SafeNet MSSQL EKM Provider User Guide

Making Data Security The Foundation Of Your Virtualization Infrastructure

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series

Network Security Guidelines. e-governance

Simple Network Management Protocol

DIGIPASS CertiID. Getting Started 3.1.0

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

Internal Server Names and IP Address Requirements for SSL:

SAP HANA Backup and Recovery (Overview, SPS08)

Introducing Director 11

Data-Centric Security vs. Database-Level Security

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Central Agency for Information Technology

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

What in the heck am I getting myself into! Capitalware's MQ Technical Conference v

Key & Data Storage on Mobile Devices

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM

Concept of Electronic Approvals

Microsoft SQL Server Integration Guide

PA-DSS Implementation Guide for. Sage MAS 90 and 200 ERP. Credit Card Processing

CA Unified Infrastructure Management Server

Enterprise Access Control Patterns For REST and Web APIs

ETSI TS V1.1.1 ( ) Technical Specification

Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions

Ensuring the security of your mobile business intelligence

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Achieving PCI Compliance Using F5 Products

Chapter 10. Cloud Security Mechanisms

Using Entrust certificates with VPN

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

GE Measurement & Control. Cyber Security for NEI 08-09

This Working Paper provides an introduction to the web services security standards.

Securing Data in Oracle Database 12c

Vs Encryption Suites

Meeting Technology Risk Management (TRM) Guidelines from the Monetary Authority of Singapore (MAS)

CompTIA Cloud+ 9318; 5 Days, Instructor-led

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair

Implementation Guide SAP NetWeaver Identity Management Identity Provider

Encrypt Your Cloud. Davi Ottenheimer flyingpenguin. Session Classification: Advanced

Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions

Den Gode Webservice - Security Analysis

Interoperable Cloud Storage with the CDMI Standard

PCI Data Security and Classification Standards Summary

Report to WIPO SCIT Plenary Trilateral Secure Virtual Private Network Primer. February 3, 1999

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

Data Protection: From PKI to Virtualization & Cloud

Transcription:

www.oasis-open.org Management Interoperability Protocol (KMIP) Storage Developer s Introduction SNIA Fall 2009 Gordon Arnold, garnold@us.ibm.com Chair, Storage Security Industry Forum 1 2009 Insert Copyright information here. All rights reserved.

Abstract Data in networked storage environments is significantly more vulnerable to unauthorized access, theft, or misuse than data stored in direct-attached storage. Encrypting data-at-rest can mitigate threats and allow data security, but widespread use of encryption is complicated by inconsistencies and duplication in key management systems supporting encryption environments. An emerging standard, Management Interoperability Protocol (KMIP), promises to greatly reduce OPEX and improve compliance visibility, and this session provides a developer s perspective on its implementation. Learning Objectives: How KMIP addresses standardizing communication between encryption systems that need to consume keys and the key management systems that create and manage those keys. How KMIP is used with encrypted storage, low-end devices, and certificate distribution How enterprises will be able to deploy a single enterprise key management infrastructure to manage keys for all encryption systems in the enterprise that require symmetric keys, asymmetric keys pairs, certificates and other security objects. An interactive discussion on KMIP implementation suggestions for storage developers 2009 Insert Copyright information here. All rights reserved.

Agenda The Need for Interoperable Management KMIP Overview KMIP Specification KMIP Use Cases Storage specific guidance 3 2009 Insert Copyright information here. All rights reserved.

The Need for Interoperable Management Today s enterprises operate in increasingly complex, multi-vendor environments. Enterprises need to deploy better encryption across the enterprise. A key hurdle in IT managers deploying encryption is their ability to recover the encrypted data. Today, many companies deploy separate encryption systems for different business uses laptops, storage, databases and applications resulting in: Cumbersome, often manual efforts to manage encryption keys Increased costs for IT Challenges meeting audit and compliance requirements Lost data 4 2009 Insert Copyright information here. All rights reserved.

Often, Each Cryptographic Environment Has Its Own Management System Enterprise Cryptographic Environments Replica Production Database CRM Portals Enterprise Applications Collaboration & Content Mgmt Systems VPN LAN File Server WAN Disk Arrays ecommerce Applications Backup System Backup Disk Staging Business Analytics Backup Tape Email Dev/Test Obfuscation Management System Management System Management System Management System Management System Management Management 5 System System 2009 Insert Copyright information here. All rights reserved. Management System

Often, Each Cryptographic Environment Has Its Own Protocol Enterprise Cryptographic Environments Replica Production Database CRM Portals Enterprise Applications Collaboration & Content Mgmt Systems VPN LAN File Server WAN Disk Arrays ecommerce Applications Backup System Backup Disk Staging Business Analytics Backup Tape Email Disparate, Often Proprietary Protocols Dev/Test Obfuscation Management System Management System Management System Management System Management System Management Management 6 System System 2009 Insert Copyright information here. All rights reserved. Management System

KMIP Overview 7 2009 Insert Copyright information here. All rights reserved.

What is KMIP The Management Interoperability Protocol (KMIP) enables key lifecycle management. KMIP supports legacy and new encryption applications, supporting symmetric keys, asymmetric keys, digital certificates, and other "shared secrets." KMIP offers developers templates to simplify the development and use of KMIPenabled applications. KMIP defines the protocol for encryption client and key-management server communication. Supported key-lifecycle operations include generation, submission, retrieval, and deletion of cryptographic keys. Vendors will deliver KMIP-enabled encryption applications that support communication with compatible KMIP keymanagement servers. 8 2009 Insert Copyright information here. All rights reserved.

KMIP: Single Protocol Supporting Enterprise Cryptographic Environments Enterprise Cryptographic Environments Production Database Portals Collaboration & Content Mgmt Systems LAN VPN File Server WAN Disk Arrays Backup System Replica CRM Enterprise Applications ecommerce Applications Backup Disk Staging Email Business Analytics Dev/Test Obfuscation Backup Tape Management Interoperability Protocol Enterprise Management 9 2009 Insert Copyright information here. All rights reserved.

KMIP: Symmetric Encryption s Enterprise Manager Management Interoperability Protocol Application Application Application Tape Library Server 2009 Insert Copyright information here. All rights reserved. 10 Application SAN Storage Array

KMIP: Asymmetric s Public KMIP Public Public Public Public 11 2009 Insert Copyright information here. All rights reserved.

KMIP: Digital Certificates KMIP to low-end Residential Meter KMIP to Commercial Meter KMIP to Industrial Meter Utility 12 2009 Insert Copyright information here. All rights reserved.

KMIP Request / Response Model Enterprise Manager Response Header Symmetric Unique Identifier Value Request Header Get Unique Identifier Name: XYZ SSN: 1234567890 Acct No: 45YT-658 Status: Gold Unencrypted data Encrypting Storage @!$%!%!%!%%^& *&^%$#&%$#$%*!^ @*%$*^^^^%$@*) %#*@(*$%%%%#@ Encrypted data Host 13 2009 Insert Copyright information here. All rights reserved.

Supporting Multiple Operations per Request Enterprise Manager Response Header Symmetric Unique Identifier Value Request Header Locate Name Get ID Placeholder Name: XYZ SSN: 1234567890 Acct No: 45YT-658 Status: Gold Unencrypted data Encrypting Storage @!$%!%!%!%%^& *&^%$#&%$#$%*!^ @*%$*^^^^%$@*) %#*@(*$%%%%#@ Encrypted data Host 14 2009 Insert Copyright information here. All rights reserved.

Messages in TTLV Format Tag Type Len Value Tag Type Len Value Value Len Type Tag Value Len Type Tag 15 2009 Insert Copyright information here. All rights reserved.

Transport-Level Encoding Client Server API API Internal representation Internal representation KMIP Encode KMIP Decode KMIP Encode KMIP Decode Transport KMIP Transport 16 2009 Insert Copyright information here. All rights reserved.

OASIS KMIP Technical Committee OASIS (Organization for the Advancement of Structured Information Standards) is a not-for-profit consortium that drives the development, convergence and adoption of open standards for the global information society. KMIP Technical Committee chartered in March 2009 The KMIP TC will develop specification(s) for the interoperability of Enterprise Management (EKM) services with EKM clients. The specifications will address anticipated customer requirements for key lifecycle management (generation, refresh, distribution, tracking of use, life-cycle policies including states, archive, and destruction), key sharing, and long-term availability of cryptographic objects of all types (public/private keys and certificates, symmetric keys, and other forms of shared secrets ) and related areas. KMIP TC IPR mode is Royalty Free on RAND 17 2009 Insert Copyright information here. All rights reserved.

KMIP Specification 2009 Insert Copyright information here. All rights reserved. 18 http://xml.coverpages.org/kmip/kmip-v0.98-final.pdf

KMIP defines a set of Operations that apply to Managed Objects that consist of Attributes and possibly cryptographic material Protocol Operations Managed Objects Object Attributes Create Create Pair Register Re-key Derive Certify Re-certify Locate Check Get Get Attributes Get Attribute List Add Attribute Modify Attribute Delete Attribute Obtain Lease Get Usage Allocation Activate Revoke Destroy Archive Recover Validate Query Cancel Poll Notify Put 19 2009 Insert Copyright information here. All rights reserved. Certificate Symmetric Public Private Split Template Policy Template Secret Data Opaque Object Block (for keys) or Value (for certificates) Unique Identifier Name Object Type Cryptographic Algorithm Cryptographic Length Cryptographic Parameters Certificate Type Certificate Issuer Certificate Subject Digest Operation Policy Name Cryptographic Usage Mask Lease Time Usage Limits State Initial Date Activation Date Process Start Date Protect Stop Date Deactivation Date Destroy Date Compromise Occurrence Date Compromise Date Revocation Reason Archive Date Object Group Link Application Specific ID Contact Information Last Change Date Custom Attribute

KMIP Base Objects Base Objects are: Components of Managed Objects: Attribute, identified by its Attribute Name Block, containing the Value, either in the clear, either in raw format, or as a transparent structure or wrapped using Encrypt, MAC/Sign, or combinations thereof possibly together with some attribute values Elements of protocol messages: Credential, used in protocol messages Parameters of operations: Template-Attribute, containing template names and/or attribute values, used in operations 20 2009 Insert Copyright information here. All rights reserved.

KMIP Managed Objects Managed Cryptographic Objects Certificate, with type and value Symmetric, with Block Public, with Block Private, with Block Split, with parts and Block Secret Data, with type and Block Managed Objects Template and Policy Template: Template has a subset of Attributes that indicate what an object created from such a template is Policy Template has a subset of Attributes that indicate how an object created from such a template can be used Note that (Policy) Templates have nothing except Attributes: for convenience these Attributes are included in the (Policy) Template structure too. Opaque Object, without Block Managed Objects Certificate Symmetric Public Private Split Template Policy Template Secret Data Opaque Object Block (for keys) or value (for certificates) 21 2009 Insert Copyright information here. All rights reserved.

KMIP Attributes Attributes contain the meta data of a Managed Object Its Unique Identifier, State, etc Attributes can be searched with the Locate operation, as opposed to the content of the Managed Object Setting/modifying/deleting Attributes Only some of the Attributes are set with specific values at object creation, depending on the object type For instance, the Certificate Type Attribute only exists for Certificate objects Some Attributes are implicitly set by certain operations Certificate Type is implicitly set by Register, Certify, and Re-certify Client can set explicitly some of the Attributes Certificate Type cannot be set by the client Not all Attributes can be added, or subsequently modified or deleted once set Certificate Type cannot added, modified or deleted Some Attributes can have multiple values (or instances) organized with indices For instance, a Symmetric object may belong to multiple groups, hence its Object Group Attribute will have multiple values 22 2009 Insert Copyright information here. All rights reserved.

KMIP Attributes cont d 31 Attributes defined Unique Identifier Name Object Type Cryptographic Algorithm Cryptographic Length Describes what is the object Describes how to use the object Describes other features of the object Cryptographic Parameters Certificate Type Certificate Issuer Certificate Subject Digest Operation Policy Name Cryptographic Usage Mask Lease Time Usage Limits State Initial Date Activation Date Process Start Date Protect Stop Date Deactivation Date Destroy Date Compromise Occurrence Date Compromise Date Revocation Reason Archive Date Object Group Link Application Specific ID Contact Information Last Change Date Custom Attribute 23 2009 Insert Copyright information here. All rights reserved.

Lifecycle States and Transitions 24 2009 Insert Copyright information here. All rights reserved.

Illustration of the Lifecycle Dates Activation Date Protect Protect Stop Date Deactivation Date Symmetric key: Process Start Date Process Asymmetric key pair: Public key for encryption Private key for digital signature Activation Date Protect Protect Stop Date = Deactivation Date Process Start Date = Activation Date Deactivation Date Private key for decryption Public key for digital signature 25 2009 Insert Copyright information here. All rights reserved. Process

Illustrations of the Link Attribute Derivation: Symmetric 2 Base Object Symmetric 1 Derived Derived Secret Data Base Object Symmetric 3 Public/Private/Cert: Public Public Private Certificate 1 Certificate Re-key or re-certify: Certificate Certificate 2 Replacement Object Replacement Object Certificate Object 1 Object 2 Object 3 Certificate 3 2009 Insert Copyright information here. All rights reserved. 26 Replaced Object Replaced Object

Client-to-server Operations Operation consists of a request from client followed by server response Multiple operations can be batched in a single request-response pair ID Placeholder can be used to propagate the value of the object s Unique Identifier among operations in the same batch Requests may contain Template-Attribute structures with the desired values of certain attributes Responses contain the attribute values that have been set differently than as requested by the client 27 2009 Insert Copyright information here. All rights reserved.

Client-to-server Operations cont d 26 client-to-server operations defined Generate objects Search and obtain objects Set/get attributes Use the objects Support of optional operations Support for asynchronous responses Create Create Pair Register Re-key Derive Certify Re-certify Locate Check Get Get Attributes Get Attribute List Add Attribute Modify Attribute Delete Attribute Obtain Lease Get Usage Allocation Activate Revoke Destroy Archive Recover Validate (optional) Query Cancel (optional) Poll (optional) Notify (optional) Put (optional) Server-to-client operations 28 2009 Insert Copyright information here. All rights reserved.

Server-to-client Operations Unsolicited messages from the server to the client with the following operations: Notify operation, used by server to inform client about attribute-value changes Push operation, used by server to provide an object and attributes to client, indicating whether the new object is replacing an existing object or not Batching can be used Support is optional 29 2009 Insert Copyright information here. All rights reserved.

Message Contents and Format Protocol messages consist of requests and responses, each with a header and one or more batch items with operation payloads and message extensions Header: Protocol version Maximum response size (optional, in request) Time Stamp (optional in request, required in response) Authentication (optional) Asynchronous Indicator (optional, in request, no support for asynchronous response is default) Asynchronous Correlation Value (optional, in response). Used later on for asynchronous polling Result Status: Success, Pending, Undone, Failure (required, in response) Result Reason (required in response if Failure, optional otherwise) Result Message (optional, in response) Batch Order Option (optional, in request, in-order processing is default). Support at server is optional Batch Error Continuation Option: Undo, Stop, Continue. Stop (optional, in request, Stop is default). Support at server is optional Batch Count Batch Item: Operation (enumeration) Unique Message ID (required if more than one batch item in message) Payload (the actual operation request or response) Message Extension (optional, for vendor-specific extensions) 30 2009 Insert Copyright information here. All rights reserved.

Message Encoding Example of TTLV encoding of the Application Specific ID Attribute Attribute identified by its name Application Specific ID Shows value at index 2 Tag Type Length Value Attribute Structure <varies> Tag Type Length Value Attribute Name Attribute Index String <varies> Application Specific ID Integer 4 2 Attribute Value Structure <varies> Tag Type Length Value App. Name String <varies> ssl App. ID String <varies> www.example.com 31 2009 Insert Copyright information here. All rights reserved.

Message Encoding cont d In a TTLV-encoded message, Attributes are identified either by tag value or by their name (see previous slide), depending on the context: When the operation lists the attribute name among the objects part of the request/response (such as Unique Identifier), its tag is used in the encoded message When the operation does not list the attribute name explicitly, but instead includes Template-Attribute (such as in the Create operation) or Attribute (such as in Add Attribute) objects as part of the request/response, its name is used in the encoded message Get Unique identifier operation 04 4 0000000A tag type length value Unique Identifier 06 24 1f165d65-cbbd-4bd6-9867-80e0b390acf9 tag type length value 32 2009 Insert Copyright information here. All rights reserved.

Authentication Authentication is external to the protocol All servers should support at least SSL/TLS https Authentication message field contains the Credential Base Object Client or server certificate in the case of SSL/TLS or https Host SSL/TLS Enterprise Manager @!$%!%!%!%%^& *&^%$#&%$#$%*!^ @*%$*^^^^%$@*) %#*@(*$%%%%#@ @!$%!%!%!%%^& *&^%$#&%$#$%*!^ @*%$*^^^^%$@*) %#*@(*$%%%%#@ 2009 Insert Copyright information here. All rights reserved. 33 Identity certificate Identity certificate

KMIP Use Cases 2009 Insert Copyright information here. All rights reserved. 34 http://xml.coverpages.org/kmip/kmip-usecases-v0.98-final.pdf

KMIP Use Cases Purpose: provide examples of message exchanges for common use cases Categories basic functionality (create, get, register, delete of sym. keys and templates) life-cycle support (key states) auditing and reporting key exchange asymmetric keys key roll-over archival vendor-specific message extensions Details of the message composition and TTLV encoding (encoded bytes included) 35 2009 Insert Copyright information here. All rights reserved.

Storage Specific guidance Establishment of trust Between the storage device and the key management server How and when are keys generated Client, server How are keys associated with storage units Implied or explicit and what requirements does that put on the storage device 36 2009 Insert Copyright information here. All rights reserved.

Establishment of Trust Digital certificates used for SSL/TLS session Authentication for session establishment How are certificates distributed and installed? During manufacturing Certificate to use to verify device added key management server prior to ship Client could generate and register with server Server can generate and client can request 2009 Insert Copyright information here. All rights reserved. 37

How and when are keys generated 3 possible scenarios 1. Client generates key when required sends to the server for backup/recovery 2. Server generates the key when requested by the client 3. Server pre-generates groups of keys, when client requests a key it gets assigned a key from the group Comparison of the approaches 1. Storage device may have special functions for key generation 2. Storage device can take advantage of special functions for key generation in the server 3. Reduces the need for backup and synchronization of keystores 2009 Insert Copyright information here. All rights reserved.

How are keys associated with storage units 3 major approaches 1. Generate a key identifier or label which is stored with the storage unit used to read previously used key sent to server and a database lookup occurs 2. Have a method of identifying the storage unit and associating the key with the storage unit s identifier 3. Storage an encrypted wrapped copy of the key with the storage unit have to interact with authentication or the key management server to unwrap the key 2009 Insert Copyright information here. All rights reserved.

Conclusion 40 2009 Insert Copyright information here. All rights reserved.

KMIP: enabling enterprise key management through standard protocol Enterprise Cryptographic Environments Staging Replica Production Database Email CRM Portals Enterprise Applications Collaboration & Content Mgmt Systems LAN VPN File Server WAN Disk Arrays ecommerce Applications Backup System Business Analytics Backup Disk Dev/Test Obfuscation Backup Tape Management Interoperability Protocol 2009 Insert Copyright information here. All rights reserved. 41 Enterprise Management System

Q&A 42 2009 Insert Copyright information here. All rights reserved.