Introduction to Key Management Services Managing keys in the data center



Similar documents
Key Management Best Practices

Applying Cryptography as a Service to Mobile Applications

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER

Key Management Interoperability Protocol (KMIP)

Key Management Interoperability Protocol (KMIP)

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February

CRYPTOGRAPHY AS A SERVICE

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

Complying with PCI Data Security

Cryptographic Key Management

Alliance Key Manager Solution Brief

Using BroadSAFE TM Technology 07/18/05

A Strategic Approach to Enterprise Key Management

6231A - Maintaining a Microsoft SQL Server 2008 Database

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

Alliance Key Manager A Solution Brief for Technical Implementers

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

SP A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter

Computer Visions Course Outline

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

Certification Practice Statement

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

EXIN Cloud Computing Foundation

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

Autodesk PLM 360 Security Whitepaper

Basic knowledge of the Microsoft Windows operating system and its core functionality Working knowledge of Transact-SQL and relational databases

General IT Controls Audit Program

shortcut Tap into learning NOW! Visit for a complete list of Short Cuts. Your Short Cut to Knowledge

An Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation

Acano solution. Security Considerations. August E

American International Group, Inc. DNS Practice Statement for the AIG Zone. Version 0.2

Information Technology General Controls (ITGCs) 101

Simple Service Modeling FAQs TrueSight Operations Management (BPPM) versions 9.5 and /31/2014

Implementing a Microsoft SQL Server 2005 Database

NIST ITL July 2012 CA Compromise

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

IBM WebSphere Data Power SOA Applicances V3.8.1 Solution IMP. Version: Demo. Page <<1/10>>

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

Key Management Issues in the Cloud Infrastructure

VMware vcloud Air HIPAA Matrix

Dashlane Security Whitepaper

DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES

TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM

Draft Information Technology Policy

Securing the Cloud - Using Encryption and Key Management to Solve Today's Cloud Security Challenges

External Supplier Control Requirements

Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008

Course Syllabus. Maintaining a Microsoft SQL Server 2005 Database. At Course Completion

Exhibit to Data Center Services Service Component Provider Master Services Agreement

SYLOGENT DEDICATED HOSTING

The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things.

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

SafeNet DataSecure vs. Native Oracle Encryption

Copyright

Managing Enterprise Devices and Apps using System Center Configuration Manager

Critical Steps to Encryption & Key Management in the Microsoft Azure Cloud

MySQL Security: Best Practices

MS Design, Optimize and Maintain Database for Microsoft SQL Server 2008

Thales e-security Key Isolation for Enterprises and Managed Service Providers

Table of Contents. Introduction. Audience. At Course Completion

Sample. WebCenter Sites. Go-Live Checklist

CHAPTER 1 INTRODUCTION

Supplier Information Security Addendum for GE Restricted Data

Volume 3, Issue 2, February 2015 International Journal of Advance Research in Computer Science and Management Studies

RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Making Data Security The Foundation Of Your Virtualization Infrastructure

Cloud Computing Questions to Ask

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Retention & Destruction

BANKING SECURITY and COMPLIANCE

Network and Security Controls

For more information on how to build a HIPAA-compliant wireless network with Lutrum, please contact us today!

MS-55115: Planning, Deploying and Managing Microsoft Project Server 2013

APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from

OPC UA vs OPC Classic

<Insert Picture Here> Oracle Secure Backup 10.3 Secure Your Data, Protect Your Budget

MCSA Instructor-led Live Online Training Program. Course Outline MCSA Deploying and Managing Windows Server 2012

Automated Network Control for

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA

ANNE ARUNDEL COMMUNITY COLLEGE ARNOLD, MARYLAND COURSE OUTLINE CATALOG DESCRIPTION

Database Mirroring: High Availability (HA) and Disaster Recovery (DR) Technology

Tailored Technologies LLC

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

Miami University. Payment Card Data Security Policy

Transcription:

Introduction to Key Management Services Managing keys in the data center Landon Curt Noll 2010-Apr-30 v1.30 An espresso shot served by by Landon Curt Noll 1

Talk Outline Review: What is Key Management? Wiktionary definition of outline Concept: Data Center Class Key Management Need: The key importance of Standards 2

Review: What is Key Management? t-cubesystems.com product catalog 3

Review: What is Key Management? Flickr user ul_marga Key Management is the complete set of operations necessary to nurture and sustain encrypted data and its associated keys during the key life-cycle A Key Management Service is an implementation of all or parts of Key Management Operations The Key Management Policy translates business security requirements into Key Management Operations which are then executed by a Key Management Service Key Management Audit securely records all Key Management operations associated with keys under its control 4

Review: What Key Management is not (a partial list) Key Management is not about using keys - It is more about managing the use of keys Wikipedia Key Management is not how a protocol negotiates keys - Although it may track the use and life of a negotiated key Key Management is not SSL/TLS key negotiation - Although Key Management Clients and Servers may use SSL/TLS to protect their communication Key Management is not a key escrow service - Although an escrow service could be built in top of a Key Management Service 5

Review: One Model of a Key s Life Cycle TIMTOWTDIBSCINABTE * (pronounced Tim Toady Bicarbonate) Key Management helps throughout the life of a key Stage 0: Planning Stage 1: Key Generation Stage 2: Key Storage Stage 3: Key Distribution Stage 4: Key Use Stage 5: Key Suspension Stage 6: Key Termination Stage 7: Key Purging Espresso Still Life Public domain photo by Mark Prince Planning Generation Storage Distribution Use Suspension Termination Purging * This Perl acronym is pronounced Tim Toady Bicarbonate: There is more than one- way to do it, but sometimes consistency is not a bad thing either 6

Review: Policies that guide a key down life s road Flickr user AceFrenzy Who may use a key - Device type, device class, application, application class, etc. What operations may be performed - Encrypt only, Decrypt only, Encrypt/decrypt, Sign, Verify, etc. Conditions of use - Time limit, usage count, HW and/or SW level, data size, etc. High level (usually more complex) business policy - Driven by legal, industry, business or customer requirements 7

Review: KM Audit Log Track all Key Management actions - Who asked for a key, when, etc. Wikipedia Under what conditions was a key used - Type of client, hardware/software environment, etc. Key life cycle state changes - When and perhaps why a change was made A secure audit log is part of a good Key Management Service 8

Review: Too many keys problem Key counts are exploding due to increased pressure from - An increased need for security - More and more products using cryptography - Increasing legal and industry requirements - More data, more devices, more people, more Flickr user simplerich Manually managing keys is annoying at best - Manual management is more subject to human error - Manual activity does not scale well - Automation through a Key Management Service is the key :-) 9

Review: The scaling problem Without automation, the explosion in key counts will increasingly result in: - Improper duplication of key values - Loss of encrypted data - Theft of keys and data - Stale or compromised keys not being rotated (replaced) - Failure of security and/or regulatory audits - More compromises of the integrity of critical applications - Companies making the headlines for the wrong reasons! Flickr user sylvia@intrigue NOTE: Scale value is in 0.1 kg units 10

Review: Helping with the scaling problem Key Management Service helps with the scaling problem of managing an increasing number of keys A Good Key Management Service - Scales as the number of keys grows - Allows for consistent treatment of keys in keeping with best practices - Provides Audit logs, key inventory & accountability Flickr user stopnlook 11

Concept: Data Center Class Key Management Wikipedia 12

Concept: Key Management is a Authenticated Service KM Client connects to a KM Server - Server found by a standard discovery protocol (e.g., DHCP), pre-configured, or uses hardware discovery - KM Server presents credentials when KM Client connects KM Client login to a KM Server - KM Client evaluates the KM Server s credentials - KM Client presents credentials to the KM Server The hard truth: entities must maintain one secret - their login credentials Flickr user William Couch KMS helps here with generation, backup storage, logs, key rotation - KM Client may use multiple KM Servers to improve service availability 13

Concept: Key Management is Session Based Request / Response protocol KM Client sends requests to the KM Server - KM Server evaluates the KM Client s request - KM Server sends a response to the KM Client KM Clients may work synchronically or asynchronously Sessions may consist of multiple request / responses KM Client connection to KM Server may be terminated by either side - Termination by explicit request, policy, or communication failure 14

Concept: Key Management as a Distributed Network Service KM Servers work together to provide KM Clients a common service Flickr user benben KM Clients to not have to know where a key resides - If a KM Server does not have a requested key, then it attempts to find the the key on behalf of the KM Client Allows for one enterprise to request a key from another KM Servers mutually authenticate (access policies control here) Complexity is pushed away from the KM client toward the KM Servers 15

Concept: Building a Highly Reliable and Available Data Center Service Keys are stored on multiple KM Servers - Multiple KM Servers per network - KM Server clusters are geographically distributed Flickr user skreuzer Key material is protected - Keys not stored in plain text - Client / Server protocol protected: nothing goes in the clear - KM Servers may use hardened master key storage methods Key Management disaster recovery - KM Servers push keys to failover KM Servers - When a disaster occurs, a KM Admin (or alarm) with appropriate credentials declares an emergency to able their use 16

Concept: Key points for a Sound Data Center Class Service KM Servers maintain key storage in a distributed encrypted database Multiple KM Servers per network - Load balancing, failover, etc. Keys never stored in the clear - Use of client side key wrapping can prevent KM Servers from knowing the value of the key Wikipedia Audit logging and key inventory - Trace use and provide accountability - Cryptographic data management 17

Need: The key importance of Standards A standards body debating espresso standards? Public domain photo of a coffee house in 1900 1900 = 1 B.E. (Before Espresso) 18

Need: OASIS KMIP and P1619.3 Standards are complementary - KMIP focuses on the exchange protocol - P1619.3 focuses on the higher level architecture - P1619.3 / KMIP map shows no major disconnects Server to Server standards work critical for interoperability Wikipedia 19

Need: Grand unified interoperating product space Multiple KM clients and KM servers cooperate in the same data center Avoid lock-in to a single KM server vendor Wikipedia 20

Thank you Questions? Comments? Flames? Artwork? Landon Curt Noll 21