SlideShare a Scribd company logo
Security and Interoperability

            Danny De Cock
          January 16th, 2012
              Moldova

    E-mail: Danny.DeCock@esat.kuleuven.be
             Slides: godot.be/slides
Secrets of Successful eID
            Environments
• 3 High-level actors                           Citizen/Customer


• Different sectors
  – eGovernment                       Government            Business

     • Collect and store data once, reuse where possible
  – eHealth
     • Make patient records available to health care service
       providers
  – eCommerce & eBusiness
     • Provide ability to correctly identify involved parties
        – Avoiding online fraud, preparing effective anti-spam measures
Secrets of Successful eID
              Environments
• Success depends on joined forces of public and
  private sector
   – Private sector requires return on investment (ROI)
      • Number of contacts between a citizen and its eGovernment only
        does not justify huge investments
   – Public sector prefers eID enablers for use in public and
     private sector
• Avoid reinventing the wheel
   – Need to exchange of experience with successes and
     *failures*
   – Risk of lacking focus to create interoperable solutions
      • Caveat: Systems focusing on any single sector are inherently
        incompatible with *similar* systems
Design Decisions – Basic Concepts
• Federated architecture
   – Each sector operates autonomously
   – Interfaces with other sectors through bus system
• Built around authoritative sources
   – Master copy of data is available at exactly one repository
   – Master copy = authoritative source
• Maximal reuse of information
   – No data replication
   – Administrations cannot re-request data already available
• Integrated system for user and access management
   – eID for all – Citizens & organizations
   – Autonomous management of access & use policies
Design Decisions – Benefits
• Guaranteed interoperability enhances security!
   – Modularity respects each organization’s sovereignty
      • Prevents vender-lock-in
   – Exchanging information using standard and open protocols
     and data formats
• Guaranteed flexibility
   – Modularity allows updating and following
      • Security standards
      • Good/best practices
Identification & Authentication
• Unique identification of
  – Citizens
  – Professionals
  – Companies and other Service Providers (public and
    private sector)
• eID for all: Authentication & Identification
  tokens
  – Federal token
  – eID card – Belgian citizens & foreigners
  – Other tokens – companies, organizations,
    individuals
eID Card Types
Citizens    Kids        Aliens




eID card    Kids-ID     Foreigners’ card
eID Card Content
    PKI           Citizen Identity Data

                                     ID      ADDRESS
Authentication




 Signature

                                   RRN           RRN
     Root CA                  SIGNATURE    SIGNATURE

       CA
                  140x200 Pixels
         RRN
                  8 BPP
                  3.224 Bytes
                                    RRN = National Register
eID Card = 4 Functions
• Non-electronic
  1. Visible Identification of a person
• Electronic                                Enabler of
                                            eServices
  2. Digital identification
    • Data capture
  3. Prove your identity
    • Authentication signature      eFunctionality

  4. Digitally sign information
    • Non-repudiation signature
Levels of Assurance (LoA) of
               Authentication
• Federated identity management model
  – E.g., Shibboleth, Liberty Alliance, CardSpace…
  LoA 4+                                         Setting access policies
  (qualified plus biometric)
  LoA 4                                          Sensitive medical records (e.g. HIV),
  (qualified cert with smart card EAL4+)         Consultant notes containing opinions.
                                                 Ability to Break the Glass. Bank to bank
                                                 transfers
  LoA 3                                          Patient confidential records (non-
  (2-factor authentication, non-qualified        sensitive)
  cert, EAL4 smart card)
  LoA 2                                          Some Internet banking applications
  (one time password)                            System administration
  LoA 1                                          Retrieve degree certificate. Completing
  (uid/password, Verisign Class 1 cert)          public service employment application

  LoA 0                                          Public data
  (no authentication)
eID – Level 3 + 4
Citizen’s Federal Token – Level 2
How to Choose a Security Level?
• Responsibility of the service provider under
  supervision of the Privacy Commission
• Based on risk assessment and depending on
   – Type of processing: communication, consultation,
     alteration,…
   – Scope of the service: does the processing only concern the
     user or also concern other persons ?
   – Degree of sensitivity of the data processed
   – Possible impact of the processing
• In addition to right security level
   – Use of an electronic & time-stamped signature might be
     needed
Interoperable & Secure by Design
• Mandates & authorization credentials based on open
  standards, e.g.,
   – XACML
   – SAML
• Revocation services setup by mandate manager and
  certification authority
   – OCSP
   – CRL
• Certificates, Signatures and timestamps, e.g.,
   – X.509
   – XADES-*
• Communication protocols
   – SSL/TLS
XAXML – Allow/Deny Service Requests…
    Joe                             Policy Enforcement Point          Service Provider

                                                       6

            1      Execute                                   OK
                  Service Y                           Execute Service Y



      Check Policy Compliance       2       5   Permit / Deny Service Request

                                                                 Authorization Domain

                      3
                                                           4
                Retrieve Relevant                            Retrieve Policy
                     Policies                         Validation Information

                              Policy Decision Point                             Policy
                                                                           Information
Policy Access Point                                                              Point
Generic Policy Enforcement Model
                          XACML-based
                                                        Action on
                                                       application
                                                        DENIED               Policy                 Action on
                                                                                                   application
                              User                                       Enforcement              PERMITTED
                                                                             (PEP)                                       Application
                                                      Action on
                                                     application
                                                                     Decision          Decision
                                                                     Request           Reply


                                                                                                                  Information
                                          Policy                                                                 Request/Reply
                                         Retrieval                        Policy Decision
                                                                               (PDP)


                                                                                              Information
                                                                                             Request/Reply


             Policy
          Management
                       Policy Administration                                     Policy Information              Policy Information
                               (PAP)                                                    (PIP)                           (PIP)
Manager




                              Policy
                            Repository
                                                                                    Authentic Source                Authentic Source

                                                                                             Slide inspired by Frank Robben
Re-using Architecture
                         Be-Health                                                  Social sector                                                Non social FPS
   USER                                                        USER
                                                                                      (CBSS)                                 USER                  (FedICT)
                                           APPLICATIONS                                                APPLICATIONS                                                     APPLICATIONS
  Authen -    Authorization                                  Authen -     Authorization                                      Authen -       Authorization
  tication       PEP                          WebApp         tication        PEP                          WebApp             tication          PEP                        WebApp
                     Role                                                        Role                                                           Role
                    Mapper
                                               XYZ                              Mapper
                                                                                                           XYZ                                 Mapper
                                                                                                                                                                           XYZ




                                  Role                                                        Role                                                           Role
                                 Mapper                                                      Mapper                                                         Mapper
                                  DB                                                           DB                                                             DB



              PDP                Role                                    PDP                  Role                                             PDP            Role
                                                                                                                                                                             PAP
                                                PAP                                                          PAP                                Role        Provider
               Role             Provider
                                             ‘’Kephas’’
                                                                          Role              Provider
                                                                                                          ‘’Kephas’’                          Provider         DB         ‘’Kephas’’
             Provider             DB                                    Provider              DB




  PIP         PIP             PIP                            PIP          PIP             PIP                                     PIP           PIP          PIP
                                                                                                                                Attribute     Attribute     Attribute
Attribute    Attribute       Attribute                     Attribute    Attribute        Attribute
                                                                                                                                Provider      Provider      Provider
Provider     Provider        Provider                      Provider     Provider         Provider




                                              Management                                                Management                DB             DB           DB         Management
  DB                           DB                            DB                            DB
              RIZIV                                                      UMAF                                                    Bailiffs       XYZ           XYZ
Mandates                       XYZ             VAS         Mandates                        XYZ             VAS                                                              VAS




                                                                                                                       Slide inspired by Frank Robben
Conclusion
• eGovernment Services are accessible
  – Via open standards
  – With strong authentication & access management
• Federated system permits use of common
  basic services securely
  – Without losing any autonomy!
• System allows permanent evolution
  – Continuously changing user & organization
    requirements
Food for Thought

• Trust is Good – Control is Better!
Th@nk you!


                                                        Danny De Cock
                                       Researcher Applied Cryptography
                                       Danny.DeCock@esat.kuleuven.be

                                      Slides: www.godot.be/slides


© fedict 2011. All rights reserved
eID Card Issuing Procedure
                                                                                                  Card Personalizer (CP)
                                                                                                  Card Initializer (CI)
                                                                                            (5)




                                                       (4)
                                                             (6)
                                                                   (10a”)                                     (8)
                                      National                                                          Certification
                                      Register (RRN)                            (9)                     Authority (CA)
           (10a’)
                            (3)
                                                                              (7)

Municipality

                                (2)
                                                 (0)                                            (10b)

                                                                                                        Citizen PIN & PUK
                                                (11)
  Face to face identification                  (1)
                                                                                      Citizen
                    (12)                                               (13)
eID Certificates Hierarchy

2048-bit
   RSA




2048-bit
   RSA




1024-bit
   RSA

           Card Administration:                 Certificates for
            update address, key            Government web servers,
           pair generation, store         signing citizen files, public
               certificates,…                   information,…
Abstract eGovernment Ecosystem


            A                                                  F
                      C


Context 1
                                                    E


                              D
                                                        H          G
            B



                Introducting Belgian eID Cards & eGovernment               Slide 24
                                                                   16 January 2012
Context 2                                     Context 3

More Related Content

PPT
Privacy audittalkfinal
PDF
Identity Insights: Social, Local and Mobile Identity
PDF
Jim o donoghue hull wsdan 30 june 2011
PPTX
TSB_IoT_Presentations_27June2012
PDF
ESEconf2011 - Buzzi Andreas: "Schrittweise Modernisierung von komplexen Mainf...
PDF
Enterprise Security Architecture: From Access to Audit
PDF
Smart Micro Credit Business Suite
PDF
Interoperability versus Cyber Security/Information Assurance?
Privacy audittalkfinal
Identity Insights: Social, Local and Mobile Identity
Jim o donoghue hull wsdan 30 june 2011
TSB_IoT_Presentations_27June2012
ESEconf2011 - Buzzi Andreas: "Schrittweise Modernisierung von komplexen Mainf...
Enterprise Security Architecture: From Access to Audit
Smart Micro Credit Business Suite
Interoperability versus Cyber Security/Information Assurance?

Viewers also liked (6)

DOCX
Secure outsourced attribute based signatures
PDF
EXCHANGE OF EXPERIENCES AND KNOW-HOW ON E-GOVERNMENT AS A TOOL FOR REGIONAL C...
DOCX
Mona secure multi owner data sharing for dynamic groups in the cloud
PPT
Information Security Principles - Access Control
PPT
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
PPTX
Authentication(pswrd,token,certificate,biometric)
Secure outsourced attribute based signatures
EXCHANGE OF EXPERIENCES AND KNOW-HOW ON E-GOVERNMENT AS A TOOL FOR REGIONAL C...
Mona secure multi owner data sharing for dynamic groups in the cloud
Information Security Principles - Access Control
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
Authentication(pswrd,token,certificate,biometric)
Ad

Similar to Security and interoperability (20)

PDF
Thornton e authentication guidance
PDF
Healthcare Security Essentials jean pawluk april 28 2011
PPT
PCTY 2012, Risk Based Access Control v. Pat Wardrop
PDF
Security Awareness Training
PDF
Layer 7: Fine Grained Authorization for Web Services
PDF
Identity and Request Management Using Novell Identity Manager: Identity Manag...
PPTX
Extensible Authorization for SAP Applications Webinar
PPTX
IQPC eDiscovery Goverment - Washington D.C.
PDF
Lumension LCRM - DSS @Vilnius 2010
PPSX
3 Telecom+Network Part1
PDF
Hospitality Law Conference 2010 - Information Protection & Privacy: The New H...
PDF
Supplement V1.2
PDF
California Privacy Law: Resources & Protections
PDF
A Framework for Obligation Fulfillment in REST Services
PDF
Technology Trends: Value Office
PPTX
Building The Framework For A Culture Of Security
PDF
Wewebu customer success story California Dept. of Public Health
PPTX
Secure adn Contained Access for Everybody, at Anytime
PPTX
Best Practices for Securing Active Directory v2.0
PDF
Tutorial 3 pedro janices
Thornton e authentication guidance
Healthcare Security Essentials jean pawluk april 28 2011
PCTY 2012, Risk Based Access Control v. Pat Wardrop
Security Awareness Training
Layer 7: Fine Grained Authorization for Web Services
Identity and Request Management Using Novell Identity Manager: Identity Manag...
Extensible Authorization for SAP Applications Webinar
IQPC eDiscovery Goverment - Washington D.C.
Lumension LCRM - DSS @Vilnius 2010
3 Telecom+Network Part1
Hospitality Law Conference 2010 - Information Protection & Privacy: The New H...
Supplement V1.2
California Privacy Law: Resources & Protections
A Framework for Obligation Fulfillment in REST Services
Technology Trends: Value Office
Building The Framework For A Culture Of Security
Wewebu customer success story California Dept. of Public Health
Secure adn Contained Access for Everybody, at Anytime
Best Practices for Securing Active Directory v2.0
Tutorial 3 pedro janices
Ad

More from E-Government Center Moldova (20)

PDF
The new era of smart
PDF
The nexus of Social, Mobile, Cloud and Big Data Analytics
PDF
Digital Transformation by Richard Baird
PPT
Presentation cert gov-md 05.03.2013
PDF
Hannes astok data protection agency
PDF
Prezentare compartiment securitatea 05 03 2013 p sincariuc
PDF
Hannes astok policy development
PDF
Digital security hannes astok
PDF
Assessing cybersecurity_Anto Veldre
PPTX
MCloud operational framework
PPTX
Arhitectura de securitate_MCloud
PDF
Ibm smart cloud solutions m-cloud
PDF
Ibm security virtual server protection
PDF
Can e government work in the cloud reichstaedter
PDF
Driving government efficiency and innovation through cloud computing k...
PDF
Star storage m cloud week
PPT
Unleashing the potential of cloud computing in europe francisco garcia moran
PPTX
Government innovation through cloud computing arthur riel
PPT
4 francisco garcia_moran_moldova_2013
The new era of smart
The nexus of Social, Mobile, Cloud and Big Data Analytics
Digital Transformation by Richard Baird
Presentation cert gov-md 05.03.2013
Hannes astok data protection agency
Prezentare compartiment securitatea 05 03 2013 p sincariuc
Hannes astok policy development
Digital security hannes astok
Assessing cybersecurity_Anto Veldre
MCloud operational framework
Arhitectura de securitate_MCloud
Ibm smart cloud solutions m-cloud
Ibm security virtual server protection
Can e government work in the cloud reichstaedter
Driving government efficiency and innovation through cloud computing k...
Star storage m cloud week
Unleashing the potential of cloud computing in europe francisco garcia moran
Government innovation through cloud computing arthur riel
4 francisco garcia_moran_moldova_2013

Recently uploaded (20)

PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Encapsulation theory and applications.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Cloud computing and distributed systems.
PPTX
MYSQL Presentation for SQL database connectivity
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Encapsulation_ Review paper, used for researhc scholars
Encapsulation theory and applications.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Empathic Computing: Creating Shared Understanding
Programs and apps: productivity, graphics, security and other tools
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Machine learning based COVID-19 study performance prediction
Cloud computing and distributed systems.
MYSQL Presentation for SQL database connectivity
“AI and Expert System Decision Support & Business Intelligence Systems”
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
The AUB Centre for AI in Media Proposal.docx
NewMind AI Weekly Chronicles - August'25 Week I
sap open course for s4hana steps from ECC to s4
Diabetes mellitus diagnosis method based random forest with bat algorithm
Chapter 3 Spatial Domain Image Processing.pdf
Review of recent advances in non-invasive hemoglobin estimation
How UI/UX Design Impacts User Retention in Mobile Apps.pdf

Security and interoperability

  • 1. Security and Interoperability Danny De Cock January 16th, 2012 Moldova E-mail: Danny.DeCock@esat.kuleuven.be Slides: godot.be/slides
  • 2. Secrets of Successful eID Environments • 3 High-level actors Citizen/Customer • Different sectors – eGovernment Government Business • Collect and store data once, reuse where possible – eHealth • Make patient records available to health care service providers – eCommerce & eBusiness • Provide ability to correctly identify involved parties – Avoiding online fraud, preparing effective anti-spam measures
  • 3. Secrets of Successful eID Environments • Success depends on joined forces of public and private sector – Private sector requires return on investment (ROI) • Number of contacts between a citizen and its eGovernment only does not justify huge investments – Public sector prefers eID enablers for use in public and private sector • Avoid reinventing the wheel – Need to exchange of experience with successes and *failures* – Risk of lacking focus to create interoperable solutions • Caveat: Systems focusing on any single sector are inherently incompatible with *similar* systems
  • 4. Design Decisions – Basic Concepts • Federated architecture – Each sector operates autonomously – Interfaces with other sectors through bus system • Built around authoritative sources – Master copy of data is available at exactly one repository – Master copy = authoritative source • Maximal reuse of information – No data replication – Administrations cannot re-request data already available • Integrated system for user and access management – eID for all – Citizens & organizations – Autonomous management of access & use policies
  • 5. Design Decisions – Benefits • Guaranteed interoperability enhances security! – Modularity respects each organization’s sovereignty • Prevents vender-lock-in – Exchanging information using standard and open protocols and data formats • Guaranteed flexibility – Modularity allows updating and following • Security standards • Good/best practices
  • 6. Identification & Authentication • Unique identification of – Citizens – Professionals – Companies and other Service Providers (public and private sector) • eID for all: Authentication & Identification tokens – Federal token – eID card – Belgian citizens & foreigners – Other tokens – companies, organizations, individuals
  • 7. eID Card Types Citizens Kids Aliens eID card Kids-ID Foreigners’ card
  • 8. eID Card Content PKI Citizen Identity Data ID ADDRESS Authentication Signature RRN RRN Root CA SIGNATURE SIGNATURE CA 140x200 Pixels RRN 8 BPP 3.224 Bytes RRN = National Register
  • 9. eID Card = 4 Functions • Non-electronic 1. Visible Identification of a person • Electronic Enabler of eServices 2. Digital identification • Data capture 3. Prove your identity • Authentication signature eFunctionality 4. Digitally sign information • Non-repudiation signature
  • 10. Levels of Assurance (LoA) of Authentication • Federated identity management model – E.g., Shibboleth, Liberty Alliance, CardSpace… LoA 4+ Setting access policies (qualified plus biometric) LoA 4 Sensitive medical records (e.g. HIV), (qualified cert with smart card EAL4+) Consultant notes containing opinions. Ability to Break the Glass. Bank to bank transfers LoA 3 Patient confidential records (non- (2-factor authentication, non-qualified sensitive) cert, EAL4 smart card) LoA 2 Some Internet banking applications (one time password) System administration LoA 1 Retrieve degree certificate. Completing (uid/password, Verisign Class 1 cert) public service employment application LoA 0 Public data (no authentication)
  • 11. eID – Level 3 + 4
  • 13. How to Choose a Security Level? • Responsibility of the service provider under supervision of the Privacy Commission • Based on risk assessment and depending on – Type of processing: communication, consultation, alteration,… – Scope of the service: does the processing only concern the user or also concern other persons ? – Degree of sensitivity of the data processed – Possible impact of the processing • In addition to right security level – Use of an electronic & time-stamped signature might be needed
  • 14. Interoperable & Secure by Design • Mandates & authorization credentials based on open standards, e.g., – XACML – SAML • Revocation services setup by mandate manager and certification authority – OCSP – CRL • Certificates, Signatures and timestamps, e.g., – X.509 – XADES-* • Communication protocols – SSL/TLS
  • 15. XAXML – Allow/Deny Service Requests… Joe Policy Enforcement Point Service Provider 6 1 Execute OK Service Y Execute Service Y Check Policy Compliance 2  5 Permit / Deny Service Request Authorization Domain 3 4 Retrieve Relevant Retrieve Policy Policies Validation Information Policy Decision Point Policy Information Policy Access Point Point
  • 16. Generic Policy Enforcement Model XACML-based Action on application DENIED Policy Action on application User Enforcement PERMITTED (PEP) Application Action on application Decision Decision Request Reply Information Policy Request/Reply Retrieval Policy Decision (PDP) Information Request/Reply Policy Management Policy Administration Policy Information Policy Information (PAP) (PIP) (PIP) Manager Policy Repository Authentic Source Authentic Source Slide inspired by Frank Robben
  • 17. Re-using Architecture Be-Health Social sector Non social FPS USER USER (CBSS) USER (FedICT) APPLICATIONS APPLICATIONS APPLICATIONS Authen - Authorization Authen - Authorization Authen - Authorization tication PEP WebApp tication PEP WebApp tication PEP WebApp Role Role Role Mapper XYZ Mapper XYZ Mapper XYZ Role Role Role Mapper Mapper Mapper DB DB DB PDP Role PDP Role PDP Role PAP PAP PAP Role Provider Role Provider ‘’Kephas’’ Role Provider ‘’Kephas’’ Provider DB ‘’Kephas’’ Provider DB Provider DB PIP PIP PIP PIP PIP PIP PIP PIP PIP Attribute Attribute Attribute Attribute Attribute Attribute Attribute Attribute Attribute Provider Provider Provider Provider Provider Provider Provider Provider Provider Management Management DB DB DB Management DB DB DB DB RIZIV UMAF Bailiffs XYZ XYZ Mandates XYZ VAS Mandates XYZ VAS VAS Slide inspired by Frank Robben
  • 18. Conclusion • eGovernment Services are accessible – Via open standards – With strong authentication & access management • Federated system permits use of common basic services securely – Without losing any autonomy! • System allows permanent evolution – Continuously changing user & organization requirements
  • 19. Food for Thought • Trust is Good – Control is Better!
  • 20. Th@nk you! Danny De Cock Researcher Applied Cryptography Danny.DeCock@esat.kuleuven.be Slides: www.godot.be/slides © fedict 2011. All rights reserved
  • 21. eID Card Issuing Procedure Card Personalizer (CP) Card Initializer (CI) (5) (4) (6) (10a”) (8) National Certification Register (RRN) (9) Authority (CA) (10a’) (3) (7) Municipality (2) (0) (10b) Citizen PIN & PUK (11) Face to face identification (1) Citizen (12) (13)
  • 22. eID Certificates Hierarchy 2048-bit RSA 2048-bit RSA 1024-bit RSA Card Administration: Certificates for update address, key Government web servers, pair generation, store signing citizen files, public certificates,… information,…
  • 23. Abstract eGovernment Ecosystem A F C Context 1 E D H G B Introducting Belgian eID Cards & eGovernment Slide 24 16 January 2012 Context 2 Context 3