+ All Categories
Home > Documents > Enhancing Trust by Enhancing the Audit Process - CSRC · Enhancing Trust by Enhancing the Audit...

Enhancing Trust by Enhancing the Audit Process - CSRC · Enhancing Trust by Enhancing the Audit...

Date post: 12-Apr-2018
Category:
Upload: trinhhanh
View: 215 times
Download: 1 times
Share this document with a friend
14
Enhancing Trust by Enhancing the Audit Process Jens Bender Federal Office for Information Security NIST CA-WS / 11.04.2013
Transcript

Enhancing Trust byEnhancing the Audit Process

Jens Bender

Federal Office for Information Security

NIST CA-WS 11042013

The BSI ndashFederal Office for Information Security

Founded in 1991 ~ 550 Employees IT security provider for the federal

government Support of the federal states Close cooperation with industry

citizens and research community

Jens Bender 11042013 Slide 2

BSI und PKI

BSI is architect operator and user of PKIs BSI operates

Root CAs for travel documents (passport ID-card ) Root CA for governmental PKI (V-PKI) Several other PKIs

Responsibilty for requirements for SubCAs of those PKIs Other PKIs used for governmental purposes

Incident Response CERT-BundBuumlrger-CERT

Jens Bender 11042013 Slide 3

What is PKI

PKI = Certification of identitiesattributes PKI enables third parties to verify identitiesattributes PKI does not assign identitiesattributes

PKI is Trust All parties (have to) trust the root The root delegates Trust to SubCAs PKI only works if the Trust is justified

Therefore Loss of Trust is disastrous

CAs need not only to be securethird parties must be convinced that the CA is secure

rarr Trustworthiness and Trust larrJens Bender 11042013 Slide 4

Solution

bdquoNotariesldquo are queried if a certificate is genuine Initial identification of sites by notaries Are the notaries trustworthy

Browser checks if the certificate is the same as before Initial trust in a certificate Cert roll-over several certs for a domain

DANE Certificates stored in the DNS secured via DNSSEC Is my registryregistrarzone-signer trustworthy

hellip and more

Help to detectmitigate compromisesbut do not solve the basic problem of trust

bdquoCAs are untrusted therefore I have to trust othersldquo

Jens Bender 11042013 Slide 5

Solution

Only way out

Trust in all CAs (not only SSL) must be enhancedrebuild

Transparent security requirements on CAs Better Security leads to higher trustworthiness

High quality audit as high level assurance Feedback loop of audit enhances security

Trustworthiness + Assurance rarr Trust Security + marketing

Jens Bender 11042013 Slide 6

Requirements and Audit

Existing requirementaudit-regimes CAB-Forum Webtrust ETSI hellip Special requirements eg national requirements for qualified

signature or governmental CAs

rarr Sector specific focussed on management processes only focussed on technical requirements only mixing security and non-security requirements

The Plan Build a framework consisting of (As far as possible) application-independent CA requirements Focussing on security Clear requirements what is to be audited in the audit Accreditation of auditors and Certification of CAs

Jens Bender 11042013 Slide 7

IT Security Standards

ISO 2700x Security concepts for IT systems Methodology not specific requirements

Baseline Protection Specific requirements on normal security level

Common Criteria Formal security assurance process for componentsdevices

Needed System security on high security levelwith formal process to enhance assurance and

compatibility

Jens Bender 11042013 Slide 8

Therefore

Formal structure inspired by Common Criteria Security Objectives + Threads rarr Requirements Mapping of requirements on Security Objectives (bdquorationaleldquo) Formal language to avoid ambiguities

View on the whole system following ISO 2700x Criteria on suitability of requirements

Security Objective is actually reached The requirement is necessary to reach objective Technical and commercal feasibility

Compatible (if possible) to existing frameworks

Jens Bender 11042013 Slide 9

Structure

rarr What is thetask of the CA

rarr What are the processes required to fulfill the task

rarr Technical requirements necessary to have secure processes

Jens Bender 11042013 Slide 10

Example

Process Creation and availability of root certificate

Depends on Security Objective Secure handling and storage of key material

Includes Requirement SecMgmtReq2 The CA private key shall be generated stored

and used in a security device following the standards [selection FIPS PUB 140-2 ISOIEC 15408 other] with security level [assignment level of security product] or higher ensuring the claimed security features

Auditors task Check CA key is generated and stored in a device hellip Check Requirements from the Guidance Document are fullfilled If other is selected check rationale for claimed equivalence

Jens Bender 11042013 Slide 11

Generic and Specific

Generic CA Requirements

QES

bdquo80ldquo application independent + bdquo20ldquo application specificrarr Simplification for CAs by enabling bdquoBase Auditldquo

SSL BerCA V-PKI

Jens Bender 11042013 Slide 12

Last Words

Requirements on CAs and on audit Systematic rarr Verifiably complete coverage of all processes Generic base requirements rarr Simpler for multi-CA trust center Clear audit criteria rarr Comparability reliability assurance Certification rarr Criterion for subscribers relying parties

Current Status Drafting of requirements underway Commenting by industry to be started soon Audit requirements to be done

Jens Bender 11042013 Slide 13

Contact

Bundesamt fuumlr Sicherheit in der Informationstechnik (BSI)

Jens Bender Godesberger Allee 185-189 53175 Bonn

Tel +49 (0)228-9582-5051 Fax +49 (0)228-99-10-9582-5051

jensbenderbsibundde wwwbsibundde wwwbsi-fuer-buergerde

  • Titel des Vortrages (Arial 36)
  • Folie 2
  • Folie 3
  • Folie 4
  • Folie 5
  • Folie 6
  • Folie 7
  • Folie 8
  • Folie 9
  • Folie 10
  • Folie 11
  • Folie 12
  • Folie 13
  • Kontakt

The BSI ndashFederal Office for Information Security

Founded in 1991 ~ 550 Employees IT security provider for the federal

government Support of the federal states Close cooperation with industry

citizens and research community

Jens Bender 11042013 Slide 2

BSI und PKI

BSI is architect operator and user of PKIs BSI operates

Root CAs for travel documents (passport ID-card ) Root CA for governmental PKI (V-PKI) Several other PKIs

Responsibilty for requirements for SubCAs of those PKIs Other PKIs used for governmental purposes

Incident Response CERT-BundBuumlrger-CERT

Jens Bender 11042013 Slide 3

What is PKI

PKI = Certification of identitiesattributes PKI enables third parties to verify identitiesattributes PKI does not assign identitiesattributes

PKI is Trust All parties (have to) trust the root The root delegates Trust to SubCAs PKI only works if the Trust is justified

Therefore Loss of Trust is disastrous

CAs need not only to be securethird parties must be convinced that the CA is secure

rarr Trustworthiness and Trust larrJens Bender 11042013 Slide 4

Solution

bdquoNotariesldquo are queried if a certificate is genuine Initial identification of sites by notaries Are the notaries trustworthy

Browser checks if the certificate is the same as before Initial trust in a certificate Cert roll-over several certs for a domain

DANE Certificates stored in the DNS secured via DNSSEC Is my registryregistrarzone-signer trustworthy

hellip and more

Help to detectmitigate compromisesbut do not solve the basic problem of trust

bdquoCAs are untrusted therefore I have to trust othersldquo

Jens Bender 11042013 Slide 5

Solution

Only way out

Trust in all CAs (not only SSL) must be enhancedrebuild

Transparent security requirements on CAs Better Security leads to higher trustworthiness

High quality audit as high level assurance Feedback loop of audit enhances security

Trustworthiness + Assurance rarr Trust Security + marketing

Jens Bender 11042013 Slide 6

Requirements and Audit

Existing requirementaudit-regimes CAB-Forum Webtrust ETSI hellip Special requirements eg national requirements for qualified

signature or governmental CAs

rarr Sector specific focussed on management processes only focussed on technical requirements only mixing security and non-security requirements

The Plan Build a framework consisting of (As far as possible) application-independent CA requirements Focussing on security Clear requirements what is to be audited in the audit Accreditation of auditors and Certification of CAs

Jens Bender 11042013 Slide 7

IT Security Standards

ISO 2700x Security concepts for IT systems Methodology not specific requirements

Baseline Protection Specific requirements on normal security level

Common Criteria Formal security assurance process for componentsdevices

Needed System security on high security levelwith formal process to enhance assurance and

compatibility

Jens Bender 11042013 Slide 8

Therefore

Formal structure inspired by Common Criteria Security Objectives + Threads rarr Requirements Mapping of requirements on Security Objectives (bdquorationaleldquo) Formal language to avoid ambiguities

View on the whole system following ISO 2700x Criteria on suitability of requirements

Security Objective is actually reached The requirement is necessary to reach objective Technical and commercal feasibility

Compatible (if possible) to existing frameworks

Jens Bender 11042013 Slide 9

Structure

rarr What is thetask of the CA

rarr What are the processes required to fulfill the task

rarr Technical requirements necessary to have secure processes

Jens Bender 11042013 Slide 10

Example

Process Creation and availability of root certificate

Depends on Security Objective Secure handling and storage of key material

Includes Requirement SecMgmtReq2 The CA private key shall be generated stored

and used in a security device following the standards [selection FIPS PUB 140-2 ISOIEC 15408 other] with security level [assignment level of security product] or higher ensuring the claimed security features

Auditors task Check CA key is generated and stored in a device hellip Check Requirements from the Guidance Document are fullfilled If other is selected check rationale for claimed equivalence

Jens Bender 11042013 Slide 11

Generic and Specific

Generic CA Requirements

QES

bdquo80ldquo application independent + bdquo20ldquo application specificrarr Simplification for CAs by enabling bdquoBase Auditldquo

SSL BerCA V-PKI

Jens Bender 11042013 Slide 12

Last Words

Requirements on CAs and on audit Systematic rarr Verifiably complete coverage of all processes Generic base requirements rarr Simpler for multi-CA trust center Clear audit criteria rarr Comparability reliability assurance Certification rarr Criterion for subscribers relying parties

Current Status Drafting of requirements underway Commenting by industry to be started soon Audit requirements to be done

Jens Bender 11042013 Slide 13

Contact

Bundesamt fuumlr Sicherheit in der Informationstechnik (BSI)

Jens Bender Godesberger Allee 185-189 53175 Bonn

Tel +49 (0)228-9582-5051 Fax +49 (0)228-99-10-9582-5051

jensbenderbsibundde wwwbsibundde wwwbsi-fuer-buergerde

  • Titel des Vortrages (Arial 36)
  • Folie 2
  • Folie 3
  • Folie 4
  • Folie 5
  • Folie 6
  • Folie 7
  • Folie 8
  • Folie 9
  • Folie 10
  • Folie 11
  • Folie 12
  • Folie 13
  • Kontakt

BSI und PKI

BSI is architect operator and user of PKIs BSI operates

Root CAs for travel documents (passport ID-card ) Root CA for governmental PKI (V-PKI) Several other PKIs

Responsibilty for requirements for SubCAs of those PKIs Other PKIs used for governmental purposes

Incident Response CERT-BundBuumlrger-CERT

Jens Bender 11042013 Slide 3

What is PKI

PKI = Certification of identitiesattributes PKI enables third parties to verify identitiesattributes PKI does not assign identitiesattributes

PKI is Trust All parties (have to) trust the root The root delegates Trust to SubCAs PKI only works if the Trust is justified

Therefore Loss of Trust is disastrous

CAs need not only to be securethird parties must be convinced that the CA is secure

rarr Trustworthiness and Trust larrJens Bender 11042013 Slide 4

Solution

bdquoNotariesldquo are queried if a certificate is genuine Initial identification of sites by notaries Are the notaries trustworthy

Browser checks if the certificate is the same as before Initial trust in a certificate Cert roll-over several certs for a domain

DANE Certificates stored in the DNS secured via DNSSEC Is my registryregistrarzone-signer trustworthy

hellip and more

Help to detectmitigate compromisesbut do not solve the basic problem of trust

bdquoCAs are untrusted therefore I have to trust othersldquo

Jens Bender 11042013 Slide 5

Solution

Only way out

Trust in all CAs (not only SSL) must be enhancedrebuild

Transparent security requirements on CAs Better Security leads to higher trustworthiness

High quality audit as high level assurance Feedback loop of audit enhances security

Trustworthiness + Assurance rarr Trust Security + marketing

Jens Bender 11042013 Slide 6

Requirements and Audit

Existing requirementaudit-regimes CAB-Forum Webtrust ETSI hellip Special requirements eg national requirements for qualified

signature or governmental CAs

rarr Sector specific focussed on management processes only focussed on technical requirements only mixing security and non-security requirements

The Plan Build a framework consisting of (As far as possible) application-independent CA requirements Focussing on security Clear requirements what is to be audited in the audit Accreditation of auditors and Certification of CAs

Jens Bender 11042013 Slide 7

IT Security Standards

ISO 2700x Security concepts for IT systems Methodology not specific requirements

Baseline Protection Specific requirements on normal security level

Common Criteria Formal security assurance process for componentsdevices

Needed System security on high security levelwith formal process to enhance assurance and

compatibility

Jens Bender 11042013 Slide 8

Therefore

Formal structure inspired by Common Criteria Security Objectives + Threads rarr Requirements Mapping of requirements on Security Objectives (bdquorationaleldquo) Formal language to avoid ambiguities

View on the whole system following ISO 2700x Criteria on suitability of requirements

Security Objective is actually reached The requirement is necessary to reach objective Technical and commercal feasibility

Compatible (if possible) to existing frameworks

Jens Bender 11042013 Slide 9

Structure

rarr What is thetask of the CA

rarr What are the processes required to fulfill the task

rarr Technical requirements necessary to have secure processes

Jens Bender 11042013 Slide 10

Example

Process Creation and availability of root certificate

Depends on Security Objective Secure handling and storage of key material

Includes Requirement SecMgmtReq2 The CA private key shall be generated stored

and used in a security device following the standards [selection FIPS PUB 140-2 ISOIEC 15408 other] with security level [assignment level of security product] or higher ensuring the claimed security features

Auditors task Check CA key is generated and stored in a device hellip Check Requirements from the Guidance Document are fullfilled If other is selected check rationale for claimed equivalence

Jens Bender 11042013 Slide 11

Generic and Specific

Generic CA Requirements

QES

bdquo80ldquo application independent + bdquo20ldquo application specificrarr Simplification for CAs by enabling bdquoBase Auditldquo

SSL BerCA V-PKI

Jens Bender 11042013 Slide 12

Last Words

Requirements on CAs and on audit Systematic rarr Verifiably complete coverage of all processes Generic base requirements rarr Simpler for multi-CA trust center Clear audit criteria rarr Comparability reliability assurance Certification rarr Criterion for subscribers relying parties

Current Status Drafting of requirements underway Commenting by industry to be started soon Audit requirements to be done

Jens Bender 11042013 Slide 13

Contact

Bundesamt fuumlr Sicherheit in der Informationstechnik (BSI)

Jens Bender Godesberger Allee 185-189 53175 Bonn

Tel +49 (0)228-9582-5051 Fax +49 (0)228-99-10-9582-5051

jensbenderbsibundde wwwbsibundde wwwbsi-fuer-buergerde

  • Titel des Vortrages (Arial 36)
  • Folie 2
  • Folie 3
  • Folie 4
  • Folie 5
  • Folie 6
  • Folie 7
  • Folie 8
  • Folie 9
  • Folie 10
  • Folie 11
  • Folie 12
  • Folie 13
  • Kontakt

What is PKI

PKI = Certification of identitiesattributes PKI enables third parties to verify identitiesattributes PKI does not assign identitiesattributes

PKI is Trust All parties (have to) trust the root The root delegates Trust to SubCAs PKI only works if the Trust is justified

Therefore Loss of Trust is disastrous

CAs need not only to be securethird parties must be convinced that the CA is secure

rarr Trustworthiness and Trust larrJens Bender 11042013 Slide 4

Solution

bdquoNotariesldquo are queried if a certificate is genuine Initial identification of sites by notaries Are the notaries trustworthy

Browser checks if the certificate is the same as before Initial trust in a certificate Cert roll-over several certs for a domain

DANE Certificates stored in the DNS secured via DNSSEC Is my registryregistrarzone-signer trustworthy

hellip and more

Help to detectmitigate compromisesbut do not solve the basic problem of trust

bdquoCAs are untrusted therefore I have to trust othersldquo

Jens Bender 11042013 Slide 5

Solution

Only way out

Trust in all CAs (not only SSL) must be enhancedrebuild

Transparent security requirements on CAs Better Security leads to higher trustworthiness

High quality audit as high level assurance Feedback loop of audit enhances security

Trustworthiness + Assurance rarr Trust Security + marketing

Jens Bender 11042013 Slide 6

Requirements and Audit

Existing requirementaudit-regimes CAB-Forum Webtrust ETSI hellip Special requirements eg national requirements for qualified

signature or governmental CAs

rarr Sector specific focussed on management processes only focussed on technical requirements only mixing security and non-security requirements

The Plan Build a framework consisting of (As far as possible) application-independent CA requirements Focussing on security Clear requirements what is to be audited in the audit Accreditation of auditors and Certification of CAs

Jens Bender 11042013 Slide 7

IT Security Standards

ISO 2700x Security concepts for IT systems Methodology not specific requirements

Baseline Protection Specific requirements on normal security level

Common Criteria Formal security assurance process for componentsdevices

Needed System security on high security levelwith formal process to enhance assurance and

compatibility

Jens Bender 11042013 Slide 8

Therefore

Formal structure inspired by Common Criteria Security Objectives + Threads rarr Requirements Mapping of requirements on Security Objectives (bdquorationaleldquo) Formal language to avoid ambiguities

View on the whole system following ISO 2700x Criteria on suitability of requirements

Security Objective is actually reached The requirement is necessary to reach objective Technical and commercal feasibility

Compatible (if possible) to existing frameworks

Jens Bender 11042013 Slide 9

Structure

rarr What is thetask of the CA

rarr What are the processes required to fulfill the task

rarr Technical requirements necessary to have secure processes

Jens Bender 11042013 Slide 10

Example

Process Creation and availability of root certificate

Depends on Security Objective Secure handling and storage of key material

Includes Requirement SecMgmtReq2 The CA private key shall be generated stored

and used in a security device following the standards [selection FIPS PUB 140-2 ISOIEC 15408 other] with security level [assignment level of security product] or higher ensuring the claimed security features

Auditors task Check CA key is generated and stored in a device hellip Check Requirements from the Guidance Document are fullfilled If other is selected check rationale for claimed equivalence

Jens Bender 11042013 Slide 11

Generic and Specific

Generic CA Requirements

QES

bdquo80ldquo application independent + bdquo20ldquo application specificrarr Simplification for CAs by enabling bdquoBase Auditldquo

SSL BerCA V-PKI

Jens Bender 11042013 Slide 12

Last Words

Requirements on CAs and on audit Systematic rarr Verifiably complete coverage of all processes Generic base requirements rarr Simpler for multi-CA trust center Clear audit criteria rarr Comparability reliability assurance Certification rarr Criterion for subscribers relying parties

Current Status Drafting of requirements underway Commenting by industry to be started soon Audit requirements to be done

Jens Bender 11042013 Slide 13

Contact

Bundesamt fuumlr Sicherheit in der Informationstechnik (BSI)

Jens Bender Godesberger Allee 185-189 53175 Bonn

Tel +49 (0)228-9582-5051 Fax +49 (0)228-99-10-9582-5051

jensbenderbsibundde wwwbsibundde wwwbsi-fuer-buergerde

  • Titel des Vortrages (Arial 36)
  • Folie 2
  • Folie 3
  • Folie 4
  • Folie 5
  • Folie 6
  • Folie 7
  • Folie 8
  • Folie 9
  • Folie 10
  • Folie 11
  • Folie 12
  • Folie 13
  • Kontakt

Solution

bdquoNotariesldquo are queried if a certificate is genuine Initial identification of sites by notaries Are the notaries trustworthy

Browser checks if the certificate is the same as before Initial trust in a certificate Cert roll-over several certs for a domain

DANE Certificates stored in the DNS secured via DNSSEC Is my registryregistrarzone-signer trustworthy

hellip and more

Help to detectmitigate compromisesbut do not solve the basic problem of trust

bdquoCAs are untrusted therefore I have to trust othersldquo

Jens Bender 11042013 Slide 5

Solution

Only way out

Trust in all CAs (not only SSL) must be enhancedrebuild

Transparent security requirements on CAs Better Security leads to higher trustworthiness

High quality audit as high level assurance Feedback loop of audit enhances security

Trustworthiness + Assurance rarr Trust Security + marketing

Jens Bender 11042013 Slide 6

Requirements and Audit

Existing requirementaudit-regimes CAB-Forum Webtrust ETSI hellip Special requirements eg national requirements for qualified

signature or governmental CAs

rarr Sector specific focussed on management processes only focussed on technical requirements only mixing security and non-security requirements

The Plan Build a framework consisting of (As far as possible) application-independent CA requirements Focussing on security Clear requirements what is to be audited in the audit Accreditation of auditors and Certification of CAs

Jens Bender 11042013 Slide 7

IT Security Standards

ISO 2700x Security concepts for IT systems Methodology not specific requirements

Baseline Protection Specific requirements on normal security level

Common Criteria Formal security assurance process for componentsdevices

Needed System security on high security levelwith formal process to enhance assurance and

compatibility

Jens Bender 11042013 Slide 8

Therefore

Formal structure inspired by Common Criteria Security Objectives + Threads rarr Requirements Mapping of requirements on Security Objectives (bdquorationaleldquo) Formal language to avoid ambiguities

View on the whole system following ISO 2700x Criteria on suitability of requirements

Security Objective is actually reached The requirement is necessary to reach objective Technical and commercal feasibility

Compatible (if possible) to existing frameworks

Jens Bender 11042013 Slide 9

Structure

rarr What is thetask of the CA

rarr What are the processes required to fulfill the task

rarr Technical requirements necessary to have secure processes

Jens Bender 11042013 Slide 10

Example

Process Creation and availability of root certificate

Depends on Security Objective Secure handling and storage of key material

Includes Requirement SecMgmtReq2 The CA private key shall be generated stored

and used in a security device following the standards [selection FIPS PUB 140-2 ISOIEC 15408 other] with security level [assignment level of security product] or higher ensuring the claimed security features

Auditors task Check CA key is generated and stored in a device hellip Check Requirements from the Guidance Document are fullfilled If other is selected check rationale for claimed equivalence

Jens Bender 11042013 Slide 11

Generic and Specific

Generic CA Requirements

QES

bdquo80ldquo application independent + bdquo20ldquo application specificrarr Simplification for CAs by enabling bdquoBase Auditldquo

SSL BerCA V-PKI

Jens Bender 11042013 Slide 12

Last Words

Requirements on CAs and on audit Systematic rarr Verifiably complete coverage of all processes Generic base requirements rarr Simpler for multi-CA trust center Clear audit criteria rarr Comparability reliability assurance Certification rarr Criterion for subscribers relying parties

Current Status Drafting of requirements underway Commenting by industry to be started soon Audit requirements to be done

Jens Bender 11042013 Slide 13

Contact

Bundesamt fuumlr Sicherheit in der Informationstechnik (BSI)

Jens Bender Godesberger Allee 185-189 53175 Bonn

Tel +49 (0)228-9582-5051 Fax +49 (0)228-99-10-9582-5051

jensbenderbsibundde wwwbsibundde wwwbsi-fuer-buergerde

  • Titel des Vortrages (Arial 36)
  • Folie 2
  • Folie 3
  • Folie 4
  • Folie 5
  • Folie 6
  • Folie 7
  • Folie 8
  • Folie 9
  • Folie 10
  • Folie 11
  • Folie 12
  • Folie 13
  • Kontakt

Solution

Only way out

Trust in all CAs (not only SSL) must be enhancedrebuild

Transparent security requirements on CAs Better Security leads to higher trustworthiness

High quality audit as high level assurance Feedback loop of audit enhances security

Trustworthiness + Assurance rarr Trust Security + marketing

Jens Bender 11042013 Slide 6

Requirements and Audit

Existing requirementaudit-regimes CAB-Forum Webtrust ETSI hellip Special requirements eg national requirements for qualified

signature or governmental CAs

rarr Sector specific focussed on management processes only focussed on technical requirements only mixing security and non-security requirements

The Plan Build a framework consisting of (As far as possible) application-independent CA requirements Focussing on security Clear requirements what is to be audited in the audit Accreditation of auditors and Certification of CAs

Jens Bender 11042013 Slide 7

IT Security Standards

ISO 2700x Security concepts for IT systems Methodology not specific requirements

Baseline Protection Specific requirements on normal security level

Common Criteria Formal security assurance process for componentsdevices

Needed System security on high security levelwith formal process to enhance assurance and

compatibility

Jens Bender 11042013 Slide 8

Therefore

Formal structure inspired by Common Criteria Security Objectives + Threads rarr Requirements Mapping of requirements on Security Objectives (bdquorationaleldquo) Formal language to avoid ambiguities

View on the whole system following ISO 2700x Criteria on suitability of requirements

Security Objective is actually reached The requirement is necessary to reach objective Technical and commercal feasibility

Compatible (if possible) to existing frameworks

Jens Bender 11042013 Slide 9

Structure

rarr What is thetask of the CA

rarr What are the processes required to fulfill the task

rarr Technical requirements necessary to have secure processes

Jens Bender 11042013 Slide 10

Example

Process Creation and availability of root certificate

Depends on Security Objective Secure handling and storage of key material

Includes Requirement SecMgmtReq2 The CA private key shall be generated stored

and used in a security device following the standards [selection FIPS PUB 140-2 ISOIEC 15408 other] with security level [assignment level of security product] or higher ensuring the claimed security features

Auditors task Check CA key is generated and stored in a device hellip Check Requirements from the Guidance Document are fullfilled If other is selected check rationale for claimed equivalence

Jens Bender 11042013 Slide 11

Generic and Specific

Generic CA Requirements

QES

bdquo80ldquo application independent + bdquo20ldquo application specificrarr Simplification for CAs by enabling bdquoBase Auditldquo

SSL BerCA V-PKI

Jens Bender 11042013 Slide 12

Last Words

Requirements on CAs and on audit Systematic rarr Verifiably complete coverage of all processes Generic base requirements rarr Simpler for multi-CA trust center Clear audit criteria rarr Comparability reliability assurance Certification rarr Criterion for subscribers relying parties

Current Status Drafting of requirements underway Commenting by industry to be started soon Audit requirements to be done

Jens Bender 11042013 Slide 13

Contact

Bundesamt fuumlr Sicherheit in der Informationstechnik (BSI)

Jens Bender Godesberger Allee 185-189 53175 Bonn

Tel +49 (0)228-9582-5051 Fax +49 (0)228-99-10-9582-5051

jensbenderbsibundde wwwbsibundde wwwbsi-fuer-buergerde

  • Titel des Vortrages (Arial 36)
  • Folie 2
  • Folie 3
  • Folie 4
  • Folie 5
  • Folie 6
  • Folie 7
  • Folie 8
  • Folie 9
  • Folie 10
  • Folie 11
  • Folie 12
  • Folie 13
  • Kontakt

Requirements and Audit

Existing requirementaudit-regimes CAB-Forum Webtrust ETSI hellip Special requirements eg national requirements for qualified

signature or governmental CAs

rarr Sector specific focussed on management processes only focussed on technical requirements only mixing security and non-security requirements

The Plan Build a framework consisting of (As far as possible) application-independent CA requirements Focussing on security Clear requirements what is to be audited in the audit Accreditation of auditors and Certification of CAs

Jens Bender 11042013 Slide 7

IT Security Standards

ISO 2700x Security concepts for IT systems Methodology not specific requirements

Baseline Protection Specific requirements on normal security level

Common Criteria Formal security assurance process for componentsdevices

Needed System security on high security levelwith formal process to enhance assurance and

compatibility

Jens Bender 11042013 Slide 8

Therefore

Formal structure inspired by Common Criteria Security Objectives + Threads rarr Requirements Mapping of requirements on Security Objectives (bdquorationaleldquo) Formal language to avoid ambiguities

View on the whole system following ISO 2700x Criteria on suitability of requirements

Security Objective is actually reached The requirement is necessary to reach objective Technical and commercal feasibility

Compatible (if possible) to existing frameworks

Jens Bender 11042013 Slide 9

Structure

rarr What is thetask of the CA

rarr What are the processes required to fulfill the task

rarr Technical requirements necessary to have secure processes

Jens Bender 11042013 Slide 10

Example

Process Creation and availability of root certificate

Depends on Security Objective Secure handling and storage of key material

Includes Requirement SecMgmtReq2 The CA private key shall be generated stored

and used in a security device following the standards [selection FIPS PUB 140-2 ISOIEC 15408 other] with security level [assignment level of security product] or higher ensuring the claimed security features

Auditors task Check CA key is generated and stored in a device hellip Check Requirements from the Guidance Document are fullfilled If other is selected check rationale for claimed equivalence

Jens Bender 11042013 Slide 11

Generic and Specific

Generic CA Requirements

QES

bdquo80ldquo application independent + bdquo20ldquo application specificrarr Simplification for CAs by enabling bdquoBase Auditldquo

SSL BerCA V-PKI

Jens Bender 11042013 Slide 12

Last Words

Requirements on CAs and on audit Systematic rarr Verifiably complete coverage of all processes Generic base requirements rarr Simpler for multi-CA trust center Clear audit criteria rarr Comparability reliability assurance Certification rarr Criterion for subscribers relying parties

Current Status Drafting of requirements underway Commenting by industry to be started soon Audit requirements to be done

Jens Bender 11042013 Slide 13

Contact

Bundesamt fuumlr Sicherheit in der Informationstechnik (BSI)

Jens Bender Godesberger Allee 185-189 53175 Bonn

Tel +49 (0)228-9582-5051 Fax +49 (0)228-99-10-9582-5051

jensbenderbsibundde wwwbsibundde wwwbsi-fuer-buergerde

  • Titel des Vortrages (Arial 36)
  • Folie 2
  • Folie 3
  • Folie 4
  • Folie 5
  • Folie 6
  • Folie 7
  • Folie 8
  • Folie 9
  • Folie 10
  • Folie 11
  • Folie 12
  • Folie 13
  • Kontakt

IT Security Standards

ISO 2700x Security concepts for IT systems Methodology not specific requirements

Baseline Protection Specific requirements on normal security level

Common Criteria Formal security assurance process for componentsdevices

Needed System security on high security levelwith formal process to enhance assurance and

compatibility

Jens Bender 11042013 Slide 8

Therefore

Formal structure inspired by Common Criteria Security Objectives + Threads rarr Requirements Mapping of requirements on Security Objectives (bdquorationaleldquo) Formal language to avoid ambiguities

View on the whole system following ISO 2700x Criteria on suitability of requirements

Security Objective is actually reached The requirement is necessary to reach objective Technical and commercal feasibility

Compatible (if possible) to existing frameworks

Jens Bender 11042013 Slide 9

Structure

rarr What is thetask of the CA

rarr What are the processes required to fulfill the task

rarr Technical requirements necessary to have secure processes

Jens Bender 11042013 Slide 10

Example

Process Creation and availability of root certificate

Depends on Security Objective Secure handling and storage of key material

Includes Requirement SecMgmtReq2 The CA private key shall be generated stored

and used in a security device following the standards [selection FIPS PUB 140-2 ISOIEC 15408 other] with security level [assignment level of security product] or higher ensuring the claimed security features

Auditors task Check CA key is generated and stored in a device hellip Check Requirements from the Guidance Document are fullfilled If other is selected check rationale for claimed equivalence

Jens Bender 11042013 Slide 11

Generic and Specific

Generic CA Requirements

QES

bdquo80ldquo application independent + bdquo20ldquo application specificrarr Simplification for CAs by enabling bdquoBase Auditldquo

SSL BerCA V-PKI

Jens Bender 11042013 Slide 12

Last Words

Requirements on CAs and on audit Systematic rarr Verifiably complete coverage of all processes Generic base requirements rarr Simpler for multi-CA trust center Clear audit criteria rarr Comparability reliability assurance Certification rarr Criterion for subscribers relying parties

Current Status Drafting of requirements underway Commenting by industry to be started soon Audit requirements to be done

Jens Bender 11042013 Slide 13

Contact

Bundesamt fuumlr Sicherheit in der Informationstechnik (BSI)

Jens Bender Godesberger Allee 185-189 53175 Bonn

Tel +49 (0)228-9582-5051 Fax +49 (0)228-99-10-9582-5051

jensbenderbsibundde wwwbsibundde wwwbsi-fuer-buergerde

  • Titel des Vortrages (Arial 36)
  • Folie 2
  • Folie 3
  • Folie 4
  • Folie 5
  • Folie 6
  • Folie 7
  • Folie 8
  • Folie 9
  • Folie 10
  • Folie 11
  • Folie 12
  • Folie 13
  • Kontakt

Therefore

Formal structure inspired by Common Criteria Security Objectives + Threads rarr Requirements Mapping of requirements on Security Objectives (bdquorationaleldquo) Formal language to avoid ambiguities

View on the whole system following ISO 2700x Criteria on suitability of requirements

Security Objective is actually reached The requirement is necessary to reach objective Technical and commercal feasibility

Compatible (if possible) to existing frameworks

Jens Bender 11042013 Slide 9

Structure

rarr What is thetask of the CA

rarr What are the processes required to fulfill the task

rarr Technical requirements necessary to have secure processes

Jens Bender 11042013 Slide 10

Example

Process Creation and availability of root certificate

Depends on Security Objective Secure handling and storage of key material

Includes Requirement SecMgmtReq2 The CA private key shall be generated stored

and used in a security device following the standards [selection FIPS PUB 140-2 ISOIEC 15408 other] with security level [assignment level of security product] or higher ensuring the claimed security features

Auditors task Check CA key is generated and stored in a device hellip Check Requirements from the Guidance Document are fullfilled If other is selected check rationale for claimed equivalence

Jens Bender 11042013 Slide 11

Generic and Specific

Generic CA Requirements

QES

bdquo80ldquo application independent + bdquo20ldquo application specificrarr Simplification for CAs by enabling bdquoBase Auditldquo

SSL BerCA V-PKI

Jens Bender 11042013 Slide 12

Last Words

Requirements on CAs and on audit Systematic rarr Verifiably complete coverage of all processes Generic base requirements rarr Simpler for multi-CA trust center Clear audit criteria rarr Comparability reliability assurance Certification rarr Criterion for subscribers relying parties

Current Status Drafting of requirements underway Commenting by industry to be started soon Audit requirements to be done

Jens Bender 11042013 Slide 13

Contact

Bundesamt fuumlr Sicherheit in der Informationstechnik (BSI)

Jens Bender Godesberger Allee 185-189 53175 Bonn

Tel +49 (0)228-9582-5051 Fax +49 (0)228-99-10-9582-5051

jensbenderbsibundde wwwbsibundde wwwbsi-fuer-buergerde

  • Titel des Vortrages (Arial 36)
  • Folie 2
  • Folie 3
  • Folie 4
  • Folie 5
  • Folie 6
  • Folie 7
  • Folie 8
  • Folie 9
  • Folie 10
  • Folie 11
  • Folie 12
  • Folie 13
  • Kontakt

Structure

rarr What is thetask of the CA

rarr What are the processes required to fulfill the task

rarr Technical requirements necessary to have secure processes

Jens Bender 11042013 Slide 10

Example

Process Creation and availability of root certificate

Depends on Security Objective Secure handling and storage of key material

Includes Requirement SecMgmtReq2 The CA private key shall be generated stored

and used in a security device following the standards [selection FIPS PUB 140-2 ISOIEC 15408 other] with security level [assignment level of security product] or higher ensuring the claimed security features

Auditors task Check CA key is generated and stored in a device hellip Check Requirements from the Guidance Document are fullfilled If other is selected check rationale for claimed equivalence

Jens Bender 11042013 Slide 11

Generic and Specific

Generic CA Requirements

QES

bdquo80ldquo application independent + bdquo20ldquo application specificrarr Simplification for CAs by enabling bdquoBase Auditldquo

SSL BerCA V-PKI

Jens Bender 11042013 Slide 12

Last Words

Requirements on CAs and on audit Systematic rarr Verifiably complete coverage of all processes Generic base requirements rarr Simpler for multi-CA trust center Clear audit criteria rarr Comparability reliability assurance Certification rarr Criterion for subscribers relying parties

Current Status Drafting of requirements underway Commenting by industry to be started soon Audit requirements to be done

Jens Bender 11042013 Slide 13

Contact

Bundesamt fuumlr Sicherheit in der Informationstechnik (BSI)

Jens Bender Godesberger Allee 185-189 53175 Bonn

Tel +49 (0)228-9582-5051 Fax +49 (0)228-99-10-9582-5051

jensbenderbsibundde wwwbsibundde wwwbsi-fuer-buergerde

  • Titel des Vortrages (Arial 36)
  • Folie 2
  • Folie 3
  • Folie 4
  • Folie 5
  • Folie 6
  • Folie 7
  • Folie 8
  • Folie 9
  • Folie 10
  • Folie 11
  • Folie 12
  • Folie 13
  • Kontakt

Example

Process Creation and availability of root certificate

Depends on Security Objective Secure handling and storage of key material

Includes Requirement SecMgmtReq2 The CA private key shall be generated stored

and used in a security device following the standards [selection FIPS PUB 140-2 ISOIEC 15408 other] with security level [assignment level of security product] or higher ensuring the claimed security features

Auditors task Check CA key is generated and stored in a device hellip Check Requirements from the Guidance Document are fullfilled If other is selected check rationale for claimed equivalence

Jens Bender 11042013 Slide 11

Generic and Specific

Generic CA Requirements

QES

bdquo80ldquo application independent + bdquo20ldquo application specificrarr Simplification for CAs by enabling bdquoBase Auditldquo

SSL BerCA V-PKI

Jens Bender 11042013 Slide 12

Last Words

Requirements on CAs and on audit Systematic rarr Verifiably complete coverage of all processes Generic base requirements rarr Simpler for multi-CA trust center Clear audit criteria rarr Comparability reliability assurance Certification rarr Criterion for subscribers relying parties

Current Status Drafting of requirements underway Commenting by industry to be started soon Audit requirements to be done

Jens Bender 11042013 Slide 13

Contact

Bundesamt fuumlr Sicherheit in der Informationstechnik (BSI)

Jens Bender Godesberger Allee 185-189 53175 Bonn

Tel +49 (0)228-9582-5051 Fax +49 (0)228-99-10-9582-5051

jensbenderbsibundde wwwbsibundde wwwbsi-fuer-buergerde

  • Titel des Vortrages (Arial 36)
  • Folie 2
  • Folie 3
  • Folie 4
  • Folie 5
  • Folie 6
  • Folie 7
  • Folie 8
  • Folie 9
  • Folie 10
  • Folie 11
  • Folie 12
  • Folie 13
  • Kontakt

Generic and Specific

Generic CA Requirements

QES

bdquo80ldquo application independent + bdquo20ldquo application specificrarr Simplification for CAs by enabling bdquoBase Auditldquo

SSL BerCA V-PKI

Jens Bender 11042013 Slide 12

Last Words

Requirements on CAs and on audit Systematic rarr Verifiably complete coverage of all processes Generic base requirements rarr Simpler for multi-CA trust center Clear audit criteria rarr Comparability reliability assurance Certification rarr Criterion for subscribers relying parties

Current Status Drafting of requirements underway Commenting by industry to be started soon Audit requirements to be done

Jens Bender 11042013 Slide 13

Contact

Bundesamt fuumlr Sicherheit in der Informationstechnik (BSI)

Jens Bender Godesberger Allee 185-189 53175 Bonn

Tel +49 (0)228-9582-5051 Fax +49 (0)228-99-10-9582-5051

jensbenderbsibundde wwwbsibundde wwwbsi-fuer-buergerde

  • Titel des Vortrages (Arial 36)
  • Folie 2
  • Folie 3
  • Folie 4
  • Folie 5
  • Folie 6
  • Folie 7
  • Folie 8
  • Folie 9
  • Folie 10
  • Folie 11
  • Folie 12
  • Folie 13
  • Kontakt

Last Words

Requirements on CAs and on audit Systematic rarr Verifiably complete coverage of all processes Generic base requirements rarr Simpler for multi-CA trust center Clear audit criteria rarr Comparability reliability assurance Certification rarr Criterion for subscribers relying parties

Current Status Drafting of requirements underway Commenting by industry to be started soon Audit requirements to be done

Jens Bender 11042013 Slide 13

Contact

Bundesamt fuumlr Sicherheit in der Informationstechnik (BSI)

Jens Bender Godesberger Allee 185-189 53175 Bonn

Tel +49 (0)228-9582-5051 Fax +49 (0)228-99-10-9582-5051

jensbenderbsibundde wwwbsibundde wwwbsi-fuer-buergerde

  • Titel des Vortrages (Arial 36)
  • Folie 2
  • Folie 3
  • Folie 4
  • Folie 5
  • Folie 6
  • Folie 7
  • Folie 8
  • Folie 9
  • Folie 10
  • Folie 11
  • Folie 12
  • Folie 13
  • Kontakt

Contact

Bundesamt fuumlr Sicherheit in der Informationstechnik (BSI)

Jens Bender Godesberger Allee 185-189 53175 Bonn

Tel +49 (0)228-9582-5051 Fax +49 (0)228-99-10-9582-5051

jensbenderbsibundde wwwbsibundde wwwbsi-fuer-buergerde

  • Titel des Vortrages (Arial 36)
  • Folie 2
  • Folie 3
  • Folie 4
  • Folie 5
  • Folie 6
  • Folie 7
  • Folie 8
  • Folie 9
  • Folie 10
  • Folie 11
  • Folie 12
  • Folie 13
  • Kontakt

Recommended