21
© 2014 PKI Solutions MARK B. COOPER PRESIDENT [email protected] WWW.PKISOLUTIONS.COM Managing and Assessing Risks in a PKI

Managing and Assessing Risks in a PKI€¦ · Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute,

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Managing and Assessing Risks in a PKI€¦ · Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute,

© 2014 PKI Solutions

MARK B. COOPER

PRESIDENT

[email protected]

WWW.PKISOLUTIONS.COM

Managing and

Assessing Risks in a

PKI

Page 2: Managing and Assessing Risks in a PKI€¦ · Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute,

© 2014 PKI Solutions

Overview of PKI

PKI Authentication Solutions

Risks Introduced by a PKI

Logical

Physical

Operational

Overview

Page 3: Managing and Assessing Risks in a PKI€¦ · Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute,

© 2014 PKI Solutions

What is PKI?

Public Key Infrastructure (PKI) is a set of hardware, software, people,

policies, and procedures needed to create, manage, distribute, use, store,

and revoke digital certificates.

Page 4: Managing and Assessing Risks in a PKI€¦ · Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute,

© 2014 PKI Solutions

A digital certificate:

• Represents the identity of a user, computer, or program

• Contains information about the issuer and the subject

• Signed by a CA which vouches for the Identity of user/device/program

Digital Certificates

Page 5: Managing and Assessing Risks in a PKI€¦ · Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute,

© 2014 PKI Solutions

A certification authority:• Certifies the identity of a certificate requestor

• The mode of identification depends on the type of CA, security policy and request handling requirements

• Issues certificates

• The certificate template or requested certificate determines the information in the certificate

• Manages certificate revocation

• The CRL ensures that invalid certificates are not used

• Extensible

• Can install Policy and Exit modules to add workflow to certificate management

Certification Authority

Page 6: Managing and Assessing Risks in a PKI€¦ · Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute,

© 2014 PKI Solutions

Three Tier Two Tier

CA Hierarchy Tiers

Root CA

Policy CA

Issuing CA

Root CA

Policy/

Issuing CA

Page 7: Managing and Assessing Risks in a PKI€¦ · Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute,

© 2014 PKI Solutions

Root Issuing CA

Single Tier

CA Hierarchy Tiers

Page 8: Managing and Assessing Risks in a PKI€¦ · Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute,

© 2014 PKI Solutions

PKI Authentication Solutions

Page 9: Managing and Assessing Risks in a PKI€¦ · Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute,

© 2014 PKI Solutions

User and Computer Identities

Wireless Authentication – 802.11x

VPN

User Authentication/Encryption

Secure Email

Microsoft Rights Management Server

Logon Authentication / Smart Cards

Common PKI Solutions

Page 10: Managing and Assessing Risks in a PKI€¦ · Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute,

© 2014 PKI Solutions

Based on User Knowledge Only

Authentication Name & Passphrase

No Controls on this knowledge

Easy to Share, Relatively Easy to Find

No Non-Repudiation

MITM, Pass-The-Hash, etc…

User Authentication

Page 11: Managing and Assessing Risks in a PKI€¦ · Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute,

© 2014 PKI Solutions

Two-Factory Authentication

Have – Certificate

Know – Passphrase

Single Instance/Location

Non-Repudiation Available

Protected against MITM, Pass-the-Hash, etc.

User Authentication – PKI Style

Page 12: Managing and Assessing Risks in a PKI€¦ · Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute,

© 2014 PKI Solutions

More Secure than Username/Password

Provides Two-Factor

Dual Authentication

Strong Key Protection

Difficult to Install

PKI Perception

Page 13: Managing and Assessing Risks in a PKI€¦ · Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute,

© 2014 PKI Solutions

Risks Introduced by a PKI

Page 14: Managing and Assessing Risks in a PKI€¦ · Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute,

© 2014 PKI Solutions

Difficult to Detect Fraudulent

Certificate

Impersonation

Harder to Mitigate than Passwords

Encryption Snooping

SSL

Files

Email

Compromises

Page 15: Managing and Assessing Risks in a PKI€¦ · Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute,

© 2014 PKI Solutions

Certificate is Valid unless Revoked

No Issuance Verification

Trust is at CA level and Implicitly

includes all children

Attacks are just as likely from

internal as external forces

Positive Control is Required at All

Times

PKI Risks

Page 16: Managing and Assessing Risks in a PKI€¦ · Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute,

© 2014 PKI Solutions

Follow the Keys

Protection Cradle to Grave

2+ Administrators at All Times

Protect Against Denial Of Service

General Controls

Page 17: Managing and Assessing Risks in a PKI€¦ · Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute,

© 2014 PKI Solutions

CA’s Signing Key is Most Critical

Component

Soft Key vs Hard Key

Hardware Security Modules

Harden for Local AND Network

Attacks

CD-ROMs

USB

Logical Control

Page 18: Managing and Assessing Risks in a PKI€¦ · Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute,

© 2014 PKI Solutions

Physical Isolation of CAs

All Required Elements Secured

Denial of Service & Compromise

Two-Man Locks – Silo Style

Protection of Offline Material

Safes/Tamper-Proof Bags

Remote Access Bypasses

Enforce Existing Physical Controls

Physical Control

Page 19: Managing and Assessing Risks in a PKI€¦ · Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute,

© 2014 PKI Solutions

Key Management Quorums

All Personnel need expertise

Audit Logs

MUST ACTUALLY AUDIT

Separation of Duties – Common Criteria

Operational Control

Page 20: Managing and Assessing Risks in a PKI€¦ · Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute,

© 2014 PKI Solutions

Key Management & Protection

Operational & Security Controls

Collusion

Determine Your Organizational Threats

Mitigate

Audit & Assess on Regular Basis

Summary

Page 21: Managing and Assessing Risks in a PKI€¦ · Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute,

© 2014 PKI Solutions

Questions?