When exiting the first wave of Covid-19 it is crucial to leverage the options we have to digitalize what we can. This is really a case that makes huge sense in the normal sense and really, really should be executed on immediately.
On Starlink, presented by Geoff Huston at NZNOG 2024
Ā
Short term possabilities for eKYC improvments
1. Leveraging eIDAS for
eKYC Purposes
Practical considerations
in time of crisis
Meeting 5/5-2020
ā¢ Ronny Khan
ā¢ rkh@dnb.no
ā¢ Stephane Mouy
ā¢ sgmouy@stephanemouy.com
2. Agenda
ā¢ Introduction
ā¢ Rationale for eIDAS Trust Services.
ā¢ Other steps to be taken.
ā¢ Suggested first steps.
ā¢ Discussion.
ā¢ Next steps.
Ronny Khan & Stephane Mouy 2
3. Introduction
ā¢ This is a continuation of the EU eID/KYC expert group.
ā¢ We are a few former members that just donāt know
when to stop.
ā¢ We are not in a position to ever make any money
out of this.
ā¢ Neither will our employer.
ā¢ So we are not doing pre-sales or anything of the
sort. We only have knowledge and a desire to see
improvements.
ā¢ There is a lot that needs to be done.
ā¢ We are focusing here on one low hanging fruit and will
suggest intermediate steps.
ā¢ Next suggestion would be to fix remote
identification for onboarding.
Ronny Khan & Stephane Mouy 3
4. The eID/KYC
expert group
is goneā¦
ā¦ but KYC
problems
remain
ā¢ There are severe impediments on having a real
single market for financial services with cross border
competition.
ā¢ 'Competitiveness and regulatory sovereignty in
relation to technology finance requires a more
harmonised framework' (ROFIEG Report 2019-12)
ā¢ 'Where to start' is important
ā¢ Directly aiming for a āGrand eKYC bargainā
appears unrealistic in the current environment
ā¢ Doing nothing means leaving the initiative to
GAFAs and other actors ā loss of EU sovereignty
ā¢ Proposed approach ā practical and pragmatic steps
are preferred
ā¢ Overall philosophy : āleverage existing eIDAS
solutions to strenghten eKYC processesā
Ronny Khan & Stephane Mouy 4
5. In these
extraordinary
circumstances '
out of the box'
thinking is
needed and
'recycling' bring
s value
ā¢ A second wave of COVID-19 is likely ā putting additional
strain on already battered EU economies
ā¢ On the (more) positive side, the pandemic is forcing a
rethink of how digital tools can facilitate business
interactions, including for KYC matters
ā¢ In this hugely difficult context, innovations must be
frugal and make the best use of what already exists
ā¢ No 'grand scheme' requiring complex deployments
please, rather focus on incremental improvements
directly related to existing tools and processes
Ronny Khan & Stephane Mouy 5
6. eIDAS Trust
Services are
legally
recognised
versatile
instruments
ā¢ eIDAS Trust Services : e-signature, e-seals, e-
registered letters, e-time stamps and website
authentication
ā¢ eIDAS Trust Services are regulated ā especially
for high-end āQualified Trust Servicesā issued by
accredited āqualified trust service
providersā and legally recognised on a cross-
border basis.
ā¢ Qualified Trust Services are based upon
āQualified Certificatesā defined by the eIDAS
Regulation (esp. Annexes I & III) which are
digital attestation mechanisms using industry-
standard formats (e.g. XAdES, CAdEs, PAdES)
ā¢ More importantly, Trust services are recognised
for AML purposes
Ronny Khan & Stephane Mouy 6
7. Basic approach
Reuse the
PSD2 model
PSD2 implementation : defines a
way for the AISP to interact
with the banks in a secure way
Proposal is to replicate the PSD2
model' so that the new service
provider can safely interact with
the existing KYC custodians
Ronny Khan & Stephane Mouy 7
8. ā¢ As with PSD2 qualified certificates will
be issued by trust service providers to
eligible entities.
ā¢ These certificates will serve as
authentication and to secure the data
towards a KYC custodian.
ā¢ This will standardize what is happening
in the market today with KYC utilities.
ā¢ It gives regulators a clear point of
control (revocation) and clear
traceability behind the usage of
qualified certificates.
How would this work
in practice?
Ronny Khan & Stephane Mouy 8
11. The proposal
has no impact
on Privacy &
AML liability
rules which
remain fully
applicable
ā¢ Privacy (GDPR) - no change to client consent requirements
ā¢ AML rules : the new service provider(KYC relying party) is fully
responsible and has to apply AML rules
ā¢ Independently assesses the risk-factors of the
contemplated customer relationship (Risk-based approach)
ā¢ Independently determines which KYC data is required
ā¢ Independently determines when KYC data needs to be
refreshed (reverified) as part of ongoing CDD processes
ā¢ Is fully responsible vis a vis regulatory authorities in line
with FATF Recommendation 17
Cannot rely on the KYC custodian for these
Ronny Khan & Stephane Mouy 11
13. Explained
ā¢ Identity proofing is separated from the rest of the user
data by design and purpose when an electronic
identity is used. So it is normally not feasible to get KYC
data from the IDP.
ā¢ Even if this by chance this is possible the protocol does
not accommodate the transport of this data.
ā¢ By nature the definition KYC data will not reach
stability immediately but be a moving target.
ā¢ Since identity is a multi stakeholder value chain
changes are complicated and take time.
ā¢ Trust services keep this 'out of band' (outside
authentication flow and the authentication value
chain) and separately managed which only needs to be
aligned point to point. (Between the parties)
ā¢ This could be a quick win temporary step.
ā¢ There is no hard requirements on end user
authentication (when not using eidas) but obviously
some requirements should be in place.
Ronny Khan & Stephane Mouy 13
14. The eIDAS
interoperabily
framework
relates identity
providers &
service
providers
Identity
Provider
Service
Provider
Upon request of the User, the Identity provider sends a SAML
assertion (XML document) containing the User autorisation to
the Service provider, with both ends having to exact same
configuration for the SAML authentication to work
Ronny Khan & Stephane Mouy 14
15. Remaining
problems
ā¢ What is KYC data ?
ā¢ What are the KYC data and how is it represented ?
ā¢ Are a PDF with proof of identity proofing required ?
ā¢ What other attributes are needed and how are the reliability
expressed ?
ā¢ What are the consent requirements?
ā¢ For eIDAS this would be done by presentation of a signed consent
form.
ā¢ For non eIDAS it can be solved by one-time authorisation codes.
ā¢ It could even be done on trust with the new service
provider warranting that it has obtained User consent and this is
trusted by the KYC custodian.
ā¢ Eligibility
ā¢ Who qualifies for the usage of such services ?
ā¢ What is the business model? How are costs and revenues shared?
ā¢ We donāt try to answer this. It might be bilateral agreed or mandated
as for free by local regulators to improve competition.
Ronny Khan & Stephane Mouy 15
16. KYC Data
standardisation
ā¢ We propose to start this track in parallel as this
is broadly speaking an independent matter.
ā¢ We do not propose to synchronize āfinish to finishā.
ā¢ Institutions can start using the Trust Service
approach subject to a risk-based approach
without a finalized standard.
ā¢ They do not get a free pass but can use this
based on their own risk assessment and in
dialogue with the competent authority.
ā¢ Domestic temporary standards can be
implemented as intermediate steps while still on
the right track for the final solution. Domestic
requirements on what KYC data is are usually
resolvable.
Ronny Khan & Stephane Mouy 16
17. User consent
ā¢ Can be defined as the responsibility of the new service
provider ā mutual trust approach
ā¢ The existing service provider (KYC custodian)
assumes that this responsibility has been honoured.
ā¢ Can be dealt with by explicit authorisation code or signed
artefact.
ā¢ In this scenario the authentication flow needs to be
expanded to include a one-time code or a signed
attribute presented to existing service provider (KYC
custodian).
ā¢ This might be an eIDAS signed statement to the effect
of allowing sharing. In this what the IDP produces is a
signed artefact and not an authentication.
ā¢ This would probably be required when opening up to
other entities beyond highly regulated entities.
Ronny Khan & Stephane Mouy 17
18. Eligibility
ā¢ Ideally all 'obliged entities' (entities subject to
AML requirements) should be able to use this.
ā¢ As a starting scope this is too large in terms
of risk and governance of certificate issuing.
ā¢ We suggest starting by focusing on easier
scenarios which correspond to the majority of
use cases.
ā¢ A suggested approach is to allow this for
account holding financial institutions now and
expand in later interactions.
ā¢ With strong proof of consent it should be
possible to expand the availability of usage.
Ronny Khan & Stephane Mouy 18
19. Suggested
timeline for
Pre-Pilot Phase
This can be done
before the
Summer recess
Ā§ "Assessment" is getting a second opinion or broadly evaluate the
approach suggested here.
Ā§ "Consultation" is reaching out for feedback and comments broadly. Can
run in parallel with the analysis if required.
Ā§ "Analysis" is to determine the details of the solution, regulatory
implications, summary from the consultation and estimate costs.
Ā§ "Report" is preparing and presentation of a summary report. Much of this
should be done continually.
Ā§ "Report assessment" is evaluation and decision on if to commit on the
implementation phase.
Ronny Khan & Stephane Mouy 19
20. Next steps data
standardisation
The process must be initiated.
ā¢ This can be done within the EU or outside.
ā¢ Our recommendation would be to get this done outside
by standardisation organisation (e.g. ISO)
ā¢ Stakeholders like the EBA has de facto control over ISO
work on financial standardisation and can review results
rather than use stretched resources to do the work
themselves.
ā¢ If we directly approach ISO or other standard-setting
bodies, there is a strong possibility we will not be
prioritised ('Thank you very much for your interest'ā¦)
ā¢ The EU Commission has the clout and influence
required to activate the process.
ā¢ In Norway we made an online application for covid-19
depositing directly to the recipients account in 3 weeks.
Normal turnaround would be 3 years. So thing can
happen fast with high-level stakeholder involvement.
Ronny Khan & Stephane Mouy 20
21. One way of
looking at a
limited Pilot
Phase
https://ec.europa.eu/cefdigital/wiki/display/CEFDIGITAL/2020/03
/30/2020+CEF+funding+for+cross-border+eID+and+eSignatures
The Pilot phase implements the proposal outlined in the Pre-
Pilot phase
Ronny Khan & Stephane Mouy 21
22. What is needed
today for the
Pre-Pilot Phase
ā¢ A clear mandate from the EU Commission.
ā¢ A limited budget consistent with the work to be
undertaken
ā¢ The involvement of two liaison officers (One DG
Fisma, one DG Connect) - not a full-time job
ā¢ The official and active support of the EU Commission
for the launch of the Data Standardisation phase
Ronny Khan & Stephane Mouy 22
23. Thank you for
your attention
Stephane Mouy
sgmouy@stephanemouy.com
https://sgmconsultingservices.com
Ronny Khan
rkh@dnb.no
https://bit.ly/3985fpF
Ronny Khan & Stephane Mouy 23
25. Why this is (still)
urgentā Life or death
ā¢ The last great Pandemic had 3 waves
during a year.
ā¢ This is one of many careful studies
that all concur.
ā¢ Wave 2 and 3 was much worse than
wave 1.
ā¢ This particular study is from
Denmark which was neutral
thus not explainable by
collateral effect of the war.
ā¢ Now this might not happen this time
but it would be foolish not to prepare
when there is still time.
ā¢ It is certain beyond question that
there will be more waves, the only
debatable question are the
magnitude.
Ronny Khan & Stephane Mouy 25
26. Recent study
Recommendations
ā¢ States, territories, and tribal health
authorities should plan for the worst-case
scenario (Scenario 2), including no vaccine
availability or herd immunity.
ā¢ Government agencies and healthcare
delivery organizations should develop
strategies to ensure adequate protection
for healthcare workers when disease
incidence surges.
ā¢ Government officials should develop
concrete plans, including triggers for
reinstituting mitigation measures, for
dealing with disease peaks when they
occur.
ā¢ Risk communication messaging from
government officials should incorporate
the concept that this pandemic will not
be over soon and that people need
to be prepared for possible periodic
resurgences of disease over the next 2 years
Ronny Khan & Stephane Mouy 26
27. PSD2 Model
explained
Use of qualified certificates is regulated for PDS2
implementation
ā¢ Established by EU Implementing Regulation
2018/389 (art. 34) and based on EBA Regulatory
Technical Standards
ā¢ Confirmed by EBA opinion 2018-7
ā¢ Leading to specific technical specifications (ETSI
TS 119 495 ā 2018 11)
Ronny Khan & Stephane Mouy 27
28. Defining
urgency
Compensation of lost revenue due to Covid-19
ā¢ On the 24 March the prime minister of Norway reached out for assistance. A completely new
solution was needed for compensation of lost revenue for businesses.
ā¢ This solution needed to be self served web based where the manager of the businesses could
apply for compensation
ā¢ The system needed automatically to retrieve the historic turn around for the company and
approve, disapprove or refer to a case worker.
ā¢ The case worker should have a suitable interface to finally reject or accept the application.
ā¢ If approved money should be transferred and be available the next business day at latest.
ā¢ On the 17 of April this was operational and public available.
Establishing secure remote on-boarding for EU subjects.
ā¢ A bit later a need was discovered for non Norwegian citizens who are entitled to benefits but
unable to apply. They would not have a suitable electronic id and in person applications was out
of the question as well as impossible as they where and are stranded in their home country.
ā¢ This system is undergoing final testing and is expected to become public available within days.
So non of these happens in a vacuum, Norway has a fully deployed electronic ID system and there
have been a huge effort on remote on boarding with specifications earlier.
But as stated by the stakeholders, this would normally have taken 3 years not 3 weeks. The efforts
includes amending/changing regulations and laws.
So this is urgency and this is what is possible if you really think something is urgent.
Ronny Khan & Stephane Mouy 28