SlideShare a Scribd company logo
1 of 71
Download to read offline
MARET Consulting | Boulevard Georges Favon 43 | CH 1204 Geneva | Tél +41 22 575 30 35 | info@maret-consulting.ch | www.maret-consulting.ch




        Implementation of a biometric solution providing strong
          authentication to gain access to confidential data




                              Sylvain Maret / Security Architect @ MARET Consulting
                                                  17 march 2010

MARET Consulting 2010
                                                                                                                                                                     Conseil en technologies
Agenda




                    Digital identity Security
                          Strong authentication?

                                                                     Applications for the Match on
                    Strong authentication technology                 Card technology

                    Biometry and Match on Card
                          Digital certificate / PKI
                                                                     Illustration with a project for
                                                                     the banking field

                                                                     Trends 2010



www.maret-consulting.ch                                                                      Conseil en technologies

                                          Security Summit Milano, march 2010
Who am I?




                    Security Expert
                          15 years of experience in ICT Security
                          CEO and Founder of MARET Consulting
                          Expert @ Engineer School of Yverdon & Geneva University
                          Swiss French Area delegate at OpenID Switzerland
                          Co-founder Geneva Application Security Forum
                          Author of the Blog: la Citadelle Electronique


                    Chosen field
                          Digital Identity Security


www.maret-consulting.ch                                                             Conseil en technologies

                                       Security Summit Milano, march 2010
Protection of digital identities: a topical issue…




                                                                      Identification




www.maret-consulting.ch                                                      Conseil en technologies

                                 Security Summit Milano, march 2010
Strong authentication: why?




                    Keylogger (hard and Soft)
                    Malware
                    Man in the Middle
                    Browser in the Midle
                    Password Sniffer
                    Social Engineering
                    Phishing / Pharming


                    The number of identity thefts is increasing dramatically!


www.maret-consulting.ch                                                         Conseil en technologies

                                   Security Summit Milano, march 2010
A major event in the world of strong authentication




                 12 October 2005: the Federal Financial Institutions Examination
                 Council (FFIEC) issues a directive

                          « Single Factor Authentication » is not enough for the web financial
                          applications
                          Before end 2006 it is compulsory to implement a strong
                          authentication system
                          http://www.ffiec.gov/press/pr101205.htm

                 And the PCI DSS norm
                          Compulsory strong authentication for distant accesses

                 And now European regulations
                          Payment Services (2007/64/CE) for banks




www.maret-consulting.ch                                                                 Conseil en technologies

                                        Security Summit Milano, march 2010
Identification and authentication ?




                    Identification
                          Who are you?


                    Authentication
                          Prove it!




www.maret-consulting.ch                                                    Conseil en technologies

                                      Security Summit Milano, march 2010
Definition of strong authentication




                          Strong Authentication on Wikipedia

www.maret-consulting.ch                                                       Conseil en technologies

                                         Security Summit Milano, march 2010
«Digital identity is the corner stone of trust»




                          More information on the subject

www.maret-consulting.ch                                                      Conseil en technologies

                                        Security Summit Milano, march 2010
MARET Consulting | Boulevard Georges Favon 43 | CH 1204 Geneva | Tél +41 22 575 30 35 | info@maret-consulting.ch | www.maret-consulting.ch




Strong authentication
    technologies

                                                                                                                                               Conseil en technologies
Which strong authentication technology?




www.maret-consulting.ch                                             Conseil en technologies

                               Security Summit Milano, march 2010
OTP                 PKI (HW)     Biometry
         Strong                                                                 *
      authentication
          Encryption

   Digital signature

   Non repudiation

    Strong link with
        the user

                          * Biometry type Fingerprinting
www.maret-consulting.ch                                                      Conseil en technologies

                                  Security Summit Milano, march 2010
Strong authentication:
            Technologies on the move




                    Corporations                                  Public
                          eBanking
                          VPN
                          Web Applications
                          Mobility
                          Electronic Document Mgt                      Social networks
                                                                            Facebook
                    Project PIV FIPS-201
                          SAML                                         Virtual World
                          Adoption of OpenID

                    Authentication as a Service                        Cloud Computing
                          AaaS                                              Google docs
                                                                            Sales Forces
www.maret-consulting.ch                                                                    Conseil en technologies

                                       Security Summit Milano, march 2010
Technologies accessible to everyone




                    Standards                                   Open Source Solution

                          Open Authentication                        Mobile One Time Passwords
                          (OATH)                                          strong, two-factor authentication
                                                                          with mobile phones
                             OATH authentication
                             algorithms
                                 HOTP (HMAC Event
                                 Based)
                                 OCRA
                                 (Challenge/Response)
                                 TOTP (Time Based)
                             OATH Token Identifier
                             Specification
www.maret-consulting.ch                                                                        Conseil en technologies

                                     Security Summit Milano, march 2010
MARET Consulting | Boulevard Georges Favon 43 | CH 1204 Geneva | Tél +41 22 575 30 35 | info@maret-consulting.ch | www.maret-consulting.ch




     Biometry
       and
   Match on Card

                                                                                                                                             Conseil en technologies
Which biometric technology for IT?




www.maret-consulting.ch                                             Conseil en technologies

                               Security Summit Milano, march 2010
Biometry = strong authentication?




                    The answer is clearly no
                          Requires a second factor

                          Problem of security (usurpation)

                          Only a convenience for the user


                    More information on usurpation
                          Study Yokohama University


www.maret-consulting.ch                                                   Conseil en technologies

                                     Security Summit Milano, march 2010
Technology Match on Card: your NIP code is your finger




www.maret-consulting.ch                                              Conseil en technologies

                               Security Summit Milano, march 2010
Example of Match on Card technology for IT




                    A reader
                          Biometry
                          SmartCard


                    A card with chip
                          Technology MOC
                          Crypto processor
                             PC/SC
                             PKCS#11
                             Digital certificate X509

www.maret-consulting.ch                                                    Conseil en technologies

                                      Security Summit Milano, march 2010
Stocking data?




                           On an external                          Through an
                          medium                                  authentication server
                              Better security                              Security issue
                              « Offline » mode                             Confidentiality issue
                              MOC = Match On card                          Availability issue




                                                                           Federal law of 19 June 1992
                                                                                      on the
                                                                             Protection of data (LPD)




www.maret-consulting.ch                                                                       Conseil en technologies

                                      Security Summit Milano, march 2010
Example of utilisation of the Match on Card technology




                    Smart Card Logon of                           Web SSO Solution
                    Microsoft                                       SAML
                          PK-INIT (Kerberos)
                                                                  Citrix
                    Very Sensitive Web
                    Applications                                  Remote access
                          Electronic Document Mgt
                                                                         VPN SSL
                          eBanking                                       VPN IPSEC


                    Data Encryption                               Digital Signature Solution
                          Laptop encryption
                          Folder (Share) Encryption               Etc.
www.maret-consulting.ch                                                                   Conseil en technologies

                                       Security Summit Milano, march 2010
Mobility security with MOC technology




                    Biometric strong
                    authentication
                          Reader of the «swipe» type
                                                                 X509 machine certificate
                                                                      Utilisation TPM
                                                                      Authentication of the
                                                                      machine

                    Applications
                                                                 Pre Boot Authentication
                          Smart Card Logon
                                                                      Full Disk Encryption
                          VPN (SSL, IPSEC)
                          Web Application
                          Citrix
www.maret-consulting.ch                                                                      Conseil en technologies

                                      Security Summit Milano, march 2010
Authentication of a user with PKINIT (Smart Card Logon)




                          1




                U_Cert
                U Cert




           2




                  2


                                                                               Schema by Philippe Logean
                                                                               e-Xpert Solutions SA

www.maret-consulting.ch                                                                       Conseil en technologies

                                          Security Summit Milano, march 2010
Feedback
                            from the
                          Banking field
www.maret-consulting.ch                   Conseil en technologies
The project: electronic management of documents




                    Implementation of a Electronic Document Mgt solution
                          Access to very sensitive information
                          Classification of the information: Secret
                          Encryption of data (From BIA)
                          Authorization Access Control


                    Project for a Private bank in Switzerland
                          Start of the project: 2005


                    Population concerned
                          500 persons (Phase I)
                          In the long run: 3000 persons (Phase II)
www.maret-consulting.ch                                                     Conseil en technologies

                                       Security Summit Milano, march 2010
Business Impact Analysis (BIA)

                                                               BIA
                                                          Bank Acme SA

                                       Data                                 Services                                         Impact
                                                                                                             Hard Impact                Soft Impact
                                                                      Availability (in time)
                                                                                                            Reduced i ncome           Los s of goodwi l l
                                                                                                           Increa s ed cos t of      Los s of credi bi l i ty
    IT Applications                                                                                              worki ng            Breach of the l aw
                          Confidentiality     Integrity                                                   Los s of opera ti ona l
                                                                                                                ca pabi l i ty
                                                          inconvenience quite serious          critical
                                                                                                                Brea ch of
                                                                                                           contra ct/fi na nci a l
                                                                                                                pena l ti es


Electronic Documents
         Mgt                   HIGH            HIGH          30 min             1H               2H               HIGH                       HIGH




www.maret-consulting.ch                                                                                                                  Conseil en technologies

                                              Security Summit Milano, march 2010
(Data Classification : Secret)

   Implementation of a technology allowing
            strong authentication
   – via a mechanism of irrefutable proof –
of the users accessing the bank’s information
                   system

               Who accesses what, when and how?!

www.maret-consulting.ch                                    Conseil en technologies
The technical constraints of the strong authentication project



Mandatory                                             Desired

        Integration with existing                         Integration with building security
        applications                                      Data encryption
                 Web                                      Non fixed workstations
                 Microsoft Smart Card Logon
                                                          Future applications
                 Laptop
                                                               Network and systems
        Separation of roles                                    Strong authentication
                 Four eyes
        Digital signature
        Auditing, proof
        Proof management


www.maret-consulting.ch                                                                Conseil en technologies

                                   Security Summit Milano, march 2010
Basic concept: a unique link

            Identity Management                                              Authorization
                                                                             Management


                                                                                        Issuer
                                                                                      App A cert




                                       Link: cn
                                                                     User




                          PHASE 1                                             PHASE 2
                    Strong authentication                                   Authorization



www.maret-consulting.ch                                                                            Conseil en technologies

                                     Security Summit Milano, march 2010
Components of the technical architecture




                    Implementation of a PKI « intra muros »
                          Non Microsoft (Separation of duties)
                    Implementation of the Online revocation
                          OCSP protocol
                    Utilisation of a Hardware Security Module
                    Security of the PKI architecture
                          Shielding and Hardening
                             Firewall
                             IDS
                             FIA
www.maret-consulting.ch                                                      Conseil en technologies

                                        Security Summit Milano, march 2010
Concept for the GED application security




www.maret-consulting.ch                                Conseil en technologies
The focus of biometric authentication




www.maret-consulting.ch                                              Conseil en technologies

                                Security Summit Milano, march 2010
Processus
Human Process
    Humain
www.maret-consulting.ch   Conseil en technologies
The weak link? Matters more than the technique…




                    Definition of roles
                          Tasks and responsibilities
                          Purpose: separation of duties
                             Four eyes


                    Implementation of identity management processes

                    Implementation of operating procedures


www.maret-consulting.ch                                                   Conseil en technologies

                                     Security Summit Milano, march 2010
Implementation of processes




                    Processes for the identity management team
                          User enrollment
                          Revocation
                          Incident mangement
                             Loss, theft, forgotten card
                          Renewal
                    Process for Help Desk
                    Process for the Auditors
                    Process for the RSSI

                    And the operating procedures!
www.maret-consulting.ch                                                     Conseil en technologies

                                       Security Summit Milano, march 2010
The result




                    A series of documents for the bank
                          Operating procedures
                          Description of processes
                          Terms of use
                          Definition of roles and responsibilities
                          CP /CPS for the « in house » PKI




www.maret-consulting.ch                                                    Conseil en technologies

                                      Security Summit Milano, march 2010
Training

www.maret-consulting.ch              Conseil en technologies
A crucial element!

                          Training of the identity management team
                          Training of users
                          Training of Help Desk
                          Training for the technologies
                             PKI
                             Biometry
www.maret-consulting.ch                                                  Conseil en technologies

                                    Security Summit Milano, march 2010
Identity Management Team Training




                    Very Important work

                          How to enroll fingers
                          Match on Card Technology
                          Problem handling
                             Technical
                             Human


                          Coaching for 3 weeks


www.maret-consulting.ch                                                   Conseil en technologies

                                     Security Summit Milano, march 2010
End User Training




                    About 30 min per User

                          Technology explication
                              Match on Card


                          Finger position
                              Try (Play with Biometry)


                          Document for End Users

                          Signature (Legal Usage)

www.maret-consulting.ch                                                     Conseil en technologies

                                       Security Summit Milano, march 2010
Problems…


www.maret-consulting.ch               Conseil en technologies
Some examples




                    Enrollment with some Users

                    End Users convocation

                    Technical Problem on Validation Authority
                          OCSP Servers



www.maret-consulting.ch                                                 Conseil en technologies

                                   Security Summit Milano, march 2010
Feedback?


www.maret-consulting.ch               Conseil en technologies
Conclusion of the project




                    Pure technique is a minor                   Biometry is a mature technology
                    element in the success of
                    such a large scale project                  Technology PKI
                                                                     Offers a safety kernel for the
                                                                     future
                    Never under estimate the
                                                                     Encryption, signature
                    organisational aspect                            Rights management information
                          CP / CPS for the PKI                       Data security
                          Management process
                                                                A step towards convergence
                    Ask for management support                       Physical and logical security



www.maret-consulting.ch                                                                     Conseil en technologies

                                     Security Summit Milano, march 2010
Tendency Biometry Match on Card




                          The PIV Fips-201 project is a leader!

                          Convergence
                              Physical security and logical security


                          Biometric sensor for laptops
                              UPEK (Solution FIPS-201)


                          New biometric technologies

                          Full Disk Encryption (Laptop)
                              Support of the Match on Card technology
                              McAfee Endpoint Encryption™ (formerly SafeBoot® Encryption)
                              Win Magic SecureDoc Disk Encryption

www.maret-consulting.ch                                                                     Conseil en technologies

                                         Security Summit Milano, march 2010
A very promising technology: Vascular Pattern Recognition




                By SONY




www.maret-consulting.ch                                                 Conseil en technologies

                              Security Summit Milano, march 2010
When will the convergence happen?




A difficult convergence! Physical security and logical security
  www.maret-consulting.ch                                            Conseil en technologies

                                Security Summit Milano, march 2010
A few links to deepen the subject




                    MARET Consulting
                          http://maret-consulting.ch/
                    La Citadelle Electronique (blog on digital identities)
                          http://www.citadelle-electronique.net/
                    Banking and finance article
                          Steal an identity? Impossible with biometry!
                                http://www.banque-finance.ch/numeros/88/59.pdf
                          Biometry and Mobility
                                http://www.banque-finance.ch/numeros/97/62.pdf
                    Publique presentations
                          OSSIR Paris 2009: Feedback on the deployment of biometry on a large scale
                                http://www.ossir.org/paris/supports/2009/2009-10-13/Sylvain_Maret_Biometrie.pdf
                          ISACA, Clusis: Access to information : Roles and responsibilities
                                http://blog.b3b.ch/wp-content/uploads/mise-en-oeuvre-de28099une-solution-biometrique-
                                de28099authentification-forte.pdf


www.maret-consulting.ch                                                                                           Conseil en technologies

                                             Security Summit Milano, march 2010
“The counseling and the expertise for the selection and

                              the implementation of innovative technologies

 in the field of security of information systems and digital identity"




www.maret-consulting.ch                                                        Conseil en technologies
MARET Consulting | Boulevard Georges Favon 43 | CH 1204 Geneva | Tél +41 22 575 30 35 | info@maret-consulting.ch | www.maret-consulting.ch




                                                      Annexes




                                                                                                                                             Conseil en technologies

                                  Security Summit Milano, march 2010
Processus
                          Authentifiers
                            inHumain
                              2010
www.maret-consulting.ch                   Conseil en technologies
OTP Software using SmartPhone




OTP for iPhone: a feedback
Software OTP for iPhone
Mobile One Time Passwords
 www.maret-consulting.ch                                           Conseil en technologies

                              Security Summit Milano, march 2010
Biometry Match on Card




Feedback on the deployment of biometry on a large scale
  www.maret-consulting.ch                                            Conseil en technologies

                                Security Summit Milano, march 2010
The focus of biometric authentication




www.maret-consulting.ch                                              Conseil en technologies

                                Security Summit Milano, march 2010
USB Token




www.maret-consulting.ch                                        Conseil en technologies

                          Security Summit Milano, march 2010
Internet Passport




www.maret-consulting.ch                                              Conseil en technologies

                                Security Summit Milano, march 2010
Matrix cryptography




www.maret-consulting.ch                                                Conseil en technologies

                                  Security Summit Milano, march 2010
PKI: Digital certificate X509



          Software Certificate                           Hardware Certificate




www.maret-consulting.ch                                                         Conseil en technologies

                                 Security Summit Milano, march 2010
OTP via SMS




                                                               OTP via SMS




                                Enter OTP




www.maret-consulting.ch                                                 Conseil en technologies

                          Security Summit Milano, march 2010
State of the art in 2010 of the authentifiers: Synthesis


          Technologies                                 Explanations

OTP Software               One Time Password software
SmartPhone                 Event, Time or mode challenge response
                           Mode not connected
Biometry Match on          Biometry and chip card
Card                       Digital certificate
                           Stocking of the Biometric pattern
USB Token                  One Time Password in mode connected
                           Event, Time ou mode challenge response
Internet Passport          Biometry One Time Password
                           Mode not connected
                           Mode challenge response
Matrix cryptography        One Time Password
                           Mode challenge response
PKI                        Certificate software
                           Certificaet Hardware
OTP SMS                    One Time Password by SMS
www.maret-consulting.ch                                                Conseil en technologies
Processus
                           Integration with
                          web applications
                             Humain
www.maret-consulting.ch                  Conseil en technologies
Web application with a basic authentication




www.maret-consulting.ch                                              Conseil en technologies

                                Security Summit Milano, march 2010
Web application towards a strong authentication?




www.maret-consulting.ch                                             Conseil en technologies

                               Security Summit Milano, march 2010
“Shielding” approach - (Perimetric Authentication)




www.maret-consulting.ch                                              Conseil en technologies

                                Security Summit Milano, march 2010
Approach by Module or Agents




www.maret-consulting.ch                                            Conseil en technologies

                              Security Summit Milano, march 2010
Approach API / SDK




www.maret-consulting.ch                                           Conseil en technologies

                             Security Summit Milano, march 2010
SSL PKI: how does it work?

                                      Validation
                                      Authority




            OCSP request

                                      Valide
                                      Pas valide
                                      Inconu




                                   SSL / TLS Mutual Authentication
                                                                        Alice
                      Web Server
www.maret-consulting.ch                                                         Conseil en technologies

                                   Security Summit Milano, march 2010
Approach federation of identity
            a change of paradigm




www.maret-consulting.ch                                              Conseil en technologies

                                Security Summit Milano, march 2010
Approach federation of identity
            a change of paradigm




www.maret-consulting.ch                                              Conseil en technologies

                                Security Summit Milano, march 2010
Approach federation of identity




www.maret-consulting.ch                                              Conseil en technologies

                                Security Summit Milano, march 2010
Approaches for an integration of the strong authentication

         Approaches                                    Examples


        Shielding          Utilisation of a protective third party compnent
     (Perimetric Auth)     Such as a Reverse Proxy (Web Application Firewall)

               Module      Utilisation of a software module
              (Agents)     Such as an Apache module, a SecurID agent, etc.
                           Utilisation of a protocol such as Radius

                  API      Development via an API
                 (SDK)     For instance by using the Web Services (SOAP)

              SSL PKI      Utilisation of a certificate X509
                           Utilisation of SSL/TLS functionalities
                           PKI Ready
   Identity Federation     Utilisation of a federation protocol such as SAML, OpenID,


                Others     PKI application, etc.
www.maret-consulting.ch                                                             Conseil en technologies

More Related Content

What's hot

case-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_encase-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_enAlix Murphy
 
28032012 Jacques Bus Privacy en Identiteit in Europese richtlijnen en program...
28032012 Jacques Bus Privacy en Identiteit in Europese richtlijnen en program...28032012 Jacques Bus Privacy en Identiteit in Europese richtlijnen en program...
28032012 Jacques Bus Privacy en Identiteit in Europese richtlijnen en program...Stichting ePortfolio Support
 
Privacy of social network attributes for online services
Privacy of  social network attributes for online servicesPrivacy of  social network attributes for online services
Privacy of social network attributes for online servicesAtos_Worldline
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Spellpoint - Securing Access for Microservices
Spellpoint - Securing Access for MicroservicesSpellpoint - Securing Access for Microservices
Spellpoint - Securing Access for MicroservicesUbisecure
 
Future of digital identity initial perspective - final lr
Future of digital identity   initial perspective - final lrFuture of digital identity   initial perspective - final lr
Future of digital identity initial perspective - final lrFuture Agenda
 
Protection Systems, from CP, CAS to DRM, part A of 2
Protection Systems, from CP, CAS to DRM, part A of 2Protection Systems, from CP, CAS to DRM, part A of 2
Protection Systems, from CP, CAS to DRM, part A of 2Paolo Nesi
 
Using Web Service Gateways and Code Generation for Sustainable IoT System Dev...
Using Web Service Gateways and Code Generation for Sustainable IoT System Dev...Using Web Service Gateways and Code Generation for Sustainable IoT System Dev...
Using Web Service Gateways and Code Generation for Sustainable IoT System Dev...Till Riedel
 
The future of digital identity initial perspective
The future of digital identity   initial perspectiveThe future of digital identity   initial perspective
The future of digital identity initial perspectiveFuture Agenda
 
SoftCOM 2011 - Design and Development of a Social Shopping Experience in the ...
SoftCOM 2011 - Design and Development of a Social Shopping Experience in the ...SoftCOM 2011 - Design and Development of a Social Shopping Experience in the ...
SoftCOM 2011 - Design and Development of a Social Shopping Experience in the ...CATTID "Sapienza"
 

What's hot (14)

case-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_encase-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_en
 
28032012 Jacques Bus Privacy en Identiteit in Europese richtlijnen en program...
28032012 Jacques Bus Privacy en Identiteit in Europese richtlijnen en program...28032012 Jacques Bus Privacy en Identiteit in Europese richtlijnen en program...
28032012 Jacques Bus Privacy en Identiteit in Europese richtlijnen en program...
 
Open Data Business
Open Data BusinessOpen Data Business
Open Data Business
 
Privacy of social network attributes for online services
Privacy of  social network attributes for online servicesPrivacy of  social network attributes for online services
Privacy of social network attributes for online services
 
Wk White Paper
Wk White PaperWk White Paper
Wk White Paper
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Spellpoint - Securing Access for Microservices
Spellpoint - Securing Access for MicroservicesSpellpoint - Securing Access for Microservices
Spellpoint - Securing Access for Microservices
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 
Future of digital identity initial perspective - final lr
Future of digital identity   initial perspective - final lrFuture of digital identity   initial perspective - final lr
Future of digital identity initial perspective - final lr
 
Cloud computing due diligence WTF?
Cloud computing due diligence WTF?Cloud computing due diligence WTF?
Cloud computing due diligence WTF?
 
Protection Systems, from CP, CAS to DRM, part A of 2
Protection Systems, from CP, CAS to DRM, part A of 2Protection Systems, from CP, CAS to DRM, part A of 2
Protection Systems, from CP, CAS to DRM, part A of 2
 
Using Web Service Gateways and Code Generation for Sustainable IoT System Dev...
Using Web Service Gateways and Code Generation for Sustainable IoT System Dev...Using Web Service Gateways and Code Generation for Sustainable IoT System Dev...
Using Web Service Gateways and Code Generation for Sustainable IoT System Dev...
 
The future of digital identity initial perspective
The future of digital identity   initial perspectiveThe future of digital identity   initial perspective
The future of digital identity initial perspective
 
SoftCOM 2011 - Design and Development of a Social Shopping Experience in the ...
SoftCOM 2011 - Design and Development of a Social Shopping Experience in the ...SoftCOM 2011 - Design and Development of a Social Shopping Experience in the ...
SoftCOM 2011 - Design and Development of a Social Shopping Experience in the ...
 

Similar to MARET Consulting Presents Strong Authentication Technologies

Strong Authentication in Web Application / ConFoo.ca 2011
Strong Authentication in Web Application / ConFoo.ca 2011Strong Authentication in Web Application / ConFoo.ca 2011
Strong Authentication in Web Application / ConFoo.ca 2011Sylvain Maret
 
Strong Authentication in Web Applications: State of the Art 2011
Strong Authentication in Web Applications: State of the Art 2011Strong Authentication in Web Applications: State of the Art 2011
Strong Authentication in Web Applications: State of the Art 2011Sylvain Maret
 
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ... Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...FinTech Belgium
 
Threat Modeling / iPad
Threat Modeling / iPadThreat Modeling / iPad
Threat Modeling / iPadSylvain Maret
 
SmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseSmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseOKsystem
 
12th International Conference on Communications Security & Information Assura...
12th International Conference on Communications Security & Information Assura...12th International Conference on Communications Security & Information Assura...
12th International Conference on Communications Security & Information Assura...ijasuc
 
Role Of Biometric Security- Bahaa Abdul Hadi.pdf
Role Of Biometric Security- Bahaa Abdul Hadi.pdfRole Of Biometric Security- Bahaa Abdul Hadi.pdf
Role Of Biometric Security- Bahaa Abdul Hadi.pdfBahaa Abdulhadi
 
12th International Conference on Communications Security & Information Assura...
12th International Conference on Communications Security & Information Assura...12th International Conference on Communications Security & Information Assura...
12th International Conference on Communications Security & Information Assura...pijans
 
12th International Conference on Communications Security & Information Assura...
12th International Conference on Communications Security & Information Assura...12th International Conference on Communications Security & Information Assura...
12th International Conference on Communications Security & Information Assura...ijasuc
 
170321 cebit blockchain summit frank bolten
170321 cebit blockchain summit frank bolten170321 cebit blockchain summit frank bolten
170321 cebit blockchain summit frank boltenFrank Bolten
 
Security in the Clouds Panel Chair: Mike Surridge
Security in the Clouds Panel Chair: Mike SurridgeSecurity in the Clouds Panel Chair: Mike Surridge
Security in the Clouds Panel Chair: Mike SurridgeServiceWave 2010
 
about IoT evolution and its trends in upcoming years.
about IoT evolution and its trends in upcoming years.about IoT evolution and its trends in upcoming years.
about IoT evolution and its trends in upcoming years.Pooja G N
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Tackling Data Security and Privacy Challenges of the IoT
Tackling Data Security and Privacy Challenges of the IoTTackling Data Security and Privacy Challenges of the IoT
Tackling Data Security and Privacy Challenges of the IoTM2M Alliance e.V.
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9alvin chin
 
Identity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTH
Identity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTHIdentity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTH
Identity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTHForgeRock
 
2013 Telco Innovation Priorities – Summary slides from TC3 2012
2013 Telco Innovation Priorities – Summary slides from TC3 20122013 Telco Innovation Priorities – Summary slides from TC3 2012
2013 Telco Innovation Priorities – Summary slides from TC3 2012Telecom Council
 
Digital Business Trends Disruptions
Digital Business Trends DisruptionsDigital Business Trends Disruptions
Digital Business Trends DisruptionsGiorgio Pauletto
 

Similar to MARET Consulting Presents Strong Authentication Technologies (20)

Strong Authentication in Web Application / ConFoo.ca 2011
Strong Authentication in Web Application / ConFoo.ca 2011Strong Authentication in Web Application / ConFoo.ca 2011
Strong Authentication in Web Application / ConFoo.ca 2011
 
Strong Authentication in Web Applications: State of the Art 2011
Strong Authentication in Web Applications: State of the Art 2011Strong Authentication in Web Applications: State of the Art 2011
Strong Authentication in Web Applications: State of the Art 2011
 
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ... Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 
Threat Modeling / iPad
Threat Modeling / iPadThreat Modeling / iPad
Threat Modeling / iPad
 
SmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterpriseSmartCard Forum 2010 - Secured Access for enterprise
SmartCard Forum 2010 - Secured Access for enterprise
 
12th International Conference on Communications Security & Information Assura...
12th International Conference on Communications Security & Information Assura...12th International Conference on Communications Security & Information Assura...
12th International Conference on Communications Security & Information Assura...
 
Role Of Biometric Security- Bahaa Abdul Hadi.pdf
Role Of Biometric Security- Bahaa Abdul Hadi.pdfRole Of Biometric Security- Bahaa Abdul Hadi.pdf
Role Of Biometric Security- Bahaa Abdul Hadi.pdf
 
12th International Conference on Communications Security & Information Assura...
12th International Conference on Communications Security & Information Assura...12th International Conference on Communications Security & Information Assura...
12th International Conference on Communications Security & Information Assura...
 
12th International Conference on Communications Security & Information Assura...
12th International Conference on Communications Security & Information Assura...12th International Conference on Communications Security & Information Assura...
12th International Conference on Communications Security & Information Assura...
 
Chris Boyer
Chris BoyerChris Boyer
Chris Boyer
 
170321 cebit blockchain summit frank bolten
170321 cebit blockchain summit frank bolten170321 cebit blockchain summit frank bolten
170321 cebit blockchain summit frank bolten
 
Security in the Clouds Panel Chair: Mike Surridge
Security in the Clouds Panel Chair: Mike SurridgeSecurity in the Clouds Panel Chair: Mike Surridge
Security in the Clouds Panel Chair: Mike Surridge
 
Jacques Bus F I I R L Presentation J B
Jacques  Bus  F I  I R L  Presentation  J BJacques  Bus  F I  I R L  Presentation  J B
Jacques Bus F I I R L Presentation J B
 
about IoT evolution and its trends in upcoming years.
about IoT evolution and its trends in upcoming years.about IoT evolution and its trends in upcoming years.
about IoT evolution and its trends in upcoming years.
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Tackling Data Security and Privacy Challenges of the IoT
Tackling Data Security and Privacy Challenges of the IoTTackling Data Security and Privacy Challenges of the IoT
Tackling Data Security and Privacy Challenges of the IoT
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9
 
Identity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTH
Identity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTHIdentity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTH
Identity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTH
 
2013 Telco Innovation Priorities – Summary slides from TC3 2012
2013 Telco Innovation Priorities – Summary slides from TC3 20122013 Telco Innovation Priorities – Summary slides from TC3 2012
2013 Telco Innovation Priorities – Summary slides from TC3 2012
 
Digital Business Trends Disruptions
Digital Business Trends DisruptionsDigital Business Trends Disruptions
Digital Business Trends Disruptions
 

More from Sylvain Maret

Air Navigation Service Providers - Unsecurity on Voice over IP Radion
Air Navigation Service Providers - Unsecurity on Voice over IP RadionAir Navigation Service Providers - Unsecurity on Voice over IP Radion
Air Navigation Service Providers - Unsecurity on Voice over IP RadionSylvain Maret
 
factsheet_4g_critical_comm_en_vl
factsheet_4g_critical_comm_en_vlfactsheet_4g_critical_comm_en_vl
factsheet_4g_critical_comm_en_vlSylvain Maret
 
INA Volume 1/3 Version 1.02 Released / Digital Identity and Authentication
INA Volume 1/3 Version 1.02 Released / Digital Identity and AuthenticationINA Volume 1/3 Version 1.02 Released / Digital Identity and Authentication
INA Volume 1/3 Version 1.02 Released / Digital Identity and AuthenticationSylvain Maret
 
INA Volume 1/3 Version 1.0 Released / Digital Identity and Authentication
INA Volume 1/3 Version 1.0 Released / Digital Identity and AuthenticationINA Volume 1/3 Version 1.0 Released / Digital Identity and Authentication
INA Volume 1/3 Version 1.0 Released / Digital Identity and AuthenticationSylvain Maret
 
INA Volume 1/3 Version 1.0 RC / Digital Identity and Authentication
INA Volume 1/3 Version 1.0 RC / Digital Identity and AuthenticationINA Volume 1/3 Version 1.0 RC / Digital Identity and Authentication
INA Volume 1/3 Version 1.0 RC / Digital Identity and AuthenticationSylvain Maret
 
Securite des Web Services (SOAP vs REST) / OWASP Geneva dec. 2012
Securite des Web Services (SOAP vs REST) / OWASP Geneva dec. 2012Securite des Web Services (SOAP vs REST) / OWASP Geneva dec. 2012
Securite des Web Services (SOAP vs REST) / OWASP Geneva dec. 2012Sylvain Maret
 
Strong Authentication State of the Art 2012 / Sarajevo CSO
Strong Authentication State of the Art 2012 / Sarajevo CSOStrong Authentication State of the Art 2012 / Sarajevo CSO
Strong Authentication State of the Art 2012 / Sarajevo CSOSylvain Maret
 
ASFWS 2012 / Initiation à la sécurité des Web Services par Sylvain Maret
ASFWS 2012 / Initiation à la sécurité des Web Services par Sylvain MaretASFWS 2012 / Initiation à la sécurité des Web Services par Sylvain Maret
ASFWS 2012 / Initiation à la sécurité des Web Services par Sylvain MaretSylvain Maret
 
Strong Authentication in Web Application #SCS III
Strong Authentication in Web Application #SCS IIIStrong Authentication in Web Application #SCS III
Strong Authentication in Web Application #SCS IIISylvain Maret
 
Authentication and strong authentication for Web Application
Authentication and strong authentication for Web ApplicationAuthentication and strong authentication for Web Application
Authentication and strong authentication for Web ApplicationSylvain Maret
 
Geneva Application Security Forum 2010
Geneva Application Security Forum 2010Geneva Application Security Forum 2010
Geneva Application Security Forum 2010Sylvain Maret
 
Final conclusions of Working Group 3 at Workshop Münchenwiler 20-21 of May 20...
Final conclusions of Working Group 3 at Workshop Münchenwiler 20-21 of May 20...Final conclusions of Working Group 3 at Workshop Münchenwiler 20-21 of May 20...
Final conclusions of Working Group 3 at Workshop Münchenwiler 20-21 of May 20...Sylvain Maret
 
Comment protéger de façon efficace son/ses identité(s) numérique(s) sur le We...
Comment protéger de façon efficace son/ses identité(s) numérique(s) sur le We...Comment protéger de façon efficace son/ses identité(s) numérique(s) sur le We...
Comment protéger de façon efficace son/ses identité(s) numérique(s) sur le We...Sylvain Maret
 
Digital identity trust & confidence
Digital identity trust & confidenceDigital identity trust & confidence
Digital identity trust & confidenceSylvain Maret
 
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...Sylvain Maret
 
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...Sylvain Maret
 
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...Sylvain Maret
 
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...Sylvain Maret
 
Corrélation d'évènements dans un environnement VoIP avec ExaProtect
Corrélation d'évènements dans un environnement VoIP avec ExaProtectCorrélation d'évènements dans un environnement VoIP avec ExaProtect
Corrélation d'évènements dans un environnement VoIP avec ExaProtectSylvain Maret
 
Protection Des Données avec la Biométrie Match On Card
Protection Des Données avec la Biométrie Match On CardProtection Des Données avec la Biométrie Match On Card
Protection Des Données avec la Biométrie Match On CardSylvain Maret
 

More from Sylvain Maret (20)

Air Navigation Service Providers - Unsecurity on Voice over IP Radion
Air Navigation Service Providers - Unsecurity on Voice over IP RadionAir Navigation Service Providers - Unsecurity on Voice over IP Radion
Air Navigation Service Providers - Unsecurity on Voice over IP Radion
 
factsheet_4g_critical_comm_en_vl
factsheet_4g_critical_comm_en_vlfactsheet_4g_critical_comm_en_vl
factsheet_4g_critical_comm_en_vl
 
INA Volume 1/3 Version 1.02 Released / Digital Identity and Authentication
INA Volume 1/3 Version 1.02 Released / Digital Identity and AuthenticationINA Volume 1/3 Version 1.02 Released / Digital Identity and Authentication
INA Volume 1/3 Version 1.02 Released / Digital Identity and Authentication
 
INA Volume 1/3 Version 1.0 Released / Digital Identity and Authentication
INA Volume 1/3 Version 1.0 Released / Digital Identity and AuthenticationINA Volume 1/3 Version 1.0 Released / Digital Identity and Authentication
INA Volume 1/3 Version 1.0 Released / Digital Identity and Authentication
 
INA Volume 1/3 Version 1.0 RC / Digital Identity and Authentication
INA Volume 1/3 Version 1.0 RC / Digital Identity and AuthenticationINA Volume 1/3 Version 1.0 RC / Digital Identity and Authentication
INA Volume 1/3 Version 1.0 RC / Digital Identity and Authentication
 
Securite des Web Services (SOAP vs REST) / OWASP Geneva dec. 2012
Securite des Web Services (SOAP vs REST) / OWASP Geneva dec. 2012Securite des Web Services (SOAP vs REST) / OWASP Geneva dec. 2012
Securite des Web Services (SOAP vs REST) / OWASP Geneva dec. 2012
 
Strong Authentication State of the Art 2012 / Sarajevo CSO
Strong Authentication State of the Art 2012 / Sarajevo CSOStrong Authentication State of the Art 2012 / Sarajevo CSO
Strong Authentication State of the Art 2012 / Sarajevo CSO
 
ASFWS 2012 / Initiation à la sécurité des Web Services par Sylvain Maret
ASFWS 2012 / Initiation à la sécurité des Web Services par Sylvain MaretASFWS 2012 / Initiation à la sécurité des Web Services par Sylvain Maret
ASFWS 2012 / Initiation à la sécurité des Web Services par Sylvain Maret
 
Strong Authentication in Web Application #SCS III
Strong Authentication in Web Application #SCS IIIStrong Authentication in Web Application #SCS III
Strong Authentication in Web Application #SCS III
 
Authentication and strong authentication for Web Application
Authentication and strong authentication for Web ApplicationAuthentication and strong authentication for Web Application
Authentication and strong authentication for Web Application
 
Geneva Application Security Forum 2010
Geneva Application Security Forum 2010Geneva Application Security Forum 2010
Geneva Application Security Forum 2010
 
Final conclusions of Working Group 3 at Workshop Münchenwiler 20-21 of May 20...
Final conclusions of Working Group 3 at Workshop Münchenwiler 20-21 of May 20...Final conclusions of Working Group 3 at Workshop Münchenwiler 20-21 of May 20...
Final conclusions of Working Group 3 at Workshop Münchenwiler 20-21 of May 20...
 
Comment protéger de façon efficace son/ses identité(s) numérique(s) sur le We...
Comment protéger de façon efficace son/ses identité(s) numérique(s) sur le We...Comment protéger de façon efficace son/ses identité(s) numérique(s) sur le We...
Comment protéger de façon efficace son/ses identité(s) numérique(s) sur le We...
 
Digital identity trust & confidence
Digital identity trust & confidenceDigital identity trust & confidence
Digital identity trust & confidence
 
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...
 
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...
 
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...
 
Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...Geneva Application Security Forum: Vers une authentification plus forte dans ...
Geneva Application Security Forum: Vers une authentification plus forte dans ...
 
Corrélation d'évènements dans un environnement VoIP avec ExaProtect
Corrélation d'évènements dans un environnement VoIP avec ExaProtectCorrélation d'évènements dans un environnement VoIP avec ExaProtect
Corrélation d'évènements dans un environnement VoIP avec ExaProtect
 
Protection Des Données avec la Biométrie Match On Card
Protection Des Données avec la Biométrie Match On CardProtection Des Données avec la Biométrie Match On Card
Protection Des Données avec la Biométrie Match On Card
 

MARET Consulting Presents Strong Authentication Technologies

  • 1. MARET Consulting | Boulevard Georges Favon 43 | CH 1204 Geneva | Tél +41 22 575 30 35 | info@maret-consulting.ch | www.maret-consulting.ch Implementation of a biometric solution providing strong authentication to gain access to confidential data Sylvain Maret / Security Architect @ MARET Consulting 17 march 2010 MARET Consulting 2010 Conseil en technologies
  • 2. Agenda Digital identity Security Strong authentication? Applications for the Match on Strong authentication technology Card technology Biometry and Match on Card Digital certificate / PKI Illustration with a project for the banking field Trends 2010 www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 3. Who am I? Security Expert 15 years of experience in ICT Security CEO and Founder of MARET Consulting Expert @ Engineer School of Yverdon & Geneva University Swiss French Area delegate at OpenID Switzerland Co-founder Geneva Application Security Forum Author of the Blog: la Citadelle Electronique Chosen field Digital Identity Security www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 4. Protection of digital identities: a topical issue… Identification www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 5. Strong authentication: why? Keylogger (hard and Soft) Malware Man in the Middle Browser in the Midle Password Sniffer Social Engineering Phishing / Pharming The number of identity thefts is increasing dramatically! www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 6. A major event in the world of strong authentication 12 October 2005: the Federal Financial Institutions Examination Council (FFIEC) issues a directive « Single Factor Authentication » is not enough for the web financial applications Before end 2006 it is compulsory to implement a strong authentication system http://www.ffiec.gov/press/pr101205.htm And the PCI DSS norm Compulsory strong authentication for distant accesses And now European regulations Payment Services (2007/64/CE) for banks www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 7. Identification and authentication ? Identification Who are you? Authentication Prove it! www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 8. Definition of strong authentication Strong Authentication on Wikipedia www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 9. «Digital identity is the corner stone of trust» More information on the subject www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 10. MARET Consulting | Boulevard Georges Favon 43 | CH 1204 Geneva | Tél +41 22 575 30 35 | info@maret-consulting.ch | www.maret-consulting.ch Strong authentication technologies Conseil en technologies
  • 11. Which strong authentication technology? www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 12. OTP PKI (HW) Biometry Strong * authentication Encryption Digital signature Non repudiation Strong link with the user * Biometry type Fingerprinting www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 13. Strong authentication: Technologies on the move Corporations Public eBanking VPN Web Applications Mobility Electronic Document Mgt Social networks Facebook Project PIV FIPS-201 SAML Virtual World Adoption of OpenID Authentication as a Service Cloud Computing AaaS Google docs Sales Forces www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 14. Technologies accessible to everyone Standards Open Source Solution Open Authentication Mobile One Time Passwords (OATH) strong, two-factor authentication with mobile phones OATH authentication algorithms HOTP (HMAC Event Based) OCRA (Challenge/Response) TOTP (Time Based) OATH Token Identifier Specification www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 15. MARET Consulting | Boulevard Georges Favon 43 | CH 1204 Geneva | Tél +41 22 575 30 35 | info@maret-consulting.ch | www.maret-consulting.ch Biometry and Match on Card Conseil en technologies
  • 16. Which biometric technology for IT? www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 17. Biometry = strong authentication? The answer is clearly no Requires a second factor Problem of security (usurpation) Only a convenience for the user More information on usurpation Study Yokohama University www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 18. Technology Match on Card: your NIP code is your finger www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 19. Example of Match on Card technology for IT A reader Biometry SmartCard A card with chip Technology MOC Crypto processor PC/SC PKCS#11 Digital certificate X509 www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 20. Stocking data? On an external Through an medium authentication server Better security Security issue « Offline » mode Confidentiality issue MOC = Match On card Availability issue Federal law of 19 June 1992 on the Protection of data (LPD) www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 21. Example of utilisation of the Match on Card technology Smart Card Logon of Web SSO Solution Microsoft SAML PK-INIT (Kerberos) Citrix Very Sensitive Web Applications Remote access Electronic Document Mgt VPN SSL eBanking VPN IPSEC Data Encryption Digital Signature Solution Laptop encryption Folder (Share) Encryption Etc. www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 22. Mobility security with MOC technology Biometric strong authentication Reader of the «swipe» type X509 machine certificate Utilisation TPM Authentication of the machine Applications Pre Boot Authentication Smart Card Logon Full Disk Encryption VPN (SSL, IPSEC) Web Application Citrix www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 23. Authentication of a user with PKINIT (Smart Card Logon) 1 U_Cert U Cert 2 2 Schema by Philippe Logean e-Xpert Solutions SA www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 24. Feedback from the Banking field www.maret-consulting.ch Conseil en technologies
  • 25. The project: electronic management of documents Implementation of a Electronic Document Mgt solution Access to very sensitive information Classification of the information: Secret Encryption of data (From BIA) Authorization Access Control Project for a Private bank in Switzerland Start of the project: 2005 Population concerned 500 persons (Phase I) In the long run: 3000 persons (Phase II) www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 26. Business Impact Analysis (BIA) BIA Bank Acme SA Data Services Impact Hard Impact Soft Impact Availability (in time) Reduced i ncome Los s of goodwi l l Increa s ed cos t of Los s of credi bi l i ty IT Applications worki ng Breach of the l aw Confidentiality Integrity Los s of opera ti ona l ca pabi l i ty inconvenience quite serious critical Brea ch of contra ct/fi na nci a l pena l ti es Electronic Documents Mgt HIGH HIGH 30 min 1H 2H HIGH HIGH www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 27. (Data Classification : Secret) Implementation of a technology allowing strong authentication – via a mechanism of irrefutable proof – of the users accessing the bank’s information system Who accesses what, when and how?! www.maret-consulting.ch Conseil en technologies
  • 28. The technical constraints of the strong authentication project Mandatory Desired Integration with existing Integration with building security applications Data encryption Web Non fixed workstations Microsoft Smart Card Logon Future applications Laptop Network and systems Separation of roles Strong authentication Four eyes Digital signature Auditing, proof Proof management www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 29. Basic concept: a unique link Identity Management Authorization Management Issuer App A cert Link: cn User PHASE 1 PHASE 2 Strong authentication Authorization www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 30. Components of the technical architecture Implementation of a PKI « intra muros » Non Microsoft (Separation of duties) Implementation of the Online revocation OCSP protocol Utilisation of a Hardware Security Module Security of the PKI architecture Shielding and Hardening Firewall IDS FIA www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 31. Concept for the GED application security www.maret-consulting.ch Conseil en technologies
  • 32. The focus of biometric authentication www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 33. Processus Human Process Humain www.maret-consulting.ch Conseil en technologies
  • 34. The weak link? Matters more than the technique… Definition of roles Tasks and responsibilities Purpose: separation of duties Four eyes Implementation of identity management processes Implementation of operating procedures www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 35. Implementation of processes Processes for the identity management team User enrollment Revocation Incident mangement Loss, theft, forgotten card Renewal Process for Help Desk Process for the Auditors Process for the RSSI And the operating procedures! www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 36. The result A series of documents for the bank Operating procedures Description of processes Terms of use Definition of roles and responsibilities CP /CPS for the « in house » PKI www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 37. Training www.maret-consulting.ch Conseil en technologies
  • 38. A crucial element! Training of the identity management team Training of users Training of Help Desk Training for the technologies PKI Biometry www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 39. Identity Management Team Training Very Important work How to enroll fingers Match on Card Technology Problem handling Technical Human Coaching for 3 weeks www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 40. End User Training About 30 min per User Technology explication Match on Card Finger position Try (Play with Biometry) Document for End Users Signature (Legal Usage) www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 41. Problems… www.maret-consulting.ch Conseil en technologies
  • 42. Some examples Enrollment with some Users End Users convocation Technical Problem on Validation Authority OCSP Servers www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 43. Feedback? www.maret-consulting.ch Conseil en technologies
  • 44. Conclusion of the project Pure technique is a minor Biometry is a mature technology element in the success of such a large scale project Technology PKI Offers a safety kernel for the future Never under estimate the Encryption, signature organisational aspect Rights management information CP / CPS for the PKI Data security Management process A step towards convergence Ask for management support Physical and logical security www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 45. Tendency Biometry Match on Card The PIV Fips-201 project is a leader! Convergence Physical security and logical security Biometric sensor for laptops UPEK (Solution FIPS-201) New biometric technologies Full Disk Encryption (Laptop) Support of the Match on Card technology McAfee Endpoint Encryption™ (formerly SafeBoot® Encryption) Win Magic SecureDoc Disk Encryption www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 46. A very promising technology: Vascular Pattern Recognition By SONY www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 47. When will the convergence happen? A difficult convergence! Physical security and logical security www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 48. A few links to deepen the subject MARET Consulting http://maret-consulting.ch/ La Citadelle Electronique (blog on digital identities) http://www.citadelle-electronique.net/ Banking and finance article Steal an identity? Impossible with biometry! http://www.banque-finance.ch/numeros/88/59.pdf Biometry and Mobility http://www.banque-finance.ch/numeros/97/62.pdf Publique presentations OSSIR Paris 2009: Feedback on the deployment of biometry on a large scale http://www.ossir.org/paris/supports/2009/2009-10-13/Sylvain_Maret_Biometrie.pdf ISACA, Clusis: Access to information : Roles and responsibilities http://blog.b3b.ch/wp-content/uploads/mise-en-oeuvre-de28099une-solution-biometrique- de28099authentification-forte.pdf www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 49. “The counseling and the expertise for the selection and the implementation of innovative technologies in the field of security of information systems and digital identity" www.maret-consulting.ch Conseil en technologies
  • 50. MARET Consulting | Boulevard Georges Favon 43 | CH 1204 Geneva | Tél +41 22 575 30 35 | info@maret-consulting.ch | www.maret-consulting.ch Annexes Conseil en technologies Security Summit Milano, march 2010
  • 51. Processus Authentifiers inHumain 2010 www.maret-consulting.ch Conseil en technologies
  • 52. OTP Software using SmartPhone OTP for iPhone: a feedback Software OTP for iPhone Mobile One Time Passwords www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 53. Biometry Match on Card Feedback on the deployment of biometry on a large scale www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 54. The focus of biometric authentication www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 55. USB Token www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 56. Internet Passport www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 57. Matrix cryptography www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 58. PKI: Digital certificate X509 Software Certificate Hardware Certificate www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 59. OTP via SMS OTP via SMS Enter OTP www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 60. State of the art in 2010 of the authentifiers: Synthesis Technologies Explanations OTP Software One Time Password software SmartPhone Event, Time or mode challenge response Mode not connected Biometry Match on Biometry and chip card Card Digital certificate Stocking of the Biometric pattern USB Token One Time Password in mode connected Event, Time ou mode challenge response Internet Passport Biometry One Time Password Mode not connected Mode challenge response Matrix cryptography One Time Password Mode challenge response PKI Certificate software Certificaet Hardware OTP SMS One Time Password by SMS www.maret-consulting.ch Conseil en technologies
  • 61. Processus Integration with web applications Humain www.maret-consulting.ch Conseil en technologies
  • 62. Web application with a basic authentication www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 63. Web application towards a strong authentication? www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 64. “Shielding” approach - (Perimetric Authentication) www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 65. Approach by Module or Agents www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 66. Approach API / SDK www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 67. SSL PKI: how does it work? Validation Authority OCSP request Valide Pas valide Inconu SSL / TLS Mutual Authentication Alice Web Server www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 68. Approach federation of identity a change of paradigm www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 69. Approach federation of identity a change of paradigm www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 70. Approach federation of identity www.maret-consulting.ch Conseil en technologies Security Summit Milano, march 2010
  • 71. Approaches for an integration of the strong authentication Approaches Examples Shielding Utilisation of a protective third party compnent (Perimetric Auth) Such as a Reverse Proxy (Web Application Firewall) Module Utilisation of a software module (Agents) Such as an Apache module, a SecurID agent, etc. Utilisation of a protocol such as Radius API Development via an API (SDK) For instance by using the Web Services (SOAP) SSL PKI Utilisation of a certificate X509 Utilisation of SSL/TLS functionalities PKI Ready Identity Federation Utilisation of a federation protocol such as SAML, OpenID, Others PKI application, etc. www.maret-consulting.ch Conseil en technologies