SlideShare a Scribd company logo
PkBox as simple and secure cloud electronic
signature creation and validation solution
Giuseppe Damiano
CTO B.U. Products Intesi Group│ gdamiamo@intesigroup.com
Andrea Caccia
Consultant │ andrea.caccia@studiocaccia.com
ETSI Security week │ eIDAS Thematic stream │ Sophia Antipolis 25 June 2015
Intesi Group at a glance
Intesi Group is an Italian private company that operates in the ICT industry offering specialized
professional services, products with high technological content and advanced cloud solutions.
Entirely self-funded, Intesi Group has been since 1998, when it was established,
in steady and rapid growth.
With 2014 revenues of EUR 10 million and more than 100 highly skilled professionals,
Intesi Group is the ideal partner for those who want to integrate advanced technologies
in a fast and reliable way.
Specialized skills, established references and adherence to organizational models are the
elements that distinguish Intesi Group.
2/12
3/12
PkBox 3.0.3 – Architecture
4/12
PkBox COD
Signature
Engine
Time4ID
OTP
Engine
Sign Credentials
Time4ID Seeds
HSM Device
#SecurityFirst
Security of sensitive information
ensured by Thales HSM
Two Factor Authetication – HSM
password and OTP validation
Signature Keys and OTP Seeds are
protected by the HSM
PkBox: main features
Milions of signature credentials and OTPs managed
Performances: several hundreds of signatures/sec
Scalability: load balancing and multi thier architectures
High reliability: one central DB for all PkBox (SSCD)
Easy to use: high level API
Signature formats: CAdES, PAdES, XAdES, S/MIME, …
Complete Validation Authority Functionalities
Authentication OATH OTP (Time & Event based): Mobile App, Mobile SDK and SMS
Multivendor OTP: Vasco, RSA, Safenet, Gemalto, McAfee
5/12
Cloud
Apps
Cloud
Apps
Use cases
6/12
Remote
Banking
Mobile
Wallet
Cloud
Apps
PkBox
COD
PkBox
COD
Mobile
Banking
Strong
Authentication
Strong
Authentication
and
Qualified Signature
Strong
Authentication
and
Qualified Signature
Internet
Remote Signature
eCommerce
Contracts signature
Strong Authentication
Industries
The first 3 most important Italian Banks (contracts signature, eInvoicing, …)
3 Italian Certification Authorities (Remote Signature Services)
2 Public Body Providers (eInvoicing)
Several small and medium banks
Universities
Outsourcing services for banks
Insurances
7/12
OnpremiseAsaservice
Strengths
Paperless
Acceleration of all processes – above all new clients acqusition
Costs saving
Security
Up to date platform
8/12
PkBox in numbers
2 milion active users, distribuited as follow:
10 Banks
20 Universities
3 Certification Authorities
2 Outsourcing Services Companies
4 Insurances
10 Public Bodies
10 Manufactoring Enterprises
9/12
PkBox was confirmed as SSCD and can be
used to implement Remote Qualified
Electronic Signature solutions
PkBox has been confirmed as a Secure Signature Creation Device (SSCD) by A-SIT (Austria - Secure Information Technology
Center) the body designated by Austria according to the Article 3(4) of the Directive 1999/93/EC to comply with the
requirements set out in Annex III of the Directive and can therefore be used for the realization of Remote Qualified Electronic
Signature solutions with full legal validity.
The confirmation certificate is valid in all the member States of the European Union according to Article 3(4): "The conformity of
secure signature-creation-devices with the requirements laid down in Annex III shall be determined by appropriate public or private
bodies designated by Member States. [...] A determination of conformity with the requirements laid down in Annex III made by the
bodies referred to in the first subparagraph shall be recognised by all Member States
The eIDAS Regulation extends the validity of Article3(4) of the Directive 93/1999/93/EC after the its repeal. Article 51(1)
reads: "Secure signature creation devices of which the conformity has been determined in accordance with Article 3(4) of Directive
1999/93/EC shall be considered as qualified electronic signature creation devices under this Regulation"
10/12
The eIDAS Regulation recognizes the
benefits of remote electronic signatures
Recital (52): The creation of remote electronic signatures, where the electronic signature
creation environment is managed by a trust service provider on behalf of the signatory, is set to
increase in the light of its multiple economic benefits. However, in order to ensure that such
electronic signatures receive the same legal recognition as electronic signatures created in an
entirely user-managed environment, remote electronic signature service providers should
apply specific management and administrative security procedures and use trustworthy
systems and products, including secure electronic communication channels, in order to
guarantee that the electronic signature creation environment is reliable and is used under
the sole control of the signatory. Where a qualified electronic signature has been created using a
remote electronic signature creation device, the requirements applicable to qualified trust service
providers set out in this Regulation should apply.
11/12
Requirements for Qualified remote
electronic signature solutions from the
eIDAS Regulation
Recital 55 states that "IT security certification based on international standards such as ISO 15408 and
related evaluation methods and mutual recognition arrangements is an important tool for verifying the security of
qualified electronic signature creation devices and should be promoted"
It should be read in combination with recital 52: "remote electronic signature service providers should apply
specific management and administrative security procedures and use trustworthy systems and
products, including secure electronic communication channels, in order to guarantee that the electronic
signature creation environment is reliable and is used under the sole control of the signatory"
According to article 30, the Certification of qualified electronic signature creation devices shall be based on a
security evaluation process carried out in accordance with one of the standards for the security assessment of
information technology products present in a list to be established by the Commission.
12/12
Qualified remote electronic signature
solutions under the eIDAS Regulation:
a proposal
A remote signature solution is in general the combination of software and an HSM hosted by a TSP.
Our proposal is that the certification of the SSCD is a combination of:
ISO 15408 certification of the HSM for Signatory key pair generation, storage and signature creation
Define a specific qualification path for TSPs offering the service by developing a specific policy and
security requirement standard, based on TS 419 241 (Security Requirements for Trustworthy
Systems Supporting Server Signing) or its evolution, to be assessed by a Conformity Assessment
Body accredited with EN 319 403 and under supervision
13/12
Security Pill of the day
14/12
Security is an attitude: learn it with a game!
www.catchergame.com
Intesi Group S.p.A.
Via Torino, 48 - 20123 Milano
T. +39 02 6760641
www.intesigroup.com
intesi@intesigroup.com

More Related Content

What's hot

raonsecure_en_min
raonsecure_en_minraonsecure_en_min
raonsecure_en_min
Matthew Shin
 
Digital signature certificate
Digital signature certificateDigital signature certificate
Digital signature certificate
Ashvini Soni
 
Merchant Responsibilities According to the Payment Card Industry
Merchant Responsibilities According to the Payment Card IndustryMerchant Responsibilities According to the Payment Card Industry
Merchant Responsibilities According to the Payment Card Industry
Allied Wallet
 
EuroPriSe and ISDP 10003 2015
EuroPriSe and ISDP 10003 2015EuroPriSe and ISDP 10003 2015
EuroPriSe and ISDP 10003 2015
Marco Moreschini
 
FIDO Authentication for Multifactor Payments
FIDO Authentication for Multifactor PaymentsFIDO Authentication for Multifactor Payments
FIDO Authentication for Multifactor Payments
FIDO Alliance
 
Apani PCI-DSS Compliance
Apani PCI-DSS ComplianceApani PCI-DSS Compliance
Apani PCI-DSS Compliance
Apani Enterprise Security Software
 
Experto
ExpertoExperto
Experto
idhmi
 
Privacy Preserving Biometrics-Based and User Centric Authentication Protocol
Privacy Preserving Biometrics-Based and User Centric Authentication ProtocolPrivacy Preserving Biometrics-Based and User Centric Authentication Protocol
Privacy Preserving Biometrics-Based and User Centric Authentication Protocol
HasiniG
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions Portfolio
Entrust Datacard
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
Information Security Services SA
 
PCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAINING
PCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAININGPCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAINING
PCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAINING
himalya sharma
 
Using ePassports for online authentication - ICT Delta 2010
Using ePassports for online authentication - ICT Delta 2010Using ePassports for online authentication - ICT Delta 2010
Using ePassports for online authentication - ICT Delta 2010
wegdam
 
Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010
Erik Ginalick
 
Tizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.pptTizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.ppt
webhostingguy
 
P0 Pcidss Overview
P0 Pcidss OverviewP0 Pcidss Overview
P0 Pcidss Overview
b28stu
 
Security
SecuritySecurity
Security
Bilcareltd
 

What's hot (16)

raonsecure_en_min
raonsecure_en_minraonsecure_en_min
raonsecure_en_min
 
Digital signature certificate
Digital signature certificateDigital signature certificate
Digital signature certificate
 
Merchant Responsibilities According to the Payment Card Industry
Merchant Responsibilities According to the Payment Card IndustryMerchant Responsibilities According to the Payment Card Industry
Merchant Responsibilities According to the Payment Card Industry
 
EuroPriSe and ISDP 10003 2015
EuroPriSe and ISDP 10003 2015EuroPriSe and ISDP 10003 2015
EuroPriSe and ISDP 10003 2015
 
FIDO Authentication for Multifactor Payments
FIDO Authentication for Multifactor PaymentsFIDO Authentication for Multifactor Payments
FIDO Authentication for Multifactor Payments
 
Apani PCI-DSS Compliance
Apani PCI-DSS ComplianceApani PCI-DSS Compliance
Apani PCI-DSS Compliance
 
Experto
ExpertoExperto
Experto
 
Privacy Preserving Biometrics-Based and User Centric Authentication Protocol
Privacy Preserving Biometrics-Based and User Centric Authentication ProtocolPrivacy Preserving Biometrics-Based and User Centric Authentication Protocol
Privacy Preserving Biometrics-Based and User Centric Authentication Protocol
 
Entrust Solutions Portfolio
Entrust Solutions PortfolioEntrust Solutions Portfolio
Entrust Solutions Portfolio
 
ISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de EntrustISS SA le presenta IdentityGuard de Entrust
ISS SA le presenta IdentityGuard de Entrust
 
PCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAINING
PCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAININGPCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAINING
PCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAINING
 
Using ePassports for online authentication - ICT Delta 2010
Using ePassports for online authentication - ICT Delta 2010Using ePassports for online authentication - ICT Delta 2010
Using ePassports for online authentication - ICT Delta 2010
 
Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010
 
Tizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.pptTizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.ppt
 
P0 Pcidss Overview
P0 Pcidss OverviewP0 Pcidss Overview
P0 Pcidss Overview
 
Security
SecuritySecurity
Security
 

Similar to proposal on assessment of qualified signature creation devices compliant with #eIDAS

General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airports
Chas Yap
 
Information technology-act 2000
Information technology-act 2000Information technology-act 2000
Information technology-act 2000
Onkar Sule
 
Enisa report e idas compliant eid solution
Enisa report   e idas compliant eid solutionEnisa report   e idas compliant eid solution
Enisa report e idas compliant eid solution
Ali Soleymani
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
shahulgk
 
Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2
Suryadev Maity
 
ECIL: EU Cybersecurity Package and EU Certification Framework
ECIL: EU Cybersecurity Package and EU Certification FrameworkECIL: EU Cybersecurity Package and EU Certification Framework
ECIL: EU Cybersecurity Package and EU Certification Framework
Deutsche Telekom AG
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
SuvabrataSamanta
 
Information Technology Act 2000 An Overview
Information Technology Act 2000  An OverviewInformation Technology Act 2000  An Overview
Information Technology Act 2000 An Overview
Anubhav
 
MEDINA brochure 2023
MEDINA brochure 2023MEDINA brochure 2023
MEDINA brochure 2023
MEDINA
 
eIDAS Reference Guide
eIDAS Reference GuideeIDAS Reference Guide
eIDAS Reference Guide
SafeNet
 
Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...
Pierre-Jean Verrando
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
Diya Mirza
 
PSD2 and the Cyber Security Related Challenges Facing the Financial Services ...
PSD2 and the Cyber Security Related Challenges Facing the Financial Services ...PSD2 and the Cyber Security Related Challenges Facing the Financial Services ...
PSD2 and the Cyber Security Related Challenges Facing the Financial Services ...
Roderick Hodgson
 
Improving System Security and User Privacy in Secure Electronic Transaction (...
Improving System Security and User Privacy in Secure Electronic Transaction (...Improving System Security and User Privacy in Secure Electronic Transaction (...
Improving System Security and User Privacy in Secure Electronic Transaction (...
IJERA Editor
 
case-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_encase-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_en
Alix Murphy
 
Mobile_Security_En
Mobile_Security_EnMobile_Security_En
Mobile_Security_En
de77
 
FAD® | Autograph signature on electronic media
FAD® | Autograph signature on electronic mediaFAD® | Autograph signature on electronic media
FAD® | Autograph signature on electronic media
Firma Autógrafa Digital
 
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ... Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
FinTech Belgium
 
Towards Continuous Security Compliance in the Cloud Continuum -MEDINA Project...
Towards Continuous Security Compliance in the Cloud Continuum -MEDINA Project...Towards Continuous Security Compliance in the Cloud Continuum -MEDINA Project...
Towards Continuous Security Compliance in the Cloud Continuum -MEDINA Project...
MEDINA
 
An Integrated Solution for Runtime Compliance Governance in SOA
An Integrated Solution for Runtime Compliance Governance in SOAAn Integrated Solution for Runtime Compliance Governance in SOA
An Integrated Solution for Runtime Compliance Governance in SOA
Aliaksandr Birukou
 

Similar to proposal on assessment of qualified signature creation devices compliant with #eIDAS (20)

General discussion paper for airports
General discussion paper for airportsGeneral discussion paper for airports
General discussion paper for airports
 
Information technology-act 2000
Information technology-act 2000Information technology-act 2000
Information technology-act 2000
 
Enisa report e idas compliant eid solution
Enisa report   e idas compliant eid solutionEnisa report   e idas compliant eid solution
Enisa report e idas compliant eid solution
 
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).pptInformation-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
Information-Technology-Act 2000- An overview-sethassociatesppt (1).ppt
 
Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2Information technology-act2000-120112080011-phpapp02 2
Information technology-act2000-120112080011-phpapp02 2
 
ECIL: EU Cybersecurity Package and EU Certification Framework
ECIL: EU Cybersecurity Package and EU Certification FrameworkECIL: EU Cybersecurity Package and EU Certification Framework
ECIL: EU Cybersecurity Package and EU Certification Framework
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
Information Technology Act 2000 An Overview
Information Technology Act 2000  An OverviewInformation Technology Act 2000  An Overview
Information Technology Act 2000 An Overview
 
MEDINA brochure 2023
MEDINA brochure 2023MEDINA brochure 2023
MEDINA brochure 2023
 
eIDAS Reference Guide
eIDAS Reference GuideeIDAS Reference Guide
eIDAS Reference Guide
 
Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...
 
Information technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatespptInformation technology-act 2000- an overview-sethassociatesppt
Information technology-act 2000- an overview-sethassociatesppt
 
PSD2 and the Cyber Security Related Challenges Facing the Financial Services ...
PSD2 and the Cyber Security Related Challenges Facing the Financial Services ...PSD2 and the Cyber Security Related Challenges Facing the Financial Services ...
PSD2 and the Cyber Security Related Challenges Facing the Financial Services ...
 
Improving System Security and User Privacy in Secure Electronic Transaction (...
Improving System Security and User Privacy in Secure Electronic Transaction (...Improving System Security and User Privacy in Secure Electronic Transaction (...
Improving System Security and User Privacy in Secure Electronic Transaction (...
 
case-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_encase-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_en
 
Mobile_Security_En
Mobile_Security_EnMobile_Security_En
Mobile_Security_En
 
FAD® | Autograph signature on electronic media
FAD® | Autograph signature on electronic mediaFAD® | Autograph signature on electronic media
FAD® | Autograph signature on electronic media
 
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ... Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 
Towards Continuous Security Compliance in the Cloud Continuum -MEDINA Project...
Towards Continuous Security Compliance in the Cloud Continuum -MEDINA Project...Towards Continuous Security Compliance in the Cloud Continuum -MEDINA Project...
Towards Continuous Security Compliance in the Cloud Continuum -MEDINA Project...
 
An Integrated Solution for Runtime Compliance Governance in SOA
An Integrated Solution for Runtime Compliance Governance in SOAAn Integrated Solution for Runtime Compliance Governance in SOA
An Integrated Solution for Runtime Compliance Governance in SOA
 

More from Andrea Caccia

La PEC e l’Europa: quale evoluzione?
La PEC e l’Europa: quale evoluzione?La PEC e l’Europa: quale evoluzione?
La PEC e l’Europa: quale evoluzione?
Andrea Caccia
 
CEN/TC 445 newsletter 2017-1
CEN/TC 445 newsletter 2017-1CEN/TC 445 newsletter 2017-1
CEN/TC 445 newsletter 2017-1
Andrea Caccia
 
The adoption of e-invoicing in public procurement - Guidance paper for eu pub...
The adoption of e-invoicing in public procurement - Guidance paper for eu pub...The adoption of e-invoicing in public procurement - Guidance paper for eu pub...
The adoption of e-invoicing in public procurement - Guidance paper for eu pub...
Andrea Caccia
 
Consulta Stati Generali dell'Innovazione
Consulta Stati Generali dell'InnovazioneConsulta Stati Generali dell'Innovazione
Consulta Stati Generali dell'Innovazione
Andrea Caccia
 
Sviluppo dello standard europeo per la "Core Invoice"
Sviluppo dello standard europeo per la  "Core Invoice"Sviluppo dello standard europeo per la  "Core Invoice"
Sviluppo dello standard europeo per la "Core Invoice"
Andrea Caccia
 
I-AM Association 1p-1uid
I-AM Association 1p-1uidI-AM Association 1p-1uid
I-AM Association 1p-1uidAndrea Caccia
 

More from Andrea Caccia (6)

La PEC e l’Europa: quale evoluzione?
La PEC e l’Europa: quale evoluzione?La PEC e l’Europa: quale evoluzione?
La PEC e l’Europa: quale evoluzione?
 
CEN/TC 445 newsletter 2017-1
CEN/TC 445 newsletter 2017-1CEN/TC 445 newsletter 2017-1
CEN/TC 445 newsletter 2017-1
 
The adoption of e-invoicing in public procurement - Guidance paper for eu pub...
The adoption of e-invoicing in public procurement - Guidance paper for eu pub...The adoption of e-invoicing in public procurement - Guidance paper for eu pub...
The adoption of e-invoicing in public procurement - Guidance paper for eu pub...
 
Consulta Stati Generali dell'Innovazione
Consulta Stati Generali dell'InnovazioneConsulta Stati Generali dell'Innovazione
Consulta Stati Generali dell'Innovazione
 
Sviluppo dello standard europeo per la "Core Invoice"
Sviluppo dello standard europeo per la  "Core Invoice"Sviluppo dello standard europeo per la  "Core Invoice"
Sviluppo dello standard europeo per la "Core Invoice"
 
I-AM Association 1p-1uid
I-AM Association 1p-1uidI-AM Association 1p-1uid
I-AM Association 1p-1uid
 

Recently uploaded

Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
Tobias Schneck
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
AlexanderRichford
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
DianaGray10
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptxAI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
Sunil Jagani
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
leebarnesutopia
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
manji sharman06
 

Recently uploaded (20)

Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptxAI in the Workplace Reskilling, Upskilling, and Future Work.pptx
AI in the Workplace Reskilling, Upskilling, and Future Work.pptx
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
 

proposal on assessment of qualified signature creation devices compliant with #eIDAS

  • 1. PkBox as simple and secure cloud electronic signature creation and validation solution Giuseppe Damiano CTO B.U. Products Intesi Group│ gdamiamo@intesigroup.com Andrea Caccia Consultant │ andrea.caccia@studiocaccia.com ETSI Security week │ eIDAS Thematic stream │ Sophia Antipolis 25 June 2015
  • 2. Intesi Group at a glance Intesi Group is an Italian private company that operates in the ICT industry offering specialized professional services, products with high technological content and advanced cloud solutions. Entirely self-funded, Intesi Group has been since 1998, when it was established, in steady and rapid growth. With 2014 revenues of EUR 10 million and more than 100 highly skilled professionals, Intesi Group is the ideal partner for those who want to integrate advanced technologies in a fast and reliable way. Specialized skills, established references and adherence to organizational models are the elements that distinguish Intesi Group. 2/12
  • 4. PkBox 3.0.3 – Architecture 4/12 PkBox COD Signature Engine Time4ID OTP Engine Sign Credentials Time4ID Seeds HSM Device #SecurityFirst Security of sensitive information ensured by Thales HSM Two Factor Authetication – HSM password and OTP validation Signature Keys and OTP Seeds are protected by the HSM
  • 5. PkBox: main features Milions of signature credentials and OTPs managed Performances: several hundreds of signatures/sec Scalability: load balancing and multi thier architectures High reliability: one central DB for all PkBox (SSCD) Easy to use: high level API Signature formats: CAdES, PAdES, XAdES, S/MIME, … Complete Validation Authority Functionalities Authentication OATH OTP (Time & Event based): Mobile App, Mobile SDK and SMS Multivendor OTP: Vasco, RSA, Safenet, Gemalto, McAfee 5/12
  • 7. Industries The first 3 most important Italian Banks (contracts signature, eInvoicing, …) 3 Italian Certification Authorities (Remote Signature Services) 2 Public Body Providers (eInvoicing) Several small and medium banks Universities Outsourcing services for banks Insurances 7/12 OnpremiseAsaservice
  • 8. Strengths Paperless Acceleration of all processes – above all new clients acqusition Costs saving Security Up to date platform 8/12
  • 9. PkBox in numbers 2 milion active users, distribuited as follow: 10 Banks 20 Universities 3 Certification Authorities 2 Outsourcing Services Companies 4 Insurances 10 Public Bodies 10 Manufactoring Enterprises 9/12
  • 10. PkBox was confirmed as SSCD and can be used to implement Remote Qualified Electronic Signature solutions PkBox has been confirmed as a Secure Signature Creation Device (SSCD) by A-SIT (Austria - Secure Information Technology Center) the body designated by Austria according to the Article 3(4) of the Directive 1999/93/EC to comply with the requirements set out in Annex III of the Directive and can therefore be used for the realization of Remote Qualified Electronic Signature solutions with full legal validity. The confirmation certificate is valid in all the member States of the European Union according to Article 3(4): "The conformity of secure signature-creation-devices with the requirements laid down in Annex III shall be determined by appropriate public or private bodies designated by Member States. [...] A determination of conformity with the requirements laid down in Annex III made by the bodies referred to in the first subparagraph shall be recognised by all Member States The eIDAS Regulation extends the validity of Article3(4) of the Directive 93/1999/93/EC after the its repeal. Article 51(1) reads: "Secure signature creation devices of which the conformity has been determined in accordance with Article 3(4) of Directive 1999/93/EC shall be considered as qualified electronic signature creation devices under this Regulation" 10/12
  • 11. The eIDAS Regulation recognizes the benefits of remote electronic signatures Recital (52): The creation of remote electronic signatures, where the electronic signature creation environment is managed by a trust service provider on behalf of the signatory, is set to increase in the light of its multiple economic benefits. However, in order to ensure that such electronic signatures receive the same legal recognition as electronic signatures created in an entirely user-managed environment, remote electronic signature service providers should apply specific management and administrative security procedures and use trustworthy systems and products, including secure electronic communication channels, in order to guarantee that the electronic signature creation environment is reliable and is used under the sole control of the signatory. Where a qualified electronic signature has been created using a remote electronic signature creation device, the requirements applicable to qualified trust service providers set out in this Regulation should apply. 11/12
  • 12. Requirements for Qualified remote electronic signature solutions from the eIDAS Regulation Recital 55 states that "IT security certification based on international standards such as ISO 15408 and related evaluation methods and mutual recognition arrangements is an important tool for verifying the security of qualified electronic signature creation devices and should be promoted" It should be read in combination with recital 52: "remote electronic signature service providers should apply specific management and administrative security procedures and use trustworthy systems and products, including secure electronic communication channels, in order to guarantee that the electronic signature creation environment is reliable and is used under the sole control of the signatory" According to article 30, the Certification of qualified electronic signature creation devices shall be based on a security evaluation process carried out in accordance with one of the standards for the security assessment of information technology products present in a list to be established by the Commission. 12/12
  • 13. Qualified remote electronic signature solutions under the eIDAS Regulation: a proposal A remote signature solution is in general the combination of software and an HSM hosted by a TSP. Our proposal is that the certification of the SSCD is a combination of: ISO 15408 certification of the HSM for Signatory key pair generation, storage and signature creation Define a specific qualification path for TSPs offering the service by developing a specific policy and security requirement standard, based on TS 419 241 (Security Requirements for Trustworthy Systems Supporting Server Signing) or its evolution, to be assessed by a Conformity Assessment Body accredited with EN 319 403 and under supervision 13/12
  • 14. Security Pill of the day 14/12 Security is an attitude: learn it with a game! www.catchergame.com
  • 15. Intesi Group S.p.A. Via Torino, 48 - 20123 Milano T. +39 02 6760641 www.intesigroup.com intesi@intesigroup.com