WindTalker VECTOR™
Transcription
WindTalker VECTOR™
WindTalker VECTOR™ Baseline Configuration Build 2.1 Introduction _____________________________________________________________________________________ This document serves as the master features descriptions for WindTalker VECTOR™. Terminology used in this document is in accordance with the WindTalker Terminology Guide published separately from this document. This document does not specify any system requirements unless anecdotally. Format of Feature Descriptions ________________________________________________________________ Feature Name Short description of what the feature does or performs will be presented next. Detailed implications for the User will be presented next, to provide the effect of using this feature, as well as any benefits of using the particular feature. Feature Categories ____________________________________________________________________________ • • • • • General Credentialing & Profiles Key Archival & Vaulting Filtering & Geo-Fencing Role Key Tiers These categories are designed to organize this document into realistic segments for readability. Features of this system can be reorganized for collateral as desired. The purpose of this document is to outline with specificity the features of the baseline WindTalker VECTOR™. This includes the WindTalker VECTOR™, the Controller Application, and the SDKs. Note about the Controller Application: The WindTalker Controller application is where most of the WindTalker features are managed. For this reason, the features are broken down into logical categories. WindTalker™: set your data free www.windtalkersecurity.com SECTION 1: General Features _________________________________________________________________ Key Serving WindTalker serves cryptographic keys across any IP-addressable network. WindTalker is a standardized web service. The system abstracts the concept of a cryptographic key into what is known as Role Keys. Role Keys provide all the cryptographic material to derive keys to be used for confidentiality and integrity of sensitive information, as well as other data fields to provide rapid and easily identifiable characteristics to a given Role Key such as a name and color. There are two distinct and separate services on a VECTOR server. The first is used by plug-ins and WindTalker-enabled applications to provide Role Keys and their derived encryption key material. The second is a more restricted service accessed by the WindTalker Controller application, for managing the system. Controller Application WindTalker comes with a robust Controller application to manage the system. The WindTalker Controller is how administrators manage the WindTalker system. It is designed to be accessed remotely as a remote application. This helps prevent man-in-the-middle intercepts while allowing remote access to the application for system administrators. A built-in virtual keyboard can be used to prevent key-logging attempts on systems where the Controller Application is installed. Additionally, the Controller Application uses the same secure connection technology for management processes as it does for normal Role Key security requests made by plug-ins and other WindTalkerenabled software. Throughout this document, various features will refer to their management via the Controller application. No Certificates Required X509 certificates require an existing Public Key Infrastructure (PKI). WindTalker doesn’t need them. WindTalker’s advanced connection technology uses dual elliptic curve Diffie-hellman (ECDH) exchanges with advanced protections against man-in-the-middle attacks.. WindTalker requires this secure connectivity for everything that uses the VECTOR system. WindTalker’s secure tunnel seamlessly works within an organization’s existing network security controls (SSL, TLS, IPSec, VPN, etc.) but does not require them for secure communications. WindTalker can be used over both secure and insecure networks. Holistic Key Management A few keys can unlock a world of easy data protection – anywhere, any time. WindTalker is a holistic way to secure the cloud. Your data can protect itself anywhere. The same blue ‘Operations’ Role Key can secure your Word documents, your phone calls, your text and chat, and even your stored database – in any database. WindTalker is a single comprehensive tool that makes security a one-step solution. Simplified Security We kept what works; changed what doesn’t. WindTalker is a “digital do-over,” built on the DNA of best-in-class information security practices. We took the things that work, skipped the parts that hackers have figured out, and then started covering whiteboards with ideas. We shook the entire process upside down, turned it on its ear, then locked it down and made it easy to use. You can even build WindTalker-enabled applications yourself – without being a cryptographer. WindTalker™: set your data free www.windtalkersecurity.com Software Development Kit Extend WindTalker to your applications with ease. WindTalker is easy to integrate. We have given our methods names like: encrypt, find key, and get key value. The programmers at WindTalker understand good SDKs. You’ll spend less time worrying about security, and more time polishing your own code. Prolific Logs WindTalker logs provide accountability. WindTalker logs everything. We make it possible to see who is accessing – or trying to access – your information and your system. Our engineers are currently developing new monitoring tools that will make real-time system monitoring a snap. You can even use your existing log monitoring tools if you like. Interchangeable Algorithms WindTalker is encryption engine-agnostic, allowing you to adapt your encryption at will. We use AES-256 as our default algorithm, but have integrated 3DES, Twofish and Blowfish as well, and additional algorithms are available. You can select any of these algorithms for any Role Key. If a newer algorithm comes along, we will add it to our growing library. We stay well ahead of the radar detectors. No need to re-invent the encryption wheel either – WindTalker is all about how encryption is applied. Windows, JAVA, Android WindTalker is blurring boundaries rapidly. WindTalker is all about making life easier. We wrote our SDKs to be compatible with Windows Cryptography Next Generation Library (WIN CNG), Bouncy Castle (JAVA encryption library) and Spongy Castle (Android instantiation of Bouncy Castle). We went further – our libraries talk to each other! iOS and C/C++ are in development, so stay tuned. Central Control of Security WindTalker puts universal cryptographic control at a central command point. Whether due to malice or simple human error, the “inside job” frequently causes priceless data to be compromised. With WindTalker, access is easily controlled from a single centralized application. Permissions can be granted or revoked immediately to make security manageable and highly responsive. Role Key Objects WindTalker turns cryptographic keys into something anyone can understand. WindTalker Role Keys are designed make sense to the end user. Protection that is based on established roles or security protocols is easy to comprehend. The system assigns a name and color to each Role Key as well. This makes for easy identification and a greatly enhanced user experience. WindTalker manages the actual cryptographic values and hashes under the hood. Controller operators cannot even access the values directly. This adds to the security of the system. No one needs to see the cryptographic key values for any reason, and Role Keys themselves are never actually used to encrypt data directly, rather they are used to derive data encryption keys. When people quickly learn that the “Blue Key” is the Role Key that is to be used to protect Social Security numbers, the user training is complete. Easy identification and name/color pairing make WindTalker extremely intuitive. WindTalker™: set your data free www.windtalkersecurity.com Complete Extensibility Many companies want their source code to remain private. WindTalker answers this call. Want security in your software without it being visible to anyone else? Are you providing software to your clients and need to provide them cloud-capable security that actually protects their data anywhere? WindTalker will unleash your developers in new ways. Extend WindTalker in any direction you desire. Protect anything. Stay in the native file format. Invent new file formats. With WindTalker, you can simplify, simplify, simplify. Set your data free with easy-to-use, easy-to-sell, and easy-to-administer Role Based Access Security (RBAS)™ – a generation beyond RBAC. WindTalker Servers: Next Generation Security in a Box WindTalker comes as a box, can be loaded bare-metal, or can run as a virtual machine. WindTalker is already available as a Software as a Service (SaaS) solution and can be globally provisioned within minutes. Alternatively, WindTalker can be installed on individual servers, or can be run as a set of virtual machines. The WindTalker framework can support any level of scaling required for even the largest of enterprises. Global Role Key distribution is now a reality. WindTalker™: set your data free www.windtalkersecurity.com SECTION 2: Credentialing & Profiles ___________________________________________________________ Advanced Credentialing WindTalker credentials both man and machine, providing flexible security that extends outside the enterprise. WindTalker makes it possible to grant permissions based on not only who a person is, but on which device they are using WindTalker. This allows security managers to permit certain Role Key access on machines and computers at work, while restricting what information is available on personal devices or portable corporate devices in the field. Role Keys can be assigned in three categories: User – User Role Keys are available to a User on any WindTalker-enabled device/application. Machine – Machine Role Keys are available to an authorized device or computer as long as any authorized WindTalker User is logged in. User and Machine – User and Machine Role Keys are provided to a User if both they and the device they are on are authorized a particular Role Key. These specifications support tailoring permissions far beyond any existing traditional key management systems. Role Key Permissions Read, Write and Print permissions can be managed for each Role Key. WindTalker supports specific permission flags for each Role Key. These permissions are set for each User and the Roles to which they are assigned. They can be tailored individually. It is up to the plug-in or application to enforce these permissions. When a User receives a Role Key, they also receive the flags by which this permission can be enforced. This allows massive flexibility for developers to provide extremely tight security protocols within their applications. Editable Role Keys Changing the name, color or any other parameter of a Role Key is a snap. The Controller application provides for easy modification of Role Key fields under the Role Management menu item. Note: If you alter an algorithm setting, the VECTOR server will automatically archive the existing values of that Role, and then reassign a new cryptographic value to the new algorithm. This is done to enable access to data already protected by the original Role and its original algorithm. Role Key Scheduling for Users Tailoring permissions has never been so easy. With WindTalker, you can now schedule limitations for a Role Key for any User. You can set different schedules for each Role Key a User has access to. Total freedom, immense capability, the way you want it to be. The Controller application allows any Role Key assigned to any User, to be scheduled for times it is available. If no schedule is set, the Role Key is always available to that User when logged in on a WindTalker application or device (default). Profile Management WindTalker provides convenient ways to assign Role Keys to Users. WindTalker™: set your data free www.windtalkersecurity.com WindTalker’s Controller allows administrators to define Profiles to which Role Keys can be assigned. For example if all nurses need access to the Nursing, Medications, Personal Health Information and Patient Tracking Role Keys, those Roles can be assigned to the All Nurses profile. Then any new nurses hired can be assigned to that profile, and the correct Roles are automatically assigned. More importantly, a great deal of effort is saved if suddenly a new Role Key needs to be allocated to every nurse. Simply adding it to the profile makes it accessible by all nurses. The opposite is also true if a Role Key is no longer permitted to all nurses. WindTalker™: set your data free www.windtalkersecurity.com SECTION 3: Key Archival & Vaulting __________________________________________________________ Easy Archival: Changing a Role Key Value WindTalker makes replacing a cryptographic value as easy as a mouse click. If a Role Key is, for any reason, compromised, assumed to be compromised, or if a security manager simply wants to alter its value, the controller allows this with a simple mouse click. Archiving a Role Key automatically replaces its cryptographic value as well as its HMAC value. It is done instantly. Auto Updating of Archived Keys Your system manager just archived a Role Key. What about my existing documents? With WindTalker, when an application or plug-in properly requests a Role Key that has been archived, the VECTOR server responds by providing two values: The old value for decryption, and the current value for re-encryption. This means that in order to update any document whose protected data was temporarily orphaned when the Role Key was archived, all a User must do is open the document. WindTalker updates the document automatically. (This functionality is the responsibility of the application or plug-in, as per the WindTalker SDK). Auto-scout tools can be used to perform this operation on document repositories. Scheduled Archival Archival scheduling is for those who want to be especially cautious with their data. We believe in making security painless, powerful, and easy to be picky about. If you want to automatically use fresh values for your Role Keys, you can automatically schedule any given Role Key for automatic Archival on a Daily, Weekly, Monthly, or Annual method. Policy management can be established to fit any level of security needs with this powerful feature. Archive Vaulting For rapidly or constantly archived Role Keys, Vaulting is available. Most security managers will set a time-period of support for how long archived Role Keys will be available on the system. After this period, they will typically Vault the Role Key Archives. This dismounts the Role Keys into a file, and those Archived Role Keys will no longer be available. If a plug-in requests a Vaulted Role Key, the return error code will indicate to the plug-in that that particular Archived Role Key has been Vaulted. The system administrator or security manager can remount a given Role Key to be used and then re-Vault as desired. This allows database size control and security by limiting the number of Archived Role Keys being retained on the system. SECTION 4: Filtering & Geo-Fencing _________________________________________________________ IP Filtering WindTalker goes beyond access control by providing the ability to grant or restrict Role Keys by IP address or range. One of the extremely powerful features of WindTalker is the ability to add yet another layer of hackerproofing to the system by means of IP filtering. While it is possible to spoof IP addresses, WindTalker enables IP filtering in both whitelisting and blacklisting. This gives administrators another way to WindTalker™: set your data free www.windtalkersecurity.com determine exactly who gets what access and from where. Simply setting an allowable set of IP ranges, or restricting known malicious IP ranges in the Controller application allows far better security control of WindTalker. This is a very powerful capability that is a snap to use. Geo-Fencing As if IP filtering was not enough….Now you can restrict or grant Role Keys down to a spot on the planet. Want to make the Blue Key only available inside city limits? How about restricting Top Secret access to the Green Zone in Iraq? How about preventing any NATO user access from anywhere within China? Wow, if only that was possible…wait, it is! WindTalker allows precision control of both whitelisted and blacklisted geo-fences for any given Role Key. Stack this on top of IP filtering, and WindTalker’s robust credentialing (user/Device), and you get access control previously unimaginable. This concept was developed for our military customers, but we make it available to anyone. Grant permissions based on location to whatever geo-position and range you need. Any location-based smart device can use this feature. Mobility has never been so secure. WindTalker™: set your data free www.windtalkersecurity.com SECTION 5: Role Key Tiers ______________________________________________________________________ WindTalker Trees: Tiered Role Keys Three hierarchical levels of Role Keys allow access to subordinate Role Keys in one-to-many supervisory situations. For effective management and appropriate access to individually-secured data, call-center personnel may need to be granted access to a customer’s Role Key on a temporary basis. WindTalker calls these tiers: Trunk, Branch and Leaf. • Trunk Users can see any Branch or Leaf Role Keys. • Branch Users can see any Leaf Keys. Although the system supports two tiers, rarely is the second level of tiers necessary. Tiered Role Keys is a feature normally required exclusively by the government for classification purposes, and as such is typically only useful in commercial situations that require separation of access to a customer or client Role Key on a temporary supervisory nature. This feature allows a single call-center agent to be granted access to one of potentially millions of individually distributed Role Keys (customer keys), without requiring the system to maintain a relationship for that call center employee and every potential client. This is an advanced feature of the system, and should be implemented very carefully in specific situations exclusively. It provides flexibility that must be applied correctly. We are available to assist any organization that desires to implement these types of security layers in their enterprise. WindTalker™: set your data free www.windtalkersecurity.com