Trust Elevation through Contextual Authentication International Telecommunication Union
Transcription
Trust Elevation through Contextual Authentication International Telecommunication Union
International Telecommunication Union Trust Elevation through Contextual Authentication Regional Arab Forum on Cybersecurity Giza (Smart Village)-Egypt, 18-20 December 2011 Abbie Barbir, PhD ITU-T SG 17 Identity Management Rapporteur [email protected] Co-chair OASIS Trust Elevation TC http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=trust-el Elected Member of OASIS Board of Directors http://www.oasis-open.org/board ITU-T Study groups (2009-2012) SG 2 Service provisioning and Telecom management SG 9 Television, sound and integrated broadband cable networks SG 13 Future networks including mobile and NGN SG 3 Tariff , accounting telecom economic & policy issues SG 5 Environment and climate change SG 16 Multimedia coding, systems and applications ITU-T Objectives Established 17 May 1865 SG 11 Signalling requirements, protocols and test specifications Decisions by consensus Participation through national Government Telecom does not mean that focus is only on Telecom SG 17 security, identity management (IdM) and languages Develop and publish standards for global ICT interoperability Identify areas for future standardization Provide an effective forum for the development of international standards Truly global public/private partnership 95% of work is done by private sector Continuously adapting to market needs 2 SG 17 Q10/17 Identity management o Interoperability of identity management • • • • • • o Trust of identity management • • • • • • o X.discovery, Discovery of identity management information Protection of personally identifiable information • o X.EVcert, Extended validation certificate X.eaa, Information technology – Security techniques – Entity authentication assurance X.atag, Attribute aggregation framework X.idmcc, Requirement of IdM in cloud computing X.mob-id, Baseline capabilities and mechanisms of identity management for mobile applications and environment X.oitf, Open identity trust framework Discovery of of identity management information • o X.giim, Generic IdM interoperability mechanisms X.1250, Baseline capabilities for enhanced global identity management trust and interoperability X. 1250 Baseline capabilities for enhanced global identity management trust and interoperability X. 1251 A framework for user control of digital identity X. 1252 Baseline identity management terms and definitions X.1253 (X.idmsg), Security guidelines for identity management systems X.1275, Guidelines on protection of personally identifiable information in the application of RFID technology • X.priva, Criteria for assessing the level of protection for personally identifiable information in identity management Working with OASIS SAML 2.0 and XACML and their equivalent ITU-T recommendations Q10/17 Coordination and collaboration ITU-T Joint coordination activity in IdM JCA-IdM 4 OASIS Trust Elevation TC o OASIS Electronic Identity Credential Trust Elevation Methods (Trust Elevation) TC • http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=trust-el Works to define a set of standardized protocols that service providers may use to elevate the trust in an electronic identity credential presented to them for authentication o Respond to suggestions from the public sector, including the U.S. National Strategy for Trusted Identities in Cyberspace (NSTIC). o Promotes interoperability among multiple identity providers--and among multiple identity federations and frameworks--by facilitating clear communication about common and comparable operations to present, evaluate and apply identity [data/assertions] to sets of declared authorization levels o National Strategy for Trusted Identities in Cyberspace (NSTIC) o Called for in President’s Cyberspace Policy Review (May2009) o Promotes the development of an online environment where individuals and organizations will be able to trust each other because they follow agreed upon standards to obtain and authenticate their digital identities Guiding Principles • Privacy Enhancing and Voluntary • Secure and Resilient • Interoperable • Cost Effective • Easy To Use Usernames and passwords are broken • People have many different passwords • Password reused • Strong passwords vulnerable Identity Theft on the rise • Large increase in financial institution Suspicious Activities • $17.3 billion estimated cost to economy over 2 years (BJS,2008) Cybercrime is on the rise • Phishing is increasing with more sophisticated attacks Main issue • How to verify the Carbon entity on the other end of an online transactions • Identities are difficult to verify over the internet • Problem is more complicated in North America due to the lack of a government based national identity system 6 Entity Authentication Assurance Entity Authentication Assurance Framework* • Joint work of ISO JTC1/SC 27/WG5 and ITU-T SG 17/Q.10 • Expected to reach Committee Draft status this year o Standardizes Levels of Assurance (LoAs) to promote trust, improve interoperability, and facilitate identity federation across organizations o • Level Description 1 Little confidence the asserted identity 2 Some confidence in the asserted identity 3 High confidence in asserted identity 4 Very High confidence in asserted identity ISO/IEC 29115 | ITU-T X.1254 provides a framework for managing entity authentication assurance in a given context. In particular, it: • specifies four levels of entity authentication assurance; • specifies criteria and guidelines for each of the four levels of entity authentication assurance; • provides guidance concerning controls that should be used to mitigate authentication threats; • provides guidance for mapping the four levels of assurance to other authentication assurance schemes; • provides guidance for exchanging the results of authentication that are based on the four levels of assurance. Entity Authentication Assurance Why so the work? o Provides a consistent basis for trust o Promotes identity federation o Helps organizations make informed decisions o Enables credential re-use in different contexts o Promotes efficiency and reduces costs o Enables cross-organization and cross-border services o Provides framework for further standardization Entity Authentication Assurance Structure and Contents o Four Levels of Assurance o Entity Authentication Assurance Framework o Management and Organizational Considerations o Threats Based on Framework Components o Required Controls for Each LoA o Privacy and Protection of PII o Operational Service Assurance Criteria 9 EAA Framework Proofing Application / Initiation LoA Selection Verification Enrollment Risk Assessment Rights, Access Controls, etc. Authorization Registration Usage RecordKeeping Authentication Credential Management Binding Revocation Issuance scope boundary of this standard 10 Authentication Towards Digital Trust o FFIEC Supplement to Authentication in an Internet Banking Environment • Layered Security to eliminate Customer Authentication for High-Risk Transactions o Retail/Consumer and Business/Commercial Banking o Detect and Respond to Suspicious Activity o Device Identification o Challenge Questions (KBA) o False Sense of Security o Need to move away from it More on Authentication How to define Authentication Strength ? o Simply counting authentication factors • Something • you know • you have • you are (or inherit ) • does not inform us about the strength of a given authentication method o Authentication methods can be based on a single authentication attribute or on any two or more attributes of different kinds o Many vendors and enterprises do not implement true two-factor authentication and do not have a consistent definition of the term. o Consider measuring a method strength to attacks, for example: • Masquerade attacks and man-in-the browser attack o Evaluate the strength of an authentication method to confirm that it meets the needs for assurance or authorizations request. Based on Gardner paper G00219391 Device Identifications From Smart Device perspectives • Cookies are increasingly becoming obsolete for device and user identification • IP address is not reliable Different Approaches are used • Identification in Browser based technologies (SAML, OpenID) is different from Native Application (Aouth2.0 and OpenID connect) Standards are needed • Need to move towards interoperable cookie-less device independent identification methods in order to prevent fraud in financial transactions • Support for cloud based interactions • Support for interoperable token based services • “one-time” cookies o Eventually every device needs an immutable, provision-able, isolated NVM to store its identity • Programmable RD/WR/OTP/ERASE capable • Scalable cross devices (power, form factor, standard) • Ultimately needs to have appropriate crypto support 13 Current Basic “Trust Triangle” o o User has direct trust relationship with IDSP and RP How can the IDSP and RP trust each other? * Source OIX Should we have Trust in Trust Frameworks • • • • Key question how much do we trust the identity enrolment stage • Do we Trust Breeder Documents and verification process? The Elephant in the room; The rise of Synthetic ID So what are Synthetic ID? • Synthetic identity happens when a criminal steals bits and pieces of info from different people and creates a new identity with No Carbon Copy. • A social security number is used with a different name and date of birth. • Difficult to detect because of all the mismatched pieces of information. • Criminals are getting bold • Trend to claim ID Theft as opposed to account busting • Need better means of validating breeder documents Not all breeder documents are Trustable Directions Some Pain Points o Internet transactions are anonymous (low trust) o Value transactions are identity based o Anonymous to identity enabled o Need strong authentication and contextual identification of identities o Enable Identity based systems • while protecting privacy (PII) • Isolation of Issuer and target Identity • Enable the right to forget • Identity dashboard for user to keep control identity and related data (Data Ownership) • Consumer Protection and Identity Service Provider Liabilities o Audit, compliance and policy enforcement o And yes…..Simple to use system Current Trends OIDF WG on Street Identity (see www.streetidentity.com ) 1. OAuth2 and OpenID Connect • Focus on Eliminating password reuse (one password) 2. Identity verification • Use of Relationship Manager or Attribute provider to share legal identity (name/address) with a requesting party 3. Toward Strong authentication • Secure the "one password" with additional protection • Potentially the use of Secure Vault technology in devices an immutable, provision-able, isolated NVM to store its identity o Programmable RD/WR/OTP/ERASE capable o Scalable cross devices (power, form factor, standard) o Ultimately needs to have appropriate crypto support o 17 Q&A