key management interoperability protocol (kmip)events.oasis-open.org › home › sites ›...

22
Key Management Interoperability Protocol (KMIP) www.oasis-open.org September 30, 2009 Federated Key Management Panel

Upload: others

Post on 23-Jun-2020

10 views

Category:

Documents


0 download

TRANSCRIPT

Key Management Interoperability Protocol (KMIP)

www.oasis-open.org

September 30, 2009Federated Key Management Panel

The Need for Interoperable Key Management

KMIP Overview

KMIP Message Overview

The High Points

The Need for Interoperable Key Management

Today’s enterprises operate in increasingly complex, multi-vendor environments.

Enterprises need to deploy better encryption across the enterprise.

A key hurdle in IT managers deploying encryption is their ability to recover the encrypted data.

Today, many companies deploy separate encryption systems for different business uses – laptops, storage, databases and applications –resulting in:

Cumbersome, often manual efforts to manage encryption keys

Increased costs for IT

Challenges meeting audit and compliance requirements

Lost data

- 3 -

Jon Olstik - ESG

"As encryption technologies become more pervasive across the enterprise, key management quickly becomes a mission critical activity for protecting the sensitive data. Without a standard way to integrate encryption technologies and key management systems, data

confidentiality and integrity may actually degrade. To address this issue, I've long been a strong proponent of key management standards and did what I could to push leading security vendors in this direction. I'm happy to say that the OASIS KMIP effort may finally fill this void."

Enterprise Cryptographic Environments

Key Management

System

DiskArrays

BackupDisk

BackupTape

BackupSystem

Collaboration &Content Mgmt

Systems

File ServerPortals

ProductionDatabase

Replica

Staging

EnterpriseApplications

Email

eCommerceApplications

Business Analytics

Dev/Test Obfuscation

WANLAN

VPN

Key Management

System

Key Management

System

Key Management

System

Key Management

System

Key Management

System

Key Management

System

Key Management

System

CRM

Often, Each Cryptographic Environment Has Its Own Key Management System

- 5 -

Often, Each Cryptographic Environment Has Its Own ProtocolEnterprise Cryptographic Environments

Key Management

System

DiskArrays

BackupDisk

BackupTape

BackupSystem

Collaboration &Content Mgmt

Systems

File ServerPortals

ProductionDatabase

Replica

Staging

EnterpriseApplications

Email

eCommerceApplications

Business Analytics

Dev/Test Obfuscation

WANLANVPN

Key Management

System

Key Management

System

Key Management

System

Key Management

System

Key Management

System

Key Management

System

Key Management

System

CRM

Disparate, Often Proprietary Protocols

- 6 -

KMIP Overview

Enterprise Cryptographic Environments

Enterprise Key Management

DiskArrays

BackupDisk

BackupTape

BackupSystem

Collaboration &Content Mgmt

Systems

File ServerPortalsProductionDatabase

Replica

Staging

Key Management Interoperability Protocol

EnterpriseApplications

Email

eCommerceApplications

Business Analytics

Dev/Test Obfuscation

WANLANVPN

CRM

KMIP: Single Protocol Supporting Enterprise Cryptographic Environments

- 8 -

OASIS KMIP Technical CommitteeOASIS (Organization for the Advancement of Structured Information

Standards) is a not-for-profit consortium that drives the development, convergence and adoption of open standards for the global information society.

KMIP Technical Committee chartered in March 2009.

“The KMIP TC will develop specification(s) for the interoperability of Enterprise Key Management (EKM) services with EKM clients. The specifications will address anticipated customer requirements for key lifecycle management (generation, refresh, distribution, tracking of use, life-cycle policies including states, archive, and destruction), key sharing, and long-term availability of cryptographic objects of all types (public/private keys and certificates, symmetric keys, and other forms of “shared secrets”) and related areas.”

I.P. mode: “R.F. on RAND”

Hoping to hit Public Review by EOY 2009

- 9 -

Storage Array

TapeLibrary

SANApplication

Server

Application

Application

Application

Enterprise Key Manager

KMIP Objects, Operations and Attributes: Symmetric Encryption Keys

Key Management Interoperability Protocol

- 10 -

KMIP Objects, Operations and Attributes: Asymmetric Keys

Public Key

Public Key

Public Key

Public Key

Public Key

KMIP

- 11 -

KMIP to Commercial Meter

Utility

KMIP Objects, Operations and Attributes: Digital Certificates

KMIP to low-end Residential Meter

KMIP to Industrial Meter

- 12 -

Name: XYZSSN: 1234567890Acct No: 45YT-658Status: Gold Encrypting Storage

Host

Enterprise Key Manager

@!$%!%!%!%%^&*&^%$#&%$#$%*!^@*%$*^^^^%$@*)%#*@(*$%%%%#@

Request Header

Get Unique Identifier

Symmetric Key

Response Header

Unique Identifier

Key Value

KMIP Request / Response Model

Unencrypted data

Encrypted data

- 13 -

Name: XYZSSN: 1234567890Acct No: 45YT-658Status: Gold Encrypting Storage

Host

Enterprise Key Manager

@!$%!%!%!%%^&*&^%$#&%$#$%*!^@*%$*^^^^%$@*)%#*@(*$%%%%#@

Request Header

Locate Name

Symmetric Key

Response Header

Unique Identifier

Key Value

Supporting Multiple Operations per Request

Unencrypted data

Encrypted data

Get ID Placeholder

- 14 -

LEN …Tag Len Value Tag Len Value

LEN… TagLenValueTagLenValue

Messages in TTLV Format

Type Type

TypeType

- 15 -

Transport-Level Encoding

Key Client Key Server

API

Internal representation

Transport

Internal representation

Transport

KMIP Encode

KMIP Encode

KMIP Decode

KMIP Decode

API

KMIP

- 16 -

KMIP Message Overview

Message Encoding

Example of TTLV encoding of the Application Specific ID Attribute

Attribute identified by its name “Application Specific ID”

Shows value at index 2

Tag Type Length Value

Attribute Structure <varies>Tag Type Length Value

Attribute Name

String <varies> “Application Specific ID”

Attribute Index

Integer 4 2

Attribute Value

Structure <varies> Tag Type Length Value

App. Name

String <varies> “ssl”

App. ID

String <varies> “www.example.com”

- 18 -

Message Encoding - 2 In a TTLV-encoded message, Attributes are identified either by

tag value or by their name (see previous slide), depending on the context: When the operation lists the attribute name among the objects

part of the request/response (such as Unique Identifier), its tag is used in the encoded message

When the operation does not list the attribute name explicitly, but instead includes Template-Attribute (such as in the Create operation) or Attribute (such as in Add Attribute) objects as part of the request/response, its name is used in the encoded message

tag

type length value

operation 04 4 0000000A

tag type length value

Unique Identifier

06 24 1f165d65-cbbd-4bd6-9867-80e0b390acf9

Get Unique identifier

- 19 -

Authentication

Authentication is external to the protocol

All servers should support at least

SSL/TLS

https

Authentication message field contains the Credential Base Object

Client or server certificate in the case of SSL/TLS or https

Host

@!$%!%!%!%%^&*&^%$#&%$#$%*!^@*%$*^^^^%$@*)%#*@(*$%%%%#@

@!$%!%!%!%%^&*&^%$#&%$#$%*!^@*%$*^^^^%$@*)%#*@(*$%%%%#@

Enterprise Key Manager

Identity certificate

Identity certificate

SSL/TLS

- 20 -

Enterprise Cryptographic Environments

Enterprise Key Management

DiskArrays

BackupDisk

BackupTape

BackupSystem

Collaboration &Content Mgmt

Systems

File ServerPortalsProductionDatabase

Replica

Staging

Key Management Interoperability Protocol

EnterpriseApplications

Email

eCommerceApplications

Business Analytics

Dev/Test Obfuscation

WANLANVPN

CRM

KMIP: enabling enterprise key management through standard protocol.

- 21 -

Conclusion

Questions?

www.oasis-open.org