1 / 21

Cryptography As A Service

Cryptography As A Service. Barclays Crypto Application Gateway and Beyond. 23 rd May 2013 George French – Barclays Dan Cvrcek – Smart Architects. Unrestricted distribution . Application Authentication. Application Cryptography Interface. BCAG / CSG Service. Application

ulmer
Download Presentation

Cryptography As A Service

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cryptography As A Service Barclays Crypto Application Gateway and Beyond 23rd May 2013 George French – Barclays Dan Cvrcek – Smart Architects Unrestricted distribution

  2. Application • Authentication Application Cryptography Interface BCAG / CSG Service Application Cryptography Audit Logging • Vendor • HSM • interfaces Cryptography As A Service Key Management Applications • Application Key • Management • Cryptography • Policy • Enforcement HSMs Operations and Audit 2 | Cryptography as a Service 23rd May 2013 Unrestricted distribution

  3. Beginning … Cryptography and Business As surprising as it may sound there are very few security products that would actually work and could be managed with a small operational team. The main culprits: - integration, scalability, reliability, support 3 | Cryptography as a Service 23rdMay 2013 Unrestricted distribution

  4. Crypto Service Must Provide For … • Audit Cryptography is deployed as a control to mitigate a risk it is therefore necessary to be able to demonstrate that the control is effective. • Cryptographic Management • The problem with cryptography is the decryption process. • NEVER GIVE DEVELOPERS OPTIONS WHEN ENCRYPTING DATA • Centralised Management • Small teams even in multinational companies • Monitoring of usage / capacity • BAU operational tasks • Security audits • Information for business units 4 | Cryptography as a Service 23rdMay 2013 Unrestricted distribution

  5. Problem Space for The Use of Cryptography What we are trying to manage Business • Capturing Business Requirements • Provision of a defined operational model • Project/Bespoke development • Testing 5 | Cryptography as a Service 23rdMay 2013 Unrestricted distribution

  6. Problem Space for The Use of Cryptography What we are trying to manage Business Build • Requires Specialised knowledge • Meet requirements • Internal governance and standards compliance • Infrastructure build • Change management • Capturing Business Requirements • Provision of a defined service • Risk Mitigation • Bullet 6 | Cryptography as a Service 23rd May 2013 Unrestricted distribution

  7. Problem Space for The Use of Cryptography What we are trying to manage Business Build Operation • Capturing Business Requirements. • Provision of a defined service. • Risk Mitigation • Bullet • Requires Specialised knowledge • Meet requirements • Internal governance and standards compliance • Infrastructure build • Change management • Hardware Utilisation • Project model delivers variances • Patch and Security Vulnerability Management • Operation impact of outages • “Non-functional” Requirements 7 | Cryptography as a Service 23rdMay 2013 Unrestricted distribution

  8. Problem Space for The Use of Cryptography What we are trying to manage Business Build Operation Compliance • Capturing Business Requirements. • Provision of a defined service. • Risk Mitigation • Bullet • Requires Specialised knowledge • “The usual suspects” • Internal governance and standards compliance • Hardware Utilisation • Project model delivers variances • Patch and Security Vulnerability Management • Operation impact of outages • Regulatory and scheme compliance • Internal Audit • Customer Due diligence 8 | Cryptography as a Service 23rd May 2013 Unrestricted distribution

  9. Problem Space for The Use of Cryptography What we are trying to manage Business Build Operation Compliance • Capturing Business Requirements. • Provision of a defined service. • Risk Mitigation • Bullet • Requires Specialised knowledge • “The usual suspects” • Internal governance and standards compliance • Hardware Utilisation • Project model delivers variances • Patch and Security Vulnerability Management • Operation impact of outages • Regulatory and scheme compliance • Internal Audit • Customer Due diligence ... I know nothing short of impossible but here we go 9 | Cryptography as a Service 23rd May 2013 Unrestricted distribution

  10. BCAG Cryptographic Approach • Separating use from management and configuration • Use (business units): • Request system authentication credentials (e.g., password); • Do Crypto – e.g., Api.Encrypt(“CC_Number”, “ME”, “Main_DB”, <transaction>) • Management (BU and Crypto Operations): • Policy – what business functions (e.g., encrypt credit card number), how many parties (DB, web app, middleware, …). • Technical (Crypto Operations): • how many keys, algorithms, crypto modes, key lengths, key validity, and so on. 10 | Cryptography as a Service 23rd May 2013 Unrestricted distribution

  11. BCAG Business Approach • Pay for what you use • Centralised use of resources (people, hardware, network, …) • HSMs used “per operation”, not “per project”. • Commissioning of cryptographic system components by Crypto Operations • skills; • volume; and • single place for deployment and management -> strategy. • Decoupling components (i.e., HSM) from applications • Eliminate vendor lock-in; and • Introduce service-based architecture with replaceable products. 11 | Cryptography as a Service 23rd May 2013 Unrestricted distribution

  12. What Does It Look Like – Architectural Blocks Business Crypto support (1st line) Solution support (2nd line) Product support (3rd line) 12 | Cryptography as a Service 23rd May 2013 Unrestricted distribution

  13. System Mechanics - Onboarding • Administrative process for enrolling new business application to BCAG • Capture Business Requirements • The most difficult part as the business does not usually have a structured description of cryptographic requirements • Convert BR to policy specification • Semi-automated process that generates a BCAG policy definition • Amend BCAG access control with new “user” privileges • Key generation and deployment (manual or semi-automatic process) • Use. 13 | Cryptography as a Service 23rd May 2013 Unrestricted distribution

  14. Mechanics - Operation And 3 pieces of information that have to align: Authentication details = username and password Policy = username and authorised operations and key locator data Crypto Key definitions = key value and key locator data 14 | Cryptography as a Service 23rd May 2013 Unrestricted distribution

  15. Doing Crypto - Key Lookup • Traditionally • Key Label = Key Value • You change a key value, you get a new key label • The new key label has to be propagated to all applications using the old key • BCAG Approach • Structured key locators: user, function, base_function, from, to • Algorithm for locating keys • Dynamic, as it does not use 1:1 mapping but lookup algorithm • Efficient – 2 layers of caching of recently used keys 15 | Cryptography as a Service 23rd May 2013 Unrestricted distribution

  16. Key Lookup – BCAG 16 | Cryptography as a Service 23rd May 2013 Unrestricted distribution

  17. Beyond • Large data processing; we talk about • Daily encryption of giga and terabytes of data • Protection of archives with 100,000s of DB tables • Composite cryptography • Grouping cryptographic operations into transactions that require specific order of operations • Breach of a transaction is a potential data compromise • Centralised key management • Replacement of manual key loading to HSMs with an automatic process to minimise human errors and increase security 17 | Cryptography as a Service 23rd May 2013 Unrestricted distribution

  18. Beyond … banking • Platform for mobile app cryptography • Platform for financial services for future applications • Providing API and system for banking transactions to developers without actually building a bank • Being able to build own virtual Central Bank with a few button clicks • All this requires something like BCAG to: • Access to payment schemes (VISA, MasterCard) • Strong cryptographic system able to ensure pre-defined security properties (like cheating, counterfeiting … within the model of a virtual world) • In some cases compliance with financial regulations 18 | Cryptography as a Service 23rd May 2013 Unrestricted distribution

  19. Thank you for your attention! • Dan@SmartArchitects.co.uk • George.French@Barclays.com

  20. Security Policy – Two Abstractions • Use - Visible for Business Units • Users • just names, possibly with domain (e.g., LDAP) • And authentication options (specs for tickets) • User groups – just names • Alias – just names for required crypto operations • Manage - Internal to Crypto Management • Params – the technical bit, e.g. • [PARAMS CookieParams] • ManagedEncryption=false • Cipher=AES • KeySize=128 • ModeOfOperation=CBC • IV=Random • Padding=NoPad 20 | Cryptography as a Service 23rd May 2013 Unrestricted distribution

  21. Doing Crypto - Key Lookup as You Know It 21 | Cryptography as a Service 23rd May 2013 Unrestricted distribution

More Related