SlideShare una empresa de Scribd logo
1 de 22
Descargar para leer sin conexión
9 July 2013
Daon TrustX Pilot
C. Tilton
Work described in this presentation was supported by the National Strategy for Trusted Identities in Cyberspace (NSTIC) National Program
Office and the National Institute of Standards and Technology (NIST).
The views in this presentation do not necessarily reflect the official policies of the NIST or NSTIC, nor does mention by trade names,
commercial practices, or organizations imply endorsement by the U.S. Government.
Agenda
2
Overview
Functional elements
Use cases
Progress
Lessons learned
Next steps
Learn more
Our Team
3
What are we investigating?
4
Suitability of strong, mobile-based authentication technology
(including biometrics) for online authentication
Willingness of RPs to move to external identity/credential
providers and how this fits within their business models
Acceptance of subscribers
Capability of existing trust frameworks (& certification schemes)
to support these scenarios & technology
Degree of interoperability achievable
Our Pilot Elements
5
Identity is …
6
A unique risk-based, multi-factor authentication capability
that leverages latest generation smart phones (e.g., iPhone,
Blackberry, Android), smart tablets (e.g., iPad/Playbook) and
traditional mobile devices
Identity technology combines multiple authentication
techniques for greatest identity confidence:
• Device (What you have)
• PKI Certificate (What you have)
• PIN/PW (What you know)
• Face (Who you are)
Placing biometric levels of identity assurance in the hands of
consumers
Designed to run both as an in-app framework and out-of-
band authentication product
• Voice (Who you are)
• Palm (Who you are)
• GPS (Where you are/context)
• OOB OTP (What you have)
• (other as devices enabled)
Technology - Identity
7
Relying Party Application
Authentication Server
(Identity Provider)
Subscriber (User) Authentication
Platform
Request
Transaction
Request
Authentication
Authentication
Challenge(s)
Authentication
Response
Authentication
Package
Authentication
Results
Access
Decision
Trust is …
8
An Identity Provider (IDP) for delivering highly secure
authentication services to businesses and consumers
A multi-tenant service hosting multiple applications from different
Relying Parties
Based on Identity authentication.
Trust Frameworks –
NSTIC Alignment
9
Migrating our TrustX IDP to work
within multiple trust frameworks
Provides CHOICE to subscribers and
Relying Parties
Operate within a multiple IDP
environment
Will assess existing trust frameworks
to support:
• Risk-based multi-factor/multi-method
• Trust elevation
• Biometrics
• Equivalence
Research – Purdue University
10
Biometric Standards, Performance & Assurance Laboratory (BSPA)
Center for Education and Research in Information Assurance and
Security (CERIAS)
Practical research
• Offline - Laboratory
• Online – Analyzing data from the operational pilots
Areas
• Usability
• Accessibility
• Privacy
• Security
• Performance
• User acceptance
Operational Pilots
11
NSTIC & Trust
Framework
Standards
IDP
RP1
RP2
RP5
Subscribers
Operational Pilots
Data/Metrics
Data Collection
& Analysis
(inline)
Gap
Analysis
Purdue
Labs
(offline)
RP3
RP4
Steps to get there
12
Extend the technology to fit within federated environment and meet
certification criteria
• Involves requirements analysis & trade-offs
• Supported by research assessments
• Identify gaps in existing TF standards along the way
Stand up the enhanced IDP/CSP
Integrate RP applications
• Work with RPs on pilot plans (use cases, populations, approaches,
schedule, etc.)
Work through Trust Framework certification and back fit RP integrations
to align
• Work with assessors and consultants
Collect and analyze metrics to evaluate progress, success
Work with other pilots to identify opportunities to work together
Proprietary and Confidential
Use Cases
13
General use case:
• Relying party has an existing relationship with a set of subscribers
(customers, members, partners, staff, etc.)
• RP wants a strong authentication solution (credential) for its higher
assurance applications/transactions
– RP maps its transactions to a set of authentication methods (low to high)
• RP is willing to use (try using) an external service
– RP may operate within a trust framework/federation
• In general, the RP performs its own identity proofing and holds identity
data, which is bound to the strong credential
– However some RPs may desire to also utilize 3rd party identity proofing,
particularly for new subscribers
• RPs sponsor a subscriber for a TrustX credential; however once
issued, this credential may be bound to multiple RPs
• Subscriber uses their credential in lieu of passwords
Use cases
14
Relying
Party
Use Case
Pilot
Population
Potential
Base
Notes
AAAE Member
portal
access
AAAE
members.
5000 Ability to pilot different subsets of
population with different access
concerns
AARP Premium
Services
Members 40M Focus likely to be more on
usability than security
Purdue Hotseat* Students/
Faculty
85K Year 2 pilot
Hotseat is a collaborative
classroom tool
Major
Bank
On-line and
mobile
banking
Bank
customers
50M Year 2 pilot
PayPal eCommerce Under NDA TBD M Year 2 pilot
*Tentative
Demonstration
15
Video
16
http://www.youtube.com/watch?v=hOj0PvL234M
Addressing Guiding Principles
Principle Affirm Investigate/Enhance
Privacy enhancing
& voluntary
• No PII stored on phone.
• Authentication proportional
to transaction risk level.
• Opt-in pilots.
• Assess privacy
• Investigate PETs
Secure & resilient • Strong multifactor
authentication
• Server security assessment
• High availability configuration
• Assess security, recommend
improvements
• Evaluate performance
Interoperable • Supports multiple methods,
hosted on multiple devices
• Biometric independent
• Integrate with multiple trust
frameworks
• Demonstrate across multiple RPs
Cost effective &
easy to use
• Use of existing mobile device
is convenient and cost
effective
• RP/user choice of methods
• Assess usability, accessibility,
and user acceptance
17Proprietary and Confidential
Sep Oct
Year 1 Year 2
Oct Nov Dec Jan Feb Mar Apr May Jun Jul Aug Nov Dec Jan Feb Mar Apr May Jun Jul Aug Sep
Implement SAML2/OpenID Connect
Mobile Biometrics Assessment
Gap Analysis
Privacy & Security Assessment
IdentityX and TrustX NSTIC Alignment
Major Bank
AAAE
Collect and analyze data from pilots
Operational Pilots
Trust Framework Integration
Research
IDX Alignment with NSTIC
Legend
Certification
Certification Preparation
Human Subject Research Approval
Oct MayNov Dec Jan Feb Mar Apr Jun Jul Aug Sep Oct MayNov Dec Jan Feb Mar Apr Jun Jul Aug Sep
Audit
Cross-RP Interoperability Demonstration
AARP
Purdue
PayPal
Accomplishments
to date
19
AAAE Pilot launched & operating
SAML & OpenIDConnect prototypes
TrustX product enhancement requirements and design completed
TrustX infrastructure and baseline capability deployed
Research protocol established
Kantara initial application for approval accepted
Lessons Learned
(issues we’ve encountered)
20
RPs are generally conservative and not willing to go from 0-60 in 3
seconds.
Many RPs do not desire a “full function” IDP, but only a CSP
They already hold identity data and don’t need/want 3rd party involvement
Do want to use 3rd party credentials, however.
Existing Trust Frameworks/Certification schemes only recognize “full
IDPs”
Marketplace moving towards componentized offerings and “decoupled”
model
Tricky bit is binding operation / maintaining chain of trust
Gaps exist related to dynamic, risk-based, multifactor and biometrics
Methods do not exist for assessing equivalency of token types
800-63 is prescriptive in this area, but for a limited set of token
implementations
Near term milestones
21
Begin AARP integration
Begin laboratory testing
Complete first round of security & privacy assessments
Initial gap analysis complete
IdentityX Trust Framework Server (ITFS) Release 1.0
Develop & coordinate OpenID Connect profile
Learn More
22
Daon Pilot POC:
Cathy Tilton, cathy.tilton@daon.com, 703-472-5546
Interested Relying Parties
Jim Williams, jim.williams@daon.com, 202-465-5150
TrustX website
www.trustx.com

Más contenido relacionado

Similar a CIS13: NSTIC Update and Reports from Pilots

Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?Priyanka Aash
 
Open Reputation Management Systems
Open Reputation Management SystemsOpen Reputation Management Systems
Open Reputation Management SystemsAbbie Barbir
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offeringeeaches
 
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The CloudSimplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The CloudHappiest Minds Technologies
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKMaganathin Veeraragaloo
 
CTI Technical Advisory Committee (TAC) Orientation November 18, 2015
CTI Technical Advisory Committee (TAC) Orientation November 18, 2015CTI Technical Advisory Committee (TAC) Orientation November 18, 2015
CTI Technical Advisory Committee (TAC) Orientation November 18, 2015Credential Engine
 
SIEM, malware protection, deep data visibility — for free
SIEM, malware protection, deep data visibility — for freeSIEM, malware protection, deep data visibility — for free
SIEM, malware protection, deep data visibility — for freeElasticsearch
 
Moving from a Data Center to a Hybrid IT Environment Securely
Moving from a Data Center to a Hybrid IT Environment SecurelyMoving from a Data Center to a Hybrid IT Environment Securely
Moving from a Data Center to a Hybrid IT Environment SecurelyJeff Green
 
Data Analytics 3 Analytics Techniques
Data Analytics 3 Analytics Techniques Data Analytics 3 Analytics Techniques
Data Analytics 3 Analytics Techniques Jim Kaplan CIA CFE
 
Edugate Futures
Edugate FuturesEdugate Futures
Edugate FuturesHEAnet
 
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...Edge AI and Vision Alliance
 
Technical Requirements of the UK Access Management Federation
Technical Requirements of the UK Access Management FederationTechnical Requirements of the UK Access Management Federation
Technical Requirements of the UK Access Management FederationJISC.AM
 
ThingsCon: Trustable Tech Mark (10 Oct 2018)
ThingsCon: Trustable Tech Mark (10 Oct 2018)ThingsCon: Trustable Tech Mark (10 Oct 2018)
ThingsCon: Trustable Tech Mark (10 Oct 2018)Peter Bihr
 

Similar a CIS13: NSTIC Update and Reports from Pilots (20)

Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?Can Blockchain Enable Identity Management?
Can Blockchain Enable Identity Management?
 
Open Reputation Management Systems
Open Reputation Management SystemsOpen Reputation Management Systems
Open Reputation Management Systems
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
 
David Whitaker: Managing Your Vendors
David Whitaker: Managing Your VendorsDavid Whitaker: Managing Your Vendors
David Whitaker: Managing Your Vendors
 
Unc charlotte prezo2016
Unc charlotte prezo2016Unc charlotte prezo2016
Unc charlotte prezo2016
 
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The CloudSimplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
 
Zero Trust and Data Security
Zero Trust and Data SecurityZero Trust and Data Security
Zero Trust and Data Security
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
 
Test_Engineer
Test_EngineerTest_Engineer
Test_Engineer
 
CTI Technical Advisory Committee (TAC) Orientation November 18, 2015
CTI Technical Advisory Committee (TAC) Orientation November 18, 2015CTI Technical Advisory Committee (TAC) Orientation November 18, 2015
CTI Technical Advisory Committee (TAC) Orientation November 18, 2015
 
SIEM, malware protection, deep data visibility — for free
SIEM, malware protection, deep data visibility — for freeSIEM, malware protection, deep data visibility — for free
SIEM, malware protection, deep data visibility — for free
 
Moving from a Data Center to a Hybrid IT Environment Securely
Moving from a Data Center to a Hybrid IT Environment SecurelyMoving from a Data Center to a Hybrid IT Environment Securely
Moving from a Data Center to a Hybrid IT Environment Securely
 
Data Analytics 3 Analytics Techniques
Data Analytics 3 Analytics Techniques Data Analytics 3 Analytics Techniques
Data Analytics 3 Analytics Techniques
 
Security Auditing
Security AuditingSecurity Auditing
Security Auditing
 
Edugate Futures
Edugate FuturesEdugate Futures
Edugate Futures
 
Embedding Security in IT Projects
Embedding Security in IT ProjectsEmbedding Security in IT Projects
Embedding Security in IT Projects
 
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
“Responsible AI: Tools and Frameworks for Developing AI Solutions,” a Present...
 
Test Engineer
Test  EngineerTest  Engineer
Test Engineer
 
Technical Requirements of the UK Access Management Federation
Technical Requirements of the UK Access Management FederationTechnical Requirements of the UK Access Management Federation
Technical Requirements of the UK Access Management Federation
 
ThingsCon: Trustable Tech Mark (10 Oct 2018)
ThingsCon: Trustable Tech Mark (10 Oct 2018)ThingsCon: Trustable Tech Mark (10 Oct 2018)
ThingsCon: Trustable Tech Mark (10 Oct 2018)
 

Más de CloudIDSummit

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content HighlightsCloudIDSummit
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016CloudIDSummit
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CloudIDSummit
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2CloudIDSummit
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CloudIDSummit
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CloudIDSummit
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CloudIDSummit
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CloudIDSummit
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCloudIDSummit
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian KatzCloudIDSummit
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CloudIDSummit
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCloudIDSummit
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCloudIDSummit
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCloudIDSummit
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid KhosravianCloudIDSummit
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCloudIDSummit
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCloudIDSummit
 

Más de CloudIDSummit (20)

CIS 2016 Content Highlights
CIS 2016 Content HighlightsCIS 2016 Content Highlights
CIS 2016 Content Highlights
 
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016Top 6 Reasons You Should Attend Cloud Identity Summit 2016
Top 6 Reasons You Should Attend Cloud Identity Summit 2016
 
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
CIS 2015 Security Without Borders: Taming the Cloud and Mobile Frontier - And...
 
Mobile security, identity & authentication reasons for optimism 20150607 v2
Mobile security, identity & authentication   reasons for optimism 20150607 v2Mobile security, identity & authentication   reasons for optimism 20150607 v2
Mobile security, identity & authentication reasons for optimism 20150607 v2
 
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
CIS 2015 Mobile Security, Identity & Authentication: Reasons for Optimism - R...
 
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
CIS 2015 Virtual Identity: The Vision, Challenges and Experiences in Driving ...
 
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
CIS 2015 Deploying Strong Authentication to a Global Enterprise: A Comedy in ...
 
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
CIS 2015 Without Great Security, Digital Identity is Not Worth the Electrons ...
 
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian PuhlCIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
CIS 2015 Mergers & Acquisitions in a Cloud Enabled World - Brian Puhl
 
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM  in your Mobile Enterprise - Brian KatzCIS 2015 IoT and IDM  in your Mobile Enterprise - Brian Katz
CIS 2015 IoT and IDM in your Mobile Enterprise - Brian Katz
 
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
CIS 2015 Practical Deployments Enterprise Cloud Access Management Platform - ...
 
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve ToutCIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
CIS 2015 What I Learned From Pitching IAM To My CIO - Steve Tout
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish JainCIS 2015 SSO for Mobile and Web Apps Ashish Jain
CIS 2015 SSO for Mobile and Web Apps Ashish Jain
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John DasilvaCIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
CIS 2015 SAML-IN / SAML-OUT - Scott Tomilson & John Dasilva
 
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015  Session Management at Scale - Scott Tomilson & Jamshid KhosravianCIS 2015  Session Management at Scale - Scott Tomilson & Jamshid Khosravian
CIS 2015 Session Management at Scale - Scott Tomilson & Jamshid Khosravian
 
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John DasilvaCIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
CIS 2015 So you want to SSO … Scott Tomilson & John Dasilva
 
CIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of ThingsCIS 2015 Identity Relationship Management in the Internet of Things
CIS 2015 Identity Relationship Management in the Internet of Things
 

Último

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Último (20)

CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

CIS13: NSTIC Update and Reports from Pilots

  • 1. 9 July 2013 Daon TrustX Pilot C. Tilton Work described in this presentation was supported by the National Strategy for Trusted Identities in Cyberspace (NSTIC) National Program Office and the National Institute of Standards and Technology (NIST). The views in this presentation do not necessarily reflect the official policies of the NIST or NSTIC, nor does mention by trade names, commercial practices, or organizations imply endorsement by the U.S. Government.
  • 4. What are we investigating? 4 Suitability of strong, mobile-based authentication technology (including biometrics) for online authentication Willingness of RPs to move to external identity/credential providers and how this fits within their business models Acceptance of subscribers Capability of existing trust frameworks (& certification schemes) to support these scenarios & technology Degree of interoperability achievable
  • 6. Identity is … 6 A unique risk-based, multi-factor authentication capability that leverages latest generation smart phones (e.g., iPhone, Blackberry, Android), smart tablets (e.g., iPad/Playbook) and traditional mobile devices Identity technology combines multiple authentication techniques for greatest identity confidence: • Device (What you have) • PKI Certificate (What you have) • PIN/PW (What you know) • Face (Who you are) Placing biometric levels of identity assurance in the hands of consumers Designed to run both as an in-app framework and out-of- band authentication product • Voice (Who you are) • Palm (Who you are) • GPS (Where you are/context) • OOB OTP (What you have) • (other as devices enabled)
  • 7. Technology - Identity 7 Relying Party Application Authentication Server (Identity Provider) Subscriber (User) Authentication Platform Request Transaction Request Authentication Authentication Challenge(s) Authentication Response Authentication Package Authentication Results Access Decision
  • 8. Trust is … 8 An Identity Provider (IDP) for delivering highly secure authentication services to businesses and consumers A multi-tenant service hosting multiple applications from different Relying Parties Based on Identity authentication.
  • 9. Trust Frameworks – NSTIC Alignment 9 Migrating our TrustX IDP to work within multiple trust frameworks Provides CHOICE to subscribers and Relying Parties Operate within a multiple IDP environment Will assess existing trust frameworks to support: • Risk-based multi-factor/multi-method • Trust elevation • Biometrics • Equivalence
  • 10. Research – Purdue University 10 Biometric Standards, Performance & Assurance Laboratory (BSPA) Center for Education and Research in Information Assurance and Security (CERIAS) Practical research • Offline - Laboratory • Online – Analyzing data from the operational pilots Areas • Usability • Accessibility • Privacy • Security • Performance • User acceptance
  • 11. Operational Pilots 11 NSTIC & Trust Framework Standards IDP RP1 RP2 RP5 Subscribers Operational Pilots Data/Metrics Data Collection & Analysis (inline) Gap Analysis Purdue Labs (offline) RP3 RP4
  • 12. Steps to get there 12 Extend the technology to fit within federated environment and meet certification criteria • Involves requirements analysis & trade-offs • Supported by research assessments • Identify gaps in existing TF standards along the way Stand up the enhanced IDP/CSP Integrate RP applications • Work with RPs on pilot plans (use cases, populations, approaches, schedule, etc.) Work through Trust Framework certification and back fit RP integrations to align • Work with assessors and consultants Collect and analyze metrics to evaluate progress, success Work with other pilots to identify opportunities to work together Proprietary and Confidential
  • 13. Use Cases 13 General use case: • Relying party has an existing relationship with a set of subscribers (customers, members, partners, staff, etc.) • RP wants a strong authentication solution (credential) for its higher assurance applications/transactions – RP maps its transactions to a set of authentication methods (low to high) • RP is willing to use (try using) an external service – RP may operate within a trust framework/federation • In general, the RP performs its own identity proofing and holds identity data, which is bound to the strong credential – However some RPs may desire to also utilize 3rd party identity proofing, particularly for new subscribers • RPs sponsor a subscriber for a TrustX credential; however once issued, this credential may be bound to multiple RPs • Subscriber uses their credential in lieu of passwords
  • 14. Use cases 14 Relying Party Use Case Pilot Population Potential Base Notes AAAE Member portal access AAAE members. 5000 Ability to pilot different subsets of population with different access concerns AARP Premium Services Members 40M Focus likely to be more on usability than security Purdue Hotseat* Students/ Faculty 85K Year 2 pilot Hotseat is a collaborative classroom tool Major Bank On-line and mobile banking Bank customers 50M Year 2 pilot PayPal eCommerce Under NDA TBD M Year 2 pilot *Tentative
  • 17. Addressing Guiding Principles Principle Affirm Investigate/Enhance Privacy enhancing & voluntary • No PII stored on phone. • Authentication proportional to transaction risk level. • Opt-in pilots. • Assess privacy • Investigate PETs Secure & resilient • Strong multifactor authentication • Server security assessment • High availability configuration • Assess security, recommend improvements • Evaluate performance Interoperable • Supports multiple methods, hosted on multiple devices • Biometric independent • Integrate with multiple trust frameworks • Demonstrate across multiple RPs Cost effective & easy to use • Use of existing mobile device is convenient and cost effective • RP/user choice of methods • Assess usability, accessibility, and user acceptance 17Proprietary and Confidential
  • 18. Sep Oct Year 1 Year 2 Oct Nov Dec Jan Feb Mar Apr May Jun Jul Aug Nov Dec Jan Feb Mar Apr May Jun Jul Aug Sep Implement SAML2/OpenID Connect Mobile Biometrics Assessment Gap Analysis Privacy & Security Assessment IdentityX and TrustX NSTIC Alignment Major Bank AAAE Collect and analyze data from pilots Operational Pilots Trust Framework Integration Research IDX Alignment with NSTIC Legend Certification Certification Preparation Human Subject Research Approval Oct MayNov Dec Jan Feb Mar Apr Jun Jul Aug Sep Oct MayNov Dec Jan Feb Mar Apr Jun Jul Aug Sep Audit Cross-RP Interoperability Demonstration AARP Purdue PayPal
  • 19. Accomplishments to date 19 AAAE Pilot launched & operating SAML & OpenIDConnect prototypes TrustX product enhancement requirements and design completed TrustX infrastructure and baseline capability deployed Research protocol established Kantara initial application for approval accepted
  • 20. Lessons Learned (issues we’ve encountered) 20 RPs are generally conservative and not willing to go from 0-60 in 3 seconds. Many RPs do not desire a “full function” IDP, but only a CSP They already hold identity data and don’t need/want 3rd party involvement Do want to use 3rd party credentials, however. Existing Trust Frameworks/Certification schemes only recognize “full IDPs” Marketplace moving towards componentized offerings and “decoupled” model Tricky bit is binding operation / maintaining chain of trust Gaps exist related to dynamic, risk-based, multifactor and biometrics Methods do not exist for assessing equivalency of token types 800-63 is prescriptive in this area, but for a limited set of token implementations
  • 21. Near term milestones 21 Begin AARP integration Begin laboratory testing Complete first round of security & privacy assessments Initial gap analysis complete IdentityX Trust Framework Server (ITFS) Release 1.0 Develop & coordinate OpenID Connect profile
  • 22. Learn More 22 Daon Pilot POC: Cathy Tilton, cathy.tilton@daon.com, 703-472-5546 Interested Relying Parties Jim Williams, jim.williams@daon.com, 202-465-5150 TrustX website www.trustx.com