SlideShare una empresa de Scribd logo
1 de 32
Descargar para leer sin conexión
Dr. Evgenia Nikoulouzou
ENISA, Policy Implementation and Development unit
DIGITAL IDENTITY, LEVERAGING THE SELF-
SOVEREIGNTY IDENTITY (SSI) CONCEPT TO
BUILD TRUST
31 05 2022
CSA: Support the development and implementation of Union policy in the field of
electronic identity and trust services
ENISA eIDAS : AGENDA
eIDAS : Overview of ENISA Activities
Digital Wallets Process in a Nutshell
Report: Digital Identify, SSI
Conclusions
ENISA: Digital Identities and Remote Identity Proofing
3
POLICY CONTEXT FOR ENISA
3
eIDAS Regulation 910/2014, Trust Services, Article 19
• Support MS with supervision and security measures
• Support MS with incident reporting, and cross-border notifications
• Annual reports Trust services incidents
• CIRAS Incident reporting and Analysis system
• Future role for ENISA in the eID Cooperation network
ENISA mandate - CSA Article 5
Support the development and implementation of Union policy in the field of electronic identity and trust
services, in particular by providing advice and issuing technical guidelines, as well as by facilitating the
exchange of best practices between competent authorities
NIS2 proposal - brings trust services under NISD
ENISA supports the NIS Cooperation group
eIDAS2 package
- Proposal for eΙDAS2 - COM (2021) 281 final
- Commission Recommendation on Toolbox for eID wallets
ENISA supports the EC toolbox work – technical security measures
4
OVERVIEW OF ENISA ACTIVITIES
Leading role for:
 ENISA Article 19 EG
 CIRAS Tool – Incident
reporting
 ENISA Trust Services Forum
(annual conference since
2015 – Berlin, September)
Advisory role for:
 FESA
 Commission eIDAS expert
group
 eID Cooperation Network
Find more under: Trust Services — ENISA (europa.eu), Building Trust in the Digital Era: ENISA boosts the
uptake of the eIDAS regulation — ENISA (europa.eu)
Support MS with Trust Services
- 12 reports to support TSPs and SBs
- 5 reports to support relying parties
- Cyber incident reporting tool, CIRAS
- Secretariat of ENISA Article 19
group
- Hosting of 19 meetings of ENISA
Article 19 group since 2015
Support MS with Digital
Identity
- 4 reports on eID, e.g. SSI
- Occasional invitation to the
eID CN
2014 eIDAS
regulation
2015 ENISA Art19
group
2016 ENISA incident
tool for trust services
(CIRAS)
2021 Supporting
EC/MS with
digital wallets
Recent example (of ENISA bridging between authorities, market players, and standards bodies)
- 2020 Security of remote identify proofing (especially relevant in a pandemic)
- 2021 Attack scenarios-countermeasures and workshop on remote identity proofing
5
PEEK INTO EU DIGITAL WALLET PROCESS
September
Agreement on
Process
December
Agreement on
Technical Outline
June 2022
Technical
Architecture-
Standards-
guidelines
September 2022
Agreement on
ToolBox
October 2022
Publication of
ToolBox
Note: Aggressive timeline – ENISA supports the MSs and the Commission
eIDAS2
6
Introduction to SSI
EU & Global SSI Landscape
Architecture Elements of SSI
Governance
Consideration of Risks
Conclusions
REPORT OVERVIEW
Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust
7
SSI IN A NUTSHELL
Digital Identity: Leveraging the Self-Sovereign identity Concept to Build Trust
• Aimed at digital IDs across global open networks
• Current technology is for federated identities for separate communities with
several hierarchies cooperating to share trusted digital IDs
• SSI allows a user to have greater control of his or her own identity
o Users can request multiple decentralised identifiers (DIDs) from
different identity controllers
• Identity can be related to different attributes issued by different authorities
for different activities
o Verifiable credentials (VCs) bind the user-centred identity to formal or
informal names
o VCs can also carry other user attributes (e.g., age or qualification)
used to control access to service
8
W3C Specifications
Decentralised Identity Foundation (DIF)
ISO TC 307 & CEN/CLC JTC 19
ISO/IEC 23220 & 18013-5
STANDARDS
Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust
Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust
9
Sovrin
Hyperledger
ESSIF
LACChain
COMMUNITIES
10
• Harmonised conditions for the establishment of a framework for European Digital Identity Wallets to be
issued by Member States
• Union citizens and other residents will able share securely data related to their identity in a user friendly
and convenient way under the sole control of the user
• European Digital Identity Wallets should allow users to electronically identify and authenticate online and
offline across borders for accessing public and private services
• Member States should Wallets relying on common standards to ensure seamless interoperability and a
high level of security
• The conformity Wallets with those requirements should be certified by accredited public or private sector
bodies designated by Member States
• European Digital Identity Wallets should ensure the highest level of security for the personal data used
for authentication irrespective of whether such data is stored locally or on cloud-based solutions, taking
into account the different levels of risk
EIDAS 2.0
(COM/2021/281 FINAL)
Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust
11
Germany
Spain
Netherlands
Poland
Member States Survey
EU SSI & eID WALLET
INITIATIVES
Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust
GERMANY
ID Union SSI project framework (source: Lissi)
12 Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust
SPAIN
Alastria’s ID Model – Based on the 10 key principles of SSI (Security, Controllability, Portability)
13 Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust
POLAND
Credentials presented by mObywatel – (left to right) ID card, driving license, COVID certificate, ePrescription
14 Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust
POLAND
Electronic identification with mObywatel
15 Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust
16
MEMBER STATE SURVEY (RESULTS)
Security
• SSI has the benefit of having no single point of failure
• Increasing demand on the user associated with user control is worrying
• ‘Privacy by demand’, with features such as sector-specific identifiers, is crucial
o Hard to achieve in typical SSI (DLT/DID-based) systems, especially when these unique and
persistent identifiers are created sector- or service- or MS-specific in the very moment they are
requested
• Important: freshness of attributes (e.g., representation, mandates, professional
capacity, custody of minors, etc.) needs to be maintained
o This can only be achieved with online/cloud-based wallets
Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust
ARCHITECTURE ELEMENTS
for Self-Sovereign Identity
VC Issuer
• Confirms wallet holder
identity
• Credential proofing
• Issues verifiable
credentials
• Revokes verifiable
credential
DID Controller
• Ensures uniqueness of ID
• Confirms wallet control
• Issues secure DID
document
Wallet Holder
• Obtains wallet
from provider
• Authenticates to
the wallet
• Collects new
verifiable data
• Authenticates ID
to relying party
Wallet Provider
• Provides certified
wallet software /
hardware
• May be cloud-
based
Relying Party
(verifier)
• Validates
presented
credentials
• Authenticates
holder
Verifiable
credential
Wallet control proof
ID authentication &
Presentation of credentials
Trusted DID/VC Registry
WALLET
Information on
issuance and
revocation of
verifiable data
Information
used to validate
verifiable data
Information used to
validate verifiable
data
Architecture
Elements
GOVERNANCE
for a Digital Identity Framework
20
GOVERNANCE
Governance of SSI-based schemes still under development
Most experience comes from Sovrin, which takes an approach similar to that
applied by many PKI services, including eIDAS Trust Services:
• There is a governing body that oversees the operation of the SSI service providers and
sets the rules for assuring the operation of the SSI service providers
• Conformity assessment of the provider by an independent assessor against the
assurance rules set by the governing body
• A means for relying parties to assess whether are considered trustworthy by the
governing body
ISO and CEN are in the early stages of developing standards for
managing trust based around SSI with working drafts looking at trust
anchors
Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust
21
GOVERNANCE
Governance of wallets
• User has control over the use of their wallet
o They can decide whether to use any particular wallet, as well as select a particular DID or
VC within a wallet, to authenticate their identity to a relying party
• Security of SSI depends on the security of the wallet software and
environment
o In particular, that the keys and verifiable data are under the sole control of the holder and
cannot be leaked to other parties
• Security of the wallet will need to be certified against specific criteria
to give assurance for the security of wallets
Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust
22
GOVERNANCE
Interdependence
Governance of the different elements of an SSI architecture cannot be
considered in isolation
• VC issuer depends on the DID, as issued by the DID controller, being uniquely
assigned to entity identified by the DID controller and on the sole control of the
authentication means being under the sole control of the document
• DID controller needs to be assured that the authentication means is held securely
in a certified wallet
• Both DID controller and VC issuer depend on the registry to provide relying
parties with the latest state of the DID document and VC
Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust
CONSIDERATION OF RISKS
SSI and Digital Identity
24
Security Measures
Asset Identification
✓ Processes
✓ Data
Risk Identification
✓ Processes
✓ Data
CONSIDERATION OF
RISKS
Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust
25
SECURITY MEASURES
Data minimization
• Partial release of user attributes for the purpose of data
minimization
• Unlinkability of transactions at the cryptographic or protocol
level
• Use only identifiers that are required to establish necessary
linkability
• Domain-specific identifiers or pseudonyms – a form of
identifiers that avoid using the same unique identifier for a user
in all its interactions
Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust
26
SECURITY MEASURES
Consent and choice
• In a user-centric system, users have control over their data
and attributes
• They can exert informed consent, whether the holder attributes
are managed and used by a wallet or another entity
Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust
27
SECURITY MEASURES
Accuracy and quality
• The user’s attributes shall be bound to the legitimate holder
• Protocols executed between the wallet and other components
protect against eavesdropping at the communication and
logical layer
• Protection of attribute authenticity and integrity of the attributes
o Attributes released to the relying entities are consistent with the issuer's
attributes
Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust
CONCLUSIONS
Leveraging the SSI Concept to Build Trust
29
PRIVACY & SSI
SSI CAN PROVIDE AN EFFECTIVE BASIS FOR DIGITAL IDENTITIES
THAT PROTECT THE PRIVACY OF PERSONAL DATA
Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust
• Decentralised digital IDs can be used to support pseudonyms for privacy
• VCs enable the separation of potentially private attributes from the digital ID;
user selects attributes that are revealed to relying parties
• Cryptographic separation between transactions through holding multiple
authentication keys in a wallet with separate identity documents from
different controllers, helping avoid links between the separate transactions
30
GOVERNING SSI
FOR THE GOVERNANCE OF THE ARCHITECTURAL
ELEMENTS OF AN SSI SOLUTION, WE NEED TO CONSIDER
Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust
• The certification of wallets
• The audit and oversight of DID controllers, VC issuers, and DID and
VC registries
• That all the above are interdependent and the governance of the DID
controller, the VC issuer, and the other elements of an SSI architecture
must also be properly governed
31
SECURITY & SSI
WHEN THE RISKS OF THE SSI ARCHITECTURE ARE CONSIDERED, THE
FOLLOWING KEY SECURITY MEASURES NEED TO BE IMPLEMENTED
Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust
• Data minimalization: Use only necessary data
• Consent and choice: User controls the process and data used for ID
• Accuracy and quality: All parties can trust identification data stored
and provided by the wallet
32
SAVE THE DATE:
27 – 28 October
2022
Berlin, ESMT
TRUST SERVICES FORUM 2022
8th Trust Services Forum
27 October 2022
14th CA-Day
28 October 2022
ENISA: Digital Identities and Remote Identity Proofing

Más contenido relacionado

Similar a PPT, ENISA, service delivery webinar 310522

case-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_encase-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_en
Alix Murphy
 

Similar a PPT, ENISA, service delivery webinar 310522 (20)

Barcelona presentationv6
Barcelona presentationv6Barcelona presentationv6
Barcelona presentationv6
 
EU Digital Identity Wallet - INNOPAY.pptx
EU Digital Identity Wallet - INNOPAY.pptxEU Digital Identity Wallet - INNOPAY.pptx
EU Digital Identity Wallet - INNOPAY.pptx
 
eIDAS Reference Guide
eIDAS Reference GuideeIDAS Reference Guide
eIDAS Reference Guide
 
FIDO, Strong Authentication and elD in Germany
FIDO, Strong Authentication and elD in GermanyFIDO, Strong Authentication and elD in Germany
FIDO, Strong Authentication and elD in Germany
 
Fintech solution day 2019
Fintech solution day 2019Fintech solution day 2019
Fintech solution day 2019
 
11 eu-institution-studies-regulation-finance-sector
11 eu-institution-studies-regulation-finance-sector11 eu-institution-studies-regulation-finance-sector
11 eu-institution-studies-regulation-finance-sector
 
VASCO Investor Presentation - July 29, 2015
VASCO Investor Presentation - July 29, 2015VASCO Investor Presentation - July 29, 2015
VASCO Investor Presentation - July 29, 2015
 
Value proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign IdentityValue proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign Identity
 
Enisa report e idas compliant eid solution
Enisa report   e idas compliant eid solutionEnisa report   e idas compliant eid solution
Enisa report e idas compliant eid solution
 
PCI-DSS for IDRBT
PCI-DSS for IDRBTPCI-DSS for IDRBT
PCI-DSS for IDRBT
 
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Au...
 
Initio at World Blockchain & Cryptocurrency Summit 2018
Initio at World Blockchain & Cryptocurrency Summit 2018Initio at World Blockchain & Cryptocurrency Summit 2018
Initio at World Blockchain & Cryptocurrency Summit 2018
 
case-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_encase-study-on-digital-identity-swisscom-mobile-id_en
case-study-on-digital-identity-swisscom-mobile-id_en
 
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ... Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 
The coin tree summarized 10-15
The coin tree   summarized 10-15The coin tree   summarized 10-15
The coin tree summarized 10-15
 
The future of identity verification predictions and trends in blockchain tech...
The future of identity verification predictions and trends in blockchain tech...The future of identity verification predictions and trends in blockchain tech...
The future of identity verification predictions and trends in blockchain tech...
 
Sovereign identity
Sovereign identitySovereign identity
Sovereign identity
 
Age Verification: Reaching a Tipping Point
Age Verification: Reaching a Tipping PointAge Verification: Reaching a Tipping Point
Age Verification: Reaching a Tipping Point
 
Identity management in government, mr. iurie turcanu
Identity management in government, mr. iurie turcanuIdentity management in government, mr. iurie turcanu
Identity management in government, mr. iurie turcanu
 
Development of Digital Identity Systems
Development of Digital Identity Systems Development of Digital Identity Systems
Development of Digital Identity Systems
 

Más de Support for Improvement in Governance and Management SIGMA

Más de Support for Improvement in Governance and Management SIGMA (20)

PPT - SIGMA-GIZ Academies - Stage 1 - CAF Ukraine roadmap.pdf
PPT - SIGMA-GIZ Academies - Stage 1 - CAF Ukraine roadmap.pdfPPT - SIGMA-GIZ Academies - Stage 1 - CAF Ukraine roadmap.pdf
PPT - SIGMA-GIZ Academies - Stage 1 - CAF Ukraine roadmap.pdf
 
PPT - SIGMA-GIZ Academies - Stage 1 - CAF Moldova roadmap.pdf
PPT - SIGMA-GIZ Academies - Stage 1 - CAF Moldova roadmap.pdfPPT - SIGMA-GIZ Academies - Stage 1 - CAF Moldova roadmap.pdf
PPT - SIGMA-GIZ Academies - Stage 1 - CAF Moldova roadmap.pdf
 
PPT - SIGMA-GIZ Academies - Stage 1 -CAF Armenia roadmap.pdf
PPT - SIGMA-GIZ Academies - Stage 1 -CAF Armenia roadmap.pdfPPT - SIGMA-GIZ Academies - Stage 1 -CAF Armenia roadmap.pdf
PPT - SIGMA-GIZ Academies - Stage 1 -CAF Armenia roadmap.pdf
 
PPT - SIGMA-GIZ Academies - Stage 1 - Financial support tu PAR in Montenegro....
PPT - SIGMA-GIZ Academies - Stage 1 - Financial support tu PAR in Montenegro....PPT - SIGMA-GIZ Academies - Stage 1 - Financial support tu PAR in Montenegro....
PPT - SIGMA-GIZ Academies - Stage 1 - Financial support tu PAR in Montenegro....
 
PPT - SIGMA-GIZ Academies - Stage 1 - SIGMA opening.pdf
PPT - SIGMA-GIZ Academies - Stage 1 - SIGMA opening.pdfPPT - SIGMA-GIZ Academies - Stage 1 - SIGMA opening.pdf
PPT - SIGMA-GIZ Academies - Stage 1 - SIGMA opening.pdf
 
Photo gallery - SIGMA-GIZ Academies on QM - Stage 1.pdf
Photo gallery - SIGMA-GIZ Academies on QM - Stage 1.pdfPhoto gallery - SIGMA-GIZ Academies on QM - Stage 1.pdf
Photo gallery - SIGMA-GIZ Academies on QM - Stage 1.pdf
 
PPT - SIGMA-GIZ Academies - Stage 1 - prezentacija gsb podgorica.pdf
PPT - SIGMA-GIZ Academies - Stage 1 - prezentacija gsb podgorica.pdfPPT - SIGMA-GIZ Academies - Stage 1 - prezentacija gsb podgorica.pdf
PPT - SIGMA-GIZ Academies - Stage 1 - prezentacija gsb podgorica.pdf
 
PPT - SIGMA-GIZ Academies - Stage 1 - CAF-MONTENEGRO-29-FEB.pdf
PPT - SIGMA-GIZ Academies - Stage 1 - CAF-MONTENEGRO-29-FEB.pdfPPT - SIGMA-GIZ Academies - Stage 1 - CAF-MONTENEGRO-29-FEB.pdf
PPT - SIGMA-GIZ Academies - Stage 1 - CAF-MONTENEGRO-29-FEB.pdf
 
PPT - SIGMA-GIZ Academies - Stage 1 - CAF Georgia.pdf
PPT - SIGMA-GIZ Academies - Stage 1 - CAF Georgia.pdfPPT - SIGMA-GIZ Academies - Stage 1 - CAF Georgia.pdf
PPT - SIGMA-GIZ Academies - Stage 1 - CAF Georgia.pdf
 
PPT - SIGMA-GIZ Academies - Stage 1 - QM Roadmapping Day 2 and 3.pdf
PPT - SIGMA-GIZ Academies - Stage 1 - QM Roadmapping Day 2  and 3.pdfPPT - SIGMA-GIZ Academies - Stage 1 - QM Roadmapping Day 2  and 3.pdf
PPT - SIGMA-GIZ Academies - Stage 1 - QM Roadmapping Day 2 and 3.pdf
 
Academies-QM_Stage1_Ministry of Higher Education CAF.pdf
Academies-QM_Stage1_Ministry of Higher Education CAF.pdfAcademies-QM_Stage1_Ministry of Higher Education CAF.pdf
Academies-QM_Stage1_Ministry of Higher Education CAF.pdf
 
PPT - SIGMA-GIZ Academies - Stage 1 - ReSPA and CAF.pdf
PPT - SIGMA-GIZ Academies - Stage 1 - ReSPA and CAF.pdfPPT - SIGMA-GIZ Academies - Stage 1 - ReSPA and CAF.pdf
PPT - SIGMA-GIZ Academies - Stage 1 - ReSPA and CAF.pdf
 
PPT - SIGMA-GIZ Academies - Stage 1 -Bosnia Herzegovina CAF.pdf
PPT - SIGMA-GIZ Academies - Stage 1 -Bosnia Herzegovina CAF.pdfPPT - SIGMA-GIZ Academies - Stage 1 -Bosnia Herzegovina CAF.pdf
PPT - SIGMA-GIZ Academies - Stage 1 -Bosnia Herzegovina CAF.pdf
 
PPT - SIGMA-GIZ Academies - Stage 1 -Montenegro CAF.pdf
PPT - SIGMA-GIZ Academies - Stage 1 -Montenegro CAF.pdfPPT - SIGMA-GIZ Academies - Stage 1 -Montenegro CAF.pdf
PPT - SIGMA-GIZ Academies - Stage 1 -Montenegro CAF.pdf
 
PPT - SIGMA-GIZ Academies - Stage 1 - North Macedonia CAF.pdf
PPT - SIGMA-GIZ Academies - Stage 1 - North Macedonia CAF.pdfPPT - SIGMA-GIZ Academies - Stage 1 - North Macedonia CAF.pdf
PPT - SIGMA-GIZ Academies - Stage 1 - North Macedonia CAF.pdf
 
PPT - SIGMA-GIZ Academies - Stage 1 - CAF in Ukraine.pdf
PPT - SIGMA-GIZ Academies - Stage 1 - CAF in Ukraine.pdfPPT - SIGMA-GIZ Academies - Stage 1 - CAF in Ukraine.pdf
PPT - SIGMA-GIZ Academies - Stage 1 - CAF in Ukraine.pdf
 
PPT - SIGMA-GIZ Academies - Stage 1 -Serbia CAF.pdf
PPT - SIGMA-GIZ Academies - Stage 1 -Serbia CAF.pdfPPT - SIGMA-GIZ Academies - Stage 1 -Serbia CAF.pdf
PPT - SIGMA-GIZ Academies - Stage 1 -Serbia CAF.pdf
 
PPT - SIGMA-GIZ Academies - Stage 1 - SIGMA opening.pdf
PPT - SIGMA-GIZ Academies - Stage 1 - SIGMA opening.pdfPPT - SIGMA-GIZ Academies - Stage 1 - SIGMA opening.pdf
PPT - SIGMA-GIZ Academies - Stage 1 - SIGMA opening.pdf
 
Omnichannel management, by Willem Pieterson - SIGMA Webinars on service desig...
Omnichannel management, by Willem Pieterson - SIGMA Webinars on service desig...Omnichannel management, by Willem Pieterson - SIGMA Webinars on service desig...
Omnichannel management, by Willem Pieterson - SIGMA Webinars on service desig...
 
eZdravlje, by Vladimir Raickovic - SIGMA Webinars on service design and deliv...
eZdravlje, by Vladimir Raickovic - SIGMA Webinars on service design and deliv...eZdravlje, by Vladimir Raickovic - SIGMA Webinars on service design and deliv...
eZdravlje, by Vladimir Raickovic - SIGMA Webinars on service design and deliv...
 

Último

2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
MadhuKothuru
 
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
gajnagarg
 
Unique Value Prop slide deck________.pdf
Unique Value Prop slide deck________.pdfUnique Value Prop slide deck________.pdf
Unique Value Prop slide deck________.pdf
ScottMeyers35
 
Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899
Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899
Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899
Cara Menggugurkan Kandungan 087776558899
 
Competitive Advantage slide deck___.pptx
Competitive Advantage slide deck___.pptxCompetitive Advantage slide deck___.pptx
Competitive Advantage slide deck___.pptx
ScottMeyers35
 

Último (20)

2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
2024 asthma jkdjkfjsdklfjsdlkfjskldfgdsgerg
 
Call Girls Basheerbagh ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Basheerbagh ( 8250092165 ) Cheap rates call girls | Get low budgetCall Girls Basheerbagh ( 8250092165 ) Cheap rates call girls | Get low budget
Call Girls Basheerbagh ( 8250092165 ) Cheap rates call girls | Get low budget
 
Dating Call Girls inBaloda Bazar Bhatapara 9332606886Call Girls Advance Cash...
Dating Call Girls inBaloda Bazar Bhatapara  9332606886Call Girls Advance Cash...Dating Call Girls inBaloda Bazar Bhatapara  9332606886Call Girls Advance Cash...
Dating Call Girls inBaloda Bazar Bhatapara 9332606886Call Girls Advance Cash...
 
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Haldia [ 7014168258 ] Call Me For Genuine Models We...
 
2024 UN Civil Society Conference in Support of the Summit of the Future.
2024 UN Civil Society Conference in Support of the Summit of the Future.2024 UN Civil Society Conference in Support of the Summit of the Future.
2024 UN Civil Society Conference in Support of the Summit of the Future.
 
Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)Tuvalu Coastal Adaptation Project (TCAP)
Tuvalu Coastal Adaptation Project (TCAP)
 
Unique Value Prop slide deck________.pdf
Unique Value Prop slide deck________.pdfUnique Value Prop slide deck________.pdf
Unique Value Prop slide deck________.pdf
 
Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899
Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899
Cara Gugurkan Pembuahan Secara Alami Dan Cepat ABORSI KANDUNGAN 087776558899
 
Competitive Advantage slide deck___.pptx
Competitive Advantage slide deck___.pptxCompetitive Advantage slide deck___.pptx
Competitive Advantage slide deck___.pptx
 
1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLS1935 CONSTITUTION REPORT IN RIPH FINALLS
1935 CONSTITUTION REPORT IN RIPH FINALLS
 
2024: The FAR, Federal Acquisition Regulations, Part 32
2024: The FAR, Federal Acquisition Regulations, Part 322024: The FAR, Federal Acquisition Regulations, Part 32
2024: The FAR, Federal Acquisition Regulations, Part 32
 
NAP Expo - Delivering effective and adequate adaptation.pptx
NAP Expo - Delivering effective and adequate adaptation.pptxNAP Expo - Delivering effective and adequate adaptation.pptx
NAP Expo - Delivering effective and adequate adaptation.pptx
 
sponsor for poor old age person food.pdf
sponsor for poor old age person food.pdfsponsor for poor old age person food.pdf
sponsor for poor old age person food.pdf
 
Contributi dei parlamentari del PD - Contributi L. 3/2019
Contributi dei parlamentari del PD - Contributi L. 3/2019Contributi dei parlamentari del PD - Contributi L. 3/2019
Contributi dei parlamentari del PD - Contributi L. 3/2019
 
Honasa Consumer Limited Impact Report 2024.pdf
Honasa Consumer Limited Impact Report 2024.pdfHonasa Consumer Limited Impact Report 2024.pdf
Honasa Consumer Limited Impact Report 2024.pdf
 
Vasai Call Girls In 07506202331, Nalasopara Call Girls In Mumbai
Vasai Call Girls In 07506202331, Nalasopara Call Girls In MumbaiVasai Call Girls In 07506202331, Nalasopara Call Girls In Mumbai
Vasai Call Girls In 07506202331, Nalasopara Call Girls In Mumbai
 
31st World Press Freedom Day - A Press for the Planet: Journalism in the face...
31st World Press Freedom Day - A Press for the Planet: Journalism in the face...31st World Press Freedom Day - A Press for the Planet: Journalism in the face...
31st World Press Freedom Day - A Press for the Planet: Journalism in the face...
 
Pakistani Call girls in Sharjah 0505086370 Sharjah Call girls
Pakistani Call girls in Sharjah 0505086370 Sharjah Call girlsPakistani Call girls in Sharjah 0505086370 Sharjah Call girls
Pakistani Call girls in Sharjah 0505086370 Sharjah Call girls
 
74th Amendment of India PPT by Piyush(IC).pptx
74th Amendment of India PPT by Piyush(IC).pptx74th Amendment of India PPT by Piyush(IC).pptx
74th Amendment of India PPT by Piyush(IC).pptx
 
unang digmaang pandaigdig tagalog version
unang digmaang pandaigdig tagalog versionunang digmaang pandaigdig tagalog version
unang digmaang pandaigdig tagalog version
 

PPT, ENISA, service delivery webinar 310522

  • 1. Dr. Evgenia Nikoulouzou ENISA, Policy Implementation and Development unit DIGITAL IDENTITY, LEVERAGING THE SELF- SOVEREIGNTY IDENTITY (SSI) CONCEPT TO BUILD TRUST 31 05 2022 CSA: Support the development and implementation of Union policy in the field of electronic identity and trust services
  • 2. ENISA eIDAS : AGENDA eIDAS : Overview of ENISA Activities Digital Wallets Process in a Nutshell Report: Digital Identify, SSI Conclusions ENISA: Digital Identities and Remote Identity Proofing
  • 3. 3 POLICY CONTEXT FOR ENISA 3 eIDAS Regulation 910/2014, Trust Services, Article 19 • Support MS with supervision and security measures • Support MS with incident reporting, and cross-border notifications • Annual reports Trust services incidents • CIRAS Incident reporting and Analysis system • Future role for ENISA in the eID Cooperation network ENISA mandate - CSA Article 5 Support the development and implementation of Union policy in the field of electronic identity and trust services, in particular by providing advice and issuing technical guidelines, as well as by facilitating the exchange of best practices between competent authorities NIS2 proposal - brings trust services under NISD ENISA supports the NIS Cooperation group eIDAS2 package - Proposal for eΙDAS2 - COM (2021) 281 final - Commission Recommendation on Toolbox for eID wallets ENISA supports the EC toolbox work – technical security measures
  • 4. 4 OVERVIEW OF ENISA ACTIVITIES Leading role for:  ENISA Article 19 EG  CIRAS Tool – Incident reporting  ENISA Trust Services Forum (annual conference since 2015 – Berlin, September) Advisory role for:  FESA  Commission eIDAS expert group  eID Cooperation Network Find more under: Trust Services — ENISA (europa.eu), Building Trust in the Digital Era: ENISA boosts the uptake of the eIDAS regulation — ENISA (europa.eu) Support MS with Trust Services - 12 reports to support TSPs and SBs - 5 reports to support relying parties - Cyber incident reporting tool, CIRAS - Secretariat of ENISA Article 19 group - Hosting of 19 meetings of ENISA Article 19 group since 2015 Support MS with Digital Identity - 4 reports on eID, e.g. SSI - Occasional invitation to the eID CN 2014 eIDAS regulation 2015 ENISA Art19 group 2016 ENISA incident tool for trust services (CIRAS) 2021 Supporting EC/MS with digital wallets Recent example (of ENISA bridging between authorities, market players, and standards bodies) - 2020 Security of remote identify proofing (especially relevant in a pandemic) - 2021 Attack scenarios-countermeasures and workshop on remote identity proofing
  • 5. 5 PEEK INTO EU DIGITAL WALLET PROCESS September Agreement on Process December Agreement on Technical Outline June 2022 Technical Architecture- Standards- guidelines September 2022 Agreement on ToolBox October 2022 Publication of ToolBox Note: Aggressive timeline – ENISA supports the MSs and the Commission eIDAS2
  • 6. 6 Introduction to SSI EU & Global SSI Landscape Architecture Elements of SSI Governance Consideration of Risks Conclusions REPORT OVERVIEW Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust
  • 7. 7 SSI IN A NUTSHELL Digital Identity: Leveraging the Self-Sovereign identity Concept to Build Trust • Aimed at digital IDs across global open networks • Current technology is for federated identities for separate communities with several hierarchies cooperating to share trusted digital IDs • SSI allows a user to have greater control of his or her own identity o Users can request multiple decentralised identifiers (DIDs) from different identity controllers • Identity can be related to different attributes issued by different authorities for different activities o Verifiable credentials (VCs) bind the user-centred identity to formal or informal names o VCs can also carry other user attributes (e.g., age or qualification) used to control access to service
  • 8. 8 W3C Specifications Decentralised Identity Foundation (DIF) ISO TC 307 & CEN/CLC JTC 19 ISO/IEC 23220 & 18013-5 STANDARDS Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust
  • 9. Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust 9 Sovrin Hyperledger ESSIF LACChain COMMUNITIES
  • 10. 10 • Harmonised conditions for the establishment of a framework for European Digital Identity Wallets to be issued by Member States • Union citizens and other residents will able share securely data related to their identity in a user friendly and convenient way under the sole control of the user • European Digital Identity Wallets should allow users to electronically identify and authenticate online and offline across borders for accessing public and private services • Member States should Wallets relying on common standards to ensure seamless interoperability and a high level of security • The conformity Wallets with those requirements should be certified by accredited public or private sector bodies designated by Member States • European Digital Identity Wallets should ensure the highest level of security for the personal data used for authentication irrespective of whether such data is stored locally or on cloud-based solutions, taking into account the different levels of risk EIDAS 2.0 (COM/2021/281 FINAL) Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust
  • 11. 11 Germany Spain Netherlands Poland Member States Survey EU SSI & eID WALLET INITIATIVES Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust
  • 12. GERMANY ID Union SSI project framework (source: Lissi) 12 Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust
  • 13. SPAIN Alastria’s ID Model – Based on the 10 key principles of SSI (Security, Controllability, Portability) 13 Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust
  • 14. POLAND Credentials presented by mObywatel – (left to right) ID card, driving license, COVID certificate, ePrescription 14 Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust
  • 15. POLAND Electronic identification with mObywatel 15 Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust
  • 16. 16 MEMBER STATE SURVEY (RESULTS) Security • SSI has the benefit of having no single point of failure • Increasing demand on the user associated with user control is worrying • ‘Privacy by demand’, with features such as sector-specific identifiers, is crucial o Hard to achieve in typical SSI (DLT/DID-based) systems, especially when these unique and persistent identifiers are created sector- or service- or MS-specific in the very moment they are requested • Important: freshness of attributes (e.g., representation, mandates, professional capacity, custody of minors, etc.) needs to be maintained o This can only be achieved with online/cloud-based wallets Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust
  • 18. VC Issuer • Confirms wallet holder identity • Credential proofing • Issues verifiable credentials • Revokes verifiable credential DID Controller • Ensures uniqueness of ID • Confirms wallet control • Issues secure DID document Wallet Holder • Obtains wallet from provider • Authenticates to the wallet • Collects new verifiable data • Authenticates ID to relying party Wallet Provider • Provides certified wallet software / hardware • May be cloud- based Relying Party (verifier) • Validates presented credentials • Authenticates holder Verifiable credential Wallet control proof ID authentication & Presentation of credentials Trusted DID/VC Registry WALLET Information on issuance and revocation of verifiable data Information used to validate verifiable data Information used to validate verifiable data Architecture Elements
  • 19. GOVERNANCE for a Digital Identity Framework
  • 20. 20 GOVERNANCE Governance of SSI-based schemes still under development Most experience comes from Sovrin, which takes an approach similar to that applied by many PKI services, including eIDAS Trust Services: • There is a governing body that oversees the operation of the SSI service providers and sets the rules for assuring the operation of the SSI service providers • Conformity assessment of the provider by an independent assessor against the assurance rules set by the governing body • A means for relying parties to assess whether are considered trustworthy by the governing body ISO and CEN are in the early stages of developing standards for managing trust based around SSI with working drafts looking at trust anchors Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust
  • 21. 21 GOVERNANCE Governance of wallets • User has control over the use of their wallet o They can decide whether to use any particular wallet, as well as select a particular DID or VC within a wallet, to authenticate their identity to a relying party • Security of SSI depends on the security of the wallet software and environment o In particular, that the keys and verifiable data are under the sole control of the holder and cannot be leaked to other parties • Security of the wallet will need to be certified against specific criteria to give assurance for the security of wallets Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust
  • 22. 22 GOVERNANCE Interdependence Governance of the different elements of an SSI architecture cannot be considered in isolation • VC issuer depends on the DID, as issued by the DID controller, being uniquely assigned to entity identified by the DID controller and on the sole control of the authentication means being under the sole control of the document • DID controller needs to be assured that the authentication means is held securely in a certified wallet • Both DID controller and VC issuer depend on the registry to provide relying parties with the latest state of the DID document and VC Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust
  • 23. CONSIDERATION OF RISKS SSI and Digital Identity
  • 24. 24 Security Measures Asset Identification ✓ Processes ✓ Data Risk Identification ✓ Processes ✓ Data CONSIDERATION OF RISKS Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust
  • 25. 25 SECURITY MEASURES Data minimization • Partial release of user attributes for the purpose of data minimization • Unlinkability of transactions at the cryptographic or protocol level • Use only identifiers that are required to establish necessary linkability • Domain-specific identifiers or pseudonyms – a form of identifiers that avoid using the same unique identifier for a user in all its interactions Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust
  • 26. 26 SECURITY MEASURES Consent and choice • In a user-centric system, users have control over their data and attributes • They can exert informed consent, whether the holder attributes are managed and used by a wallet or another entity Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust
  • 27. 27 SECURITY MEASURES Accuracy and quality • The user’s attributes shall be bound to the legitimate holder • Protocols executed between the wallet and other components protect against eavesdropping at the communication and logical layer • Protection of attribute authenticity and integrity of the attributes o Attributes released to the relying entities are consistent with the issuer's attributes Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust
  • 28. CONCLUSIONS Leveraging the SSI Concept to Build Trust
  • 29. 29 PRIVACY & SSI SSI CAN PROVIDE AN EFFECTIVE BASIS FOR DIGITAL IDENTITIES THAT PROTECT THE PRIVACY OF PERSONAL DATA Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust • Decentralised digital IDs can be used to support pseudonyms for privacy • VCs enable the separation of potentially private attributes from the digital ID; user selects attributes that are revealed to relying parties • Cryptographic separation between transactions through holding multiple authentication keys in a wallet with separate identity documents from different controllers, helping avoid links between the separate transactions
  • 30. 30 GOVERNING SSI FOR THE GOVERNANCE OF THE ARCHITECTURAL ELEMENTS OF AN SSI SOLUTION, WE NEED TO CONSIDER Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust • The certification of wallets • The audit and oversight of DID controllers, VC issuers, and DID and VC registries • That all the above are interdependent and the governance of the DID controller, the VC issuer, and the other elements of an SSI architecture must also be properly governed
  • 31. 31 SECURITY & SSI WHEN THE RISKS OF THE SSI ARCHITECTURE ARE CONSIDERED, THE FOLLOWING KEY SECURITY MEASURES NEED TO BE IMPLEMENTED Digital Identity: Leveraging the Self-Sovereign Identity Concept to Build Trust • Data minimalization: Use only necessary data • Consent and choice: User controls the process and data used for ID • Accuracy and quality: All parties can trust identification data stored and provided by the wallet
  • 32. 32 SAVE THE DATE: 27 – 28 October 2022 Berlin, ESMT TRUST SERVICES FORUM 2022 8th Trust Services Forum 27 October 2022 14th CA-Day 28 October 2022 ENISA: Digital Identities and Remote Identity Proofing