Uploaded by Christian.gale

12 Egypt PKI experience

advertisement
ITIDA
EGYPT-MCIT
Egypt’s
E-Signature & PKInfrastructure
Seminar on Electronic Signature Algeria 8-9 Dec. 2009
By:
Hisham Mohamed Abdel Wahab
Head of the E-Signature CA Licensing
ITIDA- MCIT – EGYPT
Email: hwahab@mcit.gov.eg
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
Agenda
Egypt’s PKI Model
Operational requirements for CSPs in Egypt
Applying ISO 27001 as Main CSP requirements
CSPs Auditing Procedures
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
Background : ITIDA
Established in 2004 by law 15, financially supported by IT co’s.
E-Signature regulator, promoter, and root CA.
IPR protector for software and databases (Copy Right Office).
Empowers IT companies.
Recognizes best practices in E-Content development.
Launches E-business initiatives, especially for SMEs
Supports R&D.
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
Background : E-Signature mile stones
E-Signature Law issued 2004.
Executive directives of the law issued in 2005.
4 CSP (e-signature certificate service providers) are licensed by ITIDA in
2006
Therefore the Root CA & Gov CA tendered in 2006
Root CA started work in Sep 2009
1st CSP got the official permission to work from ITIDA in Oct.
2009
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
Background: Getting the experience
Germany
Ireland
Singapore
South Korea
Malaysia
Hong Kong
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
PKI Model in Egypt…….(1/2)
ITIDA
Licensing
CSP
CSP
CSP
Root CA
GOV.
CA
CSP
Gov. employees
Public Use
For public & interaction gov
applications
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
For Internal use only
PKI Model in Egypt…….(2/2)
Regulating E-Signature
Information Technology
Industry Development Agency
(E-Signature regulator)
Request for digital certificates
Certificate
Authorities
CSP
Digital Certificates
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
Client Organizations
PKI Model in Egypt: Licensing
section....(1/2)
Managing the application process for CSPs in Egypt.
Implementing the criteria /requirements
for licensing CSPs.
Auditing the licensed CSPs.
Tracking the Technology to guarantee having the
most secure e-signature technology.
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
PKI Model in Egypt: Licensing Section
.....(2/2)
Licensing
Requirements
Licensing
Auditing
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
Awareness
Customer
services
PKI Model in Egypt : Root
CA....(1/2)
Operates a Root-CA according to the highest security standards.
Offers a continuous 24hx7d operation
Personalizes the CA-and other service-chip
cards for other CSPs,
Operates an electronic directory service that includes the certificates of all
licensed CSPs.
Achieves the interoperability among CSPs and other countries.
Handling the CRLs and E-Signature data of clients in case of licensed CSPs
failure
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
PKI Model in Egypt : Root CA....(2/2)
How works?
Self Signed
Root CA
Root CA
Certificate Info
Root CA's Private Key
Root Signature
Sub CA
Subordinate CA
Certificate Info
Root CA's Private Key
Root Signature
Subscriber
Certificate Info
Subordinate CA's Private Key
SubCA's Signature
Text
Document
Subscriber's
Signature
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
Subscriber's Private Key
PKI Model in Egypt : Licensed Public CSPs (4)
Must be under the Root CA.
Provide Gov. and public certificate services, including SSCD.
Working as RAs (Registration Authorities).
Must full fill with ITIDA requirements.
Use the most recognized world wide standards for PKI (2048/4096 KeysRSA…etc).
12
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
PKI Model in Egypt : Licensed Gov CA (1 CA)
Issue certificates to Gov. employees only for internal gov use only
& SSCD.
Provide Gov. certificate services.
Under ITIDA Root CA.
Working as RAs (Registration Authorities) for Gov. employees.
Must full fill ITIDA requirements.
Use Specific type of encryption standards.
13
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
PKI Model in Egypt : Strategic
Decisions.......(1/6)
Why just e-signature is regulated.
1- The law regulates certificates used in E-signature only.
2- Providers are allowed to provide SSL certificate for example with no obligations.
3- Providers can provide any other security services, but when comes to e-signature this
must be regulated by ITIDA.
Why??
E-Signature is the most critical application when you come to E-Gov.
E-Signature will replace current and traditional signature, so must be working under very
trustable conditions
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
PKI Model in Egypt : Strategic
Decisions.......(2/6)
The E-Signature Definition in Egyptian market.
1- Only one type of e-signature is considered in front of court
2- Another types, transactions and e-documents are considered just e-document or ewriting
3- Using third level smart card / token as SSCD is must .
4- Physical identification is must.
Why??
Avoid conflict, because if one type of e-signature is compromised then the market will
think that strong types are compromised too!
Strengthen the working environment
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
PKI Model in Egypt : Strategic
Decisions.......(2/6)
IS E-Signature
Digital Certificate
Signer Private Key
Signer Public Key
+Pin Code +Secure pin entry
KSA
15-16
Syria
1-2 Dec.
July 2009
2008
PKI Model in Egypt : Strategic
Decisions.......(2/6)
E-Signature specification
Smart Cards are able to store private e-signature keys for a card holder without delivering the key
to the outside world. Therefore the calculation of the signature algorithm as well as its storage is performed
in a highly secure environment inside a smart card. Thus, it is required to have smart
cards (Reader / Readerless / contactless) which use the most advanced security standard available in the market.
-Secure PIN code entry
-Complete separation between E-Signature application and any other applications.
Security evaluation ITSEC E4
140-1 Level 2 or higher
X.509v3 certificates
Or
NIST FIPS PUB
ISO 7816
Cryptographic algorithms must include RSA, SHA-1
Microsoft PC/SC
Recommended : PKCS #11 (interface)
Recommended: CAPI – Microsoft
Cryptographic
Recommended : PKCS #15 (syntax
standard)
KSA
15-16
Dec
KSA
15-16
Dec.
2009
Syria
1-2
July
2008
PKI Model in Egypt : Strategic
Decisions.......(3/6)
Gov CA will use its own encryption technique and provide only
services for use in internal gov transactions
1- Executive directive mentioned that gov CA could use it own encryption .
2- The services provided by gov CA for use only in internal gov transaction
3- If end user needs e-signature service to be used between gov and private then he must
get it from Public CSP
4- Physical identification is must.
Why??
To secure the sensitive transactions .
To encourage the private investment according to the national strategy.
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
PKI Model in Egypt : Strategic
Decisions.......(4/6)
ITIDA will run the Root CA
1- ITIDA will be the only body who is running Root CA for PKI in Egypt.
2- The main and backup site of Root CA is responsibility of ITIDA
3- The Root CA will be audited internally by ITIDA auditors , externally by ISO 27001
auditors , and other gov entities
Why??
Ensure interoperable environment
“trust” originate from a common Root CA (strict hierarchy model)
A subordinate CA will have one superior, and only one
Strict hierarchies are appropriate for many enterprises, especially where policy controls
are to be enforced in a “top-down” fashion.
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
PKI Model in Egypt : Strategic
Decisions.......(5/6)
Facilitating the financial requirements for licensing
1- The Licensee will pay only 0.5 M EGP instead of 1.5 M EGP.
2- 20000 EGP as auditing expenses will be paid after 2 years of operation.
3- The payments will be annually instead of quarterly .
4- 3% of the revenue will be paid at the end of 2nd year instead of 1st year.
Why??
Based on companies suggestions and market studies
To encourage this new industry
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
PKI Model in Egypt : Strategic
Decisions.......(6/6)
Leaving the pricing model to the market forces
1- Licensed companies are free to put the price model according to their business model.
2- ITIDA must approve the price list or any modifications prior to publish.
3- ITIDA is responsible for control the pricing competition.
Why??
Based on most companies suggestions.
Comply with the current Egyptian market.
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
PKI Model in Egypt : E-Signature,
when comes to apply !.....(1/4)
Applying for the service
1- Physical Identification (applicant must show himself up).
2- Delivering the service : Token/smart card – CD - installed keys plus certificate.
3- Help desk and customer support (CSP – ITIDA).
4- Providing applications (compatible with ITIDA & CSP requirements).
5- Using the e-signature with applications provided by Gov or CSPs or compatible
applications provided by another vendors.
6- Renewing / Update the service, or Change the provider / Terminating the service .
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
PKI Model in Egypt : E-Signature,
When comes to apply!......(2/4)
Auditing the service
1- Surveillance and licensing audit by ITIDA.
2-Regular audit by ITIDA.
3- Receiving the complaints and providing support in case of disputes .
4-Setting up the compliance conditions (applications & operational).
5- Renewing / Extending / terminating the license.
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
PKI Model in Egypt : E-Signature,
when comes to apply.......(3/4)
Proposed Market Applications
1- E-Government (All applications who needs physical existence of the users).
2- E-Tax
3- E-Money (money orders will be collected electronically).
4- E-Banking applications.
5- Stock market .
6- Mobile applications.
7-E-Commerce/Payment.
8- E-education.
9- E-Civil applications.
10- E-Archiving (time stamp is must).
11-E-Contracting .
12-Installed on National ID.
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
PKI Model in Egypt : E-Signature,
when comes to apply.......(4/4)
Type of certificates Provided by the CSP
- E-Signature Certificates (Regulated) for persons and organizations.
-SSL (not regulated) .
-Code signing certificates (not regulated).
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
Sign Contract Details
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
Web applications as : є -Banking & є-Trade
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
Current Situation For E-Signature Certificate Service Providers
KSA
15-16
2009
KSA
15-16
Dec
Syria
1-2 Dec.
July2009
2008
PKI Model in Egypt : Current
Status....(1/2)
4 Licensed companies as CSP (E-Signature Certificates Service
Provider).
1 Company finished its infrastructure and is audited , started
work in Egyptian market in 1 Oct. 2009 (more than 2000 hours
auditing time, team of 13 experts)
The Root CA is established in Sep. 2009
The Ministry of finance got the license to provide E-Signature
Service to gov. employees for internal transactions only.
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
PKI Model in Egypt : Current
Status....(2/2)
4 Licensed Companies + GOV CA
1-ACT
2-MCDR
3-EgyptTrust
4-SNS
http://www.act-eg.com/
http://www.mcdr.com.eg/
http://www.egypttrust.com/
http://www.snsegypt.com/
KSA
KSA
15-16
15-16
Dec
2009
Syria
1-2 Dec.
July2009
2008
Agenda
Egypt’s PKI Model
Licensing requirements for CSPs in Egypt
Applying ISO 27001 as Main CSP requirements
CSPs Auditing Procedures
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
Licensing Requirements: .....(1)
The detailed requirements are listed in License Form at:
www.e-signature.gov.eg/materials/License-July-2006.doc
(Arabic Language )
- More than 60 Page.
- More than 250 item to be satisfied before getting the license
- Categorized to financial , operational, technical and administrative.
- References: The Law 15, Its Directive, NTRA license, ETSI TS 101
456
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
Licensing Requirements: .....(2)
License Sections
Operational
Financial
Technical
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
Legal
Licensing Requirements: .....(3)
Financial Requirements
Insurance of $ 1.5 Million
Licensing fee $ 85,000 for 5 years
Insurance per certificate $ 200
3% of revenue of licensed services
34
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
Licensing Requirements: .....(4)
Technical Requirements
Complete PKI infrastructure.
Disaster Recovery site (DR).
ISO 27001 for Info. Security.
PKIX (PKI Based on X.509).
Encryption Keys with length 1024-2048.
Using Smart Cards as E-Signature creation device (SSCD).
35
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
Licensing Requirements: .....(5)
www.e-signature.gov.eg/materials/License-July-2006.doc
(Arabic Language )
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
Agenda
Egypt’s PKI Model
Operational requirements for CSPs in Egypt
Applying ISO 27001 as Main CSP requirements
CSPs Auditing Procedures
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
Why Implement an ISMS System ?
KSA
15-16
Syria
1-2 Dec
July2009
2008
Main Requirement ISO27001:
Information is an asset....(1/2)
Information is an asset, which, like other
important business assets, has value to an
organization and consequently needs to be
suitably protected. Information security
protects information from a wide range of
threats in order to ensure business continuity,
minimize business damage and maximize return
on investments and business opportunities.”
Quote ISO/IEC 17799-2000(E)
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
Main Requirement ISO27001:
Information is an asset.....(2/2)
Stored on Computers
Transmitted
Printed
Data
Written
Fax
Microfilm
Email
Spoken
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
Main Requirement ISO27001:
will satisfy...
PROTECTION OF INFORMATION FOR:
CONFIDENTIALITY
Protecting sensitive information from unauthorised disclosure or intelligible interception
INTEGRITY
Safeguarding the accuracy and completeness of information and computer software
AVAILABILITY
Ensuring that information and vital services are available to users when required
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
Main Requirement ISO27001:
Importance for PKI .....(1/2)
SABOTAGE
MISUSE OF DATA
FRAUD
VANDALISM
ESPIONAGE
NATURAL
DISASTER
ERROR
KSA 15-16 Dec. 2009
Main Requirement ISO27001:
Importance for PKI .....(2/2)
ISO27001 is providing complete security management system.
Through:Logical security.
Application security.
Physical & environmental security.
Network Security.
Personal Security.
Need for dual control through third party audit.
ISO2001 is complete ISMS, merges between business and technology .
ISO27001 needs continual improvements.
KSA 15-16 Dec. 2009
Accreditation and Certification
for ISO 27001
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
Accreditation & Certification
Everything you wanted to know
accreditation….(in 30 •
EA –about
European
Conformance at a
seconds)
Accreditation
European Level
Forum
EA 7/02
Accredited by a State
Organisation
National
Accreditation
Board
National
Accreditation
ISO Guide 66
Board
EA 45012
Certified by a
Certification Body
European
Certification Body
ISO 27001
Company
Company 3
Company 2
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
Wishes to be certified
to national or
international
standards
Management
System
Certified Information Security
Management System
Security
Phase 2 : On Site Audit
Information
Phase 1 : Pre-Audit Study
The Certification Process
®
Certification to ISO 27001 ISMS Standard
KSA15-16
15-16Dec.
Dec2009
2009
KSA
Agenda
Egypt’s PKI Model
Operational requirements for CSPs in Egypt
Applying ISO 27001 as Main CSP requirements
CSPs Auditing Process
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
CSPs Auditing Process
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
CSPs Auditing Process
Initiating (planning ) the audit
Preparation
phase
Conducting Documentation
review
Preparing for Audit activities
Conducting audit activities
Preparing , approving &
distributing the audit report
Conducting audit follow up
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
Post Audit
Phase
CSPs Auditing Process
Initiating (planning ) the audit
Conducting Documentation
review
Scope , Objective , Criteria
Preparing for Audit activities
Determine feasibility & select audit team
Conducting audit activities
Write an audit plan
Preparing , approving &
Contact the auditee
distributing the audit report
Conducting audit follow up
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
CSPs Auditing Process
Initiating (planning ) the audit
Conducting Documentation
review
Request relevant documents
Preparing for Audit activities
Review prior to arriving on-site
Conducting audit activities
Review the previous audit report if any
Preparing , approving &
distributing the audit report
Conducting audit follow up
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
CSPs Auditing Process
Initiating (planning ) the audit
Conducting Documentation
review
Preparing for Audit activities
Conducting audit activities
Finalize audit plan
Preparing , approving
Prepare &
work documents
distributing the audit report
Assign audit team
Conducting audit follow up
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
CSPs Auditing Process
Initiating (planning ) the audit
Conducting Documentation
review
Preparing for Audit activities
Conducting audit activities
Opening Meeting
Preparing , approving &
distributing theCommunication
audit reportduring the audit
Conducting audit
followobjective
up
Collecting
evidences
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
Closing meeting
CSPs Auditing Process
Initiating (planning ) the audit
Conducting Documentation
review
Preparing for Audit activities
Conducting audit activities
Preparing , approving &
distributing the audit report
Distribute it to the appropriate persons
Conducting audit follow up
Mention positive & negatives
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
CSPs Auditing Process
Initiating (planning ) the audit
Conducting Documentation
review
Preparing for Audit activities
Conducting audit activities
Preparing , approving &
distributing the audit report
Conducting audit follow up
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
Thank you
very much
hwahab@mcit.gov.eg
www.itida.gov.eg
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
57
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
Cyberlaws & ICT-related Laws & Regulations

A comprehensive IPR Law (Law No. 82/2002)

A comprehensive Communications Act (Law No.
10/2003)

An E-Signature law ( Law No. 15/2004)

Children Protection Law (2008)

Drafts:



A Data Protection, Privacy, and Cyber Security law
A Cyber Crime law
Access to Information Law
58
KSA
KSA15-16
15-16Dec.
Dec 2009
2009
Download