P1619.3 KMS Use Cases Document Title Creating a KMS Use Case Overview In order to create a key management services standard associated, a complete set of use cases must be understood. To make this process easier this document allows users to create a use case based on a common template that can then be used to incorporate these cases in a whitepaper to help determine a common set of criteria and requirements for key management services. If additional material or terminology must be added to the front matter please include it in the end section provided. Terms and Definitions Since common terminology has not been selected by P1619.3 at this time please use the following terminology so that global replacement can be performed when finalizing the use cases in the white paper. Terminology Acronym Description Access Control List ACL Access controls for a key management component that determine rights to use, access or manage keying material. Cryptographic Unit CU User of keys to encrypt and/or decrypt data. Unit where cryptographic functions takes place. May or may not contain the KM Client. Deterministic Random Bit DRBG Generator See SP800-90 for specific definition Deterministic Random DRNG Number Generator See SP800-90 for specific definition Globally unique identifier Globally unique identifier of a key that can not be duplicated anywhere. All keys irrelevant of type or level will have a GUID including key encryption keys. GUID Key blob Key Encryption Key Keying material as it is stored within the key management service. KMS may or may not understand or comprehend the specific key based on security requirements. KEK Key used to encrypt other keys. Can be symmetric or asymmetric depending on specific usage. NOTE: Please make appropriate recommendations if applicable to specific use case. Key ID 04-June-07 Unique key identifier within a specific system or group of systems. Is not globally unique. Robert A. (Bob) Lockhart Page i P1619.3 KMS Use Cases Document Title Terminology Acronym Description Key Management Service KMS Key management service defines all aspects of key management that includes but is not limited to the following functions: Key metadata Key Management API Key generation Key storage Key lifecycle management Policy management Audit and accounting KM User console Data associated with a specific key or group of keys KMAPI API for KM Client to KM Server and KM Server to KM Server communications. May require the development of one or more tool kits by one or more vendors. KM Client KM Policy KM Server 04-June-07 Provides communications directly or as a proxy between cryptographic unit and KM Server. KMP Policies defining various automatic controls as they relate to keys. Policy functions include but are not limited to: Generation requirements Key length and strength Re-keying and Retention Distribution and Replication Usage Auditing requirements Key granularity Access control KMS server that provides specific functions that may include one or more of the following: Key lifecycle management Policy functions Accounting and reporting functions Key storage KM User console Robert A. (Bob) Lockhart Page ii P1619.3 KMS Use Cases Terminology Document Title Acronym KM User Message Code Description Key management human or application user that must provide appropriate credentials to log in to the KMS to manage, monitor and/or maintain keys. Authentication MAC Media Encryption Key Cryptographic data integrity checking. While specific methods may be in use please use MAC as common term for where and how data or keys are verified for integrity. MEK Key used to encrypt data. Sometimes referred to as Data, Tape, Disk or other type of media encryption key. NOTE: For purposes of use cases please use generic MEK term. Non-deterministic random NRBG bit generator See SP800-90 for specific definition Non-deterministic random NRNG number generator See SP800-90 for specific definition Parent Key GUID Globally unique identifier (GUID) of a key encryption key (KEK) used to protect one or more media encryption keys (MEK) KEK GUID Requirements To create a use case a specific set of information both basic and detailed must be included. The information required in each of the sections is as follows: Section Information Provided Overview Basic concept of use case that includes description, entities involved both in cryptographic operations and normal operations. Overview should have a figure showing physical connectivity of entities involved. Application requirements Requirements of application without encryption being involved including hosts, networks and media involved. Additional considerations for operations compression, communications protocols, etc…) 04-June-07 Robert A. (Bob) Lockhart (i.e. Page iii P1619.3 KMS Use Cases Document Title Section Information Provided Encryption requirements Placement and uses of cryptographic unit or units Key management requirements (services used) Policy requirements (types and definitions) Data security requirements (mobile data, ACL’s, encryption, etc…) Key requirements This includes metadata that may apply to a specific type of key, key typing, key wrapping and other information required about the key for the described use case. Key management services requirements Services required from KMS such as key generation, storage, retrieval, archiving, auditing, etc… Communications requirements Topologies and possible protocols that may be used to transport keys (i.e. Ethernet, Fibre Channel, IP, SCSI, TLS, etc…) NOTE: where possible please include a diagram of required interaction between application and storage as well as KMS, KM Client and CU. Summary Optional section with a short review of the requirements and why this is included in the use case whitepaper. This can be written at a later date and time prior to inclusion into the whitepaper so is not required up front. Additional information may be required at a later date prior to publication of the specification. Once completed with the template please forward a copy with or without contact information to the P1619 reflector and a copy with contact information to: Matt Ball SISWG Chair Eric Hibbard SISWG Vice-chair Bob Lockhart P1619.3 Editor The following information should be entered (between the brackets []) prior to editing the below use case: Use Case Title: [Document Title] Use Case Author(s): [Author Name] Primary Contact email: [youremail@yourdomain.com] Date document submitted: [04-June-07] 04-June-07 Robert A. (Bob) Lockhart Page iv P1619.3 KMS Use Cases Document Title Please use the following pages as a template for the KMS use cases. You can modify the order the information is provided in by moving sections around. If a section does not apply to the use case please leave it blank but leave the section title. Do not include a table of contents, figures or tables. These tables will be added to final document. When finalizing your document, do not delete these first four pages if returning in Word or rich text format the above text information is required to keep some of the information updated. If additional sections are needed, add them as required prior to the appendices. 04-June-07 Robert A. (Bob) Lockhart Page v P1619.3 KMS Use Cases Document Title Document Title Use Case Introduction Operational and security requirements Basic concept of use case that includes description, entities involved both in cryptographic operations and normal operations. Overview should have a figure showing physical connectivity of entities involved. Include security requirements and reasons for encryption if applicable. Operational Entities Include all non-security and non-cryptographic related entities for this use case. Security and cryptographic entities Include all security and cryptographic related entities that participate in this use case. Operational scenario overview Describe in detail the normal data usage of the specific use case. Cryptographic usage overview Explain what and where cryptography is taking place. Algorithms, modes, authentication need only be mentioned in reference to symmetric, asymmetric, access controls, authentication mechanisms, etc… Specifics may be asked for at a later date. Key requirements Include any and all requirements for keys including generation, storage, etc… Include a table of metadata requirements for a key (time stamps, Policies, Key ID, etc…) Key Management Services use requirements Include any and all services required from KMS such as key generation, storage, retrieval, archiving, auditing, etc… NOTE: Do not feel locked in to services listed above. If additional services are required such as name services, directory services, etc… include them as part of the KMS cloud. They can be separated out later. Communications requirements List communication transports the need support such as IP, SCSI, etc… 04-June-07 Robert A. (Bob) Lockhart Page 1 P1619.3 KMS Use Cases Document Title Transport1 Rename title to appropriate topology being used. Include specific security concerns when using the transport to carry keys. Include detailed diagrams, if appropriate, of both topology and communications flow. Transport2 Rename section title or delete as needed. transport (if used) to carry keys. Include specific security concerns when using Include detailed diagrams, if appropriate, of both topology and communications flow. Summary Optional Section 04-June-07 Robert A. (Bob) Lockhart Page 2 P1619.3 KMS Use Cases Document Title Appendix 1 – Additional Terminology Terminology Acronym Description Appendix 2 – Additions Outside of P1619.3 Scope 04-June-07 Robert A. (Bob) Lockhart Page 1