Top Banner
Overcoming Obstacles: Encryption for Everyone! Mechthild Stöwer Head of Department Security Management Fraunhofer Institute for Secure Information Technology
20

Overcoming Obstacles: Encryption for Everyone! - … · Overcoming Obstacles: Encryption for Everyone! ... Main obstacles for use of encryption ... ID-Passport) •Wizard supported

Sep 01, 2018

Download

Documents

trinhdiep
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Overcoming Obstacles: Encryption for Everyone! - … · Overcoming Obstacles: Encryption for Everyone! ... Main obstacles for use of encryption ... ID-Passport) •Wizard supported

Overcoming Obstacles:Encryption for Everyone!

Mechthild Stöwer

Head of Department Security Management

Fraunhofer Institute for Secure Information Technology

Page 2: Overcoming Obstacles: Encryption for Everyone! - … · Overcoming Obstacles: Encryption for Everyone! ... Main obstacles for use of encryption ... ID-Passport) •Wizard supported

„Digital World“ is ubiquitous

New technologies and services produce and share mass of data.

Page 3: Overcoming Obstacles: Encryption for Everyone! - … · Overcoming Obstacles: Encryption for Everyone! ... Main obstacles for use of encryption ... ID-Passport) •Wizard supported

Confidentiality in fokus

Companies‘ know-how is at risk:

• 51% of all companies are affected 1

• 51 bn damage 1

SMEs are in focus 2.

Privacy violations cause reputational losses and data protection laws breaches.

1 Study bitkom 7/20152 Corporate Trust: Study Industriespionage, 2014

Page 4: Overcoming Obstacles: Encryption for Everyone! - … · Overcoming Obstacles: Encryption for Everyone! ... Main obstacles for use of encryption ... ID-Passport) •Wizard supported

Measures to protect confidentiality

• Up-to-date malware protection

• Implementation of firewall systems

• Data leakage prevention systems

• Appropriate access rights according to the need-to-know principle

• Monitoring of access rights

• Awareness programs

Page 5: Overcoming Obstacles: Encryption for Everyone! - … · Overcoming Obstacles: Encryption for Everyone! ... Main obstacles for use of encryption ... ID-Passport) •Wizard supported

Encryption is the key measure

Data-in-Transit• E-Mail communication

• Instant messaging

• Voice communication

• Network access

• Collaboration platforms

Data-at-rest• Storage devices

• Container, folders

• Files

Page 6: Overcoming Obstacles: Encryption for Everyone! - … · Overcoming Obstacles: Encryption for Everyone! ... Main obstacles for use of encryption ... ID-Passport) •Wizard supported

… but rarely used!

Results form a study from 2014 1:

• Only 14 % of all professional users encrypt E-Mails

• 65 % of all users do not have any technical support for encryption

• Even there where infrastructure is available only 20 % of users encrypt E-Mails

1 Study from the German organisation Bitkom - http://www.heise.de/ix/meldung/Befragung-Stand-der-E-Mail-Verschluesselung-ist-desastroes-2243124.html

Page 7: Overcoming Obstacles: Encryption for Everyone! - … · Overcoming Obstacles: Encryption for Everyone! ... Main obstacles for use of encryption ... ID-Passport) •Wizard supported

State-of-the-art in SME

• Encryption is used basing on personal risk estimation

• No company wide policy is in use

• Different solutions are in place: inefficient administrative effort

• No recovery and emergency procedures: risk of loss of keys and encrypted data

• No key management: availability and confidentiality risks

• No mechanisms for process improvement

Page 8: Overcoming Obstacles: Encryption for Everyone! - … · Overcoming Obstacles: Encryption for Everyone! ... Main obstacles for use of encryption ... ID-Passport) •Wizard supported

Best practice approach for SME

• Evaluation of information protection requirements

• Threat analysis

• Implementation of appropriate encryption solutions for storage and transfer of information

Page 9: Overcoming Obstacles: Encryption for Everyone! - … · Overcoming Obstacles: Encryption for Everyone! ... Main obstacles for use of encryption ... ID-Passport) •Wizard supported

Example: small trading company

Source: KMU Diamant Consulting AG

• Small trading company managedby the two owners

• Two employees

• IT-infrastructure: 3 networkedPCs, one of them is a laptop

• Internet access, E-Mail in use, office applications, solution forinventory management

Page 10: Overcoming Obstacles: Encryption for Everyone! - … · Overcoming Obstacles: Encryption for Everyone! ... Main obstacles for use of encryption ... ID-Passport) •Wizard supported

Step 1: Protection requirements

Information Evaluation

Personal information:

Employees’ data

Salaries

Absence from work

Highly sensitive information

High protection requirements

Customers’ related data Highly sensitive information

High protection requirements

Calculations Highly sensitive information

High protection requirements

Inventory information Low protection requirements

Product information, catalogues Low protection requirements

……

Page 11: Overcoming Obstacles: Encryption for Everyone! - … · Overcoming Obstacles: Encryption for Everyone! ... Main obstacles for use of encryption ... ID-Passport) •Wizard supported

Step 2: Threat analysis

• Confidentiality violations when mobile storage devices or laptops get lost.

• Loss of know-how by unauthorized access at critical company’s, e.g.by unsatisfied employees who transfer them to new employers.

• Data protection law breaches by unauthorized access.

• Unauthorized access to E-Mails with confidential information.

Page 12: Overcoming Obstacles: Encryption for Everyone! - … · Overcoming Obstacles: Encryption for Everyone! ... Main obstacles for use of encryption ... ID-Passport) •Wizard supported

Step 3: Encryption solution

Data-in-transit

• Confidential personal information transferred by E-Mail are encrypted.

• Offers for clients are encrypted.

Data-at-rest

• Storage devices at laptops are encrypted.

• Use of hardware-based USB sticks

• Sensitive information stored at PCs are saved at encrypted containers.

Page 13: Overcoming Obstacles: Encryption for Everyone! - … · Overcoming Obstacles: Encryption for Everyone! ... Main obstacles for use of encryption ... ID-Passport) •Wizard supported

Guide for SME for use of encryption

https://www.sit.fraunhofer.de/reports

For the German speaking audience:

Page 14: Overcoming Obstacles: Encryption for Everyone! - … · Overcoming Obstacles: Encryption for Everyone! ... Main obstacles for use of encryption ... ID-Passport) •Wizard supported

Main obstacles for use of encryption

• The concept of asymmetric encryption is not easy to understand.

• There is no accessible infrastructure to disseminate keys.

• User handle a variety of applications. They are not experienced to configure encryption solutions.

• The usability of solutions is unsatisfying.

• Lack of availability for keys and certificates.

Page 15: Overcoming Obstacles: Encryption for Everyone! - … · Overcoming Obstacles: Encryption for Everyone! ... Main obstacles for use of encryption ... ID-Passport) •Wizard supported

Project „Ecryption for Everyone“

1. Solution Free certificates for all citizens

High quality identity check whencreating certificates (eID)

Automatic installation forapplication

2. Target group Citizens, SMEs, freelancer

Usability is first priority!

Page 16: Overcoming Obstacles: Encryption for Everyone! - … · Overcoming Obstacles: Encryption for Everyone! ... Main obstacles for use of encryption ... ID-Passport) •Wizard supported

Project „Ecryption for Everyone“

Page 17: Overcoming Obstacles: Encryption for Everyone! - … · Overcoming Obstacles: Encryption for Everyone! ... Main obstacles for use of encryption ... ID-Passport) •Wizard supported

E4E - Functions

• Verification of identity (eID, identity procedure supported by Deutsche Post, ID-Passport)

• Wizard supported handling

• Certificates are automatically integrated in E-Mail clients and browsers

• Private key remains with the user

• Easy ex- and import of certificates for other devices

Page 18: Overcoming Obstacles: Encryption for Everyone! - … · Overcoming Obstacles: Encryption for Everyone! ... Main obstacles for use of encryption ... ID-Passport) •Wizard supported

CA-Network RA-Network WWW

CA-Server RA-Server

OCSP ResponderLDAP-Server

E4E-Software

eID-Provider

eID-Server

Utimaco HSM

E4E - Architecture

Page 19: Overcoming Obstacles: Encryption for Everyone! - … · Overcoming Obstacles: Encryption for Everyone! ... Main obstacles for use of encryption ... ID-Passport) •Wizard supported

E4E – overcoming obstacles

Q. Availability of keys and certificatesmissing infrastructure for key distribution

A. Free certificates from an independent organization without commercial interests, publication of certificates, implementation of application

Q. Configuration of application in a correct and secure way

A. Automatic installation of certificats

Q. Missing support for the comprehensive process

A. Support of user during the whole life span of certificate

Q. Lack of usability of encryption applications

A. Application is easy to use, support by wizards

Page 20: Overcoming Obstacles: Encryption for Everyone! - … · Overcoming Obstacles: Encryption for Everyone! ... Main obstacles for use of encryption ... ID-Passport) •Wizard supported

Tatjana RubinsteinMechthild Stöwer

Fraunhofer-Institut für Sichere Informationstechnologie SIT

www.sit.fraunhofer.de

Institutszentrum Schloss BirlinghovenD 54754 St. Augustin

E-Mail: [email protected]