Transcript
NonStop Technical Boot Camp
Atalla Security Products Update Susan Langford, PhD and HP Distinguished Technologist Steve Wierenga, CT and HP Distinguished Technologist
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Agenda Atalla Update - Steve NSP/SCA - Susan ESKM - Steve Q & A - Both
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Forward-looking statements This is a rolling (up to three year) Roadmap and is subject to change without notice. This document contains forward looking statements regarding future operations, product development, product capabilities and availability dates. This information is subject to substantial uncertainties and is subject to change at any time without prior notification. Statements contained in this document concerning these matters only reflect Hewlett Packard's predictions and / or expectations as of the date of this document and actual results and future plans of Hewlett-Packard may differ significantly as a result of, among other things, changes in product strategy resulting from technological, internal corporate, market and other changes. This is not a commitment to deliver any material, code or functionality and should not be relied upon in making purchasing decisions.
3
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Atalla HQ: Labs, Eng, QA, Operations, Support HP Moffett Towers Bldg G, 1160 Enterprise Way, Sunnyvale California
Solar Impulse
4
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
About Atalla Startup 1972 Tandem 1987 HP 2002 Enterprise Security Products 2012 Trusted security partner in the Financial Services industry Customers are the largest financial institutions and retailers worldwide 35 years experience in data protection, key management, cryptographic performance
250 Million card transactions protected daily by Atalla Technology leader in Host Security Modules and banking standards Leading HSM vendor serving Americas and APJ card payments markets Banks, payments processors, retailers, oil and gas firms, and more…
Solutions the support highest government and industry standards ATM, POS, and EFT payments applications and transactions (ANSI X9F, FIPS, PCI-DSS, PTS-HSM) Serve/protect/manage encryption keys for broad range of encryption devices/solutions 5
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP Solutions for the New Style of IT Services Advise Printers & Personal Systems
Printers
PCs
Cloud
6
Tablets
Transform
Manage
Converged Infrastructure
Servers
Mobility
Storage
Networking
Big Data
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Finance HP Software
IT Analytics Management
Security
Security
Trends driving security investments A new market adversary
1
Nature and motivation of attacks (Fame to fortune, market adversary) Research
Infiltration
Discovery
Capture
Exfiltration
Big shifts
2
Transformation of enterprise IT (Delivery and consumption changes) Cloud
Big Data
Policies and regulations
3
Regulatory pressures (Increasing cost and complexity) Basel III
7
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Mobile
HP Enterprise Security Products: Focus areas Active Intelligence
Application Defense
Next Gen. Network Security
Information Security
Use Big Data intelligence for actionable Security
Secure and monitor Mobile/Cloud applications On-Demand
Secure next generation virtual and physical networks
Secure mission critical transactions and storage
HP ArcSight
HP Fortify
HP TippingPoint
HP Atalla
Virtual and Physical Data Center
8
Application modernization
Networking/SDN
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Critical Business Systems
Building security capabilities with HP The adversary ecosystem
Disrupting the adversary ecosystem Educate users / use Resea counter intelligence
Research
rch
Infiltration
Infiltrati Stop adversary access on
FindDiscov and remove ery adversary
Discovery
Their ecosystem
Capture
Our enterprise
Their ecosystem
Exfiltration
9
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Captu Secure the important re asset PlanExfiltrat to mitigate damage
ion
Our enterprise
What does Atalla do? Product lines
#
#
10
Payments Security
Network Security Processor
“NSP” Enterprise Secure Key Manager
Cryptographic Key Management
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
“ESKM”
NonStop Technical Boot Camp Atalla NSP Update Susan Langford, PhD, HP Distinguished Technologist
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Payments Security:
Atalla Network Security Processors
12
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP Atalla Ax160 NSP Products Hardware Security Module (HSM) Highly secure cryptographic processor Functionality is aimed at financial payments • ATM /EFT/POS • Credit cards and EMV • Stored Value, loyalty cards and funds transfer
May be of use for other high-security applications
Hardware Active zeroization • • • • 13
State-of-the-art, 2U rack-mountable form factor Locking bezel with two Medeco locks Auto-sensing 10/100/1000 Base-T Ethernet TCP/IP Dual power supply © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Atalla NSPs Hardware Appliance
+ Firmware Image
A10160
Basic Software
• High End • 1080 PIN translates/second
• Included in module price • Different key management techniques – AKB – more secure: A1.30 – Variant – legacy key management: V1.30
A9160 • Mid Range • 200 PIN translates/second
A8160 • Entry Level • 66 PIN translates/second
14
Enhanced Software • Additional charge, sold separately • More Features – AKB – A2.10 – Variant –V2.10 • Uses newer, stronger smartcards
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Introducing SCA-3 – the “new SCA” SCA-2
15
AJ543A
C8Z35AA SCA-3
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
NSP/SCA/smartcard compatibility SCA-3 is fully backwards compatible. NSP Enhanced Software requires new smartcards. SCA-2
SCA-3
Standard smartcards
Ax150 (support only)
Yes
Yes
Yes
No
Ax160 Appliance (Std Software)
Yes
Yes
Yes
No
Ax160 Enhanced Software package
No
Yes
No
Yes
Standard Smartcards (still available)
Yes
Yes
New Enhanced Smartcards
No
Yes
The NSP Enhanced Software requires an Ax160 model appliance, an SCA-3, and enhanced smartcards to enable this software. 16
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Enhanced Smartcards
NSP Enhanced Software New Features Functionality • PIN & Component printing • Multiple MFKs • RSA commands (ARKEY) included • EMV RSA signatures supported
Usability • Remote reboot • Remote management of USB files • Performance monitoring • Set Clock
Moving forward – making managing your HSMs easier 17
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Security • SCA uses longer key sizes & new smart cards • SSL/TLS channel host to NSP • “whitelist” of host IP addresses • PCI-HSM mode • Share data now split so configuration is on USB drive
NSP Enhanced Software Features PIN and key component printing –
Multiple MFKs –
Provides the ability for the host application to print customer PIN letters and key component forms.
Provides the ability to support a maximum of 10 separate (low transaction volume) institutions within one physical NSP.
• For security purposes, the printer is connected to the second NIC on the Network Security Processor • The host application must send the print commands to a separate command port. • Commands are turned on for finite time & number of calls
• A10160 only • Optional feature • Separate MFK, security policies & security admins
18
This feature also eliminates the requirement to utilize multiple Network Security Processors when changing the Master File Key.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Monitoring your NSP Automated Crypto health checks • a complete set of cryptographic tests are performed automatically at power on. • Daily self test: specify a time-of-day when cryptographic self-tests are to be performed.
NSP CPU performance monitoring Useful information for capacity planning. • Determine what percentage of the Network Security Processor is in use. • Obtain command usage statistics is provided. – PIN verification failures – Sanity check failures – CVV/CVC/CSC failures – MAC verification failures – Number of times an enabled command has been processed by the Network Security Processor
19
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Managing your NSP Enhance remote manageability – Security administrators are no longer required to travel to a remote datacenter to update the configuration or software version running in the Network Security Processor. • remotely manage files on the USB flash memory device • Stop and restart the Network Security Processor.
Secure clock adjustment Provides the ability to set the Network Security Processor’s system clock. • This ensures that all system and security audit logs contain accurate timestamps in local time, not universal coordinated time. • Secure dual control operation
20
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Upgraded SCA/smartcard crypto & protocol Goal: improve security as transparently as possible What you see
What you don’t
• • • •
• • • • • •
21
New smartcards required Installation of the certificate (for now) 2 people required to enroll an NSP in association No share recovery card
RSA 2048-bit instead of 1024 AES-256 instead of 2-key 3DES CMAC instead of CBC-MAC Random IV instead of all zeros for CBC RSA keys generated within smart card NIST SP800-56C and SP800-108 key derivation instead of variants & ad hoc techniques • NIST SP800-56B bilateral RSA key agreement instead of PCKS#1 v1.5
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
SSL/TLS – certificate authority We only support acting as our own CA First NSP • • • •
Generates its own CA key Generate a server key Signs the server key with the CA key User must manually accept CA key on host side
Other NSPs • User does not want to manually accept every NSP individually • CA key is stored encrypted under the MFK on the USB • Copy the encrypted CA key to each NSP to have same CA in all
22
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Additional SSL Points SSL v3 and TLS only Cipher Selection • We only support RSA for public key • We only support AES and 3DES for symmetric
No client certificates • Added a list of allowed IP addresses
Limited configuration choices
23
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Shares Share Data is now stored on the USB Shares are generated by encrypting data with a random key, then creating shares of that random key • Key has been updated to AES-256 • Shares stored on shareholder smartcard (1 share per card)
Encrypted Data (MFK, PMFK, config data, etc) stored on USB • • • •
Data is Encrypted & MACed Needed room for Multiple-MFKs Lets the data keep current configuration Saves last configuration, but only one back
No Share Recovery Card
24
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
NSP PCI-HSM Mode Need to be directly attached for SCA when using RSA, but not for AES • • • •
Direct attach for enrollment or share card operations Other security administrator actions can be remote Not allowed to derive AES-256 keys from RSA2048 exchange We stuck with AES-256 for consistency & simplicity
No keys can be shared between PCI-HSM mode & normal operation • Must be in factory state • This affects shares & associations
Has not been re-validated yet, may be OK with change letter • Changes: SCA, shares, and the fact that this is now a mode instead of a build • Commands are now forced off – AES, 75 • RSA key sizes above the MFK strength not allowed (2key = 1024, 3key = 2048) 25
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Thank you
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
NonStop Technical Boot Camp Enterprise Key Management Update Steve Wierenga, Atalla CT, HP Distinguished Technologist
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Information Security: HP Enterprise Secure Key Manager
28
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Enterprise Secure Key Manager (ESKM) Protecting Sensitive Enterprise Data with Cryptographic Key Management Encryption Keys separate! Encrypted Data
Secure the important asset
Customer ROI – reduce costs and risks of: • Admin overhead and human error • Audit/compliance failures or sanctions • Data loss and business interruptions • Media sanitization/disposal services 29
Payment Card Holder Data Electronic Healthcare Records National Security, Defense Intellectual Property Non-Public Business Records Employee Personal Records Customer Personal Information Service Provider Client Data
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Tape
Disk Array Storage Networks
Server Storage HP Cloud NonStop
Why is Key Management important? Encryption is simple, but Key Management is not – Keys are the “little secrets” which protect the “big secrets” Lose the key Lose your data!
Is data protected just by encrypting it? (No!) Event or Threat
Risk and Impact
Exposing keys or unauthorized access
Revealing protected data, noncompliance
Loss of authorized access to keys
Loss of data access, business interruption
Loss or accidental destruction of keys
Lose the keys, data loss, business failure
Failure to control/monitor/log access
Audit failures, increased liability
Keys must be securely preserved, protected, and accessible for the life of the data Key Management is a business-critical IT security control and operational service 30
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Unifying Data Protection HP’s Enterprise Key Management Vision
31
Protect Sensitive Data Wherever It Lives
Generate and Manage Encryption Keys Securely
Meet Standards and Audit/Compliance
Disk, Tape, SAN, Devices Cloud, Service Providers Database, Applications
Scaleable, Reliable, High Availability
FIPS 140-2 Level 2 PCI-DSS, Data Privacy HIPAA/HITECH
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP Key Management HP Enterprise Secure Key Manager (ESKM) Secure appliance Generates and serves AES and other key types All hardware/software is included, pre-installed FIPS 140-2 Level 2 validated cryptographic module Keys are always encrypted at rest, in motion SSL with mutual certificate authentication Local Certificate Authority
High availability Native symmetric clustering, 2-8 nodes Automatic replication, retry, and client failover Capable of bare-metal restore disaster recovery Mirrored disk, redundant power and cooling
32
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
What’s inside ESKM: Ports and Services Security Administrators Serial Port
22
LDAP Client
389 636
ESKM
NTP Server
NTP Client
123
Ports and
FTP, SFTP, SSH/SCP
Monitoring
20 21 22 514
Syslog Server
HP ArcSight/SIEM
GUI Admin Server
Services 161 SNMP Agent NMS
ESKM Clients/Users
9443 cert
LDAP Server
Backup Server
33
SSH
n/a
IT Services
CLI Admin Server SSL
Key DB ESKM local CA
9081 FIPS Status Server
9000
cert
9001
KMS Server
SSL Cluster Sync
SSL
cert
cert
cert
Keys, Metadata cert
Keys, Users, Policies cert
9080 Health Check Server
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
ESKM Cluster
ESKM Reliability, Availability, Recovery ESKM offers multiple layers of protection and recovery for business-critical encryption keys Reliable hardware: >2M hours, no failures Reliable software: >2M hours, no loss of keys or data Mirrored disks; redundant fans, power supplies, and AC power Easy software patch/release installation with fallback option High availability symmetric clusters of 2 – 8 or more ESKM nodes Automatic continuous replication of keys, metadata, policies to all nodes Clients can verify keys have been replicated before using them Automatic client round-robin and failover to all available ESKM cluster nodes Multi-site geographically distributed clusters; client failover may be defined in tiers Backup/restore capability to/from internal, external, and offline storage media ESKM node can be fully restored to a new unit by cluster synchronization or from a backup
34
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP on HP ESKM is HP’s unified Key Management solution for Data Security ESKM Interoperability (also - free ESKM client SDK, developer and test support) HP Storage Enterprise Tape Library encryption With LT0-4, LTO-5, LTO-6 drives
HP Storage B-series SAN Encryption Switch and Blade Models HP NonStop Volume Level Encryption Disk and Tape Encryption for NonStop VLE customers HP NonStop security partners (ETI-Net BACKBOX)
HP ES hosted Backup/Restore (BUR) service HP IT Backup/Restore (internal) HP public Cloud Services And more coming in 2014… Extending ESKM interoperability across HP Storage and Server encryption solutions 35
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP Tape Encryption StoreEver ESL G3 Library Large Enterprise tape library Scales to 96 tape drives, 7000 tape cartridges
LTO-4/5/6 tape drive embedded encryption AES-256 GCM mode, unique key per tape
Fully integrated with ESKM
36
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP Tape Encryption New StoreEver MSL6480 Library Mid-Enterprise LTO tape library New, introduced June 2013 Scales to 6 tape drives, 80 cartridges per 6U unit Expands to 42 tape drives, 560 cartridges per 42U rack
LTO-4/5/6 tape drive embedded encryption AES-256 GCM mode, unique key per tape
Now integrated with ESKM Firmware release Sept. 2013
37
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP SAN encryption B-Series Encryption SAN Switch and Blade Enterprise Storage Area Network encryption Fibre Channel fabric disk/tape encryption High performance fabric-based encryption Scales non-disruptively 48 to 96 Gbit/sec Standard AES-256 encryption for disk and tape with a single platform
Fully integrated with HP ESKM
38
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP NonStop Servers NonStop Volume Level Encryption (VLE) High availability multiprocessor server Integrated CLIM fault-tolerant I/O subsystem
Data-at-rest encryption for disk and tape AES-256 (CBC or XTS), unique key per physical disk CLIM online disk encryption and key rotation CLIM delivers keys for attached LTO tape encryption
Fully integrated with HP ESKM CLIM auto-enrollment via NSC
39
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP NonStop with ETI-Net BackBox Encryption for BACKBOX® Virtual Tape Controller Encryption for Virtual Tape Volumes Protects data both at-rest and in-flight to disk Transparently emulates LTO encrypted tape Unique key per virtual tape volume media ID
Works with or without NonStop VLE VLE: on mount, VLE retrieves key from ESKM Non-VLE: on mount, BackBox retrieves key from ESKM AES-256 GCM, same as LTO tape
Fully integrated with HP ESKM
HP Enterprise Secure Key Manager cluster
ESKM cluster can be shared with VLE/CLIMs ESKMs can be local, remote, or distributed across sites
40
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP ProLiant and BladeSystems HP Secure Encryption: Smart Array Controller based HDD/SSD encryption Previewed in HP Discover 2013 CDA Discovery Zone ESKM 3.1 launched June 2013, live demonstrations and training
Session presentation at HP Protect Sept. 2013 September 2013, Washington DC Working with beta customers in Healthcare, Financial Services
Demo/session at HP Discover EMEA in December General availablity early 2014 ESKM 3.1 is available now
Disclaimer: the information contained herein is subject to change without notice 41
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
What’s New in ESKM 3.1? Announced at HP Discover, June 2013 Supports Big Data deployments Now scales to >25,000 clients, millions of keys
Easier to Administer and Maintain Display cluster members and client license ordering information Query and View Keys by Group Enhanced SNMP MIB, ArcSight connector
Updated Technology and Security Upgrade available from ESKM 3.0 to 3.1 software Crypto meets latest NIST guidance, SP 800-131A key lengths/algorithms FIPS 140-2 Level 2 validated: Certificate #1922
42
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP enterprise data protection solutions “HP on HP” – internal and external ESKM integrations HP Enterprise Services Hosted and client premises tape Backup/Restore Hosted encrypted disk storage
HP Cloud Services Storage and identity protection for clients/users
HP IT Datacenter tape Backup/Restore Datacenter encrypted disk storage
Fully integrated with HP ESKM
43
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
ESKM deployment best practices For highest availability and security • Always configure 2-node (minimum) ESKM clusters for production environments
• When possible, extend clusters across multiple data centers or geographic sites for even greater disaster tolerance/recovery • Schedule regular internal, external media, and offsite backups • Train, enroll, and utilize multiple security officers/administrators •
Avoid human single points of failure!
•
HP has no access to customer keys, nor ability to recover lost customer keys!
•
Follow the principle of least privilege for administrator roles
• Always configure ESKM for FIPS mode operation, SSL, and client certificates • Monitor ESKM logs for unusual activity and retain logs for audit readiness
45
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Thank you
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
Atalla Contacts Atalla Orders:
1-800-523-9981 opt#2
[email protected]
Atalla Support:
1-800-500-7858
[email protected]
Web:
www.atalla.com
www.hp.com/go/atalla
NSP:
Susan Langford
[email protected]
ESKM:
Steve Wierenga
[email protected]
47
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.