sidtitch ichiwldsecure identity changes in a …iso/iec jtc 1/sc 27/wg 5 identity management &...

20
ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies S Id tit Ch i Ch i W ld Secure Identity Changes in a Changing World WG 5 Id tit M t&Pi T h l i Identity Management & Privacy Technologies within SC 27 – IT Security Techniques RSA Japan 2008-04-24, Tokyo, Japan Prof. Dr. Kai Rannenberg Convener WG 5 Goethe University Frankfurt Germany 1 Goethe University Frankfurt, Germany www.m-chair.net

Upload: others

Post on 18-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: SIdtitCh iChiWldSecure Identity Changes in a …ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies SIdtitCh iChiWldSecure Identity Changes in a Changing World WG 5

ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies

S Id tit Ch i Ch i W ldSecure Identity Changes in a Changing WorldWG 5

Id tit M t & P i T h l iIdentity Management & Privacy Technologieswithin

SC 27 – IT Security Techniques

RSA Japan2008-04-24, Tokyo, Japan

Prof. Dr. Kai RannenbergConvener WG 5

Goethe University Frankfurt Germany

1

Goethe University Frankfurt, Germanywww.m-chair.net

Page 2: SIdtitCh iChiWldSecure Identity Changes in a …ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies SIdtitCh iChiWldSecure Identity Changes in a Changing World WG 5

WGs within ISO/IEC JTC 1/SC 27 –IT Security Techniques

ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies

IT Security Techniques

WG 1WG 3Assessment WG 1ISMS

WG 4

WG 3Security Evaluation

WG 5

WG 4Security Controls & Services

Guidelines

Identity Management & Privacy Technologies

WG 2Cryptography &

Security MechanismsTechniques

Product System Process Environment

2

Page 3: SIdtitCh iChiWldSecure Identity Changes in a …ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies SIdtitCh iChiWldSecure Identity Changes in a Changing World WG 5

WG 5 Identity Management & Privacy TechnologiesHistory

ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies

y

October 2003JTC 1 Plenary established

JTC 1 St d G P i T h l i (SGPT)JTC 1 Study Group on Privacy Technologies (SGPT)for one year period of time (until October 2004) to identify standardization needs

October 2004JTC 1 Pl l d tJTC 1 Plenary resolved to

disband SGPT assign to SC 27 further activities in the Privacy Technologies area such as

a further inventory a report back to the November 2006 JTC 1 Plenary

3

Page 4: SIdtitCh iChiWldSecure Identity Changes in a …ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies SIdtitCh iChiWldSecure Identity Changes in a Changing World WG 5

WG 5 Identity Management & Privacy TechnologiesHistory

ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies

y

SC 27 ti iti (i t JTC 1‘ tSC 27 activities (in response to JTC 1‘s request from October 2004)October 2004

Study Period on Identity Management establishedMay 2005

Study Period on Privacy establishedStudy Period on Privacy establishedNew Work Item Proposal: A framework for identity management (ISO/IEC 24760)

M 2006May 2006New Working Group 5 on Identity Management and Privacy Technologies establishedT W k I P lTwo new Work Item Proposals

A privacy framework (ISO/IEC 29100)A privacy reference architecture (ISO/IEC 29101)

4

Page 5: SIdtitCh iChiWldSecure Identity Changes in a …ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies SIdtitCh iChiWldSecure Identity Changes in a Changing World WG 5

WG 5 Identity Management & Privacy TechnologiesScope ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies

p

D l t d i t fDevelopment and maintenance of standards and guidelines addressing security aspects of

Identity managementIdentity managementBiometrics andP iPrivacy

5

Page 6: SIdtitCh iChiWldSecure Identity Changes in a …ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies SIdtitCh iChiWldSecure Identity Changes in a Changing World WG 5

Identity Management (IdM)2 sides of a medal with enormous economic potentialISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies

p

People live their lifeOrganisations aim to sort outin different roles (professional, private, volunteer)using different identities (pseudonyms): email accounts, SIM d B d

User Accounts in different IT systemsAuthenticationRights management

SIM cards, eBay trade names, chat names, 2ndLife names, …)

Differentiated identities

g s a age eAccess control

Unified identities help toprotect

privacy, especially anonymity personal security/safety

Unified identitieshelp to

ease administrationmanage customer relations p y y

enable reputation building at the same time

Identity management systemssupport users using role basedIdentity management support users using role based identitieshelp to present the “right” identity in the right context

Identity management systems

ease single-sign-on by unify accountssolve the problems of multiple

6

solve the problems of multiple passwords

Page 7: SIdtitCh iChiWldSecure Identity Changes in a …ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies SIdtitCh iChiWldSecure Identity Changes in a Changing World WG 5

Identity Management (IdM)2 sides of a medal with enormous economic potentialISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies

p

People live their life Organisations aim to sort outin different roles (professional, private, volunteer)using different identities (pseudonyms): email

SIM d B

User Accounts in different IT systemsAuthenticationRights management

accounts, SIM cards, eBay trade names, chat names, 2ndLife names, …)

Diff ti t d id titi

g s a age eAccess control

Unified identitiesDifferentiated identitieshelp to

protectprivacy, especially anonymity

Unified identitieshelp to

ease administrationmanage customer relationsp y p y y y

personal security/safetyenable reputation building at the same time

Identity management Identity managementIdentity management systems

support users using role based identitieshelp to present the “right”

Identity management systems

ease single-sign-on by unify accountssolve the problems of multiple

7

help to present the right identity in the right context

solve the problems of multiple passwords

Page 8: SIdtitCh iChiWldSecure Identity Changes in a …ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies SIdtitCh iChiWldSecure Identity Changes in a Changing World WG 5

WG 5 Identity Management & Privacy TechnologiesProgramme of WorkISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies

Frameworks & ArchitecturesA Framework for Identity Management (ISO/IEC 24760, WD)A Privacy Framework (ISO/IEC 29100, WD)A P i R f A hit t (ISO/IEC 29101 WD)A Privacy Reference Architecture (ISO/IEC 29101, WD)A Framework for Access Management (ISO/IEC 29146, WD)

P t ti C tProtection ConceptsBiometric template protection (ISO/IEC 24745, WD)Access Control Mechanisms (Study Period)

Guidance on Context and AssessmentAuthentication Context for Biometrics (ISO/IEC 24761, FDIS)Entity Authentication Assurance (ISO/IEC 29115 WD)Entity Authentication Assurance (ISO/IEC 29115, WD) Privacy Capability Maturity Models (Study Period)

8

Page 9: SIdtitCh iChiWldSecure Identity Changes in a …ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies SIdtitCh iChiWldSecure Identity Changes in a Changing World WG 5

WG 5 Identity Management & Privacy TechnologiesRoadmapISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies

p

9

Page 10: SIdtitCh iChiWldSecure Identity Changes in a …ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies SIdtitCh iChiWldSecure Identity Changes in a Changing World WG 5

WG 5 Identity Management & Privacy TechnologiesWD 24760ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies

Titl A f k f id tit tTitle: A framework for identity managementCo-editors: Christophe Stenuit (Belgium)

Rosa Garcia Ontoso (Spain)Rosa Garcia Ontoso (Spain)

Scope:pThis standard aims to provide a framework for the definition of identity and the secure, reliable, and private management of identity informationprivate management of identity information.This framework should be applicable to individuals as well as organizations of all types and sizes, in any environment and regardless of the nature ofany environment and regardless of the nature of the activities they are involved in.

10

Page 11: SIdtitCh iChiWldSecure Identity Changes in a …ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies SIdtitCh iChiWldSecure Identity Changes in a Changing World WG 5

WG 5 Identity Management & Privacy TechnologiesISO/IEC 24760 A Framework for Identity ManagementISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies

y g

Identity conceptsIdentity conceptsIdentity (Unification vs. Differentiation)Identity ReferencesIdentity ReferencesIdentifiers

Id tit tIdentity managementIdentity LifecycleProvisioning vs. Choice of Identities

Identity management and ITIdentity management and information securityRelated IT security concepts

11

Related IT security concepts

Page 12: SIdtitCh iChiWldSecure Identity Changes in a …ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies SIdtitCh iChiWldSecure Identity Changes in a Changing World WG 5

WG 5 Identity Management & Privacy TechnologiesFDIS 24761ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies

Titl A th ti ti t t f bi t iTitle: Authentication context of biometricsEditor: Asahiko Yamada (Japan)

Scope:This document defines the structure and the data elements of Authentication Context for Biometrics (ACBio), by which the service provider (verifier) can judge whether the biometric verification j gresult is acceptable or not.The structure and the data elements are defined.

12

Page 13: SIdtitCh iChiWldSecure Identity Changes in a …ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies SIdtitCh iChiWldSecure Identity Changes in a Changing World WG 5

WG 5 Identity Management & Privacy TechnologiesISO/EC 24761 Authentication context of biometricsISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies

The structure and the data elements are being defined based on e.g. the following assumptions:Th d bi i ifi i h llThe targeted biometric verification process shall be executed by one or more BPUs (Biometric Process Units)Process Units).Each BPU shall assure a uniform security level within that BPUwithin that BPU.A secure communication channel among all the subject interconnected such as BPUs, the service j ,requester (claimant), and the service provider (verifier) shall not be assumed.

13

Page 14: SIdtitCh iChiWldSecure Identity Changes in a …ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies SIdtitCh iChiWldSecure Identity Changes in a Changing World WG 5

WG 5 Identity Management & Privacy TechnologiesWD 29100ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies

Titl A i f kTitle: A privacy framework Editor: Stefan Weiss (Germany)

Scope:Aims at providing a framework for defining privacy safeguarding requirements as they relate to PIIsafeguarding requirements as they relate to PII (personally identifiable information) processed by any information and communication system in any jurisdiction. To be applicable on an international level and addresses system specific issues on a high level.Puts organizational, technical, procedural and regulatory aspects in perspective.

14

Page 15: SIdtitCh iChiWldSecure Identity Changes in a …ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies SIdtitCh iChiWldSecure Identity Changes in a Changing World WG 5

WG 5 Identity Management & Privacy TechnologiesISO/IEC 29100 A Privacy FrameworkISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies

y

PII = Personally Identifiable Informatione so a y de t ab e o at oPrivacy PreferencesPrivacy RequirementsPrivacy Principlesy p

Consent and ChoiceOpenness, Transparency and NoticeAccountabilityPurpose SpecificationPurpose SpecificationCollection LimitationUse, Retention and Disclosure LimitationData MinimisationAccuracy and QualityAccuracy and QualityIndividual Participation and AccessSecurity SafeguardsCompliance

Privacy Aspects within the Data Processing LifecyclesCollect, Transfer, Use, Store, Archive, Dispose

Relating Privacy to IT Security

15

Page 16: SIdtitCh iChiWldSecure Identity Changes in a …ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies SIdtitCh iChiWldSecure Identity Changes in a Changing World WG 5

WG 5 Identity Management & Privacy TechnologiesISO/IEC 29100 A Privacy FrameworkISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies

y

Privacy PrinciplesPrivacy PrinciplesConsent and ChoiceOpenness, Transparency and Noticep , p yAccountabilityPurpose SpecificationC ll ti Li it tiCollection LimitationUse, Retention and Disclosure LimitationData MinimisationData MinimisationAccuracy and QualityIndividual Participation and AccesspSecurity SafeguardsCompliance

16

Page 17: SIdtitCh iChiWldSecure Identity Changes in a …ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies SIdtitCh iChiWldSecure Identity Changes in a Changing World WG 5

WG 5 Identity Management & Privacy TechnologiesISO/IEC 29100 A Privacy FrameworkISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies

y

P i A t ithi th D tPrivacy Aspects within the Data Processing Lifecycles

CollectTransferTransferUseStStoreArchiveDispose

17

Page 18: SIdtitCh iChiWldSecure Identity Changes in a …ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies SIdtitCh iChiWldSecure Identity Changes in a Changing World WG 5

WG 5 Identity Management & Privacy TechnologiesTopicsISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies

op cs

Privacy technologies A Privacy FrameworkA Privacy Reference ArchitecturePrivacy infrastructuresAnonymity and credentials Specific Privacy Enhancing Technologies (PETs)Privacy Engineering

BiometricsProtection of biometric data

18

Authentication techniques

Page 19: SIdtitCh iChiWldSecure Identity Changes in a …ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies SIdtitCh iChiWldSecure Identity Changes in a Changing World WG 5

WG 5 Identity Management & Privacy TechnologiesLiaisons and collaboration ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies

Liaison with organizations and committees dealing with specific requirements and guidelines for services and applications e g :and guidelines for services and applications, e.g.:

JTC 1/SC 17/WG 4 Integrated circuit card with contactsJTC 1/SC 17/WG 11 Application of biometrics to cards and personal identificationpp pJTC 1/SC 37 BiometricsISO TC 68/SC 2 Financial Services Security

ITU T SG 13 N t ti t kITU-T SG 13 Next generation networksITU-T SG 17 Security, languages and telecommunication softwareITU-T JCA Identity Management

FIDIS (Future of Identity in the Information Society)PrimeLifePICOS (Privacy in Community Services)Libert AllianceLiberty AllianceThe International Conference of Data Protection and Privacy CommissionersThe Open Group (IdM Forum and Jericho Forum)

19

Page 20: SIdtitCh iChiWldSecure Identity Changes in a …ISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies SIdtitCh iChiWldSecure Identity Changes in a Changing World WG 5

WG 5Identity Management & Privacy TechnologiesISO/IEC JTC 1/SC 27/WG 5 Identity Management & Privacy Technologies

de t ty a age e t & acy ec o og es

Thank you very much for your interesty y y

Further readingFurther readingwww.jtc1sc27.din.de/enSD6 Gl f IT S it T i lSD6 Glossary of IT Security TerminologySD7 Catalogue of SC 27 Standards & Projects

[email protected]

20