Cyber Security & Public Key Infrastructure

18
Junu Rani Das Kailay Controller of Certifying Authorities Government of India December 2019 Cyber Security & Public Key Infrastructure

Transcript of Cyber Security & Public Key Infrastructure

Page 1: Cyber Security & Public Key Infrastructure

Junu Rani Das Kailay

Controller of Certifying AuthoritiesGovernment of India

December 2019

Cyber Security & Public Key Infrastructure

Page 2: Cyber Security & Public Key Infrastructure

Information Technology (IT) Act, 2000

• The Information Technology Act 2000 facilitates

acceptance of electronic records and digital

signatures through a legal framework for establishing

trust in e-Commerce and e-Governance.

• Controller of Certifying Authorities(CCA) is appointed

under provision of the IT Act, 2000.

Page 3: Cyber Security & Public Key Infrastructure

Controller of Certifying Authorities

• CCA licenses Certifying Authorities (CA) to issue

Digital Signature Certificates under the IT Act.

• Digital Signature Certificates (DSC) issued by

Certifying Authorities (CA).

• Twelve Certifying Authorities operational currently

and the total number of DSC issued is over 120

million by November 2019.

Page 4: Cyber Security & Public Key Infrastructure

Trust Hierarchy

EndUser

EndUser

EndUser

EndUser

CA

CCA’s ROOT CA

CA

SUB CA

CA

SUB CA

Page 5: Cyber Security & Public Key Infrastructure

Information Technology (Amendment) Act, 2008

• Brought in technology neutrality through electronic

signatures.

• Technology specific digital signatures retained as an

electronic signature.

• New electronic signature technologies can be

introduced through the Second Schedule of the IT

Act.

Page 6: Cyber Security & Public Key Infrastructure

eSign online digital signature service

• eSign facilitates electronically signing a documentusing an Online Service.

• Electronic Signature is created using authenticationof consumer through eKYC service.

• eSign is an integrated service that facilitates issuing aDigital Signature Certificate and performing Signing ofrequested data by authenticating users.

• Electronic Signature or Electronic AuthenticationTechnique and Procedure Rules, 2015 have beennotified to provide the legal framework for eSign.

Page 7: Cyber Security & Public Key Infrastructure

eSign

Stakeholders involved:

1. Application Service Provider (ASP),

2. eSign Service Provider (ESP),

3. Certifying Authority (CA) and

4. eKYC providers

Page 8: Cyber Security & Public Key Infrastructure

● Ministry of Corporate Affairs MCA21 for e-filing

● Income Tax e-filing

● Indian Railway Catering & Tourism Corporation (IRCTC)

● Director General of Foreign Trade (DGFT)

● Reserve Bank of India (SFMS & RTGS)

● Digital Locker

● E-Procurement

● E-Office

● E-Gazette

● PFMS

● GeM

Digital Signature Enabled Application s/w

Page 9: Cyber Security & Public Key Infrastructure

Public Financial Management System

The system is used for registering Implementing Agencies and facilitates

budget allocation, sanction,

bill generation, fund disbursements, accounting, reconciliation, E-payments and beneficiaries’ management both at

Central and sub-State level.

Page 10: Cyber Security & Public Key Infrastructure

PFMS: Span of PFMS (Users of PFMS)

Drawing and

Disbursing officer

Pay and Accounts Officer / Pr AOCentr

al

Govern

ment

Reserve Bank

of India

State SPV

District SPV

Panchayat

Village

Consolidated

Fund of State

Consolidated Fund of India

Central

Govt.

Scheme

State

Govt.

SchemeSta

te G

overn

me

nt

treasury

State Government

SP

V

Ro

ute

(Im

ple

menting a

gencie

s)

Lo

ca

l G

ove

rnm

en

t

Private

Secto

r

Co

mp

anie

s /

NG

Os/e

tc

Beneficiary

IFDProgramme

Division

Block SPV

Page 11: Cyber Security & Public Key Infrastructure

● PKI on Mobile

● Hardware Security Modules

● Cloud Based Services

● Internet of Things

● Blockchain

PKI Applications

Page 12: Cyber Security & Public Key Infrastructure

PKI on Mobile

• A PKI enabled mobile solution facilitates Digital Signature and

authentication for mobile applications, where transactions can

take place directly from a mobile phone.

• The Mobile phone is used as a device for creation and

storage of private credentials of the user.

• These credentials are then used for authenticating and

digitally signing transactions.

• The options for enablement of PKI in mobile includes

hardware implementations like Cryptographic SIM, Memory

card as Cryptographic token and software implementations

such as software cryptographic module in Mobile Phone.

• Though the options are available, major applications are still

using crypto token based signatures.

Page 13: Cyber Security & Public Key Infrastructure

Cloud based signature model

Centralized Key Pair Generation and Protection

• users belong to a specific organization and the

certificates used for organization work, such as, signing

the transactions, documents

– provision must be made available to generate and

protect the users keys centrally.

– the user and only the user must securely and directly

create their keys and authorize the keys for

transactions to ensure the non-repudiation.

Page 14: Cyber Security & Public Key Infrastructure

Organization/ Enterprise(User keys protected by HMS Certifying Authority

Internet

CA ServerCA Web Connector

Application Server (Signing)

Figure:Centralized key management for organization / enterprise users

HSM

Key

Au

tho

riza

tio

n (

Secu

re C

han

nel

)

Key

Aut

hori

zati

on (S

ecur

e Ch

anne

l)

Employees / Users

Page 15: Cyber Security & Public Key Infrastructure

Procedure for signing and key generation

The following must be ensured for secure access / authorization:

– The HSM used must be at least FIPS 140-2 Level 3 certified.

– User keys must always be protected by the HSM.

– Users must directly authorize their respective key generation and key use on

the HSM. The authorization code must be executed within the secure boundary

of the HSM, that is, HSM’s secure code execution server. The authorization

must not be through any other application outside HSM secure boundary.

– The authorization must be with user PIN/Password/Biometric.

– The channel from the user device to HSM’s secure code execution server must

be encrypted.

– The authorization PIN/Password/Biometric must be encrypted on user device

(PC/ Laptop/ Tablet/ Mobile) and sent to the HSM.

– Audit trails of the key use must be maintained by the HSM secure code

execution server.

Page 16: Cyber Security & Public Key Infrastructure

Requires

• A separate rule for specifying security

procedures, the role, responsibilities and

functions to be performed during the key-life

cycle like key generation, renewal, revocation

audit.

• Standard API for interoperability and also to

extent signing facility for application other than

of parent organisation.

• on-boarding guidelines.

• Authentication guidelines.

Page 17: Cyber Security & Public Key Infrastructure

International Cooperation

• Many countries accord legal validity to digitally signed documents

when verified using Digital Signature Certificates (DSC) issued by

Certifying Authorities recognized by their Regulatory Authorities/

Government.

• This works within the country but does not facilitate cross-border

transactions.

• The CAs Licenced under Indian Root are allowed to offer certificates

to individuals of other countries in order to enable participation in

bidding process.

• The guidelines are in place for the verification of individuals of

foreign nation.

• In order to facilitate cross-border transactions and also to mutually

recognize DSCs issued by licensed Certifying Authorities of other

countries, regulations for recognition of foreign CAs were notified in

2103.

Page 18: Cyber Security & Public Key Infrastructure

Thank you

www.cca.gov.in