SlideShare a Scribd company logo
1 of 22
ISO/IEC 24727 and INCITS #2094: Bringing it Together Mike Neumann President Agile Set, LLC
ISO/IEC 24727 A Framework for Interoperable IAS Systems Something Old, Some things New, 	and not a moment too soon.
Interoperability, Yes Six Part Standard Covering End-to-end security Application Interface Testing Authentication Protocols Command and Procedural Translation Not covering On-card command sets
Haven’t we been here before? Not exactly. Previous standards/specifications were developed either “client-down” or “card-up” “client-down”, e.g. PKCS #11 – general, but uncoordinated across API CSP – Single function of a single application view “card-up”, e.g. All of ISO/IEC 7816 series (Nearly?) all middleware based on ISO/IEC 7816. ISO/IEC 24727 is the first series of standards to be designed with both in mind.
Organization
[object Object]
Service
Action
Target
Access Control List  (client-application centric)
Access Control Rule (card-application centric)Model of Computation Semantics A well defined language syntax
ISO/IEC 24727-3 Basic Entity 						Relationships
Generic IAS Card-Application
Common Infrastructure Semantics ,[object Object]
Client-application to card-application “path” uniquely identifiable
Mapping between client-application & card-application name spaces
Security state establishment through differential-identity
Information storage / retrieval through named data service
Information and process protection via access control lists,[object Object]
Existing Industry specifications are very explicit re: APs (EMV, GlobalPlatform, etc. )
Previous to the publication of ISO/IEC 24727-3, there was no generic methodology for describing a smartcard (or any other) AP
MOST interoperability problems related to smartcards are due to subtle discrepancies between APs

More Related Content

What's hot

Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guide
Nick Owen
 

What's hot (20)

Google & FIDO Authentication
Google & FIDO AuthenticationGoogle & FIDO Authentication
Google & FIDO Authentication
 
OIDF Workshop at Verizon Media -- 9/30/2019 -- Continuous Access Evaluation P...
OIDF Workshop at Verizon Media -- 9/30/2019 -- Continuous Access Evaluation P...OIDF Workshop at Verizon Media -- 9/30/2019 -- Continuous Access Evaluation P...
OIDF Workshop at Verizon Media -- 9/30/2019 -- Continuous Access Evaluation P...
 
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
T-Systems. Automating ForgeRock Full Stack Deployments to a Magenta Cloud.
 
PKI-In-A-Box
PKI-In-A-BoxPKI-In-A-Box
PKI-In-A-Box
 
Bio-Authentication (FIDO) and PKI Trends in Korea
Bio-Authentication (FIDO) and PKI Trends in KoreaBio-Authentication (FIDO) and PKI Trends in Korea
Bio-Authentication (FIDO) and PKI Trends in Korea
 
Identiverse 2019-navigating nist sp-800-63-3 -x a-ls cheat sheets-rev20190624
Identiverse 2019-navigating nist sp-800-63-3 -x a-ls cheat sheets-rev20190624Identiverse 2019-navigating nist sp-800-63-3 -x a-ls cheat sheets-rev20190624
Identiverse 2019-navigating nist sp-800-63-3 -x a-ls cheat sheets-rev20190624
 
FIDO Authentication in Korea: Early Adoption & Rapid Innovation
FIDO Authentication in Korea: Early Adoption & Rapid InnovationFIDO Authentication in Korea: Early Adoption & Rapid Innovation
FIDO Authentication in Korea: Early Adoption & Rapid Innovation
 
Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016Apache Milagro Presentation at ApacheCon Europe 2016
Apache Milagro Presentation at ApacheCon Europe 2016
 
Integrating FIDO Authentication & Federation Protocols
Integrating FIDO Authentication & Federation ProtocolsIntegrating FIDO Authentication & Federation Protocols
Integrating FIDO Authentication & Federation Protocols
 
Secure Elements in Web Applications
Secure Elements in Web ApplicationsSecure Elements in Web Applications
Secure Elements in Web Applications
 
OpenID Foundation RISC WG Update - 2017-10-16
OpenID Foundation RISC WG Update - 2017-10-16OpenID Foundation RISC WG Update - 2017-10-16
OpenID Foundation RISC WG Update - 2017-10-16
 
Technical Considerations for Deploying FIDO Authentication
Technical Considerations for Deploying FIDO Authentication Technical Considerations for Deploying FIDO Authentication
Technical Considerations for Deploying FIDO Authentication
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guide
 
Gateway deepdive
Gateway deepdiveGateway deepdive
Gateway deepdive
 
FIDO Technical Specifications Overview
FIDO Technical Specifications OverviewFIDO Technical Specifications Overview
FIDO Technical Specifications Overview
 
Implementing security and availability requirements for banking API system us...
Implementing security and availability requirements for banking API system us...Implementing security and availability requirements for banking API system us...
Implementing security and availability requirements for banking API system us...
 
Enterprise Security Requirements
Enterprise Security RequirementsEnterprise Security Requirements
Enterprise Security Requirements
 
Hitachi ID Password Manager
Hitachi ID Password ManagerHitachi ID Password Manager
Hitachi ID Password Manager
 
OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect Federation Update
OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect Federation UpdateOIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect Federation Update
OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect Federation Update
 
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorWebinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
 

Similar to Neumann 24727 B10.12 Update 20091029 AM R3

How Cisco Migrated from MapReduce Jobs to Spark Jobs - StampedeCon 2015
How Cisco Migrated from MapReduce Jobs to Spark Jobs - StampedeCon 2015How Cisco Migrated from MapReduce Jobs to Spark Jobs - StampedeCon 2015
How Cisco Migrated from MapReduce Jobs to Spark Jobs - StampedeCon 2015
StampedeCon
 
CompTIA CASP Objectives
CompTIA CASP ObjectivesCompTIA CASP Objectives
CompTIA CASP Objectives
sombat nirund
 

Similar to Neumann 24727 B10.12 Update 20091029 AM R3 (20)

PaaS Lessons: Cisco IT Deploys OpenShift to Meet Developer Demand
PaaS Lessons: Cisco IT Deploys OpenShift to Meet Developer DemandPaaS Lessons: Cisco IT Deploys OpenShift to Meet Developer Demand
PaaS Lessons: Cisco IT Deploys OpenShift to Meet Developer Demand
 
Adobe PDF and LiveCycle ES Security
Adobe PDF and LiveCycle ES SecurityAdobe PDF and LiveCycle ES Security
Adobe PDF and LiveCycle ES Security
 
StampedeCon 2015 Keynote
StampedeCon 2015 KeynoteStampedeCon 2015 Keynote
StampedeCon 2015 Keynote
 
How Cisco Migrated from MapReduce Jobs to Spark Jobs - StampedeCon 2015
How Cisco Migrated from MapReduce Jobs to Spark Jobs - StampedeCon 2015How Cisco Migrated from MapReduce Jobs to Spark Jobs - StampedeCon 2015
How Cisco Migrated from MapReduce Jobs to Spark Jobs - StampedeCon 2015
 
Accelerate Digital Transformation with Pivotal Cloud Foundry on Azure
Accelerate Digital Transformation with Pivotal Cloud Foundry on AzureAccelerate Digital Transformation with Pivotal Cloud Foundry on Azure
Accelerate Digital Transformation with Pivotal Cloud Foundry on Azure
 
SDN in the Enterprise: APIC Enterprise Module
SDN in the Enterprise:  APIC Enterprise Module SDN in the Enterprise:  APIC Enterprise Module
SDN in the Enterprise: APIC Enterprise Module
 
Cisco project ideas
Cisco   project ideasCisco   project ideas
Cisco project ideas
 
Looking Forward to PCI DSS v4.0
Looking Forward to PCI DSS v4.0Looking Forward to PCI DSS v4.0
Looking Forward to PCI DSS v4.0
 
CIP for PCI 4.0 Solution Guide for ArcSight Logger
CIP for PCI 4.0 Solution Guide for ArcSight LoggerCIP for PCI 4.0 Solution Guide for ArcSight Logger
CIP for PCI 4.0 Solution Guide for ArcSight Logger
 
PCI DSS v3.0: How to Adapt Your Compliance Strategy
PCI DSS v3.0: How to Adapt Your Compliance StrategyPCI DSS v3.0: How to Adapt Your Compliance Strategy
PCI DSS v3.0: How to Adapt Your Compliance Strategy
 
Expedite the development lifecycle with MongoDB and serverless - DEM17-S - Ne...
Expedite the development lifecycle with MongoDB and serverless - DEM17-S - Ne...Expedite the development lifecycle with MongoDB and serverless - DEM17-S - Ne...
Expedite the development lifecycle with MongoDB and serverless - DEM17-S - Ne...
 
Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...
Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...
Как развернуть кампусную сеть Cisco за 10 минут? Новые технологии для автомат...
 
DEVNET-1166 Open SDN Controller APIs
DEVNET-1166	Open SDN Controller APIsDEVNET-1166	Open SDN Controller APIs
DEVNET-1166 Open SDN Controller APIs
 
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIsIncredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
Incredible Compute Density: Cisco DNA Center Platform: Digging Deeper with APIs
 
Breaking silos between DevOps and SecOps with Elastic
Breaking silos between DevOps and SecOps with ElasticBreaking silos between DevOps and SecOps with Elastic
Breaking silos between DevOps and SecOps with Elastic
 
An Introduction to PCI Compliance on IBM Power Systems
An Introduction to PCI Compliance on IBM Power SystemsAn Introduction to PCI Compliance on IBM Power Systems
An Introduction to PCI Compliance on IBM Power Systems
 
PCI and Remote Vendors
PCI and Remote VendorsPCI and Remote Vendors
PCI and Remote Vendors
 
Cisco and F5 accelerate Application Delivery
Cisco and F5 accelerate Application DeliveryCisco and F5 accelerate Application Delivery
Cisco and F5 accelerate Application Delivery
 
Cisco ISE BYOD Prescriptive Deployment Guide - Cisco Community.pdf
Cisco ISE BYOD Prescriptive Deployment Guide - Cisco Community.pdfCisco ISE BYOD Prescriptive Deployment Guide - Cisco Community.pdf
Cisco ISE BYOD Prescriptive Deployment Guide - Cisco Community.pdf
 
CompTIA CASP Objectives
CompTIA CASP ObjectivesCompTIA CASP Objectives
CompTIA CASP Objectives
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Neumann 24727 B10.12 Update 20091029 AM R3

  • 1. ISO/IEC 24727 and INCITS #2094: Bringing it Together Mike Neumann President Agile Set, LLC
  • 2. ISO/IEC 24727 A Framework for Interoperable IAS Systems Something Old, Some things New, and not a moment too soon.
  • 3. Interoperability, Yes Six Part Standard Covering End-to-end security Application Interface Testing Authentication Protocols Command and Procedural Translation Not covering On-card command sets
  • 4. Haven’t we been here before? Not exactly. Previous standards/specifications were developed either “client-down” or “card-up” “client-down”, e.g. PKCS #11 – general, but uncoordinated across API CSP – Single function of a single application view “card-up”, e.g. All of ISO/IEC 7816 series (Nearly?) all middleware based on ISO/IEC 7816. ISO/IEC 24727 is the first series of standards to be designed with both in mind.
  • 6.
  • 10. Access Control List (client-application centric)
  • 11. Access Control Rule (card-application centric)Model of Computation Semantics A well defined language syntax
  • 12. ISO/IEC 24727-3 Basic Entity Relationships
  • 14.
  • 15. Client-application to card-application “path” uniquely identifiable
  • 16. Mapping between client-application & card-application name spaces
  • 17. Security state establishment through differential-identity
  • 18. Information storage / retrieval through named data service
  • 19.
  • 20. Existing Industry specifications are very explicit re: APs (EMV, GlobalPlatform, etc. )
  • 21. Previous to the publication of ISO/IEC 24727-3, there was no generic methodology for describing a smartcard (or any other) AP
  • 22. MOST interoperability problems related to smartcards are due to subtle discrepancies between APs
  • 23.
  • 24. ISO/IEC 24727-4: Path Environment Address: Interface Device / Card-Application Client-Application Address: SCAI Address / Interface Device / Card-Application Address: NCI Address / Card-Application ISO/IEC 24727StackConfigurations DNS Smart CardAccess Interface PC/SC Resource Manager Network ConnectionInterface Interface DeviceDriver Interface DeviceDriver Network Card Contact Card Contactless Card
  • 25. Proxy and Agent Architecture Application Application API API Marshall API Proxy APIService Layer APIService Layer Unmarshall API API Agent
  • 26. Summary An International Standard to connect IAS systems to secure tokens Speaks semantics of IAS Client-Applications, with Means to map to constrained devices Flexible, standardized, mechanism to specify and identify new Authentication Protocols Testing; methodology and practice Multiple stack configurations to support legacy (APDU-constrained) devices and modern “connected” secure devices
  • 27.
  • 28.
  • 29. allows more direct support for “Web Service”-based applications.
  • 31. Part 1 to reflect 2008 publications and 2011 (est.) amendments
  • 32. Part 2 to enhance discovery mechanism
  • 33. Part 3 to include XML bindings for API and 7816-15 mapping guidance
  • 34. Part 4 to update stack configurations to support “web services” and related security
  • 35.
  • 36. PIV “Answered the Mail”“We’ll do exactly that, Mr. President” Identity Verification on a Smart Card An Application – runtime, not personalization With Data – minimum required for FIPS 201 Not A Framework – remember GSC-IS ? A Flexible Data model
  • 37. GICSGovernment and Industry in INCITS B10.12 Industry wants to be able to re-use PIV products and services for Corporate ID Local govt. Other IAS applications Cannot simply “just use PIV” Based on PIV and existing ISO/IEC standards for Data personalization Application management
  • 38. GICSINCITS Project #2094 Multi-part U.S. National Standard Part 1: Card Application Command Set Part 2: Card Administrative Command Set Part 3: Testing Part 4: Card Application Profile Template Contributions (Pts 1 and 2) produced in June, comments resolved in July B10.12 Formal Drafts (Pts 1, 2 and 4) produced end of July, comments resolved in August B10.12 2nd Drafts produced in September, ballot closed 10-Oct, B10.12 meeting 9-10 November.
  • 39. GICS and ISO/IEC 24727they work together, for growth ISO/IEC 24727 defines a new framework for providing card-application service access to client-applications GICS provides for PIV Interoperable and PIV Compatible card-applications to be built from a single product Including flexible data models Application data personalization Application management ISO/IEC 24727 defines the system interfaces GICS defines the card commands
  • 40. Thank you. Questions? Mike NeumannAgile Set, LLCmike.neumann at agileset dot net twitter.com/agileset slideshare.net/agileset

Editor's Notes

  1. HSPD-12 said,“it is the policy of the United States…establish a mandatory, Government-wide standard for secure and reliable forms of identification issued by the Federal Government to its employees and contractors (and their employees)” NIST is directed to issue “a Federal standard for secure and reliable forms of identification not later than 6 months after the date of this directive”