210 likes | 342 Views
eid and setup of CA. Gert roeckx March 2012 Warsaw. eID Card Types. Citizens Kids Foreigners eID card Kids-ID Foreigners’ card. eID Card Content. PKI- data. Citizen Identity Data. ID . ADDRESS . Authentication. Signature. RRN SIGNATURE. RRN SIGNATURE. Root CA CA
E N D
eid and setup of CA Gert roeckx March 2012 Warsaw
eID Card Types Citizens Kids Foreigners eID card Kids-ID Foreigners’ card
eID Card Content PKI- data Citizen Identity Data ID ADDRESS Authentication Signature RRN SIGNATURE RRN SIGNATURE Root CA CA RRN 140x200 Pixels 8 BPP 3.224 Bytes RRN = National Register number
Issued certificates Total 2003-2011: 34 MIO
Issued certificates 800 K 700 K 600 K 500 K 400 K 300 K 200 K 100 K 01 02 03 04 05 06 07 08 09 10 11 12
OCSP request avg/day 2011 180 K 160 K 140 K 120 K 100 K 80 K 60 K 40 K 20 K 01 02 03 04 05 06 07 08 09 10 11 12
Secrets of success • Card for every citizen • Value added for all the actors • Use of eid by gov as a starting multiplier effect • Joined collaboration of public & private
GOV <-> citizen / business Tax-on-Web Ehealth / Social insurance
Business <-> citizen • Banking
eID Certificates Hierarchy Belgium Root CA GlobalSign Admin CA Citizen CA Foreigners ’ CA Government CA CRL CRL CRL CRL Card Admin Cert Admin Auth Cert Sigining Cert Auth Cert Sigining Cert Code Sign Cert RRN Cert Server Cert Card Administration: update address, rekey , store certificates,… Certificates for Government web servers, signing citizen files, public information,…
Policy • CPS (Certificate Practice Statement) = legal document that describes how the CA manages the certificates it issued • CP (Certificate Policy) = document that describes the roles & responsibilities & liability of the different actors • These documents should be agreed (accepted, signed,…) befor the 1 certificate is issued !
IT services • Change – Incident - Capacity management • Demand has increased during past years • OCSP , # certificates • EU demands additional feature (Biometric) • Need of procedures to cope with change in demand • Correct handling of changes, incidents and capacity are the cornerstones of a successful IT service
Security • A PKI is based on TRUST • Challenging Internet environment • A strong rigorous Security Policy is enforced • For example • Both external and internal access is controlled • Physical access only by dual presence • Design of the PKI, off-lineCA’s , …
SLA • Service level agreement • Resultsfrom the business case of the eID • Guarantees the quality of the service • MonitoringControlObjects • OCSP, CRL • Certificateissuance • DefinedKPI’s • SLA forlife ? • If the business case changes • Adapt the service • Adapt the SLA
Auditing & accreditation • WebTrust of CA • SAS 70 • ISO 27002 • National & European law requirements
Thank you ! Gert.roeckx@certipost.com www.certipost.com