Safe Net HSM
Safe Net HSM
Reference Guide
Egg Bank Eliminates Costs and Expedites PIN Issuance with SafeNet Solution Case Study................................................... 29
Code Signing
internal REFERENCE GUIDE
SafeNet Value
Validated security with FIPS
140-2 Level 3 and Common
Criteria certification
Only HSM supply to offer true
in hardware key generation
and storage
Extensive backup features
for disaster recovery
Multi-factor authentication
for administration and
management
Superior performance: A
single Luna SA 5.0 device is
capable of up to 6,000 RSA
1024-bit transactions per
second and up to 1,200 RSA
2048-bit transactions per
second
Separation of duties with
multi-level access control
and multi-part splits for all
access control keys
40,000 RSA keys scale
for many code signing
certificates
Overview
CodeSigning
Code signing employs PKI technologies, such as keys, certificates, and digital signatures, to
ensure the identity and integrity of software. Technology companies share and distribute code
through networks with inconsistent and varying security policies, potentially exposing the
code to manipulation, corruption, or theft.
Many software providers are now making their product available over the Internet. As such,
it is imperative that code published on the Internet be seen as trustworthy by the user who
downloads it. While many browsers provide a notice to verify the codes authenticity, noone
can determine whether the code has been tampered with prior to delivery. Therefore, a
more active approach must be taken to make the Internet a reliable medium for software
distribution.
Digital signatures help maintain the electronic integrity and authenticity of code by
associating it with a software vendors unique signature. In this way, distributing software on
the Internet is no longer an anonymous activity as digital certificates ensure accountability,
just as a manufacturers brand name does on packaged software.
Digital Certificates
A certificate is a set of data that completely identifies an entity, and is issued by a certification
authority (CA). The data set includes the entitys public cryptographic key. When the sender
of a message signs it with its private key, the recipient of the message can use the senders
public key (retrieved from the certificate either sent with the message or possibly available
elsewhere in the directory service) to verify the senders identity.
Customer Problem
Preventing software counterfeiting has always been a challenge for publishers. Over time,
security measures, such as tamper-proof packaging and unique licensing keys, were
developed to minimize bootlegs and unauthorized copies of software distributed on disks. The
Internet lacks the subtle security provided by packaging, shelf space, shrink wrap, and the
like. Without an assurance of the softwares integrity, and without knowing who published the
software, its difficult for end users to know how much to trust software. In addition, Windows,
Java, and Apple require code to be compliant with their digital signing requirements. When
code is not correlated to a known publisher, a security warning message indicating Unknown
Publisher is issued requiring the user to authorize the program to run on their machine. For
this reason, software publishers are facing increased pressure to sign code.
SafeNet Partners:
Microsoft Authenticode
Verisign
Cybertrust (Verizon)
GlobalSign
Entrust
Code Signing
Certificates
Security Threat
Loss of trust in brand
Often disguised as legitimate software, malicious malware can be easily distributed to infect unsuspecting
desktops with viruses or to install applications to facilitate fraud.
Code needs protection from viruses to provide confidence of authenticity.
HSMs Role
To obtain a certificate from a CA, a software publisher must meet the criteria for a commercial
publishing certificate. It is recommended that applicants generate and store their private key
using a dedicated hardware solution, such as an HSM.
The HSM protects the identity, whether it is a server, virtualization server, or the user. SafeNet
HSMs take the security one step further by storing the signing material in a hardware device,
thus ensuring the authenticity and integrity of a code file.
Benefits Gained
Increased Revenue Protection
Reduced risk of internal/external compromise preserves brand reputation and
eliminates cost to repair infected machines of users
Ensures signer authenticity, data integrity, and non-repudiation of documents/code
SafeNet Customers:
Cisco
Lexmark
Users are able to sign only if they are part of the system that can be administered
remotely
Sony
Intel
Seagate
Increased Security
Separate data from keys
Private keys and other necessary signature credentials stored in hardened appliance
Reduced Cost and Improved Compliance Auditability
Simplified compliance all actions auditable
Can be used for enterprise-wide encryption consolidate and simplify encryption
across the enterprise
Targets
Industries:
Independent software vendors
Independent hardware vendors producing drivers
Web developers who create ActiveX controls for internal or public applications
IT administrators who sign third-party drivers and applications for use in a managed network
Use Case
A software vendor built their business on providing affordable and user-friendly software
over the internet. With the release of Microsoft Windows Vista came the requirement that
downloaded code be signed prior to running. If the code was not signed, a warning message
would be issued when prospects attempted to install the vendors software. These messages
explained that the download lacked digital code signing certificates to authenticate the source
of the software. As a result, many prospects did not trust the authenticity of the downloaded
software and sales over the Internet began to slip.
In order to reassure customers that they provide trusted content, the software vendor looked for
a solution to sign their code using private and public key systems. The solution was to implement
an enterprise PKI featuring VeriSign as the Certificate Authority and a SafeNet HSM for
cryptographic key storage. The SafeNet HSM was the right choice because it offered FIPS 140-2
Level 3 and Common Criteria certification in a tamper-proof hardware device.
With the PKI in place, prospects and customers gained the confidence that the content they
were downloading was authentic and could be trusted. The software vendor was able to instill
user confidence in their brand, eliminate security alerts, and increase Internet sales of their
software.
Code Signing
1 Build server submits request
to Web server
Build
server
(HTTPS request)
Web
server
SafeNet
HSM
2 Databases encrypted
Contact Us: For all office locations and contact information, please visit www.safenet-inc.com
Follow Us: www.safenet-inc.com/connected
2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet.
All other product names are trademarks of their respective owners. RG(EN)-11.23.10
Database Encryption
internal REFERENCE GUIDE
SafeNet Value
Overview
Database-level encryption allows enterprises to secure data as it is written to and read from
a database. This type of deployment is typically done at the column level within a database
table and, if coupled with database security and access controls, can prevent theft of critical
data.
Advanced security through database encryption is required across many different sectors
and increasingly to comply with regulatory mandates. The public sector, for example, uses
database encryption to protect citizen privacy and national security. Initiated originally in the
United States, many governments now have to meet policies requiring FIPS-validated key
storage. For the financial services industry, it is not just a matter of protecting privacy, but also
complying with regulations, such as PCI DSS. This creates policies that not only define what
data needs to be encrypted and how, but also places some strong requirements on keys and
key management.
Customer Problem
Cryptographic operations use up valuable business critical performance engine.
Security Threat
Unprotected MDF file or backup file can be stolen and all credit card data is compromised, and the
corporation fails PCI-DSS compliance
HSMs Role
Enables vendors to integrate with the database, encrypt sensitive data, and store private keys
in an external hardware device and have top-level performance together with heightened
security.
Benefits Gained
Targets
SafeNet Partners:
Industries:
Microsoft
Solution Providers:
DNS ROOT Service Providers
Retail Payment
Protegrity
Healthcare
Oracle
Financial Services
RSA
Government
Vormetric
Manufacturing
VeriSign
TLD Providers:
VeriSign
TLD providers
Cogent Systems
ISC
Autonomica
RIPE NCC
SaaS providers
US DOD
Use Case
Nautilus
Microsoft SQL Server addresses several security issues, including automatic secured updates
and encryption of sensitive data. The data encryption exists at a cell level and is accomplished
by means of built-in system procedures. SQL Server supports encryption capabilities within
the database itself, fully integrated with a key management infrastructure. SQL Server
provides an option to put key management in the hands of the end user, making it possible
to protect data using secrets that even the administrator does not know. By default, clientserver communications are encrypted. However, security problems can occur at many levels.
There are some concerns when disaster recovery involves failover to another SQL Server
orthere is a need to restore a database containing encrypted data.
Telus
Production Deployment
SafeNet Customers:
Symantec
DEK
Comidea
DEK
DEK
DEK
Client Application
Development Deployment
One HSM
Client Application
DEK
Client Application
DEK is secured by an asymmetric key that resides1 TDE uses a Database Encryption Key (DEK)
for encrypting the database that is stored in
in the Luna SA/Luna PCI
the database boot record
DEK
Contact Us: For all office locations and contact information, please visit www.safenet-inc.com
Follow Us: www.safenet-inc.com/connected
2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet.
All other product names are trademarks of their respective owners. RG(EN)-11.23.10
Overview
Oracle Advanced Security, an option to Oracle Database 11g, helps address privacy and
regulatory requirements, including the Payment Card Industry Data Security Standard
(PCI-DSS), Health Insurance Portability and Accountability Act (HIPAA), and numerous
breach notification laws. Oracle Advanced Security provides data encryption and strong
authentication services to the Oracle database, safeguarding sensitive data against
unauthorized access to the network, operating system, or through theft of hardware or backup
media. Oracle Advanced Security benefits include:
No application changes
Built-in key management
High performance
The secure storage of master encryption keys is the foundation of any robust security solution.
Integration of SafeNet Luna SA hardware security modules (HSMs) with Oracle Advanced
Security transparent data encryption (TDE) allows for the Oracle master encryption keys to
be stored in the HSM, offering greater database security and centralized key management for
Oracle Advanced Security with Oracle Database 11g. The master encryption key never leaves
the secure confines of the HSM.
Solution offers:
Transparency: No changes to
applications required
Numbers and text
Scanned documents
(medical, financial,
personnel records)
Table or Tablespace
Encryption Key
Oracle DB 11g
2
Database Administrator
Master
Encryption Key
Table & tablespace keys are sent to the HSM and returned
decrypted over secure connection
TDE table & tablespace keys are encrypted with master encryption
key stored in the SafeNet HSM
Contact Us: For all office locations and contact information, please visit www.safenet-inc.com
Follow Us: www.safenet-inc.com/connected
2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet.
All other product names are trademarks of their respective owners. SB(EN)-11.23.10
Solution Benefits
SafeNet Hardware Security Modules are the first to integrate with Microsoft
SQL Server 2008 for robust key management and encryption, delivering
unprecedented levels of data security, performance and compliance.
How it Works
SQL Server 2008 introduced Extensible Key Management (EKM) for managing keys outside of
SQL Server. Traditionally, all symmetric and asymmetric Keys used by SQL Server reside in the
database itself, however EKM allows key creation, storage, encryption and decryption to be
done outside the database using an HSM. To use this feature SafeNet (the EKM provider) wrote
a module which implements certain interfaces that SQL Server uses for key management and
cryptographic operations. Key creation and management DDL supports key creation using
EKM providers.
Ease of Integration
The SafeNet Luna SA and Luna PCI offer users of Microsoft SQL Server 2008 two flexible
encryption options for their deployment scenarios. The Luna SA is a network-attached HSM
that connects to the server through TCP/IP. It can be leveraged by many servers, offering
the ability to securely partition and share the HSM resource, and is a cost-effective way
of extending the data platform. The Luna PCI is a PCI-card form factor HSM that connects
to the server in the PCI bus and provides seamless deployment to a wide range of security
applications. Its full cryptographic application program interface support makes integration
quick and easy.
SafeNet Hardware Security Solutions for Microsoft SQL Server 2008 Solution Brief
Integration with Microsoft applications is facilitated via the SafeNet Luna EKM, which is used
to set up Extensible Key Management (EKM) for Microsoft SQL Server 2008. Initializing the
SafeNet Luna EKM ensures all keys that are generated via SQL Server 2008 or transparent
data encryption (TDE) will be stored on the SafeNet HSM. The Luna EKM Configuration Utility
allows the flexibility to set parameters required by the EKM module, and thus specify a
particular HSM and slot number. Data can be encrypted by using encryption keys that only the
database user has access to on the external Luna EKM module.
1. Client application
accesses SQL Server
SafeNet Luna SA
Encrypted tunnel
Related Documents
Product Brief: SafeNet Luna SA
Product Brief: SafeNet Luna PCI
Press Release: SafeNet Offers First Hardware Security Module to Work with Microsoft SQL
Server 2008
Solution Brief: SafeNet HSMs for Microsoft Certificate Services
Contact Us: For all office locations and contact information, please visit www.safenet-inc.com
Follow Us: www.safenet-inc.com/connected
2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet.
All other product names are trademarks of their respective owners. SB (EN)-11.23.10
SafeNet Hardware Security Solutions for Microsoft SQL Server 2008 Solution Brief
10
DNSSEC
internal REFERENCE GUIDE
SafeNet Value
Overview
DNSSEC, Domain Name Systems Security Extensions, is the process of signing DNS records to
ensure that the messages received are the same as those that were sent.
DNS, on its own, has no real security. Cache poisoning, which occurs when a name server
has cached data from a non-authoritative DNS server and continues to serve that incorrect/
fraudulent data (website redirects), has created a need for security.
To ensure the validity of DNS services, DNSSEC deploys public key cryptography to digitally
sign DNS messages. Robust protection of private signing keys is vital to the security of
the DNSSEC system because if the keys and their corresponding digital certificates are
compromised, the chain of trust in the DNS hierarchy is broken, rendering the security system
obsolete.
Major DNS organizations have already implemented DNSSEC, and adoption is accelerating
worldwide.
Customer Problem
Cache poisoning
DNS signing performance
Industry compliance/regulations
RFCs NSEC (ex. RFC 5011)
NSEC3
ICANN mandates FIPS 4 for public DNS roots
Integration of security
Impersonation of website
Security Threat
Size of DNSSEC packets and ability for the system to handle large signing volumes. Since DNS updates
are very frequent, need to ensure the performance is not slowed down.
HSMs Role
Next Gen HSMs will have industry-leading ECC performance. This is a fit for smaller ECCsigned data footprints in the DNSSEC packet.
11
SafeNet Partners:
VeriSign
Benefits Gained
Size of signing footprint of ECDSA keys vs. RSA. Sizes for ECDSA keys gets increasingly
smaller as a percentage of the equivalent cryptographic protection increases (i.e., ECC
signing footprint is one-fifth the size, when comparing equivalent strengths (4096 RSA
key, 384 ECC key)).
Certicom compression would make the signature footprint even smaller
Protection of the hosting service provider, as well as the incoming requestor or end user
Targets
Industries:
Top level domain providers
Online bank and retail/payment providers
Forgotten password websites
SaaS providers
Cloud computing providers
DNSSEC key management and zone signing software
providers
Banking
Retail
Large enterprise
Government
Education
Solution Providers:
DNS ROOT Service Providers
VeriSign
Cogent Systems
ISC
Autonomica
RIPE NCC
U.S. DOD
Use Case
SafeNet Customers:
VeriSign
SURFnet
SURFnet, a subsidiary of the SURF organization, allows Dutch universities for applied sciences
and research centers to collaborate nationally and internationally on innovative Information
and Communication Technologies facilities. The SURFnet network is the national computer
network for higher education and research in the Netherlands. SURFnet recognized the need
to add a DNSSEC security solution that would allow them to restrict access to the SURFnet
network to universities, academic hospitals and teaching hospitals, institutes for higher
professional education, research institutes, corporate R & D departments, scientific libraries,
and other organizations funded by the Ministry of Education, Culture and Sciences.
After evaluating a number of security vendors solutions for DNSSEC, SURFnet selected
SafeNets HSMs for its standards-based DNSSEC solution backed by superior customer
support. SafeNet HSMs were the right choice because they met PKCS standards and offered
FIPS 140-2 Level 3 and Common Criteria EAL 4+ certified security.
Since deploying SafeNet HSMs, SURFnet has revamped its key management capabilities
through key generation, distribution, rotation, storage, termination, and archivalkeeping the
private DNSSEC signing key and DNS server secure at all times. SafeNet HSMs also boosted
SURFnets cryptographic processing capabilities by offloading it from application servers and
storing cryptographic keys in a centralized, hardened device, thereby eliminating the risks
associated with having these assets housed on poorly secured platforms.
12
Production Deployment
Issuing Cert CA 2
Root CA
Issuing Cert CA 1
Network-attached HSM
Issuing Cert CA 2
Root CA
Root CA
DNS Server
PCI HSM
www.customer.com
Issuing Cert CA 1
Issuing Cert CA 1
Network-attached H
Network-attached HSM
www.customer.edu
www.customer.org
DNS Server
PCI HSM
PCI HSM
3
2
www.cust
Issuing Cert CA 2
Root CA
Issuing Cert CA 1
Network-Attached HSM
www.customer.edu
www.customer.org
www.customer.org
root certificate
authority
(CA) secures
issuing
CA issues the
certificates
for each
1TheThe
Theissuing
DNS server
digital
The
CA issues
th
Root CA
Issuing Cert CA 2
Issuing Cert CA 1
Root CA
2
Issuing Cert CA 2
Network-Attached HSM
Issuing Cert CA 1
Network-Attached HSM
Contact Us: For all office locations and contact information, please visit www.safenet-inc.com
Follow Us: www.safenet-inc.com/connected
2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet.
All other product names are trademarks of their respective owners. RG(EN)-11.23.10
13
For root, top level domain, and enterprise level DNS hierarchies, SafeNet
HSMs combine the strongest cryptographic security with the highest
performance, reliability, and ease of integration for rapid and affordable DNSSEC
implementation.
14
In addition SafeNet HSMs support key rollover functions, since DNSSEC keys do not have
a permanent lifetime. The chances a key will be compromised, whether through accident,
espionage, or cryptanalysis, increase the longer the key is used. Key rollover is the process by
which a key is replaced with a new key and associated signatures are updated.
HSM
SafeNet HSM
Enterprise level zone key signed by
SafeNet HSM (www.mybank.com)
SafeNet HSM
1
Client-side
of the DNS
DNS Query
Contact Us: For all office locations and contact information, please visit www.safenet-inc.com
Follow Us: www.safenet-inc.com/connected
2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet.
All other product names are trademarks of their respective owners. SB (EN)-11.23.10
15
Business Challenges
Business Challenge
Because SURFnet is a provider of network support for a large constituency of organizations,
including universities, hospitals, research institutes, corporate research bodies, and scientific
libraries, they needed to safeguard private key material used in DNS Security Extensions
(DNSSEC).
SURFnet enables
groundbreaking education
and researchdesigning and
operating the hybrid SURFnet6
network and providing innovative
services in the field of trusted
identities and electronic
collaboration for institutions like
universities, hospitals, research
institutes, corporate research
bodies, and libraries.
With such large amounts of information in play for SURFnets network and its large
constituency, its network has opened itself up to standard DNS security flaws, where
unsecured and vulnerable caching name servers are easy targets for hackers to hijack
Web traffic containing sensitive data. SURFnet recognized the need to add DNSSEC to its
repertoire to protect their network from many vulnerabilities, including cache poisoning, manin-the-middle attacks, rerouting of e-mails, and denial-of-service attacks.
As a provider of a massive network of respected bodies and institutions in the Netherlands,
SURFnet needed a DNS security solution that was:
Compatible with OpenDNSSEC, an Open Source software that manages security for DNS.
Compliant with the PKCS#11 standard, which calls for a platform-independent API to the
HSM.
Supported by world-class customer support.
Provided by a reliable and reputable security provider.
SURFnet Selects SafeNet HSMs to Secure DNSSEC Material Case Study
16
Solution
SURFnet evaluated a number of security vendors solutions for DNSSEC and chose SafeNets
HSMs for its standards-based DNSSEC solution.
After testing their DNSSEC options, SURFnet found SafeNet HSMs to:
Secure digital signatures in order to ensure the validity of response to queries through every
zone in the DNS hierarchy and establish the chain of trust.
Control access so only authorized customers and internal staff can access sensitive
applications and data.
Scale to accommodate high-volume processing.
Have secure backup features.
Store all key material in hardware ensuring integrity and protection of all hardware keys.
Provide standardized PKCS#11 support for application integration to the SafeNet HSMs.
Be supported by superior customer service.
SURFnet will initially deploy DNSSEC for its own domain to pioneer the technology on its
network. It will then deploy the technology for its large constituency, leveraging the scalability
offered by SafeNets HSMs. SURFnet will operate the SafeNet HSMs in high-availability mode to
ensure maximum redundancy for this critical infrastructure.
SafeNet has proven to be an elite security vendor for our DNSSEC rollout. The SafeNet HSMs
were scalable, easy to deploy, and let us install security through a phased approach, thus
allowing for maintenance of ongoing network viability, said Roland van Rijswijk, SURFnet. The
compliance to PKCS standards, as well as its FIPS 140-2 Level 3 and Common Criteria EAL 4+
certifications, combined with its compatibility to OpenDNSSEC, has shown our constituents that
we are serious about protecting the vulnerabilities in DNS technology.
Benefits
Since deploying SafeNet HSMs, SURFnet has revamped its key management capabilities through
key generation, distribution, rotation, storage, termination, and archivalkeeping the private
DNSSEC signing key and DNS server secure at all time. SafeNet HSMs also boosted SURFnets
cryptographic processing capabilities, by offloading it from application servers and storing
cryptographic keys in a centralized, hardened device, thereby eliminating the risks associated
with having these assets housed on poorly secured platforms. Using SafeNet HSMs has also
allowed SURFnet to significantly streamline security administration.
Contact Us: For all office locations and contact information, please visit www.safenet-inc.com
Follow Us: www.safenet-inc.com/connected
2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet.
All other product names are trademarks of their respective owners. CS (EN)-11.23.10
17
eDocuments
internal REFERENCE GUIDE
SafeNet Value
SafeNet Hardware Security
Modules form a single
auditable point of trust in
eDocument deployments.
In addition, SafeNet
HSMs support the leading
virtual platforms including
Microsoft Hyper-V, Citrix
XenServer, and VMware
vSphere.
Overview
eDocuments are a type of paper-to-digital initiative, often including a digital signature. Digital
signatures are required by some localities and are the preferred choice in others because they
offer stronger security attributes.
eDocumentation involves the process of moving from paper bases systems, towards digitized
invoice imagery, tracking, management based, and storage. When coupled with a digital
signature, it offers robust security, non-repudiation, and trust between parties.
Gaining momentum worldwide, the highest rates of adoption and focus have been in Europe,
followed closely by Latin American countries.
Customer Problem
Meet Regulatory Mandate/Directives:
EU VAT directive (Value Add Tax)
Brazilian Nota Fiscal (NF-e)
Ordinance of the Federal Department of Finance on Electronic Data and
Information (OEIDI)
Types of eDocument
Processes
Invoicing
Others
Improve efficiencies for invoice processing, storage, and retrieval
Procurement
Notary
Mortgage
Contracts
Reduce the cost and complexity of long-term storage of large amounts of paper-based
documents
Technical/Security Problem
Establish trust as the invoice moves between parties
Determine how to move the invoice to a digital format in a secure and timely manner
Ensure the integrity of invoice content
Provide non-repudiation of receipt and origin
Secure electronic tracking, storage, and management
Adequate performance requirement for signing/verifying large quantities of incoming invoices, as well as
invoices retrieved from storage
18
SafeNet Partners:
4Point
Azurian
Certisign
Complus
Datasoft
GlobalSign
Identiga
Mier Borda
Netco
Netsec
HSMs Role
The key is to establish trust in the eDocument between all parties, ensuring that it remains
unaltered throughout the document life cycle:
At the point of entry By the digital processing During the storage period At the time of retrieval
SafeNet HSMs are the cornerstone for establishing this trust-safeguarding the cryptographic
keys that will sign/verify the documents, providing security in the digital process, and ensuring
trust across all parties.
Our high-performance SafeNet HSMs are the high security ENGINES that can meet the
potentially large transaction volume requirements with real-time capabilities and high
availability, expediting processes.
Benefits Gained
Reduced cost of handling invoices
Improved relationships with suppliers because the approval and payment cycle can be
significantly reduced
Increased productivity through seamless integration with back office systems
Reduced storage space requirements and elimination of manual filing of paper invoices
Reduced errors resulting in reduced reconciliation time
Efficient retrieval of invoice records
SafeNet Customers:
Petrobras - Luna SAs (3)
Acos Villares - PSEs (2)
Oi - PSEs (3)
Brasil Telecom - Luna SAs (3)
Yamaha - PSEs (3)
Allergan - PSGs (2)
Antwerp Port Authority
NF-e Brazil
Targets
Industries:
Solution Providers:
Retailers
b_process
Government
Logica
Postal organizations
EDB
Anochron
Progrator
Electronic marketplaces
Tieto
Medidata
BBS
SETTCE
19
Use Case
In order to comply with the VAT law, the Antwerp Port Authority implemented an advanced
e-invoice solution based on digital signatures. The port authority leveraged its investment in
Adobes LiveCycle Enterprise Suite (ES) and GlobalSigns DocumentSign digital certificates by
selecting an HSM that offered easy integration with these applications.
Production Deployment
GlobalSign
Certificates
Supplier
3 Adobe LiveCycle ES
Customer
5
Production Deployment
Two HSMs
GlobalSign
Certificates
Supplier
1
GlobalSign
Certificates
Supplier
2
Product Units & Disaster
Recovery/Business Continuity
3 Adobe LiveCycle ES
3 Adobe LiveCycle ES
Customer
4 Supplier sends email to customer
Customer
2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet.
All other product names are trademarks of their respective owners. RG (EN)-11.23.10
20
Overview
Provides non-repudiation of
receipt and origin
Secures electronic tracking
and storage
Scales to accommodate
high volumes of important
documents
FIPS validated and Common
Criteria certified
Trust is a critical requirement for the feasibility of eDocuments. Digital signatures, powered by
encryption and public key infrastructure (PKI), represent the means for establishing trust in
eDocuments. Digital signatures give all parties the confidence required to trust that documents
come from known entities, and that they have not been altered in transit. In turn, these digital
signatures need to have foolproof, comprehensive security mechanisms to protect them: If digital
signatures are in any way compromised, the entire eDocument infrastructure will be compromised.
This is where hardware security modules (HSMs) come into play.
eDocuments are digitally signed with a secure private signing key, which requires an HSM capable
of performing certificate authority management tasks. The HSM stores the keys within the secure
confines of the appliance throughout the key lifecycle. The HSM enables the organization to
secure digitally certified documents and to cryptographically bind the identity of the certifying
party to the documents. By storing cryptographic keys in a centralized, hardened device, HSMs
can eliminate the risks associated with having these assets housed on disparate, poorly secured
platforms. In addition, this centralization can significantly streamline security administration.
21
The Benefits of
eDocuments with SafeNet
HSMs
Enhance Security and Ensure
Compliance
Certification
Compliance
Multiple signatures
Optimize Operational Performance
Efficient retrieval, processing
Elimination of time-consuming,
inefficient paper-based
processes
Improve vendor relations
Reduced errors and
reconciliation times
Efficiency through back office
integration
Reduce Cost
Compliance. SafeNet HSMs offer the robust security capabilities that ensure compliance with the
European Directive on Invoicing, Brazil Notal Fiscal (NF-e), and other regulations.
Multiple signatures. With SafeNet HSMs managing digital signatures, organizations can manage
multiple signatures per invoice.
Reduce Cost
With SafeNet powering eDocument systems, businesses can realize an array of cost-saving
benefits. For example, by centralizing cryptographic keys and policy management on SafeNet
HSMs, businesses can significantly reduce the administration associated with managing digital
signatures in a distributed, disparate fashion. Also, by eliminating the need to do filing of paper
documents, businesses can reduce the overhead and expense of paper document storage.
Finally, the digitization of documents leads to significant reductions in the time and staffing costs
associated with paper-based document processing.
Supplier
1
Luna HSM with
Globalsign Certificate
GlobalSign
Certificates
Supplier creates invoice for
products or services sold to
customer
Supplier sends
Email to customer
containing the
signed invoice PDF
4
2
Invoice is converted to
PDF format by Adobe
LiveCycle ES
3 Adobe LiveCycle ES
Adobe LiveCycle ES adds time stamp
and digitally signs the PDF using a
GlobalSign certificate that is securely
stored on SafeNet HSM
Customer
6
The PDF invoice is ready
to be processed for
accounts payable and
subsequent archiving
5
Customer opens invoice PDF in
Adobe Reader to validate the digital
signature and ensure integrity and
authenticity of the invoice
About SafeNet
Founded in 1983, SafeNet is a global leader in information security. SafeNet protects its customers
most valuable assets, including identities, transactions, communications, data and software
licensing, throughout the data lifecycle. More than 25,000 customers across both commercial
enterprises and government agencies, and in over 100 countries, trust their information security
needs to SafeNet.
Contact Us: For all office locations and contact information, please visit www.safenet-inc.com
Follow Us: www.safenet-inc.com/connected
2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet.
All other product names are trademarks of their respective owners. SB (EN)-11.23.10
22
Customer Profile
Business Challenge
The European Directive on Invoicing (EC/115/2001) requires member states, including Belgium,
to implement electronic invoicing into their local value-added tax (VAT) legislation to improve
and streamline cross-border invoicing. The VAT rules require suppliers to guarantee the
authenticity of origin and the integrity of the content for the invoices they create. Authenticity
of origin ensures that the message content was actually created by the person or legal entity
that signed it, while integrity assures that no changes have been made to the content of the
invoice during transit.
Solution
Business Challenges
Solution
In order to comply with the VAT law, Antwerp Port Authority implemented an advanced
e-invoice solution based on digital signatures. Antwerp Port Authority leveraged its multipartner investment in Adobes LiveCycle Enterprise Suite (ES) and GlobalSigns DocumentSign
digital certificates by selecting SafeNets hardware security modules (HSMs) for storage of
digital signatures and protection of cryptographic keys.
After Adobe LiveCycle ES converts an invoice into a PDF/A (Archive)-compliant document,
digital signatures are applied using a digital certificate to ensure the authenticity and integrity
of the PDF. A secure, embedded time stamp locks down the exact time of signature creation,
which meets a key VAT requirement for archival and storage. The Certified Document Service
(CDS) digital certificates are provided by GlobalSign, a trusted Certificate Authority that
delivers high-assurance digital identities to organizations and users worldwide.
The PDF invoices are digitally signed with a secure private signing key, which requires a
cryptographic hardware security module (HSM) capable of performing certificate authority
management tasks. The SafeNet Luna SA HSM stores the keys within the secure confines
of the appliance throughout the key lifecycle. The integrity of both cryptographic keys and
digital certificates is vital to the integrity of the overall security systemif the keys or digital
certificates are compromised, the entire system is rendered obsolete. The SafeNet solution
allows Antwerp Port Authority to secure digitally-certified invoices and to cryptographically
bind the identity of the certifying party to the invoice. The Adobe PDF Reader automatically
verifies all of the embedded information and visually highlights the authenticity and integrity
of the document, allowing the recipient to easily detect whether the document has been
altered after being certified.
23
Supplier
1
Luna HSM with
Globalsign Certificate
GlobalSign
Certificates
Supplier sends
Email to customer
containing the
signed invoice PDF
4
2
Invoice is converted to
PDF format by Adobe
LiveCycle ES
3 Adobe LiveCycle ES
Adobe LiveCycle ES adds time stamp
and digitally signs the PDF using a
GlobalSign certificate that is securely
stored on SafeNet HSM
-Jan Goosens
Manager Software Development
Antwerp Port Authority
Customer
6
The PDF invoice is ready
to be processed for
accounts payable and
subsequent archiving
5
Customer opens invoice PDF in
Adobe Reader to validate the digital
signature and ensure integrity and
authenticity of the invoice
Applying Security to the Automated PDF Work Flow for E-invoicing and E-archiving
Benefits
The SafeNet, Adobe, and GlobalSign joint solution allows the Antwerp Port Authority to leverage
their IT investments and apply a compliant security solution that guarantees the authenticity
and integrity of electronic invoices. All parties recognize the need to reduce their carbon
footprint throughout the supply chain, as well as leverage the financial savings to reduce
billing costs. By applying digital signature and encryption technologies within a PKI network
environment, Antwerp Port Authority quickly brought digital invoicing processes online,
thereby streamlining workflow, lowering costs, and meeting mandatory European directives for
compliance. For the party relying on the e-invoice, the secure Adobe PDF Reader allows for easy
validating, processing, and archiving. Viewing and validating the e-invoices is also automated
thanks to the out-of-the-box integrated trust solution between Adobe Reader and the Adobe
Certified Document Services platform.
About SafeNet
Founded in 1983, SafeNet is a global leader in information security. SafeNet protects its
customers most valuable assets, including identities, transactions, communications, data,
and software licensing, throughout the data lifecycle. More than 25,000 customers across
both commercial enterprises and government agencies, and in over 100 countries, trust their
information security needs to SafeNet.
Contact Us: For all office locations and contact information, please visit www.safenet-inc.com
Follow Us: www.safenet-inc.com/connected
2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet.
All other product names are trademarks of their respective owners. CS (EN)-11.23.10
24
SafeNet Value
SafeNets award-winning
ViewPIN+ is the only secure
Web-based PIN issuance
and management solution
that delivers unprecedented
customer satisfaction and
proven cost savings by
eliminating expensive, less
secure, and time-consuming
paper-based authentication
delivery to customers.
Overview
The Personal Identification Number (PIN) has existed since the invention of the Automated
Teller Machine (ATM) in 1967 as a means to authenticate customers and authorize
transactions, such as cash withdrawals, retail purchases, and account transactions. Until
today, organizations involved in PIN issuance, (banks, retailers, universities, suppliers, etc.)
have not found an easy and cost-effective way to securely deliver PINs to account holders.
Most methods involve PIN mailers, which introduce waiting periods, mail house processing
and postage costs, and risk factors inherent to paper-based processes.
Customer Problem
Higher cost of operations
Insecurity of authentication credential delivery
Latency of authentication credential delivery system
Security Threat
Existing protocols like SSL protect critical user data on public networks. However, once user data reaches
a Web server, it is available in clear text, hence a variety of insider and external attacks are still possible.
The solution is to devise a mechanism, such as ViewPIN+, that ensures that all critical user data remains
encrypted all the time, until it enters a physically and logically secure HSM.
HSMs Role
With its hardware-based application security module, SafeNet ViewPIN+ offers hardwarebased key management, and ensures that cryptographic keys and processes are, at all times,
stored and managed exclusively within FIPS-validated hardware. Code signing, time stamping,
and verification maintain the integrity of the Java application code and prevent unauthorized
application execution. Additionally, strictly enforced access and usage policies prevent
unauthorized access to sensitive applications or data.
Benefits Gained
Massive cost savings compared to paper mailers
Reduced security risks compared to paper mailers
Faster PIN delivery. Cardholders begin using their card sooner, enabling greater bank
revenue
Increased customer satisfaction
Significant green environmental benefits in moving from paper to digital
25
SafeNet Partners:
Targets
Industries:
Gemalto
Solution Providers:
DNS ROOT Service Providers
Postal organizations
VeriSign
U.S. Government
Electronic marketplaces
ISC Autonomica
RIPE NCC U.S. DOD
Use Case
In order to guard against forgery, many manufacturers are relying on HSMs to protect their
intellectual property, such as chips, hard drives, printer components, among other, as well
as protect against lost revenue. One such manufacturer wanted to protect their phones from
snooping, identity forgery, and other forms of network abuse that plague the cellular phone
and satellite television industries. An IP phone manufacturer needed to integrate secure
identification and authentication into its devices. The business needed to integrate the
issuance of digital identities and authentication into its manufacturing processes, which
meant the organization would need to securely and cost-effectively create thousands of
industry-compliant digital identities.
SafeNet Customers:
Citi/Egg Bank
Production Deployment
1
2
PIN Agent generates a symmetric key. This key is used to encrypt the
credentials that were sent to PIN Agent. This key is then wrapped
using the wrapping certificate of PIN Authority. All this information is
then timestamped and signed using the signing key of the PIN Agent.
1
3 Transaction
Authorization
System
Web Server
Internet
credentials that were sent to PIN Agent. This key is then wrapped
PRIVATE NETWORK
CARDHOLDER
DMZ
PRIVATE NETWORK
3 Transaction
Firewall
Web Server
Authorization
System
Retail Banking
System
Firewall
Internet
Firewall
PIN
Database
Firewall
ATM, POS,
Branch
2
2
SafeNet
ViewPIN+
PIN Agent
PIN Agent then validates the digital signature and time stamp of
the encrypted user credential information and sends it to the
ATM, POS,
SafeNetBranch
ViewPIN+
PIN Agent
SafeNet
ViewPIN+
Authority
usersand
web browser.
PIN Agent then validates the digital signature
time stamp of
the encrypted user credential information and sends it to the
users web browser.
Retail Banking
System
3 Transaction
Contact Us: For all office locations and contact information, please visit www.safenet-inc.com
Follow Us: www.safenet-inc.com/connected
2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet.
All other product names are trademarks of their respective owners. RG(EN)-12.13.10
Web Server
Firewall
Authorization
System
PIN
Database
Firewall
2
SafeNet
ViewPIN+
PIN Agent
ATM, POS,
Branch
SafeNet
ViewPIN+
Authority
26
S
Vi
A
Benefits
Safe, fast, easy, and costeffective PIN issuance
Winner-2008 Network Product
Guide Best in Security Solution
Finance
Highest security available
Increases customer
satisfaction
Increases competitive
advantage
Increases profitability
Environmentally responsible
Easy to integrate and deploy
PINs are just a click away with ViewPIN+. For banks, credit card issuers, telecom
operators, and retailers with membership/PIN cards, SafeNets award-winning
ViewPIN+ is the only secure Web-based PIN issuance and management solution
that delivers unprecedented customer satisfaction and proven cost savings by
eliminating expensive, insecure, and time-consuming paper-based PIN delivery to
customers.
Increased Profitability
ViewPIN+ reduces operational costs, increases revenue, and saves resources for banks, credit
card companies, and retail program membership card issuers. The first ViewPIN+ customer
was U.K.-based financial services provider Egg Banking, plc, a Citigroup company, and the
worlds largest online bank. Using ViewPIN+, Egg eliminated paper-based PIN issuance, saving
thousands of resource hours and upwards of $5 million dollars in expenses the first year alone.
27
Technical Specifications
Cardholder
Web/Application Server
Transaction
Authorization
System
Firewall
Transport
Hardware-secured accelerated SSL
Any browser that supports Javascript
1.1 or higher
IE, Firefox, Safari, Opera, iPhone
Network Connectivity
2x10/100 Ethernet
Secure Integration & Administration
Secure remote administration
Hardware-secured RSA and 3DES/AES
crypto keys
Strongest cryptographic algorithm
Retail
Banking
System
Internet
Platform
SafeNet Luna SP
Compliance
FIPS 140-2 Level 3
APACS guidelines
RoHS
ISO 9002 certification
Private Network
DMZ
SafeNet
ViewPIN+
PIN Agent
Pin
Database
Firewall
ATM, POS SafeNet ViewPIN+
PIN Authority
Branch
Easy to Deploy
ViewPIN+ integrates into the banks existing website and user authentication system without
any requirement for applets or browser plug-ins on the client side. The browser requirements
are basic and standards-based, making ViewPIN+ available from any browser, including on
mobile devices.
About SafeNet
Founded in 1983, SafeNet is a global leader in information security. SafeNet protects its
customers most valuable assets, including identities, transactions, communications, data,
and software licensing, throughout the data lifecycle. More than 25,000 customers across
both commercial enterprises and government agencies, and in over 100 countries, trust their
information security needs to SafeNet.
Contact Us: For all office locations and contact information, please visit www.safenet-inc.com
Follow Us: www.safenet-inc.com/connected
2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet.
All other product names are trademarks of their respective owners. PB (EN)-11.23.10
28
Business Challenges
The worlds largest online bank securely issues PINs online to save money, reduce
fraud, and improve the customer experience with SafeNets award-winning
ViewPIN+ Web-based PIN management platform.
Customer Profile
Egg, the UKs leading online bank and a member of Citi, became the U.K.s first Internet-only
bank in 1998. Today, it is the worlds largest online bank with 3.2 million customers. Egg is
a savvy, agile organization that leverages the Internet in innovative ways to improve both
efficiency and customer experience.
Business Challenge
Personal Identification Numbers (PINs) are increasingly used to authenticate customers and
authorize credit card transactions, such as ATM withdrawals or retail purchases. Before the
introduction of ViewPIN+, Egg used to issue millions of new PIN mailer letters through the
postal service. In addition, every time a customer forgot a PIN, another letter was mailed.
In short, sending PINs through the traditional mail delivery channel was very costly, time
consuming, and highly insecure. Egg was looking for a better solution.
Egg wanted their customers to experience the best service possible by being able to use their
cards immediately after receiving them, rather than having to wait seven to ten days for their
PIN to follow by mail. Egg also wanted to lower the risk of fraud that typically occurs when PIN
mailer letters are intercepted en route to customers, as well as decrease the costs associated
with providing up to three million new PINs a year. Leveraging the Internet seemed like an
obvious solution for this online bank. However, allowing customers to retrieve their PINs via
the Internet seemed dangerous, even to some of the companys own security experts.
In 2006, Egg began a search for a highly secure, automated, and convenient method of
delivering PINs to customers over the Internet. The Web-based PIN management system had
to be not only absolutely secure, but also fast and reliable. One of the biggest challenges
of the project was ensuring that the customer was the only person able to view their PIN.
We insisted on a solution that would prevent anyone or anything from being able to gain
knowledge of the PIN number as it traveled to the rightful owner of the card. It was imperative
that we could demonstrate to our peers within the payment industry that we were improving
the security of the payment network rather than weakening it, said Horler. Preventing
disclosure of the PIN across the entire transaction would be difficult. The third-party card
issuer holding Eggs customer PIN data had doubts as to whether a technology actually
existed to achieve this goal.
-Stuart Horler
Lead Security Architect
Egg plc
Egg Bank Eliminates Costs and Expedites PIN Issuance with SafeNet Solution Case Study
29
ViewPIN+ is a perfect
example of how we strive to
make banking secure and
convenient for our customers.
We are constantly seeking
to adapt our products and
services such that they fit in
with their modern lifestyles.
-Ken Woghiren Head of Architecture
and Innovation for Citibank UK
Consumer
Solution
Egg knew they would need an experienced security technology partner, so they approached
SafeNet about the project. SafeNets award-winning PIN management platform ViewPIN+
perfectly suited the challenge. With its hardware-based application security module,
ViewPIN+ would offer hardware key management, and would ensure that cryptographic keys
and processes were, at all times, stored and managed exclusively within FIPS-validated
hardware. Code signing and verification would maintain the integrity of the Java application
code and prevent unauthorized application execution. Additionally, strictly enforced access
and usage policies would prevent unauthorized access to sensitive applications or data. With
tamper-resistant hardware, network connectivity, and secure remote administration, only
SafeNet ViewPIN+ would make it possible for Egg to deploy sealed high-assurance Java Web
service applications, which proved to be a critical, project-enabling capability.
The Benefits
Stuart Horler, said the technology, which has been in use since 2004, has had a 100% success
and reliability rate. Another major benefit of the Web-based PIN issuance solution is the
hard cost savings. For every card customer, Egg saves in postage and fulfillment costs,
while providing the customer with better servicea win-win situation for the bank and its
customers.
Time savings are also a significant factor. A PIN request through the Egg website is fulfilled
instantly and the customer can use their card immediately. In contrast, a PIN request that
has to go through the postal system can take up to 10 days, assuming it is not subject to
interception fraud and actually arrives to the rightful account owner.
Thats a week or more that the customer is either not using the card for purchases or is doing
so with a card from another issuer, said Horler. Multiplied by the large number of credit card
customers we have, that is a huge potential loss of revenue and an unnecessary inconvenience
for our customers.
About SafeNet
Founded in 1983, SafeNet is a global leader in information security. SafeNet protects its
customers most valuable assets, including identities, transactions, communications, data,
and software licensing, throughout the data lifecycle. More than 25,000 customers across
both commercial enterprises and government agencies, and in over 100 countries, trust their
information security needs to SafeNet.
About Egg
Egg is the UKs leading online bank, providing banking, insurance, investments, and mortgages
through its Internet site and other distribution channels.
About Citi
Egg is a member of Citi, the leading global financial services company, has some 200 million
customer accounts, and does business in more than 100 countries, providing consumers,
corporations, governments, and institutions with a broad range of financial products and
services, including consumer banking and credit, corporate and investment banking,
securities brokerage, and wealth management. Citis major brand names include Citibank,
CitiFinancial, Primerica, Smith Barney, Banamex, and Nikko. Additional information may be
found at www.citigroup.com or www.citi.com.
-Robin Young,
CIO Citi UK
Contact Us: For all office locations and contact information, please visit www.safenet-inc.com
Follow Us: www.safenet-inc.com/connected
2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet.
All other product names are trademarks of their respective owners. CS (EN)-12.13.10
Egg Bank Eliminates Costs and Expedites PIN Issuance with SafeNet Solution Case Study
30
Secured Manufacturing
internal REFERENCE GUIDE
SafeNet Value
Using the HSM for key
management ensures
the IP is protected both
internally and among third
parties who may or may
not have their own security
policies. With SafeNet
HSMs, manufacturers are
able to leverage the HSM
for centralized control
to remote locations, and
since each manufacturing
environment is different,
also customized features.
In addition, SafeNet HSMs
offer high availability, load
balancing, and ECC key
limit size constraints for
smaller crypto footprints, to
ensure production uptimes
and efficient performance
rates that will not bog down
systems.
Overview
The goal of implementing a secured manufacturing environment is to protect intellectual
property (IP). With a projected year-over-year increase in IT spending of 3.6 percent,
companies are moving towards secured manufacturing environments in an effort to reduce
manufacturing costs, improve supply chain efficiencies, and protect their IP. This especially
holds true with third-party manufacturing sites that may not have security policies in place
and cannot be trusted.
Customer Problem
Reasons vendors look to Offshore Manufacturing:
Costs
Lack of core competency
Greater flexibility
Higher volumes
Higher quality
Time to market
Risks/Concerns with Offshore:
Lack of control
Loss of IP
Production of black market replicas
IP laws are not equally enforced WW
Complexity increases with distance
Language barriers
Security Threat
Privacy of IP data
Authentication of manufacturing tools
Limits on manufacturing quantities
Limits on license features, added at manufacturing time
Authentication of manufactured components once deployed
Enforcement of policy and procedures
Secured Manufacturing HSM Reference Guide
31
HSMs Role
Using the HSM for key management ensures the IP is protected both internally and among
third parties who may or may not have their own security policies. In addition, SafeNet Remote
PED will provide centralized control.
Since each manufacturing environment is different, SafeNet Functionalities Modules and the
Luna SP Java applet will allow manufacturers to customize their features/logic.
High availability and load balancing features will assure production uptimes and efficient
performance rates that will not bog down systems. In addition, next-generation HSMs will
include ECC keys limit size for smaller signed data footprints.
Benefits Gained
Protection of IP
Control of manufacturing process
Remote operational control with cryptographic policies, regardless of distance
Cost reduction
Improved time to market
Improved quantity capabilities
Improved quality
SafeNet Customers:
Seagate
Intel
John Deere
Cisco
Lexmark
Targets
Industries:
Solution Providers:
Technology manufacturing
b_process
Logica
Textile manufacturers
EDB
Third-party suppliers
Anochron
Progrator
Sony
Tieto
Motorolla
Medidata
BBS
SETTCE
32
Use Case
In order to guard against forgery, many manufacturers are relying on HSMs to protect their
intellectual property, such as chips, hard drives, and printer components, as well as protect
against lost revenue. One such manufacturer wanted to protect their phones from snooping,
identity forgery, and other forms of network abuse that plague the cellular phone and satellite
television industries. An IP phone manufacturer needed to integrate secure identification
and authentication into its devices. The business needed to integrate the issuance of digital
identities and authentication into its manufacturing processes, which meant the organization
would need to securely and cost-effectively create thousands of industry-compliant digital
identities.
The IP telephone manufacturer selected Microsoft Certificate Services software for managing
the issuance of digital identities, but needed a hardware solution to deliver maximum security
and performance. A highly secure hardware system was required to protect the certificate
issuance root keythe basis of trust for all of the IDs issued to the phonesand prevent the
possibility of a copy of that key being used to create illegitimate device identities. The solution
also had to meet high performance standards to ensure that the computationally-intensive
certificate issuance process did not create bottlenecks in the manufacturing process.
The manufacturer selected an HSM as the foundation for their digital identity issuance system
for IP telephones. Their selected HSM held both FIPS 140-2 and Common Criteria certification.
With each IP telephone containing a unique, trusted digital identity, users can be sure that
the IP telephone they are connecting with is definitely the telephone it claims to be. This IP
telephone manufacturers use of HSMs demonstrates how high-volume, high-speed digital
ID issuance can be seamlessly integrated into the manufacturing process without sacrificing
security.
33
Remo
Production Deployment
Remote Location A
Headquarters
HSM
3
HSM
Headquarters
HSM
Remo
Internet/
Intranet
Remote Location
B
HSM
Internet/
Intranet
1
2
License reloaded
License reloaded
HSM
HSM
5
6
Headquarters
Development Deployment
One HSM
HSM
5
6
Headquarters
Production
Deployment
Two HSMs
1
Remote Location A
HSM
Remote Location A
HSM
Remote Location
B
1
Remote Location B
HSM
Remote Location C
Remo
Internet/
Intranet
HSM
42
5
Internet/
Intranet
4
5
Remote Location C
Remote Location C
HSM
License reloaded
License reloaded
HSM
6
End point secure target
components:
Hard drives
Chips
Printer cartridges
Other component
firmware images
Contact Us: For all office locations and contact information, please visit www.safenet-inc.com
Follow Us: www.safenet-inc.com/connected
2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet.
All other product names are trademarks of their respective owners. RG(EN)-11.23.10
34
SafeNet Value
Supports industry
compliance requirements
Supports best practices for
key management/security
Overview
Smart Grid
The smart grid creates a network of links between customers and utility companies. This
smart grid network then connects to computer systems at utility companies and will signal
people or their appliances to take certain actions, such as reducing power usage when
electricity prices spike. In order to implement trust in this system, a PKI infrastructure secured
with HSM technology is deployed in smart meters as the first step to establishing a smart
grid.
Smart meters are deployed in two phases:
1. Automated Meter Reading (AMR) allows meters to be read remotely, eliminating the
need to send meter readers to each location.
2. Advanced Metering Infrastructure (AMI) technologies facilitate a two-way channel
of communication between meters on the grid and the utility that, in turn, provides
increased business intelligence to both the utility and the end consumer.
Utilities managed by the smart grid are a fundamental part of our everyday lives and must be
protected. Protecting these assets will require the deployment of authentication, encryption,
and integrity protection solutions throughout the smart grid architecture.
Customer Problem
Energy providers use a complex and decentralized system of applications to manage the
delivery of the utility. Manipulation of one or all of these components in the smart grid
could impede the delivery of energy to homes and businesses, with potentially disastrous
consequences.
Assets managed at the application and communication layers of the grid require the most
security:
The Application Layer
Outage Management System (OMS). An Outage Management System is a computer
system tasked with the management of the restoration of power in the event of
an outage. These systems are used to estimate the location, size, and work force
required to restore power.
Geographical Information Systems (GIS). Geographical Information Systems allow
utilities to visualize the electric and communications systems, and the relationship
that exists between them. GIS provides a real-time picture of the health of the grid
itself.
35
SafeNet Partners:
Solution providers
Elster, Elster Group is a world
leader in Advanced Metering
Infrastructure (AMI)
Meter Data Management Systems (MDM). An MDM system performs long-term data
storage and management for the vast quantities of data that are now being delivered
by smart metering systems. This data consists primarily of usage data and events that
are imported from the head end servers that manage the data collection in Advanced
Metering Infrastructure (AMI) or Automatic Meter Reading (AMR) systems.
Enterprise Resource Planning Systems (ERP). ERP systems manage internal and
external resources, including tangible assets, financial resources, materials, customer
information, and human resources data of utility organizations.
Sensus
General Electric
SafeNet Customers:
Southern California Edison
Vectren (ProtectFile)
Security Threat
If not properly secured, smart grid attacks could lead to:
Grid Instability. Large-scale manipulation of smart meters could be used to create instability in the power
grid by falsifying the usage readings to be higher or lower than the actual demand. If meters were to
simultaneously have a dramatic change in draw, it could cause outages across a large area.
Loss of Consumer and Enterprise Privacy. A benefit of the Smart Grid is improved customer service
relationships through more frequent communication between customers and utility companies. This
requires an exchange of personal and account data at some level that could be exploited.
Actionable Energy Usage Data Exposure. Electricity use patterns could lead to disclosure of not only
how much energy customers use but also when theyre at home, at work, or traveling. In residential
deployments, it would be possible to deduce information about personal behaviors and what appliances
are present by monitoring energy usage.
Utility Fraud. Criminals can tap into the network, extract data that could contain executable codes,
configuration information or cryptographic keys, all of which could be stolen or modified. These assets
could be used to manipulate billing or usage data.
36
Integrated Enterprise-Wide
Advanced Control Systems
Smart Grid
Applications
Layer
Application n
Application 3
DR Control System
Application 1
Meter data
(Ex: AMI)
WAN
LAN
(Utility enterprise
network)
Application 2
AMI, MDM
Communications
Layer
FAN/AMI
HAN
Network Gateway
Smart Meter
Power Layer
Generation
Utility
Transmission
Substation
Infrastructure
Distribution
Home/Building
Distributed
Generation and Storage
Consumer
37
Benefits Gained
Security Benefits
Security
Reliability
Redundancy
Privacy
Business Benefits
Increased visibility and
control over the power grid
Compliance with PII
(authentication, signing,
encryption of data), NIST,
FIPS, and NERC audits
Improved budgeting.
Accurate data improves
budgeting and cash flow
projections.
Reduce administrative
costs. Eliminate time spent
checking and validating bills.
Bills are based on accurate
and up-to-date information
Targets
Industries:
Solution Providers:
Use Case
The Smart Grid and HSMs
With Smart Metering, utility companies and consumers can gain increased insight into energy
consumption, cost, and workload across the energy grid. While the two-way flow of information
from meters to the utility company can provide cost savings, increase customer service,
and bolster conservation efforts, the smart grid introduces new vulnerabilities to the utility
infrastructure that could be used maliciously.
SafeNet HSMs are a cost-effective security solution for smart grid deployments. The SafeNet
Luna SA HSM ensures the integrity and security of cryptographic operations in a robust, highavailability appliance. Luna SA is capable of up to 6,000 RSA and 400 ECC transactions per
second and offers optional stand-alone authentication to protect the most demanding security
applications. With the SafeNet Luna SA PKI Bundle solution, product and maintenance costs are
dramatically reduced by combining HSM functionality that usually requires two or more HSMs
into a single HSM bundle of modular functions. For CAs with certificates and root keys, for
example, rather than requiring separate HSMs for key generation and key export for offline and
online root CAs respectively, the requirements can be fulfilled by only one Luna SA HSM, which
stores keys in hardware achieving FIPS 140-2-Level 3 security.
Secure Metering Grid Architecture Overview
Network Operations Centre
PKI Service for
Key Issuance
Technical Benefits
Key management for
deployment of keys
Signing of messages/
software delivery to end
points
SafeNet
HSMs
DR/HA Sites
Collectors
Smart Meters
Command
Center
Collectors
SafeNet
HSMs
Collectors
Meshed
Network
Database/Appliation
Server Encryption
Tokens/SC:
Authenticators
Command
Center
SafeNet
HSE
Deployments similar
to ILM Use Case
SafeNet eToken/Flash/NG-OTP
Production Deployment
Advanced Metering
Central Computer
Collectors
HSM encrypt
collector data
Customer
Information
System (CIS)
38
Benefits of PKI
Building trust in the smart grid with hardware security modules for meter
attestation, PKI and EKM management, and compliance with security mandates
Overview
The smart grid is the first major effort to modernize an energy infrastructure that has
remained largely unchanged over the past several decades. The smart grid creates a network
of links between customers and utility companies that provides increased insight into energy
consumption, cost, and workload across the energy grid.
At a time when energy utilities play an increasingly important role in our everyday lives, smart
grid technologies introduce new security challenges that must be addressed. Implementing a
smart grid without proper security could result in grid instability, loss of private information,
utility fraud, and unauthorized access to energy consumption data. Building a trusted smart
grid will require robust security solutions that can be easily deployed at the communication
and application layers of the smart grid infrastructure.
In the first phase of smart grid deployments, traditional meters will be replaced with smart
meters that can be read remotely, called smart meters. The Advance Metering Infrastructure
(AMI) is the second phase of the smart grid and uses smart meters to enable a two-way
channel of communication between meters and the utility company. Securing this two-way
line of communication is imperative, and will require a solution for authentication and device
attestation to ensure the integrity of the grid.
39
PKI and EKM Key Management. HSMs provide significant cost savings, as HSM functionality
(key generation/offline root/online root/key export) is made available with one device.
Trust Anchor. A local policy database is a set of rules that define how the device can use its
certificate, and what types of certificates it should accept when acting as a relying party.
The LPD would be a signed object, signed and stored within the HSM.
High-availability mode
Encryption and Decryption of Information. AES 256 & ECC 256/384-bit. ECIES key
management and ECDSA signing performance (256-bit curves).
Transaction processing of usage and billing to customers. Provide a trusted path for energy
usage for accurate and secure electronic billing.
Compliance. Compliant with PII, NIST, FIPS, and NERC audits
Remote Management of Meters. Securely update the metering settings, configuration,
security credentials, and firmware of all devices in the AMI System.
Advanced Metering
Central Computer
Collectors
HSM encrypts
collector data
Customer
Information
System (CIS)
HSM
PKI service for key issuance
About
SafeNet
Founded
in 1983, SafeNet is a global leader in information security. SafeNet protects its
HSE for WAN protection
customers
valuable assets, including identities, transactions, communications, data,
Tokensmost
for authentication
and software licensing, throughout the data lifecycle. More than 25,000 customers across
both commercial enterprises and government agencies, and in over 100 countries, trust their
information security needs to SafeNet. For more information, visit www.safenet-inc.com.
Contact Us: For all office locations and contact information, please visit www.safenet-inc.com
Follow Us: www.safenet-inc.com/connected
2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet.
All other product names are trademarks of their respective owners. SB(EN)-12.13.10
40
Customer Problem
Cloud Service Provider
Need to accommodate organizations at all levels of data sensitivity
Need to offer hardware-based cryptographic services
Centralized key management
Granular security polices
Data encryption
Digital signature
Strong authentication and access control
Need to offer validated/certified hardwared-based security with auditing capabilities
Need to offer trustworthy and efficient deployments to their enterprise customers
41
Types of Organizations:
Issues of risk, data privacy, and compliance are the chief inhibitors to most organizations
adoption of cloud services. These concerns can outweigh the potential cost savings of cloud
resources for many organizations. For an enterprise with highly sensitive data to transition to the
cloud, they must first trust that a cloud environment will allow them to preserve their existing
level of encryption and retain full control over security ownership.
With a trusted cloud platform, enterprises can leverage the cloud and get the level of security
needed to stay compliant with all pertinent regulatory mandates and security policies. With
features including robust encryption, secure remote key management, and granular access
control, we create the foundation for a cloud-based infrastructure that meets the security
objectives of every enterprise.
Security Threat
Data location risk
Data loss risk
Data security (privacy) risk
42
SafeNet Partners
Several partners (Amazon, Adobe,
Microsoft, NetApps, and others)
have asked about the possibility
of SafeNet providing a HSM-asa-Service offering. This would
concentrate the skills associated
with configuring and managing
cryptographic devices, while
making them generally available
to enterprise customers for
both on-premises and in-thecloud applications.
Elastic Scalability. Luna SAs partitioning and client registration fully supports multiple
instances of the same VM. Client registration can be scripted and invoked from a secure
management console to automate an elastic response to performance demands.
Hypervisor Support. Luna SA supports the leading hypervisors, including VMware
vSphere, Microsoft Hyper-V, and Citrix XenServer.
Ease of management for lower administrative and operational costs
Remote PED Authentication and Management. Luna SA implements a trusted-path,
multi-factor authentication method for its HSM partitions. This enables flexible remote
management, consistent with virtualized infrastructures. In addition, the Luna PED can
logically connect to an HSM across any network using a secured trusted path.
Secure Transport Mode. Using secure transport mode, Luna SA can be pre-configured,
securely shipped, racked and stacked, and remotely activated for secure deployments
in a third-party data center.
Trusted security
Strong Access Control and Authorization. Luna SA uses industry proven TLS with full
client authentication to provide strong network access controls and authorization for
each client requesting HSM access. To simplify the deployment of this technology, the
Luna SA includes its own internal CA to certify and authorize each clients certificate.
Therefore, no external PKI is required.
Secure Authentication. In addition to the client-level authentication and access control,
each user or process must authenticate using a secure challenge-response mechanism
to gain access to the keys in a particular HSM partition.
In-Hardware Key Storage. Luna SA secures more keys, deeper in the hardware than
ever before by utilizing a special, SafeNet-designed, tamper-proof ASIC cryptographic
processor.
Performance and reliability helping to keep up with demands to the cloud infrastructure
Marketing Leading Performance. A single Luna SA 5.0 device is capable of up to 6,000
RSA 1024-bit transactions per second and up to 1,200 RSA 2048-bit transactions per
second. Luna SA 5.0 processes over 400 384-bit ECC transactions per second (the
security equivalent of RSA 7680-bit).
High Availability and Load Balancing. Luna SA has a high-availability and loadbalancing mode that allows multiple Luna SA units to group as a logical set. This
feature aids in the deployment of virtual services by delivering the reliability and
performance required in a highly virtualized infrastructure. A three unit, highavailability setup can triple transaction performance, enabling processing speeds of
up to 18,000 RSA 1024-bit, 3,600 RSA 2048-bit, and 2,400 384-bit ECC transactions per
second. Clients communicate to partitions in the group as if it is a single HSM, and the
Luna SA automatically keeps key material synchronized and load-balances requests
across the set.
Code Signing HSM Reference Guide
43
SafeNet Value
SafeNets network-based
HSM, the Luna SA, has been
architected in a manner that
enables virtualization and
cloud deploymentsoffering
customers advanced future sets
that will scale with their business
needs, high levels of certification,
auditability, non-repudiation, and
ease of remote management.
SafeNet HSMs also support
the leading virtual platforms
including Citrix XenServer,
Microsoft Hyper-V, and VMware
vSphere.
Cloud providers have been moving towards the concept of enabling on-premise HSMs for
securing their cloud-hosted applications. Bringing the security benefits of a HSM onto
virtualized platforms can greatly reduce the costs of traditional in-house deployment, making
cloud solutions a viable and cost-effective option for organizations with even the most sensitive
data. With SafeNets Luna SA, providers can offer their clients a solution for central key and
policy management, robust encryption support, and flexible integration that we define as
Cryptography-as-a-Service.
For enterprise organizations, as they look to the cloud to reduce costs, increase reliability,
and provide flexibility with cloud solutions, HSMs in the cloud infrastructure provide a strong
foundation of protection. The Luna SA HSM, manages cryptographic keys, access control, and
other security policies. Deployed in a cloud environment, the Luna SA protects assets at the data
level while allowing for full remote security administration through the use of a remote PIN entry
device (PED).
The Luna SA HSM is ideally suited for use in a virtualized infrastructure. The Luna SA includes
multiple features to enable virtualization:
Support for 100 client machines independent of their physical or virtual nature
Support for 20 partitions that directly map to distinctly separate logical HSMs for virtual
machines (100 in future releases)
Support for high availability and load balancing to deliver the reliability and scalable
performance demanded by a virtualized infrastructure
Remote management capabilities enabling strong separation between infrastructure
administration and security roles associated with HSMs
Supports the leading hypervisors, including VMware vSphere, Microsoft Hyper-V, and Citrix
XenServer
Support for elastic scaling of identical VM instances and concurrent re-use of client
registrations
Elastic Compute
HSM
HSM
Client
Enterprise
Cloud Provider
Luna SA
HSM
Client
NTLS Link
Virtual
Machine
A
Partition
Sharing
Virtual
Machine
B
Partition
#1
Partition
#2
Dedicated
Partition
Virtual
Machine
C
Partition
#3
Partition
#4
Virtual
Machine
D
Virtual
Machine
2
Partition
#100
HSM HA Group
Luna SA
Luna SA
Contact Us: For all office locations and contact information, please visit www.safenet-inc.com
Follow Us: www.safenet-inc.com/connected
2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet.
All other product names are trademarks of their respective owners. RG(EN)-11.23.10
44
Contact Us: For all ofce locations and contact information, please visit www.safenet-inc.com
Follow Us: www.safenet-inc.com/connected
2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet.
All other product names are trademarks of their respective owners. RG-HSM Reference Guide-11.23.10