Data Centric Security Architecture - AFCEA€¦ · Data Centric Security Architecture. Bonn, 17....

24
OFFEN BMVg CIT II 1 Data Centric Security Architecture Bonn, 17. November 2016 Oberstleutnant i.G. Stefan Eisinger AFCEA Zukunfts- und Technologieforum

Transcript of Data Centric Security Architecture - AFCEA€¦ · Data Centric Security Architecture. Bonn, 17....

Page 1: Data Centric Security Architecture - AFCEA€¦ · Data Centric Security Architecture. Bonn, 17. November 2016 . Oberstleutnant i.G. Stefan Eisinger . AFCEA Zukunfts- und Technologieforum

OFFEN

BMVg CIT II 1

Data Centric Security Architecture Bonn, 17. November 2016

Oberstleutnant i.G. Stefan Eisinger

AFCEA Zukunfts- und Technologieforum

Page 2: Data Centric Security Architecture - AFCEA€¦ · Data Centric Security Architecture. Bonn, 17. November 2016 . Oberstleutnant i.G. Stefan Eisinger . AFCEA Zukunfts- und Technologieforum

OFFEN

Gliederung

• Problemstellung

• Data Centric Security (DCS) – DEU Ansatz

• Weiteres Vorgehen

2

Page 3: Data Centric Security Architecture - AFCEA€¦ · Data Centric Security Architecture. Bonn, 17. November 2016 . Oberstleutnant i.G. Stefan Eisinger . AFCEA Zukunfts- und Technologieforum

OFFEN

Klassifizierung von Informationen Nicht-technische Anwendung von

Einstufungskriterien

Klassifizierung von Systemen IT-basierter Schutz von Daten bis zu

einer bestimmten Sicherheitseinstufung

Klassifizierung von Daten

Definition der Schutzbedürftigkeit gespeicherter Daten

Mission Secret

Mission Restricted

Klassifizierung von Informationen

3

Schutz von Gesamtsystemen wird realem Schutzbedarf der

Datenobjekte nicht gerecht.

Page 4: Data Centric Security Architecture - AFCEA€¦ · Data Centric Security Architecture. Bonn, 17. November 2016 . Oberstleutnant i.G. Stefan Eisinger . AFCEA Zukunfts- und Technologieforum

OFFEN

RS Secret

Grundsatz „Need-To-Know“

• Maximaler Schutzbedarf für alle Daten

wird unterstellt. • Labelling in Systemen nicht

umgesetzt.

4

Realer Schutzbedarf der Daten wird ignoriert. Herausforderung: Operative Nutzbarkeit;

Page 5: Data Centric Security Architecture - AFCEA€¦ · Data Centric Security Architecture. Bonn, 17. November 2016 . Oberstleutnant i.G. Stefan Eisinger . AFCEA Zukunfts- und Technologieforum

OFFEN

Incident Management Prozess in Resolute Support (RS)

5

Weitergabe wichtiger Lageinformation an mobile taktische Ebene

derzeit technisch nur eingeschränkt möglich.

Page 6: Data Centric Security Architecture - AFCEA€¦ · Data Centric Security Architecture. Bonn, 17. November 2016 . Oberstleutnant i.G. Stefan Eisinger . AFCEA Zukunfts- und Technologieforum

OFFEN

IT-Service Management (ITSM) im multinationalen Umfeld

Austausch von ITSM-Informationen zwischen IT-Service Providern

über unterschiedlich klassifizierte Netzwerke derzeit nicht möglich.

6

Page 7: Data Centric Security Architecture - AFCEA€¦ · Data Centric Security Architecture. Bonn, 17. November 2016 . Oberstleutnant i.G. Stefan Eisinger . AFCEA Zukunfts- und Technologieforum

OFFEN

Federated Mission Networking (FMN)- Operative Forderungen

1. Permit sharing of commander’s intent and communication of mission orders.

2. Provide mission participants with situational awareness and a planning environment.

3. Provide an environment in which mission participants use their own tools linked to authoritative data sources.

4. Rapidly create a single information sharing environment.

5. Exchange information between the mission environment and other information domains.

7

Page 8: Data Centric Security Architecture - AFCEA€¦ · Data Centric Security Architecture. Bonn, 17. November 2016 . Oberstleutnant i.G. Stefan Eisinger . AFCEA Zukunfts- und Technologieforum

OFFEN

Gliederung

• Problemstellung

• Data Centric Security (DCS) – DEU Ansatz

• Weiteres Vorgehen

8

Page 9: Data Centric Security Architecture - AFCEA€¦ · Data Centric Security Architecture. Bonn, 17. November 2016 . Oberstleutnant i.G. Stefan Eisinger . AFCEA Zukunfts- und Technologieforum

OFFEN

DEU Ansatz - Zieldefinition

9

Page 10: Data Centric Security Architecture - AFCEA€¦ · Data Centric Security Architecture. Bonn, 17. November 2016 . Oberstleutnant i.G. Stefan Eisinger . AFCEA Zukunfts- und Technologieforum

OFFEN

Gefährdungsprofile

10

Page 11: Data Centric Security Architecture - AFCEA€¦ · Data Centric Security Architecture. Bonn, 17. November 2016 . Oberstleutnant i.G. Stefan Eisinger . AFCEA Zukunfts- und Technologieforum

OFFEN

Funktionale IT-Sicherheitsarchitektur (FITSA)

11

Konzept FITSA beschreibt notwendige funktionale Bausteine zur

Realisierung einer DCS.

Funktionaler Baustein Funktionale Elemente

Legende

Page 12: Data Centric Security Architecture - AFCEA€¦ · Data Centric Security Architecture. Bonn, 17. November 2016 . Oberstleutnant i.G. Stefan Eisinger . AFCEA Zukunfts- und Technologieforum

OFFEN

Gliederung

• Problemstellung

• Data Centric Security (DCS) – DEU Ansatz

• Weiteres Vorgehen

12

Page 13: Data Centric Security Architecture - AFCEA€¦ · Data Centric Security Architecture. Bonn, 17. November 2016 . Oberstleutnant i.G. Stefan Eisinger . AFCEA Zukunfts- und Technologieforum

OFFEN

Ergebnisse in 2016

13

? NS Network

NR Tracks NS Tracks NR Network

NR Tracks

Friendly Force Tracking (FFT)

DCA/DCI DEU Mission PKI

Coalition Warrior Interoperability eXploration, eXperimentation, eXamination, eXercise (CWIX)

Page 14: Data Centric Security Architecture - AFCEA€¦ · Data Centric Security Architecture. Bonn, 17. November 2016 . Oberstleutnant i.G. Stefan Eisinger . AFCEA Zukunfts- und Technologieforum

OFFEN

Fazit CWIX 2016

1. Permit sharing of commander’s intent and communication of mission orders

2. Provide mission participants with situational awareness and a planning environment

3. Provide an environment in which mission participants use their own tools linked to authoritative data sources

4. Rapidly create a single information sharing environment 5. Exchange information between the mission environment

and other information domains

Wesentliche Funktionalitäten in Einzelsystemen getestet.

Integration in einen Demonstrator für CWIX 2017 ist anzustreben.

14

Page 15: Data Centric Security Architecture - AFCEA€¦ · Data Centric Security Architecture. Bonn, 17. November 2016 . Oberstleutnant i.G. Stefan Eisinger . AFCEA Zukunfts- und Technologieforum

OFFEN

CWIX 2017 – Fokus

15

Wesentliche funktionale Bausteine einer DCS stehen im Fokus der

CWIX 2017.

Funktionaler Baustein Funktionale Elemente

Legende

Fokus CWIX 2017

Page 16: Data Centric Security Architecture - AFCEA€¦ · Data Centric Security Architecture. Bonn, 17. November 2016 . Oberstleutnant i.G. Stefan Eisinger . AFCEA Zukunfts- und Technologieforum

OFFEN

CWIX 2017 -Fokus

• Funktionale Forderungslage (FüUstgKdoBw) o „Labelling“ und „Binding“

o Trust Models

o National Mission Public Key Infrastructure

o Border Policy Enforcement Point

o Datenobjekte:

o SMC Data (ITSM-records in XML-Format) o File Service (xls, doc, ppt) o Tactical Data (FFT)

o HAFIS-konforme Architektur

16 16

Page 17: Data Centric Security Architecture - AFCEA€¦ · Data Centric Security Architecture. Bonn, 17. November 2016 . Oberstleutnant i.G. Stefan Eisinger . AFCEA Zukunfts- und Technologieforum

OFFEN

Erfahrungen

Neue Technologien

Status: Beschaffung

Status: Entwicklung

Neues Paradigma

Neuer Ansatz: HaFIS/GMN

Harmonisiertes Führungs- und Informationssystem (HaFIS)

17

Integration in HaFIS als wesentliche Herausforderung.

Page 18: Data Centric Security Architecture - AFCEA€¦ · Data Centric Security Architecture. Bonn, 17. November 2016 . Oberstleutnant i.G. Stefan Eisinger . AFCEA Zukunfts- und Technologieforum

OFFEN

Die nächsten Schritte…

Sachstand durch FüUstgKdoBw erarbeitet sowie multinational in Teilen abgestimmt.

Ziel: Ministeriell Abstimmen und Festlegen der Federführung noch in 2016!

18

Referenz-architektur 2016

Technische Realisierung Demonstrator

2017 Multinationale Standards 2019

Page 19: Data Centric Security Architecture - AFCEA€¦ · Data Centric Security Architecture. Bonn, 17. November 2016 . Oberstleutnant i.G. Stefan Eisinger . AFCEA Zukunfts- und Technologieforum

OFFEN

BMVg CIT II 1

Data Centric Security Architecture Bonn, 17. November 2016

Oberstleutnant i.G. Stefan Eisinger

AFCEA Zukunfts- und Technologieforum

Page 20: Data Centric Security Architecture - AFCEA€¦ · Data Centric Security Architecture. Bonn, 17. November 2016 . Oberstleutnant i.G. Stefan Eisinger . AFCEA Zukunfts- und Technologieforum

OFFEN

Backup Folien

Page 21: Data Centric Security Architecture - AFCEA€¦ · Data Centric Security Architecture. Bonn, 17. November 2016 . Oberstleutnant i.G. Stefan Eisinger . AFCEA Zukunfts- und Technologieforum

OFFEN

Coalition Domain

Szenario 1: Coalition Partner w/o Trust

Coalition partner A

Coalition partner B

Scenario 1: No trust between coalition partner A + B Mission PKI @partner A does not reach out to partner B

1. bPEP @ partner A checks for releasability/security label 2. bPEP breaks label, decrypts data object, encrypts with coalition domain distributed

symmetric key (SYM KEY) 3. bPEP sends data object to partner B 4. bPEP @ partner B decrypts data object and label is bound to data object @ partner B via

national cryptographic means

bPEP

bPEP

bPEP: Border policy enforcement point

Certification Authority

Certification Authority

SYM

SYM

MISSION SECRET

MISSION SECRET

Data 1 3 2 4

21

Data

Page 22: Data Centric Security Architecture - AFCEA€¦ · Data Centric Security Architecture. Bonn, 17. November 2016 . Oberstleutnant i.G. Stefan Eisinger . AFCEA Zukunfts- und Technologieforum

OFFEN

Coalition Domain

Scenario 2: Coalition Partner w/ full Trust

Coalition partner A – option A

afiiliate

Coalition partner B – option A

affiliate

Scenario 2: Full trust between coalition partner A + B, coalition domain is secure no SYM Key necessary Mission PKI @partner A reaches out to partner B

1. bPEP @ partner A checks for releasability/security label 2. data releasable to bPEP @ partner B 3. bPEP @ partner B can check labeling due to CA-trust 4. Partner B can utilize data

bPEP

bPEP

bPEP: Border policy enforcement point

Certification Authority (CA)

Certification Authority (CA)

SYM

SYM

MISSION SECRET MISSION SECRET

Data 1 3 2

Cross certified

4

22

Data

Page 23: Data Centric Security Architecture - AFCEA€¦ · Data Centric Security Architecture. Bonn, 17. November 2016 . Oberstleutnant i.G. Stefan Eisinger . AFCEA Zukunfts- und Technologieforum

OFFEN

Coalition Domain

Scenario 3: Blue to Green Forces

Coalition partner A

Green Forces

Scenario 4: Coalition partner A+B perform Blue-to-Green communication 1. bPEP @ partner A checks releasability (unclassified) and breaks binding 2. Strip label from data object 3. Send “clear text” data object to partner B

bPEP

bPEP

bPEP: Border policy enforcement point

Certification Authority (CA)

SYM

SYM

Unclassified

MISSION SECRET

Data 1 3 2

23

Data

Page 24: Data Centric Security Architecture - AFCEA€¦ · Data Centric Security Architecture. Bonn, 17. November 2016 . Oberstleutnant i.G. Stefan Eisinger . AFCEA Zukunfts- und Technologieforum

OFFEN

Coalition Domain

Szenario 4: Friendly-Force-Tracking

Coalition partner A

Mobile Tactical Units

Scenario 5: Coalition partner A+B perform Friendly-Force-Tracking 1. bPEP @ partner A checks releasability (RESTRICTED, rel. to mobile/tactical element) and

breaks binding 2. Strip label from data object 3. Send “clear text” data object to mobile tactical units

bPEP

bPEP

bPEP: Border policy enforcement point

Certification Authority (CA)

SYM

SYM

MISSION RESTRICTED

MISSION SECRET

Data 1 3 2

24

Data