SESSION ID: ACB-F03 Scaling Key Management: Thousands of Clients, Trillions of Operations Yaron Sheffer Director, Security Technologies Product Development Intuit @yaronsheffer #RSAC #RSAC Intuit A global financial platform company Maker of More than 50M customers trust us with their financial data Steadfast commitment to security Strategic move to the AWS cloud Acquired Israeli security startup Porticor in Feb. 2015 2 #RSAC IDPS, Intuit Data Protection Service Secret and Key Management service – Storage for secrets and encryption keys – Cryptographic operations Client Application Key Management Key Storage For highly sensitive data we require both transparent disk-level and application-level data encryption #RSAC Core Features #RSAC Where to Encrypt Fetch the key into the client, then encrypt Alternatively, send the data to be encrypted on the KM service Derive Instead: RDLE – Remote Derive, Local Encrypt Fine-grain keys: implications on threat model – Spatial granularity Also on performance, scalability 5 Encrypt Client KMS #RSAC Temporal Granularity: Key Versions New key version every 90 days Key versioning vs. re-encryption (vs. “key rotation”) Versioning is automated, saved as part of a ciphertext header – No industry standard, sigh Fixed Key Header Version Nonce Ciphertext Versioning works well with probabilistic encryption More challenging with deterministic encryption 6 Auth Tag #RSAC Managing Keys Each project receives a strictly segregated namespace A namespace is a hierarchy of folders and keys – Keys consist of multiple key versions Keys can be created, listed etc. with a UI and a REST API Role-based access control at the folder level Custom permissions e.g. read public-key only 7 #RSAC Client Authentication Initially, had an OAuth1-like message signing – Assert long-term credentials, obtain a short-term bearer token Found out this is not workable: turtles all the way down Built a separate policy authentication service – Policy: AWS role plus additional properties – Good for: EC2 instances, Lambda functions, Docker containers, more Now being reused for other internal services 8 #RSAC The Customer View IDPS only used by internal customers SDK: Java, Python, Go, JavaScript – Using the REST API directly is hard UI and a CLI tool for secret management No manual handling of keys Enterprise-wide governance 9 Why Have Your Own KMS? 10 #RSAC #RSAC Service Architecture #RSAC The Architectural Journey 1. Virtual Appliance (VA) owned by customer, 2. Fully managed master key service, including VA clusters Client VAVA Cluster Cluster Customer Customer 3. End-to-end secrecy Client 4. Multitenant key derivation VAVA Cluster Cluster Customer Customer 13 Virtual Key Mgmt Key Storage IDPS IDPS IDPS #RSAC Evolving Key Derivation Need a deterministic function of a secret (“root key”) and a non-secret input, returning a secret derived key – With several security guarantees HKDF, RFC 5869 How to do it in a shared environment? Oblivious PRF! The service uses a blinded version of the root key to derive a subkey – Which is then unblinded by the client 13 #RSAC IDPS Technology EC2 instances – Formerly also hosted in a traditional data center RHEL, moving to Amazon Linux 2 Go – Including most crypto code On the client side, primarily Java – Bouncy Castle for the crypto code – Apache Commons Crypto for performance Moved from CloudFormation to Terraform 14 #RSAC Developed for Security #RSAC Security Principles IDPS is primarily about securing applications, not users Keys are only in the clear when used Cryptography is bog standard – When in doubt, call a cryptographer 16 #RSAC Security Principles Humans are fallible – Dev/ops separation – No access to encryption keys, by anybody 17 Security Infrastructure: Intuit Large scale AWS account management – Including centralized SSO Automated policy enforcement – Both via tickets and real-time technical intervention Internal red team Strong compliance org/culture Cost tracking tools 18 #RSAC Security Infrastructure: Unique to IDPS Zoning and containment: multiple separate AWS accounts SELinux – A strict custom policy reduces risk from code vulns and Golang zero days Dedicated instances – They come at a cost The Meltdown/Spectre family of issues validated these decisions 19 #RSAC Security Infrastructure: Unique to IDPS (Cont.) Very conservative: no Lambda functions, no containers – But we su

pdf文档 2020_USA20_ACB-F03_01-scaling-key-management-thousands-of-clients-trillions-of-operations

安全研究库 > 国外研究报告 > 应用加密和区块链 > 文档预览
24 页 0 下载 23 浏览 0 评论 0 收藏 3.0分
温馨提示:如果当前文档出现乱码或未能正常浏览,请先下载原文档进行浏览。
2020_USA20_ACB-F03_01-scaling-key-management-thousands-of-clients-trillions-of-operations 第 1 页 2020_USA20_ACB-F03_01-scaling-key-management-thousands-of-clients-trillions-of-operations 第 2 页 2020_USA20_ACB-F03_01-scaling-key-management-thousands-of-clients-trillions-of-operations 第 3 页 2020_USA20_ACB-F03_01-scaling-key-management-thousands-of-clients-trillions-of-operations 第 4 页 2020_USA20_ACB-F03_01-scaling-key-management-thousands-of-clients-trillions-of-operations 第 5 页
下载文档到电脑,方便使用
还有 19 页可预览,继续阅读
本文档由 张玉竹2022-04-08 10:14:39上传分享
给文档打分
您好可以输入 255 个字符
安信天行文库的中文名是什么?( 答案:安信天行 )
评论列表
  • 暂时还没有评论,期待您的金玉良言