Oasis' open Enterprise Key Management Infrastructure initiative promises less-complex encryption. But will vendors get on board?
STRENGTH IN COMPLEXITY
There are, of course, obstacles that must still be overcome by EKMI proponents. For example, the proposed components are somewhat simple by design, which concerns some encryption purists who prefer more complex protocols, on the logic that they're more difficult to break into.
In addition, enterprises deploying an extremely sensitive system of this type that houses the keys to the kingdom will need to pay great attention to detail when hardening platforms and operating systems, a step strongly recommended by the Oasis technical committee. Failover and redundancy must also be considered during deployment to ensure availability.
Assigning these functions to an open set of protocols is asking for quite a big change in both technology and mind-set.
Then there are the problems associated with any open standard. Although published and commented on, some of the technological specifications that have been in use since the inception of the Internet aren't always implemented in, shall we say, strict adherence to their original guidelines. Integrating EKMI into the required clients for encryption of applications, endpoints, backup systems, and so on will require the cooperation of major application vendors. These entities--some of them fierce competitors--historically haven't been the most collaborative of groups. Not surprisingly, as of press time, there have been no large-scale public endorsements of EKMI, though Oracle is a member of Oasis.
The Enterprise Key Management Infrastructure initiative is intended to improve information security through more effective deployment and management of enterprise encryption. Automating the interaction between encryption clients and a key management system may lead to reduced administrative overhead, a more attractive total cost of ownership for encryption, and softening of some of the concerns around encryption technologies.
EKMI is being driven by Oasis, and a diverse group of well-respected names in security and top-tier organizations is represented on the technical committee--for example, Red Hat, Wells Fargo, and the U.S. Department of Defense. The project would likely benefit from a more public endorsement from major encryption vendors, including Entrust and VeriSign.
The overall objective is consolidation of key management functions through open standards, combined with the use of APIs and a standard markup language. The drafts should be fully reviewed and published in final form within the next year. Implementation will not be a short-term project, and EKMI is not suited to every environment. Larger encryption infrastructure deployments will benefit the most.
This reticence could create a delay in full implementation of EKMI, but we don't see it bringing the entire effort to a halt. The overall concept and design of EKMI are sound, and the open nature of the protocols is very appealing to those who manage the behind-the-scenes aspects of security countermeasures. As a standard, it could be of significant value when combined with the appropriate systems. The Oasis technical committee consists of a variety of individuals and organizations with impressive backgrounds in encryption and information protection, including the committee chair, Arshad Noor of StrongAuth. The diversity of the membership, ranging from software development companies to financial institutions and large government agencies, reflects the current push to adopt encryption for protecting valuable information.
Also working in EKMI's favor are recently publicized breaches and the trend for more statutory controls on the privacy of personal information, both of which are driving organizations to apply stronger data protection. We must now assume that all perimeter defenses are vulnerable, if not because of flawed technologies, then by way of the redefinition of the perimeter: The simple model of "inside, outside, and DMZ" is no longer viable as partner connectivity grows and customer-level access is increased.
Encryption represents a final level of protection. Even if data is lost or stolen, it's of no value to the holder without the decryption key. EKMI is a valuable component in the operational and management aspects of encryption, and organizations with complex encryption requirements ought to start putting pressure on their application and security vendors to support the initiative.
For now, we recommend following updates on the Oasis Web site or, if possible, joining the organization to provide input. As you purchase new security systems, those with less-proprietary interfaces will best lay the groundwork for EKMI.
David Brown is a managing consultant, security solutions, at Forsythe and has more than 20 years of experience in information security and related IT fields. Write to him at email@example.com.
Photo by Jupiterimages
2 of 2