Microsoft Windows Server 2008 PKI and Deploying the Ncipher Hardware Security Module
Total Page:16
File Type:pdf, Size:1020Kb
This is a joint nCipher and IdentIT authored whitepaper Microsoft Windows Server 2008 PKI and Deploying the nCipher Hardware Security Module Abstract This paper discusses the benefits that are unique to deploying the integrated solution of the Windows Server 2008 PKI and the nCipher nShield and netHSM hardware security modules (HSM). This includes the essential concepts and technologies used to deploy a PKI and the best practice security and life cycle key management features provided by nCipher HSMs.. MicrosofT WIndoWs server 2008 PKI and dePloyIng The nCipher hardWare seCurity Module Introduction...............................................................................................................................................................................................3 PKI – A Crucial Component to Securing e-commerce ......................................................................................................................4 Microsoft Windows Server 2008 ...............................................................................................................................................................4 nCipher Hardware Security Modules ......................................................................................................................................................4 Best.Practice.Security.–.nCipher.HSMs.with.Windows.Server.2008.PKI................................................................................5 Overview...............................................................................................................................................................................................................5 Hardware vs. Software ...................................................................................................................................................................................5 Statutory and Regulatory Requirements ...............................................................................................................................................5 Windows.Server.2008.PKI.....................................................................................................................................................................7 Overview...............................................................................................................................................................................................................7 Windows Server 2008 Active Directory Certificate Services Role Services .............................................................................7 Active Directory Domain Services .............................................................................................................................................................8 What’s New in Certificate Services for Windows Server 2008............................................................... ......................................8 Hardware Security Modules ..................................................................................................................................................................... 10 HSM Form Factors ......................................................................................................................................................................................... 10 How.Hardware.Security.Modules.Integrate.with.Microsoft.Windows.Server.2008......................................................11 Integration with Active Directory Certificate Services Role Services ...................................................................................... 11 Deploying nCipher nShield HSMs for each CA in the CA Hierarchy ....................................................................................... 12 Deploying an nCipher netHSM for all CAs in the CA Hierarchy ................................................................................................ 12 Deploying a mix of nShields and netHSMs ....................................................................................................................................... 13 Integration with Online Responders..................................................................................................................................................... 14 CryptoAPI .......................................................................................................................................................................................................... 14 CAPICOM ........................................................................................................................................................................................................... 15 .NET Framework Cryptography ............................................................................................................................................................... 16 Cryptography Next Generation (CNG) ................................................................................................................................................. 16 Hardware Cryptographic Service Provider (CSP) .............................................................................................................................. 18 nCipher.Hardware.Security.Modules..............................................................................................................................................19 Overview............................................................................................................................................................................................................ 19 nCipher Security World – A Key Management Framework ........................................................................................................ 19 Security World Key Management Concepts ...................................................................................................................................... 20 Key Access and Storage............................................................................................................................................................................... 21 Key Life Cycle Management Features ................................................................................................................................................... 22 Key Security ...................................................................................................................................................................................................... 23 Key Generation .............................................................................................................................................................................................. 23 Shared Management and Role Separation ........................................................................................................................................ 23 The Ability to Support Key Policy ........................................................................................................................................................... 23 Secure and Simple Backup of Private Keys ......................................................................................................................................... 23 Secure and Simple Disaster Recovery ................................................................................................................................................... 24 Load Balancing ................................................................................................................................................................................................ 24 Failover ............................................................................................................................................................................................................... 24 Standards Compliance ................................................................................................................................................................................ 24 Scalability .......................................................................................................................................................................................................... 24 The.Synergy:.Windows.Server.2008.PKI.and.nCipher.HSMs...................................................................................................25 APPENDIX.................................................................................................................................................................................................27 Table 1.0 Supported Asymmetric Encryption Algorithms ........................................................................................................... 27 Table 2.0 Supported Symmetric Encryption Algorithms ............................................................................................................. 27 Table 3.0 Supported Hash Function Algorithms ............................................................................................................................. 28 Table 4.0 Supported Digital Signature Algorithms ........................................................................................................................ 29 Table 5.0 Supported Key Agreement Algorithms ...........................................................................................................................