11.04.2014 Views

Customs Declaration Processing System Detailed User and ...

Customs Declaration Processing System Detailed User and ...

Customs Declaration Processing System Detailed User and ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

DETAILED USER & TECHNICAL REQUIREMENTS FOR CDPS<br />

AND USE-CASE MODELS<br />

Ref: PHASE V<br />

5.2.5.1.3Authentication <strong>and</strong> Digital Certificates<br />

As explained above, user authentication can be done with (i) username <strong>and</strong> password, <strong>and</strong> (ii)<br />

digital certificates.<br />

For the external domain it is strongly recommended that digital certificates are used for user<br />

authentication.<br />

<strong>User</strong>s from the external domain can use the same digital certificates for digital signatures too.<br />

Digital signatures prove the origin <strong>and</strong> integrity of data, <strong>and</strong> also provide non-repudiation security<br />

service. According to the Macedonian law [R18], digital signatures have the same validity as h<strong>and</strong>written<br />

signatures. Digital certificates need to be issued by a certified Certificates Issuing Authority,<br />

such as Komercijalna Banka AD Skopje, KIBS AD Skopje, AD Makedonski Telekomunikacii,<br />

GlobalSign, Verisign.<br />

Each user must sign a document which contains the public key from his/her digital certificate. Prior<br />

to any data exchange between CDPS <strong>and</strong> any application from the External Domain it is necessary<br />

that MCA <strong>and</strong> the partners from the External Domain exchange the public key from their digital<br />

certificates.<br />

The digital certificate must be stored on a tamper-proof security device from which it cannot be<br />

copied.<br />

5.2.5.2 Requirements<br />

This section highlights the security requirements for CDPS..<br />

Number<br />

SR-0010<br />

SR-0020<br />

SR-0030<br />

Description<br />

MCA must provide <strong>and</strong> guarantee the security of each CDSP module, e.g. by<br />

deploying firewalls.<br />

CDPS has to take the following security policies into account:<br />

• The IT <strong>and</strong> non-IT CDPS resources <strong>and</strong> assets must be protected from<br />

unauthorised access.<br />

• Precautions must be taken to ensure that confidential information is erased<br />

from CDPS applications <strong>and</strong> tools as soon as it is no longer required.<br />

• Controls should be implemented to ensure that information supplied to<br />

CDSP systems <strong>and</strong> tools is accurate <strong>and</strong> consistent with other information<br />

stored elsewhere in CDPS;<br />

• Data that is passed between two processing stages, does so without<br />

alteration, loss, or addition;<br />

• The CDPS architecture must be designed <strong>and</strong> managed so as to ensure<br />

continuity of service;<br />

• Controls must exist to limit the impact of a Denial of Service attack mounted<br />

against any CDPS resources;<br />

• Transit information should be exchanged only between entities that have<br />

been mutually authenticated;<br />

• Information that is exchanged should be protected from unauthorised<br />

disclosure, loss, or alteration.<br />

The requirements of particular importance concern (a) maintaining the<br />

confidentiality of confidential information regarding Trader <strong>and</strong> Guarantor<br />

relationships, (b) user identification <strong>and</strong> authentication information, <strong>and</strong> (c)<br />

information which may facilitate fraud.<br />

The following security policies, deduced from the [A07], are relevant:<br />

• All IT users must be uniquely identifiable;<br />

Page 140/276

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!