19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

Key recovery<br />

If the keys used for encryption are lost, this generally also means that the data<br />

protected by the keys is also lost. In the commercial versions, 5.0 or higher,<br />

PGP includes functions for retrieving data in such instances. <strong>The</strong>se functions<br />

are also referred to as key recovery functions. <strong>The</strong> functionality they offer can<br />

prevent the loss of data by recovering stored, encrypted data in the event of a<br />

key or access password being lost.<br />

If it is intended to use the recovery function, either one or two additional keys<br />

(ADKs, additional decryption keys) have to be generated. During key<br />

generation, these additional keys are attached to the newly created keys, and<br />

all data that is encrypted with the new keys additionally incorporates<br />

encryption of the session key with the ADKs. In this way it is possible in an<br />

emergency to decrypt the data using the ADKs, without using the original key.<br />

PGP is therefore able to offer a message recovery function without the need<br />

for central storage of retrieval information.<br />

Use of key recovery can be enforced by making presettings to that effect on<br />

the clients, ensuring that this functionality cannot be circumvented by<br />

individual users. In that case, however, the security of the whole encryption<br />

system is dependent on the confidentiality of the ADKs. If the ADKs are<br />

revealed, they can be used to decrypt all of the data.<br />

In order to prevent misuse of this highly sensitive function it is essential that<br />

the ADKs should be protected by a particularly carefully chosen, safely kept<br />

password. In addition, as of PGP Version 6.0, keys can also be divided into<br />

several parts, which means that several people have to take action jointly in<br />

order to use them. This form of the two-person control rule should always be<br />

used when ADKs are used. To give further protection, provision can be made<br />

for users to be warned every time that they encrypt data with a key to which<br />

ADKs are attached.<br />

Before PGP is used with key recovery, the advantages and disadvantages<br />

should be weighed up against each other. On the one hand it protects against<br />

the loss of data as a result of losing a key, but on the other it creates a central<br />

weak point in the encryption system. This function should therefore only be<br />

used if PGP is used for encrypting stored data. If it is used solely for securing<br />

communications, in the event of the loss of a key is it also possible simply to<br />

request that the e-mail be sent again. It should also be examined whether as an<br />

alternative it would not be preferable to keep the password in a safe place in a<br />

sealed envelope and to create backup copies of the private key files.<br />

Additional controls:<br />

- Are users trained in the use of PGP?<br />

- Are the data and keys stored separately?<br />

- Are backup copies made of the private keys? Are these kept at a secure<br />

location?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!