WWW.DISSERTATION.XLIBX.INFO
FREE ELECTRONIC LIBRARY - Dissertations, online materials
 
<< HOME
CONTACTS



Pages:   || 2 |

«The Hidden Costs of Self-Signed SSL Certificates Why self-signed certificates are much costlier—and riskier—than working with a trusted security ...»

-- [ Page 1 ] --

The Hidden Costs of Self-Signed SSL Certificates

Why self-signed certificates are much costlier—and riskier—than working with a trusted security vendor

Introduction

Even when business is booming, smart companies always have an eye on the bottom line and look for

ways to reduce costs. Security is not usually one of the first places companies look to trim expenses, but

some IT professionals believe that they can easily lower cash outlays by eliminating third-party Secure

Sockets Layer (SSL) Certificate Authorities (CAs) from the budget equation.

While spending money on SSL security for external facing sites—such as the company home page or e- commerce pages—still seems necessary, some IT professionals think that self-signed SSL certificates are an acceptable alternative for internal sites. They believe that, since only internal employees have access to servers that host internal-facing sites such as intranet portals and wikis, self-signed certificates provide adequate protection at practically no cost.

However, this kind of reasoning can backfire—badly.

The total cost of ownership (TCO) of an SSL certificate is far more than just the price of the certificate.

From security hardware, to management software, to data center space and more, the costs of establishing a secure self-signing architecture can quickly add up. Not only that, but a do-it-yourself approach to SSL security may put an organization at risk—from both a technical and business perspective—in a variety of ways.

This paper explores the true TCO for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor. Before a company decides to use self-signed certificates, these issues deserve careful consideration.

Third-Party Verified Versus Self-Signed Certificates When the SSL protocol debuted in 1995, the world finally had a foundation for a safe and secure way to transact business over the web. Since then, SSL has evolved to be the single most important authentication protocol used in web-based transactions.

Why is SSL necessary? Most web traffic goes over the Internet in an unencrypted form. This means that anyone with sufficient technical expertise and tools can easily “eavesdrop” on the conversations between two parties. SSL security encrypts the data moving between a web server and a browser, making it extremely difficult to intercept and decode the information.

However, SSL security goes beyond mere encryption. From a purely technical perspective, Public Key Infrastructure (PKI) does an excellent job of safeguarding data transfers, but it leaves a gaping hole in the security of a transaction. How can parties to the transaction be sure they are communicating with the proper participants? For example, if a customer is trying to purchase an expensive camera at the web site of an online retailer, the business must be able to confirm its identity to the customer.

Otherwise, the customer’s credit card information is encrypted when in transit, but if the retailer’s web site has been spoofed, all of that well-encrypted data may be sent to a cybercriminal who can easily decrypt it.

This is where the importance of third-party validation is most apparent. A certificate signed by a trusted, independent CA helps ensure the organization that owns the certificate is indeed what it claims to be.

From a technical standpoint, however, third-party validation is not required for SSL security.

Organizations can “self-sign” certificates. When companies use self-signed certificates, in effect they are saying, “I verify that I am myself. Trust me.” However, to many standard web browsers such as Internet Explorer and Firefox, this guarantee is meaningless. Users who try to access a site “protected” with a self-signed certificate will usually get an error message that says the signing entity is unknown and not trusted. Not surprisingly, this kind of message scares off potential customers, partners, and other stakeholders. For this reason, few businesses will self-sign external-facing web sites. Retaining user trust is simply too important.

Internal-facing sites and servers, on the other hand, present a different use case scenario for SSL certificates. Corporate email servers, human resource (HR) portals, wikis for individual project management, software development sandboxes—these are just a few of the internal sites and servers that are often protected by SSL security. Do organizations really need third-party signed certificates when only employees access these areas? Once again, when a business uses a self-signed certificate, it asks its employees to trust that its systems are secure. Even if they will—should they?

Without the proper data center architecture and management framework—and the skilled personnel who make sure certificates are issued and signed properly—an organization simply has the ability to encrypt data between two points. Given that internal web sites are now the target of malicious attacks as much as external-facing ones, encryption is not enough.

The High Cost of Infrastructure for SSL Security Data Centers and Physical Security On their face, self-signed certificates are not inherently less trustworthy than those signed by leading CAs. However, reputable third-party CAs have robust processes in place to help ensure that their encryption keys, especially their highly sensitive private “root” keys, are kept safe. For these CAs, security is always a top priority: Personnel are rigorously vetted and highly trained, and these CAs have strict policies concerning where private keys are stored. In fact, if a CA wants to be approved by mainstream web browsers, these keys must be kept on non-extractible storage on smart cards.





To offer strong SSL security, a CA must also provide high-availability and failover mechanisms to prevent system failure. This helps to ensure that it can provide the proper authentication on demand whenever users need it.

Replicating this infrastructure to match the high security standards in place at leading CAs requires a number of costly components. First, an organization must have high-availability (HA) replication of the SSL system and data. A second, related requirement is that this replication must be achieved using two different secure rooms in two different data centers in two separate locations. This helps to ensure that if one data center goes down, due to power loss or other unforeseen factors, the other will be there to provide backup authentication. Without replication across data centers, servers and browsers would not be able to complete the authentication process and vital SSL-protected transactions—such as credit card purchases at an e-commerce site or uploading new employee information to an HR portal—would stop.

Moreover, the data centers housing the SSL systems and data themselves also need to be secure, which means establishing strict physical security measures. In addition to screening employees who would have physical access to data rooms, these extra precautions would include installing key card readers to grant entry to locked areas, mounting video surveillance cameras, and even hiring security guards to do regular walk-bys. If an unauthorized person gained access to these restricted rooms, he or she could obtain the key to crack encrypted data, once again putting transactions at risk.

The basic cost for a secure, one-rack colocation data center room—with all connectivity and utilities included—can range from $1,000 to more than $10,000 per month. 1 Adding more racks, increasing bandwidth, or utilizing technical support can raise costs even more, often by hundreds of dollars. Not only that, but all of these expenses will double to replicate data in two data centers. Clearly, the costs of maintaining the physical infrastructure and security needed to protect SSL encryption and authentication processes are more than many businesses can afford.

Hardware Components Although you can easily acquire free or very low-cost software that will allow you to generate selfsigned SSL certificates, you will still need a hardware security module (HSM) for each data center to manage encryption.

An SSL HSM is a secure crypto-processor—a physical piece of hardware—dedicated to managing digital keys and for authenticating private keys in a PKI SSL protocol system. An HSM has four purposes. First, it securely generates public and private keys for encrypting transactions over the web. Second, it securely stores keys in a way that prevents them from being extracted. Third, it allows companies to manage sensitive cryptographic data.

Finally, companies use HSMs to offload application servers for both asymmetric and symmetric cryptography. This last point is increasingly relevant since the National Institute of Standards and Technology (NIST) recommends today that companies use 2048-bit RSA keys. Using these larger keys can slow down system performance, so HSMs are critical to help organizations issue keys and authenticate certificates rapidly.

An HSM is a highly specialized piece of hardware that is usually quite expensive, ranging from $13,000 on the low end to upwards of $30,000 each. Once again, for purposes of replication and achieving high availability, any SSL infrastructure needs at least two HSMs, one for each data center.

1 Multiple sources: http://www.hostventures.com/colocationprices.html, http://www.creativedata.net/index.cfm?webid=168, http://www.datacenterknowledge.com/archives/2011/02/11/analysis-colocation-pricing-trends/ Management and Personnel Beyond pure hardware costs, the time and expense associated with finding and training skilled professionals to manage self-signed SSL security—as well as to create policies to govern the use of SSL certificates—are also a major consideration.

Tools that allow you to self-sign certificates—such as Microsoft Certificate Authority—do not include certificate management functionality. Given that, organizations will need to plan and implement robust processes to help ensure that SSL protocols are being strictly followed. Without such safeguards, anyone could ask for an SSL certificate and receive it, which in turn would allow anyone to spoof a supposedly “secure” site at will.

First, an organization needs to carefully control who has the authority to create and sign certificates for its domains, and establish processes for ensuring that this is done according to established policies. This authority should not be given lightly, and a clear audit trail is needed in case an investigation is ever required.

Leading third-party CAs typically offer web-based applications with easy-to-use management interfaces that automate and accelerate many processes, including delegating authority for creating certificates and approving certificates for signing by the CA. Certificate Signing Requests (CSRs) must eventually be approved by someone vested with authority for a particular domain. Trusted CAs have robust automated procedures in place to help ensure that all of this occurs as prescribed.

If an organization decides to use self-signed certificates, it will need processes similar to those described above. Some businesses attempt to automate the SSL security workflow by writing custom software, but many simply attempt to manually manage the processes. This takes a considerable amount of time and effort from highly skilled and trusted staff—which may mean more highly paid senior employees.

Moreover, without the management tools and alerts that often come with certificates from a trusted CA, organizations will not be notified when certificates expire. The expiration of self-signed certificates— as well as their renewal—will need to be tracked manually, an extremely time consuming task that can take skilled personnel away from other mission-critical work. The cost of expired SSL Certificates is unacceptably high; “rogue” certificates can create an uneven patchwork of security, leading to warning messages that may negatively impact customers and internal stakeholders alike.

Retaining personnel who possess the right talent and expertise to perform all of these management tasks is expensive. According to ComputerWorld’s IT Salary Survey 2011, mid-level security professionals earn approximately $100,000 a year. Depending on the size of an organization, the expense of hiring even one experienced worker could raise the cost of self-signed SSL security above a reasonable threshold, particularly when compared to the cost of using a trusted third-party SSL vendor.

A company could always choose to outsource infrastructure management, but this tactic not only adds additional cost, it also raises other key questions: Who is going to manage the outsourcer? What happens if the outsourcer makes costly mistakes? Adding to these concerns, if an organization’s IT strategy changes, infrastructure outsourcers are notoriously difficult to replace given the dependencies that such relationships create.

Technical and Business Risks of a Do-It-Yourself SSL Security Strategy In addition to all the “hard” costs an organization may accrue with self-signed SSL certificates, it also faces increased operational risks. Although difficult to quantify, these dangers can add up to substantial expenses if not mitigated.

Some of these risks are technical, including the potential for security breaches that can happen at both ends of the encryption/decryption process if the environment is not secured properly. In addition, it is extremely difficult to revoke certificates in unmanaged, self-signed certificate schemes.

Business risks are arguably even more serious than technical ones. Most of these perils involve building trust with customers and end users. Trust is critical for any web-based transaction, whether it’s online banking or uploading a Social Security Number to an internal employee portal.

Although the true value of trust is difficult to quantify, not winning the trust of potential customers could be disastrous to revenues. For an internal site, like an HR portal, a lack of trust among employees—who might wonder if their salary histories and other personal data are truly secure—could impact worker morale and productivity.

Another factor to consider is the warranty protection that a third-party SSL vendor can provide. These warranties can range anywhere from $10,000 to $250,000 (or more) and are meant to compensate a business if a data breach occurs. Self-signed certificates do not provide warranty guarantees.



Pages:   || 2 |


Similar works:

«How Chinese Innovation and Capital Market Liberalisation are Changing the Global Investment Landscape China is at the heart of the global economy and of investment markets. As the second largest economy in the world and the largest trading nation, China is the primary source of demand for many global companies. China is also home to the second largest capital market in the world behind the US. The lack of integration of these capital markets is a global economic anomaly. The...»

«Curriculum Vita Vijay Atluri Professor Management Science and Information Systems Department Rutgers Business School, Newark and New Brunswick Rutgers University Newark, NJ 07102 973-353-1642 (phone), 973-353-5003 (fax) email: atluri at rutgers dot edu home page: http://cimic.rutgers.edu/∼atluri/ EDUCATION: • Ph.D., Information Technology, May, 1994, George Mason University, Fairfax, VA. Dissertation: Concurrency Control in Multilevel Secure Databases Dissertation Adviser: Sushil Jajodia...»

«The Sprawl: Alpha Version hamish@ardens.org The Sprawl Alpha Version An Apocalypse World Hack by Hamish Cameron. Contact details at the end. “The sky above the port was the color of television, tuned to a dead channel.” Neuromancer, William Gibson. The Sprawl is a game of mission-based action in a gritty neon-and-chrome Cyberpunk future. You are the extended assets of vast multinational corporations, operating in the criminal underground, and performing the tasks that those multinationals...»

«The ADOR MVD SCRAP web application provides you a way to verify that all vehicles needing to be scrapped do not currently have a lien against their title and are not flagged by NCIC as stolen. SCRAP also updates the titling system by cancelling the current title and issuing a junk cancellation title on the vehicle’s VIN.SCRAP USER MANUAL Distributed by ADOR MVD CONTENTS Introduction Register Your Business Registration Wizard – Facility Information Registration Wizard – User Information...»

«This PDF is a selection from an out-of-print volume from the National Bureau of Economic Research Volume Title: The Microstructure of Foreign Exchange Markets Volume Author/Editor: Jeffrey A. Frankel, Giampaolo Galli, Alberto Giovannini, editors Volume Publisher: University of Chicago Press Volume ISBN: 0-226-26000-3 Volume URL: http://www.nber.org/books/fran96-1 Conference Date: July 1-2, 1994 Publication Date: January 1996 Chapter Title: Foreign Exchange Volume: Sound and Fury Signifying...»

«SECURITIES AND EXCHANGE COMMISSION 17 CFR PARTS 210 and 240 [RELEASE NOS. 33-8829; 34-56203; File No. S7-24-06] RIN 3235-AJ58 Definition of the Term Significant Deficiency AGENCY: Securities and Exchange Commission. ACTION: Final rule. SUMMARY: We are defining the term “significant deficiency” for purposes of the Commission’s rules implementing Section 302 and Section 404 of the Sarbanes-Oxley Act of 2002. EFFECTIVE DATE: September 10, 2007. FOR FURTHER INFORMATION CONTACT: N. Sean...»

«Cash Intensive Businesses Audit Techniques Guide Chapter 16 Scrap Metal NOTE: This document is not an official pronouncement of the law or the position of the Service and can not be used, cited, or relied upon as such. This guide is current through the publication date. Since changes may have occurred after the publication date that would affect the accuracy of this document, no guarantees are made concerning the technical accuracy after the publication date. Contents Introduction General...»

«Vijay K. Vaishnavi E-Mail: vvaishna@gsu.edu EDUCATION  Postdoctoral Fellow (Computer Science), McMaster University, Canada, 1977-79  Ph.D. in Electrical Engineering/Computer Science, Indian Institute of Technology (IIT), Kanpur, India, 1976  M.Tech in Electrical Engineering/Computer Science, Indian Institute of Technology (IIT), Kanpur, India, 1972  B.E. (with Distinction) in Electrical Engineering, Regional Engineering College (NIT: National Institute of Technology), Srinagar,...»

«Georgia State University ScholarWorks @ Georgia State University Finance Dissertations Department of Finance 1-12-2012 Agency Problems in Target-Date Funds Vallapuzha Sandhya Georgia State University Follow this and additional works at: http://scholarworks.gsu.edu/finance_diss Recommended Citation Sandhya, Vallapuzha, Agency Problems in Target-Date Funds. Dissertation, Georgia State University, 2012. http://scholarworks.gsu.edu/finance_diss/19 This Dissertation is brought to you for free and...»

«Copyright Notice The material contained in this article is protected by U.S. Copyright and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. 7 page(s) will be printed. Back Record: 3 Why family businesses are best.; By: Brokaw, L.; Murphy, A., Inc., Mar92, Vol. 14 Issue 3, p72, 7p, 4c, 1bw Database: Academic Search Premier WHY...»

«Journal of Property Investment & Finance Emerald Article: A vision for valuation Barry Gilbertson, Duncan Preston Article information: To cite this document: Barry Gilbertson, Duncan Preston, (2005),A vision for valuation, Journal of Property Investment & Finance, Vol. 23 Iss: 2 pp. 123 140 Permanent link to this document: http://dx.doi.org/10.1108/14635780510699998 Downloaded on: 20-06-2012 References: This document contains references to 27 other documents Citations: This document has been...»

«Georgia State University ScholarWorks @ Georgia State University Finance Dissertations Department of Finance 4-19-2013 Leverage and Liquidity: Evidence from the ClosedEnd Fund Industry Yuehua Tang Follow this and additional works at: http://scholarworks.gsu.edu/finance_diss Recommended Citation Tang, Yuehua, Leverage and Liquidity: Evidence from the Closed-End Fund Industry. Dissertation, Georgia State University, 2013. http://scholarworks.gsu.edu/finance_diss/22 This Dissertation is brought to...»





 
<<  HOME   |    CONTACTS
2016 www.dissertation.xlibx.info - Dissertations, online materials

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.