categorizing analyzing managing third party trust
play

Categorizing, Analyzing, & Managing Third Party Trust Andy - PowerPoint PPT Presentation

Categorizing, Analyzing, & Managing Third Party Trust Andy Sayler TPRC44 10/01/16 The Internet By Randall Munroe, xkcd.com Third Party Services Questions What capabilities are we entrusting to third parties? What capabilities are we


  1. Categorizing, Analyzing, & Managing Third Party Trust Andy Sayler TPRC44 10/01/16

  2. The Internet

  3. By Randall Munroe, xkcd.com

  4. Third Party Services

  5. Questions

  6. What capabilities are we entrusting to third parties?

  7. What capabilities are we entrusting to third parties? How can this trust be violated?

  8. What capabilities are we entrusting to third parties? How can this trust be violated? Can we reduce the degree of required trust?

  9. What capabilities are we entrusting to third parties? How can this trust be violated? Can we reduce the degree of required trust? Can we reduce the likelihood of trust violations?

  10. Modeling Trust

  11. Degree of Trust (Capabilities) Types of Violation (Attacks)

  12. Degree of Trust (Capabilities) Types of Violation (Attacks)

  13. Degree of Trust Types of Violation Storage (S) Implicit (P) Access (R) Compelled (C) Manipulation (W) Unintentional (U) Meta-Analysis (M) Colluding (L)

  14. Degree of Trust Types of Violation Storage (S) Implicit (P) Access (R) Compelled (C) Manipulation (W) Unintentional (U) Meta-Analysis (M) Colluding (L)

  15. Degree of Trust Storage (S) Access (R) Manipulation (W) Meta-Analysis (M)

  16. Degree of Trust Storage (S) Can a third party faithfully store private user data and make it available to the user upon request? Access (R) Manipulation (W) Meta-Analysis (M)

  17. Degree of Trust Storage (S) Access (R) Can a third party read and interpret the private user data they store? Manipulation (W) Meta-Analysis (M)

  18. Degree of Trust Storage (S) Access (R) Manipulation (W) Can a third party modify the private user data to which they have access? Meta-Analysis (M)

  19. Degree of Trust Storage (S) Access (R) Manipulation (W) Meta-Analysis (M) Can a third party gather user metadata related to any stored private user data?

  20. Examples

  21. Storage (S)

  22. Storage (S) Access (R)

  23. Storage (S) Access (R) Manipulation (W)

  24. Storage (S) Access (R) Manipulation (W) Meta-Analysis (M)

  25. Storage (S) Access (R) Manipulation (W) Meta-Analysis (M)

  26. Storage (S) Access (R) Manipulation (W) Meta-Analysis (M)

  27. Degree of Trust Types of Violation Storage (S) Implicit (P) Access (R) Compelled (C) Manipulation (W) Unintentional (U) Meta-Analysis (M) Colluding (L)

  28. Degree of Trust Types of Violation Storage (S) Implicit (P) Access (R) Compelled (C) Manipulation (W) Unintentional (U) Meta-Analysis (M) Colluding (L)

  29. Types of Violation Implicit (P) Compelled (C) Unintentional (U) Colluding (L)

  30. Types of Violation Implicit (P) Occurs when a third party violates a user’s trust in a manner approved by the third party. Compelled (C) Unintentional (U) Colluding (L)

  31. Types of Violation Implicit (P) Compelled (C) Occurs when a third party is compelled by another actor to violate a user’s trust. Unintentional (U) Colluding (L)

  32. Types of Violation Implicit (P) Compelled (C) Unintentional (U) Occurs when a third party unintentionally violates a user’s trust. Colluding (L)

  33. Types of Violation Implicit (P) Compelled (C) Unintentional (U) Colluding (L) Occurs when multiple trusted parties collude to gain capabilities beyond what the user intended each to have.

  34. Examples

  35. Implicit Violations

  36. Implicit Violations

  37. Implicit Violations

  38. Compelled Violations

  39. Compelled Violations

  40. Unintentional Violations

  41. Unintentional Violations

  42. Collusion Violations

  43. Collusion Violations ?

  44. Managing Trust

  45. Degree of Trust Types of Violation Storage (S) Implicit (P) Access (R) Compelled (C) Manipulation (W) Unintentional (U) Meta-Analysis (M) Colluding (L)

  46. Degree of Trust Types of Violation Storage (S) Implicit (P) Access (R) Compelled (C) Manipulation (W) Unintentional (U) Meta-Analysis (M) Colluding (L)

  47. Storage (S) Access (R) Manipulation (W) Meta-Analysis (M)

  48. Storage (S) Access (R) Manipulation (W) Meta-Analysis (M)

  49. Storage (S) Access (R) Manipulation (W) Meta-Analysis (M)

  50. Trust Surplus Access (R) Manipulation (W)

  51. Traditional Trust Model Feature Provider Storage (S) User Data Access (R) Unrestricted Manipulation (W) Access Meta-Analysis (M) Full Features Trust

  52. Client Trust Model Feature Provider Encrypted Storage (S) User Data Access (R) Controlled Access Manipulation (W) by Proxy Meta-Analysis (M) Minimal Features Trust

  53. Distributed Trust Model Feature Provider Encrypted User Data Controlled Secret Storage Access by Proxy Provider Controlled Access Secrets Storage (S) Features Access (R) Minimal Manipulation (W) Trust Meta-Analysis (M)

  54. Distributed Trust Model Secret Storage Feature Provider Providers Encrypted Controlled User Data Access Secret Shard Controlled Access by Proxy Controlled Access Secret Shard Storage (S) Features Access (R) Minimal Manipulation (W) Trust Meta-Analysis (M)

  55. Distributed Trust Model

  56. Distributed Trust Model

  57. Distributed Trust Model

  58. Degree of Trust Types of Violation Storage (S) Implicit (P) Access (R) Compelled (C) Manipulation (W) Unintentional (U) Meta-Analysis (M) Colluding (L)

  59. Degree of Trust Types of Violation Storage (S) Implicit (P) Access (R) Compelled (C) Manipulation (W) Unintentional (U) Meta-Analysis (M) Colluding (L)

  60. Distributed Trust Markets

  61. Distributed Trust Markets Storage Provider Storage Provider Storage Provider Secret Secret Secret Shard Shard Shard

  62. Digital Due Process

  63. Digital Due Process Feature Provider Encrypted User Data Secret Storage Provider Secrets Third Party Doctrine

  64. Digital Due Process Feature Provider Encrypted User Data Secret Storage Provider Secrets Warrant Third Party Doctrine

  65. Alternatively...

  66. Alternatively... Jurisdictional Arbitrage

  67. Third Party Liability

  68. Third Party Liability Storage Provider Secrets Liability

  69. Third Party Liability Storage Provider Secrets Liability Insurance

  70. Third Party Liability $$$ ? Secrets Liability Insurance

  71. Third Party Liability $$$ ??? Secret Shard Secret Shard Liability Insurance

  72. Third Party Liability Declare $$$ Secret Shard Secret Shard Liability Insurance

  73. Conclusion

  74. What capabilities are we entrusting to third parties? How can this trust be violated? Can we reduce the degree of required trust? Can we reduce the likelihood of trust violations?

  75. Thank You

  76. Questions?

  77. Extra Slides

  78. Storage (S) Access (R) Manipulation (W) Meta-Analysis (M)

  79. Storage (S) Access (R) Manipulation (W) Meta-Analysis (M)

  80. Storage (S) Access (R) Manipulation (W) Meta-Analysis (M)

  81. Compelled Violations

  82. Compelled Violations

  83. Application Storage Access Manipulation Meta-analysis Score Dropbox Full Full Full Full 12 Tresorit Full Partial Partial Full 10 Facebook Full Full Full Full 12 Gmail Full Full Full Full 12 PGP/GPG Full None None Full 6 Hangouts Full Full Full Full 12 TextSecure Full None None Minimal 4 LastPass Full Minimal Full Full 10 Amazon EC2 Full Full Full Full 12 Single SSP Full Partial Partial Full 10 Multiple SSPs Partial Minimal Minimal Partial 6 Degree of Third Party Trust Across Capabilities None Minimal Partial Full 0 1 2 3 Increasing Trust

  84. Application Storage Access Manipulation Meta-analysis Score Dropbox Full Full Full Full 12 Tresorit Full Partial Partial Full 10 Facebook Full Full Full Full 12 Gmail Full Full Full Full 12 PGP/GPG Full None None Full 6 Hangouts Full Full Full Full 12 TextSecure Full None None Minimal 4 LastPass Full Minimal Full Full 10 Amazon EC2 Full Full Full Full 12 Single SSP Full Partial Partial Full 10 Multiple SSPs Partial Minimal Minimal Partial 6 Degree of Third Party Trust Across Capabilities None Minimal Partial Full 0 1 2 3 Increasing Trust

  85. Application Storage Access Manipulation Meta-analysis Score Dropbox Full Full Full Full 12 Tresorit Full Partial Partial Full 10 Facebook Full Full Full Full 12 Gmail Full Full Full Full 12 PGP/GPG Full None None Full 6 Hangouts Full Full Full Full 12 TextSecure Full None None Minimal 4 LastPass Full Minimal Full Full 10 Amazon EC2 Full Full Full Full 12 Single SSP Full Partial Partial Full 10 Multiple SSPs Partial Minimal Minimal Partial 6 Degree of Third Party Trust Across Capabilities None Minimal Partial Full 0 1 2 3 Increasing Trust

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend