Security & Trust Meeting 2010-05-21

From Direct Project
Jump to navigation Jump to search

Notes from NHIN Direct Security & Trust Meeting


Date: May 21, 2010
Time: 3pm-4pm
Attendees:Jackie Key, Sean Nolan, Nick Radov, Fred Trotter, David McCallie, Richard Floyd, Vassil Peytchev, John Moehrke, Konda Mullapudi, Ron Cordell, Thomas Davidson, Pete Palmer, Mike Davis, Brett Peterson, Walter Sujansky, Eric Heflin, Brian Behlendorf, Richard Kernan

Actions from today

#
Date
Action
Status
Owner
Due Date
21
5/21/10
Rewrite the Basic Trust Model Keys for Consensus wiki page to remove terms that are causing confusion and capture the intent of the WG’s discussion
Open
Sean
5/21/10
22
5/21/10
Set-up a follow-up meeting on 5/24 to continue discussion of the Keys for Consensus
Open
Jackie
5/23/10
23
5/21/10
Post links to Federal initiatives/programs discussed on wiki
Open
Mike Davis
5/24/10


Actions from yesterday

#
Date
Action
Status
Owner
Due Date
18
5/20/10
Create a high-level summary of the intent of the Keys for Consensus in plain English
Closed
Arien
5/20/10
19
5/20/10
Route each of the voting links on the wiki for the Keys for Consensus to separate discussion threads
Closed
Arien
5/20/10
20
5/20/10
Set-up a follow-up meeting on 5/21 to continue discussion of the Keys for Consensus
Closed
Jackie Key
5/21/10

Agenda

Continue discussion of Basic Trust Model Keys for Consensus (http://nhindirect.org/Basic+Trust+Model+-+Keys+for+Consensus)

Notes
Comment from David McCallie
· If we can’t reach agreement on the keys for consensus, let’s create concrete models in pseudo-code, in an unambiguous structured form, to give us something concrete to discuss

Comment from Sean Nolan
· Agree with David’s idea - if we can’t make progress in the next hour let’s take that route

Comment from Mike Davis
· Point #1 needs to have a link back to security
· Should append this statement with “with confidentiality and integrity”

Comment from Sean Nolan
· Arien likely intended to convey the concept of reliability by point #1
· Arien changed wording in point #2 from “my minimum set of criteria” to “a minimum set of criteria”

Comment from John Moerkhe
· Point #2 was heavily discussed in the discussion page

Comment from Mike Davis
· We need to collect and harmonize the comments posted thus far
· When we talk about trust frameworks, we should look at those that already exist
o Federal government has identity credentialing and access management program (ICAM)
o Federal ICAM has adopted Kantara initiative’s trust framework
· Mike to post links to the initiatives and programs he’s mentioned on the wiki

Comment from Sean Nolan
· We are just talking about the mechanism, the token, that will be used to separate levels of assurance

Comment from Brian Behlendorf
· Has reached out to Kantara community to engage them in NHIN Direct, but they haven’t participated thus far
· Although there are many good ideas, in the end those who participate are those who shape the project
· Parties that have already built a trust framework should map to what we’re doing

Comment from John Moerkhe
· If NHIN Direct is intended to support small practices, does Kantara facilitate this?

Comment from Mike Davis
· Yes, Kantara does support small practices
· We should not reinvent what’s already been done

Comment from John Moerkhe
· We are not building a trust framework
· Primary NHIN Direct principle is that users have already defined trust policies out of band

Comment from Sean Nolan
· What is the right way to talk about what we’re trying to accomplish?
Comment from Fred Trotter
· NHIN Direct will allow other people to use trust frameworks on top of our foundational work
Comment from Pete Palmer
· We need to decide if identifying a trust framework is in scope for the group or not
· If it is in scope, we should not reinvent the wheel

Comment from Sean Nolan
· We are not defining policies for how people should get their certs, what they need to do to get their certs, etc
· We are only looking at the mechanics/technology

Comment from Mike Davis
· We need to clarify that parties are expected to determine policies for exchange through an out of band process

Comment from Sean Nolan
· NHIN Direct will allow: individuals to decide what policies they are comfortable with, anyone who wants to represent policies to do so with a certificate, and a cert to be used to communicate out-of-band policies
· The concrete implementation groups need to understand these things to move forward

Comment from John Moerkhe
· Those using NHIN Direct specs should provide guidance around cert policies

Comment from Brian Behlendorf
· Clarification of trust circles: A trust circle means a group of individuals that agree to a set of policies. A trust circle is encoded by a cert from a particular CA
· By allowing different trust circles, we allow different sets of policies and thereby allow NHIN Direct participants to select which policies they want to use

Comment from Mike Davis
· Propose a concrete instance with Kantara and ICAM

Comment from Sean Nolan
· Brian’s statement is good clarification, will add to wiki as a preamble

Comment from Walter Sujansky
· If the scope of this group is confined to what has been described, are these sufficient to meet goals of NHIN direct?

Comment from Vassil Peytchev
· Not necessarily goals of NHIN direct that we are satisfying, but we are satisfying the technical piece of NHIN direct that the group has recognized
· Policy guidance will be provided by groups such as the HITPC

Comment from Sean Nolan
· We’ve been told that it’s not our job to define policies

Comment from Mike Davis
· There are policies associated with managing a PKI infrastructure

Comment from Sean Nolan
· In the pseudo code for the agent we have this defined
· Protocol may be the best word to describe what we’re trying to accomplish

Comment from Walter Sujansky
· We are not talking about trust, just plumbing

Comment from Mike Davis
· Even though it’s just plumbing, it delivers trust

Comment from John Moerkhe
· Our plumbing should enable a reasonable set of trust policy assumptions

Comment from Walter Sujansky
· Are we assuming that there is a trusted CA?

Comment from John Moerkhe
· There is no single CA for NHIN Direct

Comment from Brian Behlendorf
· We are allowing for the possibility of multiple, different CAs

Comment from John Moerkhe
· There is a crossover to policy when you get to scalability, when you trust several individual certs that you self sign as opposed to federal PKI

Comment from Mike Davis
· We should look at minimum entry with options to expand to a more robust system

Comment from John Moerkhe
· NHIN Direct will have identity certs that are used to open secure communication that is responsible for authenticity, confidentiality and integrity
· We assume that the sender has determined that policies are in place - NHIN direct is not addressing this

Comment from Sean Nolan
· Need to clarify the protocol by which certs will be used in NHIN direct and the what the implications are of this protocol on policy-making bodies

· Jackie to set up a follow-up meeting for Monday 5/24
· Sean to rewrite the Basic Trust Model Keys for Consensus wiki page to remove terms that are causing confusion and capture the intent of the WG’s discussion