TryTRY
BuyBUY
  • newsletter
  • contact
  • corporate
  • careers
Utimaco
TRYour free HSM simulator
BUYget a quote
  • home
  • solutions
  • products
  • services
  • blog
  • downloads
  • partners
  • company

Utimaco Portal

Here you will find everything you need as a partner and customerLogin required

  • home
  • solutions
    • industries
      • banking and financial services
        • acquirer
        • card scheme
        • issuer
        • hsm-as-a-service
      • government
        • federal government
      • cloud
        • cloud-based innovation
        • multi-cloud agility
      • connected car (V2V)
      • automotive solutions
      • road infrastructure (V2I), toll collection & ITS
      • industrial IoT & manufacturing
      • energy & utilities
      • lottery & gaming
      • media & entertainment
      • telecommunications
    • applications
      • authentication
      • blockchain
      • code signing
      • database encryption
      • document signing
      • key injection
      • post-quantum crypto agility
      • public key infrastructure (PKI)
        • EJBCA
      • random number generator (RNG)
    • compliance
      • certifications & approvals
        • Common Criteria (CC)
        • FIPS 140-2
      • compliance & standardization
        • FISMA, FedRAMP, and FICAM
        • Certificate Policy of the Smart Metering PKI
        • eIDAS
        • GDPR
        • PCI DSS
        • Privacy Shield
  • products
    • general purpose HSM
      • SecurityServer Se Gen2
      • SecurityServer CSe
      • Block-safe
      • CryptoServer CP5 (eIDAS & CC)
      • CryptoServer Cloud
      • TimestampServer
      • Q-safe
    • payment HSM
      • Atalla AT1000
      • PaymentServer Se Gen2
      • PaymentServer CSe
      • Secure Configuration Assistance (SCA)
      • QuickStart Services
      • u.cloud – Atalla PaymentHSMaaS
      • u.trust 360
    • key management
      • Enterprise Key Management
    • Software Development Kit (SDK)
      • CryptoServer SDK
      • CryptoScript SDK
    • HSM simulators
      • Block-safe HSM simulator
      • CryptoServer CP5 simulator (eIDAS & CC)
      • SecurityServer simulator
      • Q-safe HSM simulator
    • form factor
      • LAN appliance
      • PCIe card
      • cloud, “HSM as a Service”
    • KeyBRIDGE
      • KeyBRIDGE POI
      • KeyBRIDGE RKD
      • KeyBRIDGE eKMS
      • TokenBRIDGE™
    • u.trust Anchor
      • u.trust Anchor CSAR
      • u.trust Anchor High Performance HSM
  • services
    • consultancy
      • PQC consultancy
    • support
    • managed services
      • Key Exchange & Escrow Service (KEES™)
    • professional services
    • Utimaco Academy
  • blog
  • downloads
    • brochures
    • data sheets
    • case studies
    • white papers
    • webinars
    • e-books
      • PQC for Dummies e-book
      • HSM for Dummies e-book
    • Utimaco Portal
      • integration guides
      • knowledge base
  • partners
    • Partner Program
      • technology partner
    • Partner Locator
  • company
    • about Utimaco
      • legal
      • terms & conditions
      • privacy
        • cookie-policy
    • locations
    • news
      • newsletter
    • events
    • contact
    • careers
    • investors
    • utimaco management
    • business ethics
    • memberships and certifications
    • engagement in research
  • home
  • solutions
    • industries
      • banking and financial services
        • acquirer
        • card scheme
        • issuer
        • hsm-as-a-service
      • government
        • federal government
      • cloud
        • cloud-based innovation
        • multi-cloud agility
      • connected car (V2V)
      • automotive solutions
      • road infrastructure (V2I), toll collection & ITS
      • industrial IoT & manufacturing
      • energy & utilities
      • lottery & gaming
      • media & entertainment
      • telecommunications
    • applications
      • authentication
      • blockchain
      • code signing
      • database encryption
      • document signing
      • key injection
      • post-quantum crypto agility
      • public key infrastructure (PKI)
        • EJBCA
      • random number generator (RNG)
    • compliance
      • certifications & approvals
        • Common Criteria (CC)
        • FIPS 140-2
      • compliance & standardization
        • FISMA, FedRAMP, and FICAM
        • Certificate Policy of the Smart Metering PKI
        • eIDAS
        • GDPR
        • PCI DSS
        • Privacy Shield
  • products
    • general purpose HSM
      • SecurityServer Se Gen2
      • SecurityServer CSe
      • Block-safe
      • CryptoServer CP5 (eIDAS & CC)
      • CryptoServer Cloud
      • TimestampServer
      • Q-safe
    • payment HSM
      • Atalla AT1000
      • PaymentServer Se Gen2
      • PaymentServer CSe
      • Secure Configuration Assistance (SCA)
      • QuickStart Services
      • u.cloud – Atalla PaymentHSMaaS
      • u.trust 360
    • key management
      • Enterprise Key Management
    • Software Development Kit (SDK)
      • CryptoServer SDK
      • CryptoScript SDK
    • HSM simulators
      • Block-safe HSM simulator
      • CryptoServer CP5 simulator (eIDAS & CC)
      • SecurityServer simulator
      • Q-safe HSM simulator
    • form factor
      • LAN appliance
      • PCIe card
      • cloud, “HSM as a Service”
    • KeyBRIDGE
      • KeyBRIDGE POI
      • KeyBRIDGE RKD
      • KeyBRIDGE eKMS
      • TokenBRIDGE™
    • u.trust Anchor
      • u.trust Anchor CSAR
      • u.trust Anchor High Performance HSM
  • services
    • consultancy
      • PQC consultancy
    • support
    • managed services
      • Key Exchange & Escrow Service (KEES™)
    • professional services
    • Utimaco Academy
  • blog
  • downloads
    • brochures
    • data sheets
    • case studies
    • white papers
    • webinars
    • e-books
      • PQC for Dummies e-book
      • HSM for Dummies e-book
    • Utimaco Portal
      • integration guides
      • knowledge base
  • partners
    • Partner Program
      • technology partner
    • Partner Locator
  • company
    • about Utimaco
      • legal
      • terms & conditions
      • privacy
        • cookie-policy
    • locations
    • news
      • newsletter
    • events
    • contact
    • careers
    • investors
    • utimaco management
    • business ethics
    • memberships and certifications
    • engagement in research

Home / Blogs / The Atalla Secure Configuration Assistant and Concepts of Hyper-Security

The Atalla Secure Configuration Assistant and Concepts of Hyper-Security

November 09, 2020

The Atalla Secure Configuration Assistant, also named the SCA-W, is a secure system dedicated to interfacing Atalla HSMs.

It contains:

  • A secure media storage
  • A kit of administrator and backup smartcards
  • The Atalla Secure keypad (ASK) acting as a Key Loading Device (KLD)

The SCA-W connects to the HSM and is used to perform initialization and management in a secure way. It achieves many of the concepts of hyper-security.

The SCA-W implements M of N quorum control via smartcards for configuration and other operations.

The Concept of Hyper-Security

The notion of hyper-security in the era of Information Technology security and for the general security of computer systems is still an experimental concept. It is a set of ideas rather than a well-defined term. Here we shall define hyper-security simply as the sum of all security constraints of a system that involves physical security, cyber-security, human security, and in general, all possible security related to the system. Hyper-security, maximum security, maximal security, super-security are equivalent concepts to hyper-security.

As an example, let’s consider the following real-life implementation of a hyper-secure project.

New call-to-actionA team of specialized key custodians was selected for a secret project that had to be “hyper-secure.” The data for the project had to stay secret.

The key custodians backgrounds and references were closely examined by a team of specialists and detectives. They were required to work in a secure building. The building had no internet access and did not allow access to any hardware other than a screen, keyboard, and mouse.

The cables connecting the terminals (e.g. the screens, keyboards, and mice) were secure cables that could not be cut. No “tempest” scanner could retrieve the information on the devices.

The key custodians were not allowed to bring in any recording devices such as flashcards, USB sticks, mobile phones, mp3 players, or smartwatches.

Each day they were required to go through a detection portal when they entered in the morning and left the building in the evening. Security guards were present, and they performed random physical searches.

The walls around the area were sonic-proof so that no information could have been leaked through vibrations. A Faraday cage surrounded the area so that no radio devices, short-wave emitters, or receivers, could have been used.

Additionally, the electrical system had been equipped with jamming devices because information could potentially transmit via the electrical system. The windows to the outside were dark, would not open, were bulletproof, and were specially designed so that no information could be exchanged with the outside via optical communication; especially lasers.

These measures were done because even if a rogue key custodian could have entered the building with a modem or a recording device, it should not have been possible for him to use it. Additionally, “traditional” measures were implemented, such as video monitoring and strict access control using fingerprint-based biometric identification.

The key custodians operated in a closed private network that was isolated from the internet. The resources they needed had been compiled and stored on a special server by a security officer who had access to the computers. The operating system used was equipped with all types of heuristic virus detection, habitual anti-virus, and anti-malware programs.

Only the security officer could access the central repository server. but only after a successful three-factor authentication process. This involved smartcard authentication, biometric authentication, and password authentication.

All the data of the project was ciphered and securely replicated on backup servers.

Now, this could convince readers that the project was implemented in a “hyper-secure” way; some might even say “paranoid.” However, there was still room for uncertainty. For example, the whole access control could have been easily bypassed by setting a fire in the area. In such an event, all access control would be automatically disabled and even worse, some doors leading to the outside would open to allow people to evacuate the building.

In such a case, only physical security remains, as security guards must control and direct the evacuation. For that example, the notion of hyper-security of a computer system goes beyond simple “IT Security” because it encompasses all aspects of security and also involves access controls, social engineering, protections against “non-standard” communications, etc.

A system being Common Criteria EAL4+, for example, does not automatically guarantee that it is “hyper-secure”. It all depends on the security target requirements. For example, consider that Windows 10 is EAL4+ certified.

Hyper-security is still a concept and not is described by any norms. It is perceived by readers as the “top secret” protection often portrayed in movies. The military, secret services, and special agencies are known to implement hyper-security for the development of secret weapons and protocols for interacting with nuclear weapons and strategic missiles, etc. Lie detectors and behavioral detectors are also parts of such hyper-security.

In the context of HSM technologies, hyper-security is also usually involved. Banks and financial organizations must protect their assets in a very secure way. For such organizations, breaches could result in hundreds of millions or even billions of dollars of losses.

Why the SCA-W Achieves Some Hyper-Security

Connecting a terminal to a secure system is not easy. By definition, allowing remote access is insecure. Of course, remote access is usually protected by a password or by keys, and might also be protected by IP restrictions. But if the security of the terminal is not at least equal to the security of the system it must connect to, it then creates a security problem. Why? Because compromising the terminal is compromising the entire system. Hence, why such a terminal used to connect to an HSM must be hyper-secure in many ways.

Atalla Secure Keypad (ASK)

The SCA-W uses the Atalla Secure Keypad, which is a secure cryptographic device with anti-tampering capacities. It is designed to meet the security requirements of PCI, x9.24, as well as other financial standards regarding the manual entry of PINs. All the keys and smart card PINs are entered into the Atalla Secure Keypad and are communicated securely to the smart card, thus isolating all security items.

Atalla-secure-configuration-assistant-change-login

Security Association

One of the main reasons why SCA-W achieves some hyper-security is its ability to create security associations. In its configuration, more than one administrator is needed to perform some management operations. For instance, three administrators will take part in a security association defined by the security policy, each will use their smart cards, one after the other to unlock the system with their own PIN secret.

Atalla-secure-configuration-assistant-security-association

This protocol is clearly hyper-secure and found in many critical tools, including interaction with nuclear strategic weapons, in many countries.

Loading of the HSM MasterKey(s) from the Administrators Smartcards

The HSM MasterKey is the root of all keys. It must be remotely transmitted to the HSM in a hyper-secure way. Loading such a key is performed via the administrators’ smartcards, which are as secure as the HSM because these smartcards are provided with sophisticated anti-tampering systems and resistant to all sorts of attacks (DPA, SPA, glitch, DTA, laser, chemical EM environmental attacks, etc.). Therefore, this is the ideal way to carry cryptographic keys. Essentially, the smartcards used by the SCA are themselves hyper-secure.

Atalla-secure-configuration-assistant-component-management
Summary

The Secure Configuration Assistant (SCA-W) achieves hyper-security. It is the ideal way to remotely connect to the Atalla HSM.

New call-to-action

References

  • More articles on the AT1000 (2018 – today), by Martin Rupp and the Utimaco team.
Back to overview

Stay on top of our news
Don’t miss out on any Utimaco updates

Subscribe to Utimaco Newsletter

We will keep you posted with news from Utimaco and the industries we protect, as well as information on upcoming events and webinars.

Subscribe now

Partners

Telegrupp AS Cryptomathic A/S Abrantix AG Throughwave (Thailand) Co.,Ltd - Utimaco Hardware Security Modules Partner EUROPEAN DYNAMICS SA. ESYSCO Sp. z o.o. Primekey Solutions AB Envoy Data Corporation - Utimaco Hardware Security Modules Partner cv cryptovision GmbH CertiSur S.A. PrimeKey Labs GmbH Macroseguridad Versasec Utimaco HSM - InfoGuard Swiss Cyber Security Nexus Technology GmbH Nexus - Utimaco Hardware Security Modules Partner Baas Control s.r.o. Utimaco HSM - PTESA_profesionales en transacciones electronicas Nexus - Utimaco Hardware Security Modules Partner PETA (Thailand) Co., Ltd. Secure Source Distribution (M) Sdn Bhd - Utimaco Hardware Security Modules Partner SecureMetric Technology Sdn. Bhd. Synergy Computers (Pvt.) Ltd. - Utimaco Hardware Security Modules Partner Cryptomathic GmbH Perceptus-sp.-z-o.-o. CEGA Security Microexpert Limited JJNet International Co., Limited - Utimaco Hardware Security Modules Partner Encryption Consulting LLC CewTec S.A. Safesoft Kft. Cogito Group Pty Ltd MIcrosec AKEA S.A. - Utimaco Hardware Security Modules Partner Compumatica secure networks GmbH Utimaco HSM - QuintessenceLabs Fortiedge Pte Ltd. CREAplus Italia S.r.l Real security d.o.o. Cryptomathic Inc. CREA plus d.o.o. VAR Group SpA - Utimaco Hardware Security Modules Partner Ascertia - Utimaco Hardware Security Modules Partner E-Sign S.A. Komar Consulting Inc. - Utimaco Hardware Security Modules Partner intarsys AG Softline Solutions GmbH MTG - Utimaco Hardware Security Modules Partner Thomas-Krenn.AG Astel (UK) Ltd. - Utimaco Hardware Security Modules Partner Skytech Computing Solutions Limited. - Utimaco Hardware Security Modules Partner PKI Solutions Inc. Clearkey Consulting - Utimaco Hardware Security Modules Partner Cyber Armor Pte Ltd Fornetix - Utimaco Hardware Security Modules Partner MALKOM D.Malińska i Wspólnicy s.j. Altacom UAB IQuantics Corp Compumatica secure networks B.V. Rohde & Schwarz Cybersecurity GmbH
Find a partner

Share this page

EMEA

Utimaco IS GmbH
Germanusstraße 4
52080 Aachen
Germany
Phone: + 49 241 1696 200

Americas

Utimaco Inc.
900 E Hamilton Ave., Suite 400
Campbell, CA 95008
USA
Phone: +1 844 UTIMACO

APAC

Utimaco IS Pte Limited
80 Raffles Place,
#32-01, UOB Plaza
Singapore 048624
Phone: +65 6622 5347

Utimaco

  • support
  • corporate
  • careers
  • legal
  • terms & conditions
  • privacy
  • cookie-policy
© 2021
to top
  • home
  • solutions
    • industries
      • banking and financial services
        • acquirer
        • card scheme
        • issuer
        • hsm-as-a-service
      • government
        • federal government
      • cloud
        • cloud-based innovation
        • multi-cloud agility
      • connected car (V2V)
      • automotive solutions
      • road infrastructure (V2I), toll collection & ITS
      • industrial IoT & manufacturing
      • energy & utilities
      • lottery & gaming
      • media & entertainment
      • telecommunications
    • applications
      • authentication
      • blockchain
      • code signing
      • database encryption
      • document signing
      • key injection
      • post-quantum crypto agility
      • public key infrastructure (PKI)
        • EJBCA
      • random number generator (RNG)
    • compliance
      • certifications & approvals
        • Common Criteria (CC)
        • FIPS 140-2
      • compliance & standardization
        • FISMA, FedRAMP, and FICAM
        • Certificate Policy of the Smart Metering PKI
        • eIDAS
        • GDPR
        • PCI DSS
        • Privacy Shield
  • products
    • general purpose HSM
      • SecurityServer Se Gen2
      • SecurityServer CSe
      • Block-safe
      • CryptoServer CP5 (eIDAS & CC)
      • CryptoServer Cloud
      • TimestampServer
      • Q-safe
    • payment HSM
      • Atalla AT1000
      • PaymentServer Se Gen2
      • PaymentServer CSe
      • Secure Configuration Assistance (SCA)
      • QuickStart Services
      • u.cloud – Atalla PaymentHSMaaS
      • u.trust 360
    • key management
      • Enterprise Key Management
    • Software Development Kit (SDK)
      • CryptoServer SDK
      • CryptoScript SDK
    • HSM simulators
      • Block-safe HSM simulator
      • CryptoServer CP5 simulator (eIDAS & CC)
      • SecurityServer simulator
      • Q-safe HSM simulator
    • form factor
      • LAN appliance
      • PCIe card
      • cloud, “HSM as a Service”
    • KeyBRIDGE
      • KeyBRIDGE POI
      • KeyBRIDGE RKD
      • KeyBRIDGE eKMS
      • TokenBRIDGE™
    • u.trust Anchor
      • u.trust Anchor CSAR
      • u.trust Anchor High Performance HSM
  • services
    • consultancy
      • PQC consultancy
    • support
    • managed services
      • Key Exchange & Escrow Service (KEES™)
    • professional services
    • Utimaco Academy
  • blog
  • downloads
    • brochures
    • data sheets
    • case studies
    • white papers
    • webinars
    • e-books
      • PQC for Dummies e-book
      • HSM for Dummies e-book
    • Utimaco Portal
      • integration guides
      • knowledge base
  • partners
    • Partner Program
      • technology partner
    • Partner Locator
  • company
    • about Utimaco
      • legal
      • terms & conditions
      • privacy
        • cookie-policy
    • locations
    • news
      • newsletter
    • events
    • contact
    • careers
    • investors
    • utimaco management
    • business ethics
    • memberships and certifications
    • engagement in research