openwallet-foundation / digital-wallet-and-agent-overviews-sig

The objective of this SIG is to develop and maintain the Digital Wallets and Agents Overview. The overview should provide transparency of the characteristics of wallets and agents in order to allow for an objective comparison and effective decision making on which wallet or agent is applicable for your use case.
https://openwallet-foundation.github.io/digital-wallet-and-agent-overviews-sig/
Apache License 2.0
13 stars 15 forks source link

Add sole control assurance level #33

Open sander opened 4 months ago

sander commented 4 months ago

For some use cases it is important to know to what extent the wallet or agent operates on holder keys under sole control of an authorized end-user. This knowledge can be provided with more or less assurance. Two assurance levels are standardised under Common Criteria in the CEN EN 419241-2:2019 standard on trustworthy systems supporting server signing. The SCAL3 project provides an overview and an extension applicable to wallets.

For example, wallets for eIDAS LoA High authentication or other high-risk transactions will need to provide a high assurance level, while wallets for webshop coupons or intranet authentication may do with lower levels.

I suggest to add a field:

maaikevanleuken commented 3 months ago

Maximum level of assurance, not the assurance level for each individual.

Can we place objective trust in the assessor of these levels? We can't work with patents in this publicly available resource.

Interesting related characteristic: holder authentication to wallet.

sander commented 3 months ago

Thanks @maaikevanleuken for taking a look. Responding to your notes:

Maximum level of assurance, not the assurance level for each individual.

Agreed, individual users can configure/break the system to use reduced security.

Can we place objective trust in the assessor of these levels?

I suggest to use the SCAL quality criteria as written in my first post. As with other characteristics, we can go with the supplier’s self-assessment and publications and verify it with our own experiences:

Only SCAL2 may be more tricky. For example, I know one solution that has used a TPM assessment from a Register EDP auditor to demonstrate SCAL2 compliance.

We can't work with patents in this publicly available resource.

What is exactly the constraint in this context? The general idea of tamper-evident logs with cryptographic evidence of multi-factor authentication seems hard to claim in a patent. If you want to refer to the SCAL3 docs without any sections that cover patented designs, I can work on separating these.

Interesting related characteristic: holder authentication to wallet.

In my view this is the same characteristics. The SCALs concretise what qualities we could measure to describe holder authentication.