Confidential + ProprietaryConfidential + Proprietary
Risk and Incident Sharing and
Coordination Legal Agreement Meeting
Luke Camery, Adam Dawes
January 31, 2018
Public Link: https://goo.gl/hUkTx5
Confidential + Proprietary
Agenda
[1:00 - 1:15] Intros
[1:15 - 1:45] RISC Overview
[1:45 - 2:30] Defining the goals of the sharing agreement
[2:30 - 2:45] Break
[2:45 - 3:00] Review the current draft
[3:00 - 3:30] Feedback on the current draft
[3:30 - 4:00] Process for working together and making progress
Confidential + ProprietaryConfidential + Proprietary
Overview
Confidential & Proprietary
We seem to be losing against the bad guys
Confidential + Proprietary
Connected Accounts
● Email and phone number recovery creates an implicit relationship
● Federated sign in creates an explicit relationship
○ Example: Sign in with Google
● Account protections on one site don’t protect our
users on their other sites
Confidential + Proprietary
● Protect our shared users’ accounts across the Internet
● Protect our shared users’ data while respecting their
privacy
Goals
Confidential + ProprietaryConfidential + Proprietary
The Problem
Confidential + Proprietary
An exploit at one service often leads to hacks elsewhere
● Attackers use account recovery mechanisms
to gain access to other accounts
● Email and phone hacks are especially valuable
to gain access to other Internet services
● Compromise results in privacy breach, financial
loss, data loss How Apple and Amazon
Security Flaws Led to My
Epic Hacking
Confidential + Proprietary
Example: Hijacking
Confidential + Proprietary
Hijackers find a way in
Confidential + Proprietary
… and spread
Confidential + Proprietary
Example: Spam
Confidential + Proprietary
Spam can be more or less noticeable
Confidential + Proprietary
SSO makes it easy for you to get into 3P accounts
Confidential + Proprietary
SSO’s Fatal Flaw
Confidential + Proprietary
SSO’s Fatal Flaw
Confidential + Proprietary
Easy to hijack, hard to evict
Confidential + Proprietary
A solution is needed
Users can’t evict an attacker from a session bootstrapped with SSO
...but SSOut would offer a poor user experience
Easy to hijack, hard to evict
Confidential + ProprietaryConfidential + Proprietary
The Solution
Confidential + Proprietary
Sharing important security events across providers
Risk and Incident Sharing and Coordination WG
Confidential + Proprietary
Defenses grow to match attack surface
Confidential + Proprietary
How is this done technically?
● Security Events standards set by the Internet Engineering
Task Force (IETF)
○ Standardized transport system
● RISC standards built on top at OIDF
○ Standardized message format
Confidential + Proprietary
How is our users’ information shared?
● RISC signals are sent only to
the apps that we know the
user is using
● But…
○ Do we share everything
with everyone?
○ Do we share with every
connected app?
Confidential + Proprietary
Where you come in!
● Standardized trust framework for sharing
○ Common scope
○ Mutual terms
● Privacy is paramount
● User trust is essential
● Goal: Define the rules of the road for the whole ecosystem
○ Protecting all of our companies and users
Confidential + Proprietary
How? A Contract!
● Required to join trusted tester group
○ Pre-launch period until ~April
● To be used bilaterally going forward
● Open agreement to prevent bilateral negotiations
Confidential + ProprietaryConfidential + Proprietary
Google’s Plan
Confidential + Proprietary
How do we know the user’s apps?
Explicit
via OAuth
Implicit
registered via API
Request RISC for
alice@gmail.com
Contract
Required
For any app Only for major apps where
our users benefit
Confidential + Proprietary
Google + Contract
● Google will:
○ Treat this agreement as final
○ Share indiscriminately with explicit partners after launch
○ Only share with implicit partners with this agreement in place
● Google will not:
○ Negotiate bilateral amendments to this agreement
○ Accept implicit partners without extraordinary circumstances
Confidential + ProprietaryConfidential + Proprietary
The Data
Confidential + Proprietary
● State Changes!
○ Account disabled/enabled/deleted
○ Tokens/Sessions revoked
○ Credentials/Identifier changed
○ May include reasoning
● Not in scope:
○ “Riskiness”
○ Commands
What is shared?
Google moves from solid to liquid
Confidential + Proprietary
Signals in Scope
Account Status Events
● account_disabled
● account_disabled
○ reason=hijacking
● account_disabled
○ reason=bulk_account
● account_enabled
● account_credential_change_required
● account_deleted
● email_recovery_activated
Revoked Events
● sessions_revoked
● tokens_revoked
Identifier Change (future)
● account_email_changed
● account_identifier_recycled
● email_recovery_removed
● email_recovery_registered
Confidential + Proprietary
Up Next
[2:45 - 3:00] Review the current draft
[3:00 - 3:30] Feedback on the current draft
[3:30 - 4:00] Process for working together and making progress

More Related Content

PDF
OpenID Foundation RISC WG Update - 2017-10-16
PDF
OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect Federation Update
PDF
OIDF Workshop at Verizon Media -- 9/30/2019 -- Browser Changes Impacting Iden...
PDF
OpenID Foundation/Open Banking Workshop - OpenID Foundation Overview
PDF
OpenID Foundation Workshop at EIC 2018 - OpenID Enhanced Authentication Profi...
PDF
Open source iam value, benefits, and risks
PDF
OpenID Foundation RISC WG Update - 2018-04-02
PDF
OIDF Workshop at Verizon Media -- 9/30/2019 -- Continuous Access Evaluation P...
OpenID Foundation RISC WG Update - 2017-10-16
OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect Federation Update
OIDF Workshop at Verizon Media -- 9/30/2019 -- Browser Changes Impacting Iden...
OpenID Foundation/Open Banking Workshop - OpenID Foundation Overview
OpenID Foundation Workshop at EIC 2018 - OpenID Enhanced Authentication Profi...
Open source iam value, benefits, and risks
OpenID Foundation RISC WG Update - 2018-04-02
OIDF Workshop at Verizon Media -- 9/30/2019 -- Continuous Access Evaluation P...

What's hot (20)

PPTX
Security in microservices architectures
PDF
OpenID Connect vs. OpenID 1 & 2
PDF
Microservices Security: dos and don'ts
PPTX
Modern Authentication with OpenID Connect and IdentityServer 4 (umBristol - J...
PDF
Implementing security requirements for banking API system using Open Source ...
PDF
OpenID Connect Federation
PDF
OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect for Identity As...
PDF
Microservices Manchester: Security, Microservces and Vault by Nicki Watt
PPTX
Microservices Manchester: Authentication in Microservice Systems by David Borsos
PDF
Secure Webservices
PPTX
Ledingkart Meetup #3: Security Basics for Developers
PDF
Identity Server on Azure: A Reference Architecture
PDF
Authorization and Authentication in Microservice Environments
PDF
ICO and Cyber security - How to protect from hackers during ICOs
PPTX
WSO2 Product Release Webinar: WSO2 Identity Server 5.2.0
PPTX
Zero trust Architecture
PDF
Inter process communication
PPTX
Secure interoperation across cyber physical systems in smart societies with i...
PDF
[OPD 2019] Trusted types and the end of DOM XSS
PDF
FIWARE Training: API Umbrella
Security in microservices architectures
OpenID Connect vs. OpenID 1 & 2
Microservices Security: dos and don'ts
Modern Authentication with OpenID Connect and IdentityServer 4 (umBristol - J...
Implementing security requirements for banking API system using Open Source ...
OpenID Connect Federation
OIDF Workshop at Verizon Media -- 9/30/2019 -- OpenID Connect for Identity As...
Microservices Manchester: Security, Microservces and Vault by Nicki Watt
Microservices Manchester: Authentication in Microservice Systems by David Borsos
Secure Webservices
Ledingkart Meetup #3: Security Basics for Developers
Identity Server on Azure: A Reference Architecture
Authorization and Authentication in Microservice Environments
ICO and Cyber security - How to protect from hackers during ICOs
WSO2 Product Release Webinar: WSO2 Identity Server 5.2.0
Zero trust Architecture
Inter process communication
Secure interoperation across cyber physical systems in smart societies with i...
[OPD 2019] Trusted types and the end of DOM XSS
FIWARE Training: API Umbrella
Ad

Similar to OpenID Foundation's Risk Incident and Sharing Communication (RISC) Work Group Data Sharing Agreement Workshop - January 31, 2018 (20)

PDF
Becoming Unphishable
PPTX
PBL Encryption project.pptx
PDF
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
PDF
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
PDF
Blockade.io : One Click Browser Defense
PDF
Google Case Study - Towards simpler, stronger authentication
PDF
How Google Protects your Data
PDF
How Privacy in the Cloud Affects End-Users
PDF
How Privacy in the Cloud Affects Organizations
PPTX
New business opportunities in smart societies and industry 4.0
PDF
Creating a GDPR Action Plan; Not a Freakout Plan
PDF
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
PDF
Google Case Study: Strong Authentication for Employees and Consumers
PDF
Cybersecurity Awareness Training Presentation v1.3
PDF
Google peter logli & jake shea
PPTX
IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...
PPTX
Why care about GDPR and avoid over $20 million fines, even outside EU ?
PPTX
Privacy by Design as a system design strategy - EIC 2019
PDF
Accelerating Your GDPR Compliance with the WSO2 Platform
PDF
Security In The Public Cloud
Becoming Unphishable
PBL Encryption project.pptx
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
Google Case Study: Becoming Unphisable: Towards Simpler, Stronger Authenticat...
Blockade.io : One Click Browser Defense
Google Case Study - Towards simpler, stronger authentication
How Google Protects your Data
How Privacy in the Cloud Affects End-Users
How Privacy in the Cloud Affects Organizations
New business opportunities in smart societies and industry 4.0
Creating a GDPR Action Plan; Not a Freakout Plan
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
Google Case Study: Strong Authentication for Employees and Consumers
Cybersecurity Awareness Training Presentation v1.3
Google peter logli & jake shea
IEEE Standards Impact in IoT and 5G, Day 2 - Architectural Requirements for S...
Why care about GDPR and avoid over $20 million fines, even outside EU ?
Privacy by Design as a system design strategy - EIC 2019
Accelerating Your GDPR Compliance with the WSO2 Platform
Security In The Public Cloud
Ad

More from MikeLeszcz (12)

PDF
OpenID Foundation Workshop at EIC 2018 - Introduction to the FAPI Read & Writ...
PDF
OpenID Foundation Workshop at EIC 2018 - Mobile Driver's License Presentantion
PDF
OpenID Foundation Workshop at EIC 2018 - OpenID Connect Working Group Update
PDF
OpenID Foundation Workshop at EIC 2018 - OpenID Certification Update
PDF
OpenID Foundation Workshop at EIC 2018 - HEART Working Group Update
PPTX
OpenID Foundation Workshop at EIC 2018 - MODRNA Working Group Update
PDF
CIBA Profile Overview - OpenID Foundation/Open Banking Workshop - March 21, 2018
PDF
OpenID Certification Program Update - 2018-04-02
PDF
OpenID Foundation/Open Banking Workshop - Open Banking Update
PDF
OpenID Certification Program Update - 2017-10-16
PDF
Banking is Now More Open: Open Banking Update
PPTX
OpenID Foundation FastFed Working Group Update - 2017-10-16
OpenID Foundation Workshop at EIC 2018 - Introduction to the FAPI Read & Writ...
OpenID Foundation Workshop at EIC 2018 - Mobile Driver's License Presentantion
OpenID Foundation Workshop at EIC 2018 - OpenID Connect Working Group Update
OpenID Foundation Workshop at EIC 2018 - OpenID Certification Update
OpenID Foundation Workshop at EIC 2018 - HEART Working Group Update
OpenID Foundation Workshop at EIC 2018 - MODRNA Working Group Update
CIBA Profile Overview - OpenID Foundation/Open Banking Workshop - March 21, 2018
OpenID Certification Program Update - 2018-04-02
OpenID Foundation/Open Banking Workshop - Open Banking Update
OpenID Certification Program Update - 2017-10-16
Banking is Now More Open: Open Banking Update
OpenID Foundation FastFed Working Group Update - 2017-10-16

Recently uploaded (20)

PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PDF
Build Real-Time ML Apps with Python, Feast & NoSQL
PDF
Electrocardiogram sequences data analytics and classification using unsupervi...
PPTX
MuleSoft-Compete-Deck for midddleware integrations
PDF
LMS bot: enhanced learning management systems for improved student learning e...
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
PDF
Advancing precision in air quality forecasting through machine learning integ...
PPTX
Presentation - Principles of Instructional Design.pptx
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PDF
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PPTX
Build automations faster and more reliably with UiPath ScreenPlay
PDF
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
NewMind AI Weekly Chronicles – August ’25 Week IV
Build Real-Time ML Apps with Python, Feast & NoSQL
Electrocardiogram sequences data analytics and classification using unsupervi...
MuleSoft-Compete-Deck for midddleware integrations
LMS bot: enhanced learning management systems for improved student learning e...
Data Virtualization in Action: Scaling APIs and Apps with FME
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
SGT Report The Beast Plan and Cyberphysical Systems of Control
Advancing precision in air quality forecasting through machine learning integ...
Presentation - Principles of Instructional Design.pptx
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
Lung cancer patients survival prediction using outlier detection and optimize...
Co-training pseudo-labeling for text classification with support vector machi...
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
Build automations faster and more reliably with UiPath ScreenPlay
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...

OpenID Foundation's Risk Incident and Sharing Communication (RISC) Work Group Data Sharing Agreement Workshop - January 31, 2018