Upload
rachmat99
View
245
Download
0
Embed Size (px)
Citation preview
7/29/2019 Essential Guide EDI Security PDF
1/7
The essenTial Guide To
NAHID JILOVEC APRIL 2007
I
The essenTial Guide To
NAHID JILOVEC APRIL 2007
nformation security is not only a business
q, , g d
wh v p p. y kp
h s s , p ,
dvd d , d p d
hzd d . y gh
g h wh h w gz
d w dg p p wh -
.
b d hg (eDi) d h --
xpd pv
p, p gh h d p
wh gv d gv d, w
d v d. th -kw gv-
d g d h Hh i P
d a a (HiPaa), s-ox (soX), d
Gh-lh-b. bh h w d g d
k d .
Authenticationah (.., g) vd h dd v g. y h
v h d h d h dd p
v g g dg hg, dg
dd w h d d v
p q g d h d p
, d, dp g
ah p k pv k pph.
P k h h d d p
hzd dg p ( h dv), wh p
g g h vd k. i pv k h, h
d d v hv h k, d d
h p. th gh h pv k d v
.
y h g g vd iD,
pwd, Pin. y q p
(.g., v, gp g) v d. th
h hq iD d pwd,
ddd , dg (
Dg c pg 3 ).
f eDi gg, ansi X9.9 dd
p g h d (mac). th mac
pgph dvd hh d v h hzd
d h hzd v d p h g h
d. th mac p p d, dg , x,
d v p. o d hd, hd
hgd w.
Nonrepudiationnpd p pp , d q dg g. a
dg g v d hdw g
w . i dd g hd
- g h pvd vd
pp d h p d g d h
h hv d.
Dg g public key cryptography, whh
gh wh w d k. o k dg g
(.., d g g ) d
I
7/29/2019 Essential Guide EDI Security PDF
2/7
Order errors impacting your bottom line?
Ten percent of inventory shortages, lost profit and
slower revenue realization is caused by incorrect orders.
Inovis can help. We standardize document formats and
synchronize product data for streamlined informationflow across the order-to-payment lifecycle.
Let Inovis start helping you today.
Download our white paper Achieving the Perfect Order
at www.inovis.com/perfectorder.
Get TrustedLink System i today, the leader in System i data translation.
System i NewsApex Award,
Editors Choice, 2002 and 2004
Midrange SystemsBuyers
Choice Award, 5-time winner
Midrange ComputingTechnology
Excellence Award, 4-time winner
Let us show how we can help at booth #211 at COMMON, April 29May 1 in Anaheim, CA.
To jump-start the process, call us today at +1 877.4INOVIS (+ 1 877.446.6847) option 4, or visit us on the web at www.inovis.com/systemi.
Bring order to your orders.
You can with Inovis.
7/29/2019 Essential Guide EDI Security PDF
3/7
The essenTial Guide To edi seCuRiTY
v dg g (.., h g
g ). th w p k h pv k,
kw h g d d h dg g,
d h p k, d vg p v h dg
g. i h p d v h g
dg g, d h p k h.
ahgh h k h p h d, h
h dgd d pd ,
dv h pv k kwdg h p k.th, hgh pp gh kw h p k
gv g d v h g g, h
d h g pv k d g
dg g.
Authorizationo hd, p hz
hkg. th p hk gh d p
h dvd. s hv d- gh, d h
p d g.
y hk hz j h
p p, , d pg. i h
i p, h dg h pph d p h --
. th dg h p k
p h p h d h .
th p wh p h p k dp h
dg v h d d h v h
hz h . th k p
p h d h g xhgd, h pvdg
p h h d p.
ahz d gg
whh ph d
hzd . y ph
(.g., dg, g ) wh ph k, dg,
h h gpg. y
d wh - -d , ppg
, d, pp.
Encryptionep h hk g d, h d
g. y p X12 g wh ansi X9.23.
Hwv, p d d d d
g w d d v. i
p wh h d
, gh g dd d h dpd g
gh g.
ep d d g k v d h d v h h g
d. y h k.
s k h p d dp h d, -
k pvd hgh dg p d p.
Wh k, dp h d g h
k h d p . th p k -
(PKi) k . PKi
k p pv k d p k. th p k
v wh p h
d h p. th pp h h
p k p d h p.
th p dp h d wh pv k, h p-
vdg d xhg .
m p gh v. b h
gh d h dg d vg d,
p p v h p wh
h dg p.
Message Transportationy h w w pph g
v h i: e h g w
(x ) d h wh h g
(ddd ).
External security.D g d
- pk h i d h pd
pd. m w pkg -
pd kd -d kwdg h
whh d w vd d
DIGITAL CERTIFICATESA digital certificate is a digitally signed certificate of identity issued by a certification authority. The certification authority is a neutral party
that provides independent confirmation of the attributes of the users digital signature. To associate a key pair with a prospective signer,
a certification authority issues a certificate and an electronic record that lists a public key of the certificate, and confirms that the pro-
spective signer identified in the certificate holds the corresponding private key. The prospective signer is referred to as the subscriber.
A certificates function is to bind a key pair with a specific subscriber. A recipient of a certificate can use the public key in the certificate
to verify that the digital signature was created with the corresponding private key. If so, you know that the subscriber named in thecertificate holds the corresponding private key and created the digital signature.
The International Telecommunications Union (ITU) defines digital X.509 certificates. A digital certificate contains company information
such as name, serial number, expiration date, public keys, and the issuing authoritys signature.
The information contained within a certificate might vary, but the key is the integrity of the issuing authoritys signature. You should
manage certificate information with AS1 or AS2 software to simplify the management of trading partner information.
Certificates eventually expire. As certificates expire, it is important to communicate and manage expirations and renewals with trading
partners to ensure that EDI transactions continue flowing without interruption of service. If at any point an integrity question or concern
arises with a particular certificate, the issuing authority has the ability to revoke it.
N.J.
7/29/2019 Essential Guide EDI Security PDF
4/7
Order errors impacting your bottom line?
Ten percent of inventory shortages, lost profit and
slower revenue realization is caused by incorrect orders.
Inovis can help. We standardize document formats and
synchronize product data for streamlined informationflow across the order-to-payment lifecycle.
Let Inovis start helping you today.
Download our white paper Achieving the Perfect Order
at www.inovis.com/perfectorder.
Get TrustedLink System i today, the leader in System i data translation.
System i NewsApex Award,
Editors Choice, 2002 and 2004
Midrange SystemsBuyers
Choice Award, 5-time winner
Midrange ComputingTechnology
Excellence Award, 4-time winner
Let us show how we can help at booth #211 at COMMON, April 29May 1 in Anaheim, CA.
To jump-start the process, call us today at +1 877.4INOVIS (+ 1 877.446.6847) option 4, or visit us on the web at www.inovis.com/systemi.
Bring order to your orders.
You can with Inovis.
7/29/2019 Essential Guide EDI Security PDF
5/7
The essenTial Guide To edi seCuRiTY
h g h d. eDi
h v h i gd dd x
pp.
Embedded security. s vd w h
d h wh h g
. y p eDi h w wh h X12.58
dd. Wh ddd , h, p,
d h . td, as1 d as2 dd
h v h eDi- d Xml-d .
Intrusion Detectioni d kp hzd g
p . a wh , d
pp ph d ,
p . f , p-
g p w h hd
wdg d.
fw gh w p h
wk , x, h
g d vd iD,
pwd, iP dd, d .
fw hg phd, d dd h
h h
g g. fw p
wk .
th pp p w
iP pk. th
pk h v hgh
h w d h g d
d g .
y h d h p
p d, h dd d
h g, whh h iP dd
kw h .y w ggg .
th g wk d. i d d
d , h v d , h
d , d h z . th h
w w.
s gz p v h dd-
d ph w w h p i d
wk. th p wk d
g h d d g p.
m gz p px v. a h p
h w px v, d wh p
h , h h d hgh h px
v. Pxg h dvg g d kg
d h wk (.g., d d ,
iP dd, z).
Audit Loggingad ggg h k
d d v h gd, dd,
dd. ad ggg p p
d gd k
dg eDi d pp dg,
whh h
d hzd
dd
dd
pp vd
pd h pp
zd
d
p
EDI Then and Nows ph p d
p p p. b dd h i h x, d
hv px d k v
g. eDi w j k
h dv h i.
i , eDi w -d-wd
xhg d
dd . th j d -
p eDi dd
d v pv wk
d v-ddd wk (Van).Pv wk w
dg wh hd
g h h d d d
d g h. s dg
p d Van. Van w
d p,
h pvdd v h
w (.g., -
g, hvg).
Hwv, v eDi
pd. Van v
p, g eDi k -
p v. th w, , w h i, whh d h ddd d d
p. b , h, d pd hd
ddd w pg h g g h
p i.
EDI-INTW eDi qk zd h h i dd hv h
d d h Van dd, dd
h h v-ddd v, h hvg
d x g. rgd, gz wd
d w h i eDi xhg v
d pd p p -v d.
ag eDi v h i (eDi-int). eDi-int
h p: as1, as2, d as3.
AS1.th eDi-int p, app s 1 (as1),
p eDi d g s mpp
i m ex (s/mime) p v sp m
t P (smtP). th p eDi
d wppd - d wk h
h d. b w, p w x,
as1 g dd.
AS2. as2 HttP h p p--p
h w p d
7/29/2019 Essential Guide EDI Security PDF
6/7
The essenTial Guide To edi seCuRiTY
p d w h p. as2
pvd p hgh dg d
v HttP HttPs. t as2, hv
p d h i 24 h d, v
d wk, wh h w dj.
AS3. as3 h p eDi g v ftP
g h /v. as3 p v
s/mime d v ftP g /
v d. b ftP d-p d d v , d hv
d h i 24/7.
EDI Transaction Integrityo gv d, v p d wh h
k g h
p d pd d h d wh
kp d d hvd. t
d d, h
pv hzd d -
gd h g (dg
eDi ).
eDi pvd gdg h d pp qv . c
h d g v v wh
eDi , dg pp w, g w,
w, d /Van w (fg 1).
Application Softwareiv, g x d wh
pp, h pp hg dg
p q d. Hwv, hd z
hg pp d g.
uq dg p q hdd
- , x pg , wh h
g w .a hg h w hd w dd
hp h h w dd h g
w. f xp, pp w dd
d hd d dg ph d, h
pdg g w dd p
h . appg hp pv
d g wh h pp w .
Integration Softwareig w p pp p k
d. b g w -
dvpd, d p eDi q h
kp d h pp w . K d h hd g wh h w d h
d (.g., ph d ), h d
h g , d h dg p iD
. ag, h p wh h z
dg-pp q.
Translation Softwareo h k gg eDi g
wh h w. s
dd h dd; h p. b-
h vp (isa/iea, Gs/Ge, st/se). c d
hh h ctt, se, d Ge g. D d -
pg h vp k x g, d
kwdg pvd vd p.
th hg hd d (isa/iea g)
d q . y w
k d p g, dp, --q
. i h h isa d iea
g d h, d hk h p h . th g
(iea) p h gp
h v h
p d d vd . eh
pd wh d d
.
th gp hd d (Gs/
Ge g) d h q
h h. th (Ge)
d p h
h
gp, pvdg p
p. f xp, h dd h, wd kw h h ph d h
d w g.
th hd d (st/se g)
pvd ddd vd p wh h q
h h. th g (se)
h h g
(dg h st d se g).
th hh h ctt
g. th ctt w h h
d hh p -
. th h .
th d h hh d h
(.g., ph d) h . th h h d.
Functional Acknowledgmentsy h kwdg (fa) kwdg
p d g eDi d. ahgh h
d kwdg p h h d,
fa p p kwdg h hp vd
p pzg . y p eDi
g fa h eDi
vd. Hwv, v p kwdg,
h fa d wh h gg g
v.
i dd kwdg p, h fa pvd
vd d dg d
g . fa d
h pd, pd wh , jd.
th v d d wh fa gz d.
Communications Softwarec w h h eDi
g. i d k h i,
d p w k p : h d
d , d whh h
ApplicationSoftware
IntegrationSoftware
TranslationSoftware
VAN/CommunicationsSoftware
FIGURE 1. SOFTWARE LAYERS
7/29/2019 Essential Guide EDI Security PDF
7/7
The essenTial Guide To edi seCuRiTY
dd .
i h i, d g dd d p
d p h p. th
p d d z . t
h p, p d h .
Van v g d
pg h h gh g .
Van pvd d eDi
, dg h , wk (hg) , d d h d vd h
Van, d d h d pd h v
x, d d h v pkd p h d, d
d d h eDi d w wdd h
Van isP.
Van p wd v kg
w. th d
vd d p g d
h w v vd
h
h hp d
h v h h d
h h h wk vd
kwdgd d p h hw
h w vd kwdgd
d/dg p p h pvd
d vd
h h d vd gv pd
v p pvdg h d
dg p, g
vd x
vd x h
d p h v h d
h wk pvd, g
vd h wk pd
vd h wk d pd h dg
p x
pkd p dg p
jd h wk
Van hv v d p d h kp
d . i p z wh
Van d d g p. f xp, Van
gh h w g, h gh
. i g h p d
dg p d h wh.
r h g h i, h
p gh h p . b
, h d q Van,
whh dgd p eDi g. i h
i p, k h h
d p pvd d p
eDi d Xml v, dg p p,
h, d h d .
Decrease Your Exposurea wh , eDi hd h
p hzd d d . cp h
Van eDi g p p
hgh p, h hv h ddd Van pvd.
Hwv, hv d h eDi g
d v h i p
d h. Wh h d
d g g d h p. D kwh g g d d wh v
d. sp ddg as2 w eDi
w gh. cd h h wh
it p wh d k.
Nahid Jilovecis a System iNEWS technical editor.
Nahid Jilovecis a System iNEWS technical editor.
AbouttheAuthor