Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Pillar 2: Security - Key Management and Generation #44

Open
tlodderstedt opened this issue Aug 28, 2024 · 2 comments
Open

Pillar 2: Security - Key Management and Generation #44

tlodderstedt opened this issue Aug 28, 2024 · 2 comments

Comments

@tlodderstedt
Copy link

"Backup and Recovery: A robust key recovery system, or process, is critical to ensure users can regain access to their wallet(s)if the private keys are lost or compromised"

Can you please shed some light on how backup and recovery of keys should work if the wallet manages the keys in hardware? I think both aspects mutual exclude each other.

"Key Revocation: Processes for revoking and replacing compromised keys"

Wouldn't the issuer revoke the credential in case of a key compromise? I'm not aware of standards for key revocation.

"Private Key Management to prevent exposure during the rendering of transaction processes"

What does this mean?

@andy-tobin
Copy link

On your first point, we aren't going to specify particular implementation methods - those will be up to developers to execute. We acknowledge that there may be restrictions on backup/recovery mechanisms e.g. due to tight credential/device coupling (like in mDL) or restrictions on private key backup from secure areas. There are likely to be other credential types that are lower assurance level or 1-time issuance that have different requirements. We will add "where possible" to the text.

On the last point, thanks, we will expand on the explanation of "rendering" in that sentence.

@jcafik
Copy link
Contributor

jcafik commented Sep 3, 2024

What does this mean? "Private Key Management to prevent exposure during the rendering of transaction processes" :

While the rendering process itself is not typically involved in accessing private keys, there are potential security risks if vulnerabilities exist in the software or hardware used for rendering. For example, if a rendering application has a security flaw, it could be exploited by malicious actors to gain unauthorized access to sensitive data, including private keys

To mitigate such risks, it’s crucial to ensure that all software, including rendering applications, is kept up-to-date with the latest security patches. Additionally, using strong encryption and secure key management practices can help protect private keys from unauthorized access

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants
@tlodderstedt @andy-tobin @jcafik and others