SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
Buil
                                    Building Trust into eInvoicing:
                                    Key Requirements and Strategies
                                    Key R
                                    WHITE PAPER
                                          P




                                    Introduction
Executive Summary                   For years, the digitalization of assets has been underway, completely transforming entire
eInvoicing presents a host of       industries, from healthcare to music. In the same way, the move to digitalization has also
advantages for organizations        brought fundamental change to the way businesses manage invoices. By moving to electronic
looking to move away from paper-    invoicing, known as eInvoicing, organizations in a host of industries can realize a range of
based invoicing processes—but       benefits
these benefits can only be
realized if businesses can ensure     • Reduced costs. By eliminating the purchase of paper for invoice printing, reducing the
the integrity, accuracy, and            time and expense of physical invoice handling, reducing the space and expense of paper-
security                                based file storage, and eliminating postage, organizations can realize direct, upfront cost
of these digitalized files.              savings.
This paper looks at the key           • Boost operational efficiency. eInvoicing fosters streamlined processes for the creation,
requirements for building a             management, and distribution of invoices, and it enables integration with backend
secure eInvoicing infrastructure,       applications to enable streamlined controls.
and it describes how businesses
can both boost security and           • Speed invoice processing. By eliminating manual processes and physical mail,
optimize the business benefits of        organizations can significantly reduce billing and approval cycles.
their eInvoicing investments.         • Improved accuracy. By eliminating a host of manual, error-prone tasks, eInvoicing fosters
                                        increased accuracy in invoice creation.

                                      • Reduce carbon footprint. Electronic invoices reduce paper and printing usage and the
                                        fossil fuel usage associated with physical shipments.

                                    Beyond the benefits above, many organizations have been compelled to adopt eInvoicing
                                    approaches in order to comply with regulatory mandates. Examples of these mandates include
                                    the following:

                                      • European Directive on Invoicing. This measure was adopted in order to provide European
                                        Union member states with a single, simplified set of rules on invoicing, rather than
                                        contending with different rules across each state. To comply with this regulation, an
                                        eInvoice’s authenticity and integrity must be guaranteed through the use of electronic
                                        signatures or electronic data interchange (EDI).




                                    Building Trust into eInvoicing: Key Requirements and Strategies White Paper                      1
• Brazil Nota Fiscal (NF-e). This is the Brazilian Government’s rule regarding the use of
To effectively implement               electronic bill-of-lading files that document the movement of goods and services provided
secure eInvoicing,                     between parties. A legally valid NF-e document is associated with the issuer’s digital
organizations need to                  signature and guarantees receipt by tax authorities before the actual shipment of goods or
establish trust throughout             delivery of services.
the process. To do so, they
need capabilities to do the        Without Trust eInvoicing is not a Solution
following:                         For all the benefits outlined earlier however, eInvoicing simply isn’t feasible without the ability
• Ensure integrity of invoice      to ensure trust throughout the process. How can organizations ensure authorized personnel
• Provide non-repudiation of       have approved invoices, without a paper trail? How can organizations ensure digital files aren’t
  receipt and origin               modified after they’re generated and distributed? How can the business receiving an invoice be
• Secure electronic tracking and   sure it came from the business that claims to have sent it?
  storage.
                                   To effectively implement secure eInvoicing, organizations need to establish trust throughout the
• Scale to accommodate high
                                   process. To do so, they need capabilities to do the following:
  volumes of invoices.
                                     • Ensure integrity of invoice. All parties involved need to be certain that all invoice
                                       information, including amounts, billing addresses, payment information, and more, are
                                       accurate and haven’t been modified since original generation.

                                     • Provide non-repudiation of receipt and origin. Organizations need to be sure that, when
                                       eInvoices are generated and approved, these processes are verifiable, and can’t later be
                                       refuted or disavowed.

                                     • Secure electronic tracking and storage. Organizations need to have visibility into who has
                                       accessed an eInvoice, and ensure the storage and archival of eInvoices is secure.

                                     • Scale to accommodate high volumes of invoices. Organizations need to ensure that the
                                       processing of eInvoices can scale to meet immediate and long-term demands.

                                   The Role of HSMs in eInvoicing
                                   As outlined above, trust is a critical requirement for the feasibility of eInvoicing. Digital
                                   signatures, powered by encryption and public key infrastructure (PKI), represent the means for
                                   establishing trust in eInvoicing. Digital signatures give all parties the confidence required to trust
                                   that invoices come from known entities, and that they have not been altered in transit. In turn,
                                   these digital signatures need to have foolproof, comprehensive security mechanisms to protect
                                   them: If digital signatures are in any way compromised, the entire eInvoicing infrastructure will
                                   be compromised. This is where hardware security modules (HSMs) come into play.

                                   Cryptographic keys are used to lock and unlock access to digitalized information. Even if the
                                   strongest encryption algorithm is used, security is still weak if cryptographic keys are not
                                   adequately secured. HSMs are dedicated systems that physically and logically secure the
                                   cryptographic keys and cryptographic processing that are at the heart of digital signatures.

                                   HSMs support the following functions:

                                     • Life-cycle management, including key generation, distribution, rotation, storage,
                                       termination, and archival.

                                     • Cryptographic processing, which produces the dual benefits of isolating and offloading
                                       cryptographic processing from application servers.

                                   eInvoices are digitally signed with a secure private signing key, which requires an HSM capable
                                   of performing certificate authority management tasks. The HSM stores the keys within the
                                   secure confines of the appliance throughout the key life cycle. The HSM enables the organization
                                   to secure digitally certified invoices and to cryptographically bind the identity of the certifying
                                   party to the invoice. By storing cryptographic keys in a centralized, hardened device, HSMs can
                                   eliminate the risks associated with having these assets housed on disparate, poorly secured
                                   platforms. In addition, this centralization can significantly streamline security administration.




                                   Building Trust into eInvoicing: Key Requirements and Strategies White Paper                          2
The Advantages of HSMs
Compared to the process of storing cryptographic keys in software residing on general purpose
application servers, HSMs deliver several advantages:

Completeness
HSMs are fully contained solutions for cryptographic processing, key generation, and key
storage. As purpose-built appliances, they automatically include the required hardware
and firmware (i.e., software) in an integrated package. Physical and logical protection of the
appliance is supported by a tamper resistant/evident shell; and protection from logical threats,
depending on the vendor’s products, is supported by integrated firewall and intrusion prevention
defenses. Some HSM vendors also include integrated support for two-factor authentication.
Security certification is typically pursued by HSM vendors and positioned as a product feature.

Software for these same functions is not a complete out-of-the-box solution. Server hardware is
a separate purchase, unless unused servers are present, as is firewall, intrusion prevention, and
two-factor authentication. Being tamper resistant is not a trait typically associated with general-
purpose servers. Security certification encompassing the combination of hardware platform
and software would be the responsibility of the user organization and can be a lengthy and
very costly activity, especially if involvement with certification bodies is not standard operating
practice for the organization using the software.

Performance
Cryptography is a resource intensive process that will introduce latency to any application that
depends on it. Depending on the application involved and organization, the objective could be
to minimize the latency introduced by cryptography. HSMs have an advantage over software as
they are designed to optimize the efficiency of cryptographic processing. Compared to software
running on general purpose servers, HSMs will accelerate processing; an outcome of being
purpose-built.

Compliant and Secure
Frequently, cryptography is used to meet compliance mandates. Cryptography use, however,
does not guarantee that information is secure. Further, there are no security guarantees (i.e.,
promises of no security instances ever) with any security solution so the objective becomes one
of managing risk by reducing the number of vulnerabilities and the likelihood of vulnerabilities
being exploited. The aforementioned completeness attributes of HSMs allow organizations that
deploy HSMs to take efficient and simultaneous steps toward compliance and security.

Centralization of Key Management
An attribute of software is its portability; software can be installed on several servers.
Consequently, cryptographic keys have greater likelihood to reside in several locations/software
hosts. This multi-location characteristic will add to administrative complexity and potential
lapses in the life-cycle management of cryptographic keys (e.g., rotation and revocation). In
addition, if consistency in the protective layer of the software host (e.g., firewall, intrusion
prevention, and access control) cannot be ensured, the risk of keys being compromised
increases. With HSMs, the tendency is to store keys in a single unit. Not only does this streamline
administration and reduce the potential for management lapses but it also supports a
consistent layer of key protection.




Building Trust into eInvoicing: Key Requirements and Strategies White Paper                        3
The Benefits of eInvoicing with SafeNet
                                  SafeNet offers a broad set of HSMs that are ideally suited to the demands of eInvoicing
                                  infrastructures. By employing SafeNet HSMs, organizations can realize a range of benefits:

                                  Enhance Security and Ensure Compliance
                                  SafeNet HSMs deliver sophisticated security capabilities that enable businesses to enjoy
                                  maximum security in their eInvoicing implementations, ensuring optimal trust in the entire
                                  invoicing lifecycle. SafeNet HSMs address the following critical requirements:

                                    • Certification. Many SafeNet HSMs meet the demanding requirements of FIPS and Common
                                      Criteria certification.

                                    • Compliance. SafeNet HSMs offer the robust security capabilities that ensure compliance
“According to the European            with the European Directive on Invoicing, Brazil Notal Fiscal (NF-e), and other regulations.
Association of Corporate            • Multiple signatures. With SafeNet HSMs managing digital signatures, organizations can
Treasurers’ (CAST) Project, an        manage multiple signatures per invoice.
average cost savings of 80%
can be achieved by using
                                  Optimize Operational Performance
electronic invoicing.”
                                  By leveraging SafeNet’s secure HSMs in a secure eInvoicing deployment, organizations can
~ European Electronic Invoicing
                                  realize significant gains in operational performance:
Final Report
                                    • Efficient retrieval, processing. By working with electronic files, business can more quickly
                                      generate, locate, retrieve, and process invoices.

                                    • Elimination of time consuming, inefficient paper-based processes. Secure eInvoicing
                                      systems enable businesses to eliminate a host of manual, error-prone processes associated
                                      with the handling and distribution of paper invoices.

                                    • Improve vendor relations. By ensuring trust and optimizing speed and efficiency throughout
                                      the invoicing process, businesses can improve relationships with vendors.

                                  Reduced errors, reconciliation times. With eInvoicing, businesses can improve accuracy in
                                  invoice generation and approval processes, and, in the event of questions or disputes with a
                                  given invoice, businesses can much more quickly reconcile those issues and speed payment
                                  cycles.

                                    • Efficiency through back office integration. With a secure eInvoicing system in place,
                                      organizations are well equipped to integrate digital invoicing process with other backend
                                      applications, such as procurement and enterprise resource planning, which can lead to
                                      further efficiency and accuracy gains.

                                  Reduce Cost
                                  With SafeNet powering eInvoicing systems, businesses can realize an array of cost saving
                                  benefits. For example, by centralizing cryptographic keys and policy management on SafeNet
                                  HSMs, businesses can significantly reduce the administration associated with managing
                                  digital signatures in a distributed, disparate fashion. Also, by eliminating the need to do filing of
                                  paper invoices, business can reduce the overhead and expense of paper invoice storage costs.
                                  Finally, the digitization of invoices leads to significant reductions in the time and staffing costs
                                  associated with paper based invoicing processing.

                                  SafeNet’s Breadth of HSM Offerings
                                  SafeNet HSMs provide reliable protection for applications, transactions, and information assets
                                  by safeguarding the cryptographic keys that are at the heart of any encryption-based security
                                  solution. SafeNet HSMs are the fastest, most secure, and easiest to integrate application
                                  security solution for enterprise and government organizations to ensure regulatory compliance,
                                  reduce the risk of legal liability, and improve profitability.




                                  Building Trust into eInvoicing: Key Requirements and Strategies White Paper                            4
SafeNet offers these HSM products:
HSM Advantages:
• Completeness            General Purpose HSMs, Network Attached
• Performance              • Luna SA. Luna SA offers award-winning application protection through powerful
• Compliant and Secure       cryptographic processing and hardware key management. Luna PCI for Luna SA 4.1has
• Centralization of Key      received Common Criteria EAL4+ certification.
  Management                • Luna SP. The SafeNet Luna SP allows developers to securely deploy Web applications, Web
                              services, and other Java applications in a protected, hardened security appliance.

                            • Luna XML. SafeNet Luna XML is designed to secure next-generation XML Web services
                              and service-oriented architectures (SOAs). Other HSMs take months to integrate with
                              new applications due to complex security APIs. Luna XML has zero footprint on the
                              host application server, providing for rapid, independent, flexible, and highly scalable
                              deployments.

                            • ProtectServer External. The SafeNet ProtectServer External is a networkattached HSM
                              that connects via TCP/IP to a single machine or complete network (LAN) to function as a
                              central cryptographic subsystem that delivers symmetric and asymmetric cryptographic
                              services. All operations that would otherwise be performed on insecure servers are
                              securely processed within the HSM, ensuring that sensitive keys are always protected from
                              compromise.

                            • Luna SX. The SafeNet Luna SX is a central management console for rapid HSM setup and
                              easy remote administration for the SafeNet Luna SA and Luna SP. Using a simple GUI,
                              SafeNet HSMs can be managed remotely and securely.

                          General Purpose HSMs, Embedded
                           • Luna CA4 HSM. The SafeNet Luna CA4 offers a complete hardware security solution for
                             the protection of sensitive root keys belonging to certificate authorities used in public key
                             infrastructures (PKI).

                            • Luna PCI. SafeNet Luna PCI is designed to protect cryptographic keys and accelerate
                              sensitive cryptographic operations across a wide range of security applications.

                            • Luna PCM. SafeNet Luna PCM is a low-cost family of compact HSMs, offering hardware-
                              based key management and hardware-accelerated cryptographic performance within a
                              compact PCMCIA card.

                            • ProtectServer HSMs. For server systems and support applications that require high
                              performance symmetric and asymmetric cryptographic operations, ProtectServer Gold and
                              ProtectServer Internal-Express provide tamper-protected hardware security.

                          Customer Profile: Antwerp Port Authority
                          Challenge
                          The European Directive on Invoicing (EC/115/2001) requires member states, including Belgium,
                          to implement electronic invoicing into their local value-added tax (VAT) legislation to improve and
                          streamline cross-border invoicing. The VAT rules require suppliers to guarantee the authenticity
                          of origin and the integrity of the content for the invoices they create.

                          Solution
                          In order to comply with the VAT law, Antwerp Port Authority implemented an advanced e-invoice
                          solution based on digital signatures. Antwerp Port Authority leveraged its multi-partner
                          investment in Adobe’s LiveCycle Enterprise Suite (ES) and GlobalSign’s DocumentSign digital
                          certificates by selecting SafeNet’s hardware security modules (HSMs) for storage of digital
                          signatures and protection of cryptographic keys.




                          Building Trust into eInvoicing: Key Requirements and Strategies White Paper                       5
Benefits
The SafeNet, Adobe, and GlobalSign joint solution allows the Antwerp Port Authority to leverage
their IT investments and apply a compliant security solution that guarantees the authenticity
and integrity of electronic invoices. By applying digital signatures and encryption technologies
within a PKI network environment, Antwerp Port Authority quickly brought digital invoicing
processes online, thereby streamlining workflow, lowering costs, and meeting mandatory
European directives for compliance.


                  Supplier
         1
                                                                                                 Luna HSM with
                                                                      GlobalSign              Globalsign Certificate                      Supplier sends
                                                                      Certificates                                                      Email to customer
                                                                                                                                          containing the
             Supplier creates invoice for                                                                                               signed invoice PDF
             products or services sold to
                      customer                                                                                                              4

                                                  2                          3 Adobe LiveCycle ES
                                            Invoice is converted to     Adobe LiveCycle ES adds time stamp
                                             PDF format by Adobe         and digitally signs the PDF using a
                                                 LiveCycle ES           GlobalSign certificate that is securely
                                                                              stored on SafeNet HSM




                                                                                                                              Customer



                                                                                          6
                                                                                                                                        5
                                                                                     The PDF invoice is ready             Customer opens invoice PDF in
                                                                                       to be processed for             Adobe Reader to validate the digital
                                                                                      accounts payable and              signature and ensure integrity and
                                                                                      subsequent archiving                  authenticity of the invoice




When an eInvoice deployment integrates leading solutions like Addobe LiveCycle ES, GlobalSign certificates, and
SafeNet HSMs, organizations can enjoy optimal efficiency, and security, in their invoice processing.

Conclusion
eInvoicing presents organizations with a host of benefits when compared to paper-based
invoicing processes—including cost savings, improved efficiency and accuracy, and reduced
environmental impact. However, unless businesses can establish and ensure trust throughout
the process, any eInvoice initiative is doomed to fail. It is only by harnessing HSMs to fully
secure digital signatures and cryptographic keys that organizations can optimize the security
of their eInvoicing infrastructure. Today, SafeNet offers a broad range of HSMs, solutions that
accommodate the needs of a range of deployments, and ensure organizations enjoy maximum
return from their eInvoicing investments.

About SafeNet
Founded in 1983, SafeNet is a global leader in information security. SafeNet protects its
customers’ most valuable assets, including identities, transactions, communications, data
and software licensing, throughout the data lifecycle. More than 25,000 customers across
both commercial enterprises and government agencies and in over 100 countries trust their
information security needs to SafeNet.




Contact Us: For all office locations and contact information, please visit www.safenet-inc.com
Follow Us: www.safenet-inc.com/connected
©2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet.
All other product names are trademarks of their respective owners. WP (EN)-12.03.10


Building Trust into eInvoicing: Key Requirements and Strategies White Paper                                                                                   6

Weitere ähnliche Inhalte

Was ist angesagt?

Towards Better Patient Outcomes and Staying Well: The Promise of Cloud Comput...
Towards Better Patient Outcomes and Staying Well: The Promise of Cloud Comput...Towards Better Patient Outcomes and Staying Well: The Promise of Cloud Comput...
Towards Better Patient Outcomes and Staying Well: The Promise of Cloud Comput...
accacloud
 
Asia's Financial Services on the Cloud 2018: Regulatory Landscape Impacting t...
Asia's Financial Services on the Cloud 2018: Regulatory Landscape Impacting t...Asia's Financial Services on the Cloud 2018: Regulatory Landscape Impacting t...
Asia's Financial Services on the Cloud 2018: Regulatory Landscape Impacting t...
accacloud
 

Was ist angesagt? (20)

Towards Better Patient Outcomes and Staying Well: The Promise of Cloud Comput...
Towards Better Patient Outcomes and Staying Well: The Promise of Cloud Comput...Towards Better Patient Outcomes and Staying Well: The Promise of Cloud Comput...
Towards Better Patient Outcomes and Staying Well: The Promise of Cloud Comput...
 
Safe Cloud Principles for the FSI Industry 2014, endorsed by the Asia Cloud C...
Safe Cloud Principles for the FSI Industry 2014, endorsed by the Asia Cloud C...Safe Cloud Principles for the FSI Industry 2014, endorsed by the Asia Cloud C...
Safe Cloud Principles for the FSI Industry 2014, endorsed by the Asia Cloud C...
 
Asia's Financial Services on the Cloud 2018: Regulatory Landscape Impacting t...
Asia's Financial Services on the Cloud 2018: Regulatory Landscape Impacting t...Asia's Financial Services on the Cloud 2018: Regulatory Landscape Impacting t...
Asia's Financial Services on the Cloud 2018: Regulatory Landscape Impacting t...
 
2018 Cross-Border Data Flows: A Review of the Regulatory Enablers, Blockers, ...
2018 Cross-Border Data Flows: A Review of the Regulatory Enablers, Blockers, ...2018 Cross-Border Data Flows: A Review of the Regulatory Enablers, Blockers, ...
2018 Cross-Border Data Flows: A Review of the Regulatory Enablers, Blockers, ...
 
The Impact of Data Sovereignty on Cloud Computing in Asia 2013 by the Asia Cl...
The Impact of Data Sovereignty on Cloud Computing in Asia 2013 by the Asia Cl...The Impact of Data Sovereignty on Cloud Computing in Asia 2013 by the Asia Cl...
The Impact of Data Sovereignty on Cloud Computing in Asia 2013 by the Asia Cl...
 
2017 Towards Better Patient Outcomes and Staying Well: The Promise of Cloud C...
2017 Towards Better Patient Outcomes and Staying Well: The Promise of Cloud C...2017 Towards Better Patient Outcomes and Staying Well: The Promise of Cloud C...
2017 Towards Better Patient Outcomes and Staying Well: The Promise of Cloud C...
 
Regulating for a Digital Economy: Understanding the Importance of Cross-Borde...
Regulating for a Digital Economy: Understanding the Importance of Cross-Borde...Regulating for a Digital Economy: Understanding the Importance of Cross-Borde...
Regulating for a Digital Economy: Understanding the Importance of Cross-Borde...
 
SMEs in Asia Pacific: The Market for Cloud Computing - Case Studies of 14 mar...
SMEs in Asia Pacific: The Market for Cloud Computing - Case Studies of 14 mar...SMEs in Asia Pacific: The Market for Cloud Computing - Case Studies of 14 mar...
SMEs in Asia Pacific: The Market for Cloud Computing - Case Studies of 14 mar...
 
2011 ACCA Cloud Readiness Index
2011 ACCA Cloud Readiness Index2011 ACCA Cloud Readiness Index
2011 ACCA Cloud Readiness Index
 
2015 How important is Cloud Computing for building Crowd Networks? Crowdsourc...
2015 How important is Cloud Computing for building Crowd Networks? Crowdsourc...2015 How important is Cloud Computing for building Crowd Networks? Crowdsourc...
2015 How important is Cloud Computing for building Crowd Networks? Crowdsourc...
 
Report on Cloud Data Regulations 2014: A contribution on how to reduce the co...
Report on Cloud Data Regulations 2014: A contribution on how to reduce the co...Report on Cloud Data Regulations 2014: A contribution on how to reduce the co...
Report on Cloud Data Regulations 2014: A contribution on how to reduce the co...
 
26 Nov 2013 - Law and Policy Meet the Cloud, by Bernie Trudel [IIC-TRPC Singa...
26 Nov 2013 - Law and Policy Meet the Cloud, by Bernie Trudel [IIC-TRPC Singa...26 Nov 2013 - Law and Policy Meet the Cloud, by Bernie Trudel [IIC-TRPC Singa...
26 Nov 2013 - Law and Policy Meet the Cloud, by Bernie Trudel [IIC-TRPC Singa...
 
Asia Cloud Computing Association’s (ACCA) Response to India’s Draft Health Da...
Asia Cloud Computing Association’s (ACCA) Response to India’s Draft Health Da...Asia Cloud Computing Association’s (ACCA) Response to India’s Draft Health Da...
Asia Cloud Computing Association’s (ACCA) Response to India’s Draft Health Da...
 
The ASEAN Data Protection Index 2020
The ASEAN Data Protection Index 2020The ASEAN Data Protection Index 2020
The ASEAN Data Protection Index 2020
 
28 Feb 2012 - Asia Opportunity, by Mark Ross [Questex Asia, Hong Kong]
28 Feb 2012 - Asia Opportunity, by Mark Ross [Questex Asia, Hong Kong]28 Feb 2012 - Asia Opportunity, by Mark Ross [Questex Asia, Hong Kong]
28 Feb 2012 - Asia Opportunity, by Mark Ross [Questex Asia, Hong Kong]
 
2015 Asia's Financial Services: Ready for the Cloud - A Report on FSI Regulat...
2015 Asia's Financial Services: Ready for the Cloud - A Report on FSI Regulat...2015 Asia's Financial Services: Ready for the Cloud - A Report on FSI Regulat...
2015 Asia's Financial Services: Ready for the Cloud - A Report on FSI Regulat...
 
Cloud Readiness Index 2016 by the Asia Cloud Computing Association
Cloud Readiness Index 2016 by the Asia Cloud Computing AssociationCloud Readiness Index 2016 by the Asia Cloud Computing Association
Cloud Readiness Index 2016 by the Asia Cloud Computing Association
 
E-Magazine September Issue 2021
E-Magazine September Issue 2021E-Magazine September Issue 2021
E-Magazine September Issue 2021
 
Data Analytics to Bridge Knowledge Gaps 2016 - An ACCA White Paper on Supply ...
Data Analytics to Bridge Knowledge Gaps 2016 - An ACCA White Paper on Supply ...Data Analytics to Bridge Knowledge Gaps 2016 - An ACCA White Paper on Supply ...
Data Analytics to Bridge Knowledge Gaps 2016 - An ACCA White Paper on Supply ...
 
Cloud Readiness Index 2012 by the Asia Cloud Computing Association
Cloud Readiness Index 2012 by the Asia Cloud Computing AssociationCloud Readiness Index 2012 by the Asia Cloud Computing Association
Cloud Readiness Index 2012 by the Asia Cloud Computing Association
 

Andere mochten auch

icredit-einvoicing
icredit-einvoicingicredit-einvoicing
icredit-einvoicing
iCredit
 

Andere mochten auch (7)

CFO barometer: e-invoicing
CFO barometer: e-invoicingCFO barometer: e-invoicing
CFO barometer: e-invoicing
 
Assessing new business processes and technologies for eInvoicing
Assessing new business processes and technologies for eInvoicingAssessing new business processes and technologies for eInvoicing
Assessing new business processes and technologies for eInvoicing
 
"eInvoicing put to practice in The Netherlands and abroad."
"eInvoicing put to practice in The Netherlands and abroad.""eInvoicing put to practice in The Netherlands and abroad."
"eInvoicing put to practice in The Netherlands and abroad."
 
Digitale Nota
Digitale NotaDigitale Nota
Digitale Nota
 
icredit-einvoicing
icredit-einvoicingicredit-einvoicing
icredit-einvoicing
 
How to Manage E-invoicing Globally: The DHL Story
How to Manage E-invoicing Globally: The DHL Story  How to Manage E-invoicing Globally: The DHL Story
How to Manage E-invoicing Globally: The DHL Story
 
Addressing the challenge of the new European Union Medical Device Regulation
Addressing the challenge of the new European Union Medical Device RegulationAddressing the challenge of the new European Union Medical Device Regulation
Addressing the challenge of the new European Union Medical Device Regulation
 

Ähnlich wie Building Trust into eInvoicing: Key Requirements and Strategies

Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
EY
 
Think twice before you sign again!
Think twice before you sign again!Think twice before you sign again!
Think twice before you sign again!
Process Fusion Inc
 
Authentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_webAuthentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_web
SafeNet
 

Ähnlich wie Building Trust into eInvoicing: Key Requirements and Strategies (20)

Why eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdfWhy eSignatures are Imperative for Data Security.pdf
Why eSignatures are Imperative for Data Security.pdf
 
Controls for Digital Signature (e-Sign) Cloud Network & eCommerce Application
Controls for Digital Signature  (e-Sign) Cloud Network & eCommerce ApplicationControls for Digital Signature  (e-Sign) Cloud Network & eCommerce Application
Controls for Digital Signature (e-Sign) Cloud Network & eCommerce Application
 
Strengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdfStrengthening Online Security with eSignatures.pdf
Strengthening Online Security with eSignatures.pdf
 
Carrie Peter
Carrie PeterCarrie Peter
Carrie Peter
 
Reducing the Risk of Fraud​ through Treasury Technology
Reducing the Risk of Fraud​ through Treasury TechnologyReducing the Risk of Fraud​ through Treasury Technology
Reducing the Risk of Fraud​ through Treasury Technology
 
Contribution of DSC in e-Governance .docx (1).pdf
Contribution of DSC in e-Governance .docx (1).pdfContribution of DSC in e-Governance .docx (1).pdf
Contribution of DSC in e-Governance .docx (1).pdf
 
How Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and SecurityHow Cloud-Based Service Providers Can Integrate Strong Identity and Security
How Cloud-Based Service Providers Can Integrate Strong Identity and Security
 
SecureMAG Vol 3
SecureMAG Vol 3SecureMAG Vol 3
SecureMAG Vol 3
 
E-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptxE-Lock AdaptAuth.pptx
E-Lock AdaptAuth.pptx
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Development of Digital Identity Systems
Development of Digital Identity Systems Development of Digital Identity Systems
Development of Digital Identity Systems
 
5 Digital Onboarding Trends To Watch In 2024.pdf
5 Digital Onboarding Trends To Watch In 2024.pdf5 Digital Onboarding Trends To Watch In 2024.pdf
5 Digital Onboarding Trends To Watch In 2024.pdf
 
Blue Bricks Business Collateral
Blue Bricks Business CollateralBlue Bricks Business Collateral
Blue Bricks Business Collateral
 
E-Lock digital signature solutions
E-Lock digital signature solutionsE-Lock digital signature solutions
E-Lock digital signature solutions
 
Hdfc case presentation
Hdfc case presentationHdfc case presentation
Hdfc case presentation
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)
 
Think twice before you sign again!
Think twice before you sign again!Think twice before you sign again!
Think twice before you sign again!
 
Authentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_webAuthentication_Best_Practices_WP(EN)_web
Authentication_Best_Practices_WP(EN)_web
 
Prudent vms plus v1.0
Prudent vms plus v1.0Prudent vms plus v1.0
Prudent vms plus v1.0
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information security
 

Mehr von SafeNet

Mehr von SafeNet (20)

eIDAS Reference Guide
eIDAS Reference GuideeIDAS Reference Guide
eIDAS Reference Guide
 
Whose Cloud is It Anyway - Data Security in the Cloud
Whose Cloud is It Anyway - Data Security in the CloudWhose Cloud is It Anyway - Data Security in the Cloud
Whose Cloud is It Anyway - Data Security in the Cloud
 
Whose Cloud Is It Anyway: Exploring Data Security Ownership and Control
Whose Cloud Is It Anyway: Exploring Data Security Ownership and ControlWhose Cloud Is It Anyway: Exploring Data Security Ownership and Control
Whose Cloud Is It Anyway: Exploring Data Security Ownership and Control
 
Cyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldCyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative World
 
Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility
Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and MobilityNot Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility
Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility
 
ProtectV - Data Security for the Cloud
ProtectV - Data Security for the CloudProtectV - Data Security for the Cloud
ProtectV - Data Security for the Cloud
 
Cloud Monetization: A Step-by-Step Guide to Optimizing Your SaaS Business Model
Cloud Monetization: A Step-by-Step Guide to Optimizing Your SaaS Business ModelCloud Monetization: A Step-by-Step Guide to Optimizing Your SaaS Business Model
Cloud Monetization: A Step-by-Step Guide to Optimizing Your SaaS Business Model
 
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
 
A Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise ApplicationsA Single Strong Authentication Platform for Cloud and On-Premise Applications
A Single Strong Authentication Platform for Cloud and On-Premise Applications
 
Securing Digital Identities and Transactions in the Cloud Security Guide
Securing Digital Identities and Transactions in the Cloud Security GuideSecuring Digital Identities and Transactions in the Cloud Security Guide
Securing Digital Identities and Transactions in the Cloud Security Guide
 
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
Securing Network-Attached HSMs: The SafeNet Luna SA Three-Layer Authenticatio...
 
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
Introduction to PKI & SafeNet Luna Hardware Security Modules with Microsoft W...
 
Cloud Computing and the Federal Government: Maximizing Trust Supporting the M...
Cloud Computing and the Federal Government: Maximizing Trust Supporting the M...Cloud Computing and the Federal Government: Maximizing Trust Supporting the M...
Cloud Computing and the Federal Government: Maximizing Trust Supporting the M...
 
Hardware Security Modules: Critical to Information Risk Management
Hardware Security Modules: Critical to Information Risk ManagementHardware Security Modules: Critical to Information Risk Management
Hardware Security Modules: Critical to Information Risk Management
 
Strong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling BusinessStrong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling Business
 
A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...A Question of Trust: How Service Providers Can Attract More Customers by Deli...
A Question of Trust: How Service Providers Can Attract More Customers by Deli...
 
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNetPayment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
 
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...
 
SafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server EncryptionSafeNet DataSecure vs. Native SQL Server Encryption
SafeNet DataSecure vs. Native SQL Server Encryption
 
Building Trust into DNS: Key Strategies
Building Trust into DNS: Key StrategiesBuilding Trust into DNS: Key Strategies
Building Trust into DNS: Key Strategies
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

Building Trust into eInvoicing: Key Requirements and Strategies

  • 1. Buil Building Trust into eInvoicing: Key Requirements and Strategies Key R WHITE PAPER P Introduction Executive Summary For years, the digitalization of assets has been underway, completely transforming entire eInvoicing presents a host of industries, from healthcare to music. In the same way, the move to digitalization has also advantages for organizations brought fundamental change to the way businesses manage invoices. By moving to electronic looking to move away from paper- invoicing, known as eInvoicing, organizations in a host of industries can realize a range of based invoicing processes—but benefits these benefits can only be realized if businesses can ensure • Reduced costs. By eliminating the purchase of paper for invoice printing, reducing the the integrity, accuracy, and time and expense of physical invoice handling, reducing the space and expense of paper- security based file storage, and eliminating postage, organizations can realize direct, upfront cost of these digitalized files. savings. This paper looks at the key • Boost operational efficiency. eInvoicing fosters streamlined processes for the creation, requirements for building a management, and distribution of invoices, and it enables integration with backend secure eInvoicing infrastructure, applications to enable streamlined controls. and it describes how businesses can both boost security and • Speed invoice processing. By eliminating manual processes and physical mail, optimize the business benefits of organizations can significantly reduce billing and approval cycles. their eInvoicing investments. • Improved accuracy. By eliminating a host of manual, error-prone tasks, eInvoicing fosters increased accuracy in invoice creation. • Reduce carbon footprint. Electronic invoices reduce paper and printing usage and the fossil fuel usage associated with physical shipments. Beyond the benefits above, many organizations have been compelled to adopt eInvoicing approaches in order to comply with regulatory mandates. Examples of these mandates include the following: • European Directive on Invoicing. This measure was adopted in order to provide European Union member states with a single, simplified set of rules on invoicing, rather than contending with different rules across each state. To comply with this regulation, an eInvoice’s authenticity and integrity must be guaranteed through the use of electronic signatures or electronic data interchange (EDI). Building Trust into eInvoicing: Key Requirements and Strategies White Paper 1
  • 2. • Brazil Nota Fiscal (NF-e). This is the Brazilian Government’s rule regarding the use of To effectively implement electronic bill-of-lading files that document the movement of goods and services provided secure eInvoicing, between parties. A legally valid NF-e document is associated with the issuer’s digital organizations need to signature and guarantees receipt by tax authorities before the actual shipment of goods or establish trust throughout delivery of services. the process. To do so, they need capabilities to do the Without Trust eInvoicing is not a Solution following: For all the benefits outlined earlier however, eInvoicing simply isn’t feasible without the ability • Ensure integrity of invoice to ensure trust throughout the process. How can organizations ensure authorized personnel • Provide non-repudiation of have approved invoices, without a paper trail? How can organizations ensure digital files aren’t receipt and origin modified after they’re generated and distributed? How can the business receiving an invoice be • Secure electronic tracking and sure it came from the business that claims to have sent it? storage. To effectively implement secure eInvoicing, organizations need to establish trust throughout the • Scale to accommodate high process. To do so, they need capabilities to do the following: volumes of invoices. • Ensure integrity of invoice. All parties involved need to be certain that all invoice information, including amounts, billing addresses, payment information, and more, are accurate and haven’t been modified since original generation. • Provide non-repudiation of receipt and origin. Organizations need to be sure that, when eInvoices are generated and approved, these processes are verifiable, and can’t later be refuted or disavowed. • Secure electronic tracking and storage. Organizations need to have visibility into who has accessed an eInvoice, and ensure the storage and archival of eInvoices is secure. • Scale to accommodate high volumes of invoices. Organizations need to ensure that the processing of eInvoices can scale to meet immediate and long-term demands. The Role of HSMs in eInvoicing As outlined above, trust is a critical requirement for the feasibility of eInvoicing. Digital signatures, powered by encryption and public key infrastructure (PKI), represent the means for establishing trust in eInvoicing. Digital signatures give all parties the confidence required to trust that invoices come from known entities, and that they have not been altered in transit. In turn, these digital signatures need to have foolproof, comprehensive security mechanisms to protect them: If digital signatures are in any way compromised, the entire eInvoicing infrastructure will be compromised. This is where hardware security modules (HSMs) come into play. Cryptographic keys are used to lock and unlock access to digitalized information. Even if the strongest encryption algorithm is used, security is still weak if cryptographic keys are not adequately secured. HSMs are dedicated systems that physically and logically secure the cryptographic keys and cryptographic processing that are at the heart of digital signatures. HSMs support the following functions: • Life-cycle management, including key generation, distribution, rotation, storage, termination, and archival. • Cryptographic processing, which produces the dual benefits of isolating and offloading cryptographic processing from application servers. eInvoices are digitally signed with a secure private signing key, which requires an HSM capable of performing certificate authority management tasks. The HSM stores the keys within the secure confines of the appliance throughout the key life cycle. The HSM enables the organization to secure digitally certified invoices and to cryptographically bind the identity of the certifying party to the invoice. By storing cryptographic keys in a centralized, hardened device, HSMs can eliminate the risks associated with having these assets housed on disparate, poorly secured platforms. In addition, this centralization can significantly streamline security administration. Building Trust into eInvoicing: Key Requirements and Strategies White Paper 2
  • 3. The Advantages of HSMs Compared to the process of storing cryptographic keys in software residing on general purpose application servers, HSMs deliver several advantages: Completeness HSMs are fully contained solutions for cryptographic processing, key generation, and key storage. As purpose-built appliances, they automatically include the required hardware and firmware (i.e., software) in an integrated package. Physical and logical protection of the appliance is supported by a tamper resistant/evident shell; and protection from logical threats, depending on the vendor’s products, is supported by integrated firewall and intrusion prevention defenses. Some HSM vendors also include integrated support for two-factor authentication. Security certification is typically pursued by HSM vendors and positioned as a product feature. Software for these same functions is not a complete out-of-the-box solution. Server hardware is a separate purchase, unless unused servers are present, as is firewall, intrusion prevention, and two-factor authentication. Being tamper resistant is not a trait typically associated with general- purpose servers. Security certification encompassing the combination of hardware platform and software would be the responsibility of the user organization and can be a lengthy and very costly activity, especially if involvement with certification bodies is not standard operating practice for the organization using the software. Performance Cryptography is a resource intensive process that will introduce latency to any application that depends on it. Depending on the application involved and organization, the objective could be to minimize the latency introduced by cryptography. HSMs have an advantage over software as they are designed to optimize the efficiency of cryptographic processing. Compared to software running on general purpose servers, HSMs will accelerate processing; an outcome of being purpose-built. Compliant and Secure Frequently, cryptography is used to meet compliance mandates. Cryptography use, however, does not guarantee that information is secure. Further, there are no security guarantees (i.e., promises of no security instances ever) with any security solution so the objective becomes one of managing risk by reducing the number of vulnerabilities and the likelihood of vulnerabilities being exploited. The aforementioned completeness attributes of HSMs allow organizations that deploy HSMs to take efficient and simultaneous steps toward compliance and security. Centralization of Key Management An attribute of software is its portability; software can be installed on several servers. Consequently, cryptographic keys have greater likelihood to reside in several locations/software hosts. This multi-location characteristic will add to administrative complexity and potential lapses in the life-cycle management of cryptographic keys (e.g., rotation and revocation). In addition, if consistency in the protective layer of the software host (e.g., firewall, intrusion prevention, and access control) cannot be ensured, the risk of keys being compromised increases. With HSMs, the tendency is to store keys in a single unit. Not only does this streamline administration and reduce the potential for management lapses but it also supports a consistent layer of key protection. Building Trust into eInvoicing: Key Requirements and Strategies White Paper 3
  • 4. The Benefits of eInvoicing with SafeNet SafeNet offers a broad set of HSMs that are ideally suited to the demands of eInvoicing infrastructures. By employing SafeNet HSMs, organizations can realize a range of benefits: Enhance Security and Ensure Compliance SafeNet HSMs deliver sophisticated security capabilities that enable businesses to enjoy maximum security in their eInvoicing implementations, ensuring optimal trust in the entire invoicing lifecycle. SafeNet HSMs address the following critical requirements: • Certification. Many SafeNet HSMs meet the demanding requirements of FIPS and Common Criteria certification. • Compliance. SafeNet HSMs offer the robust security capabilities that ensure compliance “According to the European with the European Directive on Invoicing, Brazil Notal Fiscal (NF-e), and other regulations. Association of Corporate • Multiple signatures. With SafeNet HSMs managing digital signatures, organizations can Treasurers’ (CAST) Project, an manage multiple signatures per invoice. average cost savings of 80% can be achieved by using Optimize Operational Performance electronic invoicing.” By leveraging SafeNet’s secure HSMs in a secure eInvoicing deployment, organizations can ~ European Electronic Invoicing realize significant gains in operational performance: Final Report • Efficient retrieval, processing. By working with electronic files, business can more quickly generate, locate, retrieve, and process invoices. • Elimination of time consuming, inefficient paper-based processes. Secure eInvoicing systems enable businesses to eliminate a host of manual, error-prone processes associated with the handling and distribution of paper invoices. • Improve vendor relations. By ensuring trust and optimizing speed and efficiency throughout the invoicing process, businesses can improve relationships with vendors. Reduced errors, reconciliation times. With eInvoicing, businesses can improve accuracy in invoice generation and approval processes, and, in the event of questions or disputes with a given invoice, businesses can much more quickly reconcile those issues and speed payment cycles. • Efficiency through back office integration. With a secure eInvoicing system in place, organizations are well equipped to integrate digital invoicing process with other backend applications, such as procurement and enterprise resource planning, which can lead to further efficiency and accuracy gains. Reduce Cost With SafeNet powering eInvoicing systems, businesses can realize an array of cost saving benefits. For example, by centralizing cryptographic keys and policy management on SafeNet HSMs, businesses can significantly reduce the administration associated with managing digital signatures in a distributed, disparate fashion. Also, by eliminating the need to do filing of paper invoices, business can reduce the overhead and expense of paper invoice storage costs. Finally, the digitization of invoices leads to significant reductions in the time and staffing costs associated with paper based invoicing processing. SafeNet’s Breadth of HSM Offerings SafeNet HSMs provide reliable protection for applications, transactions, and information assets by safeguarding the cryptographic keys that are at the heart of any encryption-based security solution. SafeNet HSMs are the fastest, most secure, and easiest to integrate application security solution for enterprise and government organizations to ensure regulatory compliance, reduce the risk of legal liability, and improve profitability. Building Trust into eInvoicing: Key Requirements and Strategies White Paper 4
  • 5. SafeNet offers these HSM products: HSM Advantages: • Completeness General Purpose HSMs, Network Attached • Performance • Luna SA. Luna SA offers award-winning application protection through powerful • Compliant and Secure cryptographic processing and hardware key management. Luna PCI for Luna SA 4.1has • Centralization of Key received Common Criteria EAL4+ certification. Management • Luna SP. The SafeNet Luna SP allows developers to securely deploy Web applications, Web services, and other Java applications in a protected, hardened security appliance. • Luna XML. SafeNet Luna XML is designed to secure next-generation XML Web services and service-oriented architectures (SOAs). Other HSMs take months to integrate with new applications due to complex security APIs. Luna XML has zero footprint on the host application server, providing for rapid, independent, flexible, and highly scalable deployments. • ProtectServer External. The SafeNet ProtectServer External is a networkattached HSM that connects via TCP/IP to a single machine or complete network (LAN) to function as a central cryptographic subsystem that delivers symmetric and asymmetric cryptographic services. All operations that would otherwise be performed on insecure servers are securely processed within the HSM, ensuring that sensitive keys are always protected from compromise. • Luna SX. The SafeNet Luna SX is a central management console for rapid HSM setup and easy remote administration for the SafeNet Luna SA and Luna SP. Using a simple GUI, SafeNet HSMs can be managed remotely and securely. General Purpose HSMs, Embedded • Luna CA4 HSM. The SafeNet Luna CA4 offers a complete hardware security solution for the protection of sensitive root keys belonging to certificate authorities used in public key infrastructures (PKI). • Luna PCI. SafeNet Luna PCI is designed to protect cryptographic keys and accelerate sensitive cryptographic operations across a wide range of security applications. • Luna PCM. SafeNet Luna PCM is a low-cost family of compact HSMs, offering hardware- based key management and hardware-accelerated cryptographic performance within a compact PCMCIA card. • ProtectServer HSMs. For server systems and support applications that require high performance symmetric and asymmetric cryptographic operations, ProtectServer Gold and ProtectServer Internal-Express provide tamper-protected hardware security. Customer Profile: Antwerp Port Authority Challenge The European Directive on Invoicing (EC/115/2001) requires member states, including Belgium, to implement electronic invoicing into their local value-added tax (VAT) legislation to improve and streamline cross-border invoicing. The VAT rules require suppliers to guarantee the authenticity of origin and the integrity of the content for the invoices they create. Solution In order to comply with the VAT law, Antwerp Port Authority implemented an advanced e-invoice solution based on digital signatures. Antwerp Port Authority leveraged its multi-partner investment in Adobe’s LiveCycle Enterprise Suite (ES) and GlobalSign’s DocumentSign digital certificates by selecting SafeNet’s hardware security modules (HSMs) for storage of digital signatures and protection of cryptographic keys. Building Trust into eInvoicing: Key Requirements and Strategies White Paper 5
  • 6. Benefits The SafeNet, Adobe, and GlobalSign joint solution allows the Antwerp Port Authority to leverage their IT investments and apply a compliant security solution that guarantees the authenticity and integrity of electronic invoices. By applying digital signatures and encryption technologies within a PKI network environment, Antwerp Port Authority quickly brought digital invoicing processes online, thereby streamlining workflow, lowering costs, and meeting mandatory European directives for compliance. Supplier 1 Luna HSM with GlobalSign Globalsign Certificate Supplier sends Certificates Email to customer containing the Supplier creates invoice for signed invoice PDF products or services sold to customer 4 2 3 Adobe LiveCycle ES Invoice is converted to Adobe LiveCycle ES adds time stamp PDF format by Adobe and digitally signs the PDF using a LiveCycle ES GlobalSign certificate that is securely stored on SafeNet HSM Customer 6 5 The PDF invoice is ready Customer opens invoice PDF in to be processed for Adobe Reader to validate the digital accounts payable and signature and ensure integrity and subsequent archiving authenticity of the invoice When an eInvoice deployment integrates leading solutions like Addobe LiveCycle ES, GlobalSign certificates, and SafeNet HSMs, organizations can enjoy optimal efficiency, and security, in their invoice processing. Conclusion eInvoicing presents organizations with a host of benefits when compared to paper-based invoicing processes—including cost savings, improved efficiency and accuracy, and reduced environmental impact. However, unless businesses can establish and ensure trust throughout the process, any eInvoice initiative is doomed to fail. It is only by harnessing HSMs to fully secure digital signatures and cryptographic keys that organizations can optimize the security of their eInvoicing infrastructure. Today, SafeNet offers a broad range of HSMs, solutions that accommodate the needs of a range of deployments, and ensure organizations enjoy maximum return from their eInvoicing investments. About SafeNet Founded in 1983, SafeNet is a global leader in information security. SafeNet protects its customers’ most valuable assets, including identities, transactions, communications, data and software licensing, throughout the data lifecycle. More than 25,000 customers across both commercial enterprises and government agencies and in over 100 countries trust their information security needs to SafeNet. Contact Us: For all office locations and contact information, please visit www.safenet-inc.com Follow Us: www.safenet-inc.com/connected ©2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet. All other product names are trademarks of their respective owners. WP (EN)-12.03.10 Building Trust into eInvoicing: Key Requirements and Strategies White Paper 6