acrobat livecycle security wp
TRANSCRIPT
-
7/29/2019 Acrobat Livecycle Security Wp
1/14
Technical Whitepaper
Purposehis white paper is intended to provide the reader with a brie overview o relevant
document securit y issues and technologies, as well as to introduce the Adobe suite o documen
security solutions. Te white paper also summarizes Adobe implementations or documentcontrol and digital signatures.
Executive summaryAs organizations move more business processes online, protecting the confidentiality and
privacy o inormation used during these processes, as well as providing authenticity and
integrity, are essential. Because many automated processes rely on electronic documents that
contain sensitive inormation, organizations must properly protect these documents. Many
inormation security solutions attempt to protect electronic documents only at their storage
location or during transmission. However, these solutions do not provide protection or the
entire liecycle o an electronic document. When the document reaches the recipient, the
protection is lost, and the document can be intentionally or unintentionally orwarded to and
viewed by unauthorized recipients.
A significantly more eective solution is to protect a document by assigning security parameters
that travel with it. Six criteria must be met in order to provide more eective protection or an
electronic document throughout its liecycle:
Confidentiality
2 Authorization
Accountability
4 Integrity
5 Authenticity
Non-repudiation
Te two major security techniques used to establish these six document security criteria aredocument control and digital signatures.
Te Adobe suite o security solutions delivers document control and digital signature services that
simpliy the process o protecting sensitive electronic documents and orms. Organizations can
easily integrate Adobe document security solutions into current business processes and enterprise
inrastructure to support a wide range o simple and complex processes. Adobe solutions
dynamical ly protect electronic documents inside and outside the network, online and oine to
provide persistent, end-to-end protection throughout an electronic documents liecycle.
Table of contents
1 Executive summary
2 Introduction
3 How to provide persistentdocument security
4 Document control
4 Confidentialityencryption
5 Authorization
6 Accountability
6 Digital signatures
6 Integrity
7 Authenticity
7 Non-repudiation
7 Public key inrastructure
8 Adobe security solutions
for end-to-end document
protection
9 Summary o Adobe securitycapabilities
9 Adobe Acrobat and Adobe
Reader
10 Adobe LiveCycle Reader
Extensions
10 Adobe LiveCycle Rights
Management ES
11 Adobe LiveCycle Digital
Signatures ES
12 Summary o Adobe document
control implementation
12 Summary o Adobe digital
signature implementation
13 Partner integrations
13 Conclusion
13 Appendix: Adobe standardsand technology
A primer on electronicdocument securityHow document control and digital signaturesprotect electronic documents
http://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdfhttp://c/Marcom_Source/Server_Products/7937_livecycle_es_updates/sourcefiles/securityprimer/95004100_Security_WP-UE.pdf -
7/29/2019 Acrobat Livecycle Security Wp
2/14
A primer on electronic document security
Introduction
As organizations move more business processes online, protecting the confidentiality and privacy
o the inormation used during these processes is essential . Because many automated processes rely
on electronic documents that contain mission-critical, personal, and sensitive inormation,
organizations must make significant investments to properly protect these documents.
Tere are three main reasons that organizations need to address the security o electronically
shared documents:
Regulatory requirementsMany companies are directly or indirectly aected by governmentmandates and regulations or providing consumer privacy. Tese include:
Health Insurance Portability and Accountability Act (HIPAA)Protection or health-related data
Gramm-Leach-Bliley ActFinancial privacy
European Union Directive on Privacy and Electronic Communications
Privacy Acts o Japan and Australia
Caliornia SB 8Privacy notification
Caliornia AB 50Protection o customer data
Return on investment (ROI)Organizations can achieve significant ROI by migrating to
electronic business processes. Automated workflows allow prospects, customers, partners, andsuppliers to part icipate, enabling organizations to reap significant cost savings while improving
customer satisaction and loyalty. However, many workflows cannot be automated until
adequate protections are put in place on the electronically shared inormation. For instance, how
can you be sure that the bank statement you received is truly rom your bank (authenticity), that
it has not been altered in transit (integrity), and that it has not been viewed by someone other
than the intended recipient (confidentiality)?
Inormation securityTes o proprietary inormation are increasing, which can jeopardize
revenue, competitive advantage, and customer relationships; generate negative publicity; and
result in significant penalties and fines or ailure to comply with privacy laws.
Many inormation security solutions attempt to protect electronic documents only at
their storage location or during transmission. For example, organizations rely on document
management systems and virtual private networks (VPNs) to protect documents. With this
approach document security remains a problem because these solutions secure only the
communication line or storage site; they do not provide protection or the actual content o an
electronic document throughout its liecycle. When the document reaches the recipient, the
protection is lost, and the document can be intentionally or unintentionally orwarded to and
viewed by unauthorized recipients. Consequent ly, many organizat ions are orced to engage in an
inconsistent combination o online and paper processes in which sensitive documents must still
be printed and physically delivered to achieve adequate security. As a result, the potential
benefits o online processing cannot be ully realized.
-
7/29/2019 Acrobat Livecycle Security Wp
3/14
A primer on electronic document security
How to provide persistent document security
A significantly more eective solution or protecting an electronic document is to assign security
parameters that are an integral part o the document itsel. Te ollowing criteria define
persistent document security:
ConfidentialityWho should have access to the document?
AuthorizationWhat permissions does the user have or working with the document?
AccountabilityWhat has the recipient done with the document?
IntegrityHow do you know i the document has been altered?
AuthenticityHow do you know where the document came rom?
Non-repudiationCan the signatory deny signing the document?
1
F
S
T
J
T
U
FO
DF
1
F
S
T
J
T
U
F
O
DF
$POmEFOUJBMJUZ
FODSZQUJ
PO
"VUIPSJ[BUJPO"DDP
VOUBCJMJUZ
*OUFHSJUZ
"VUIFOUJDJUZ
/PO3FQVEJBUJPO
%P
D VN F
O U $ P O U SPM
%JH
JU B M 4 J H O B U V S FT
Six key criteria or providing persistent document security
4FDVSF5IJT%PDVNFOU
3FWPLF5IJT%PDVNFOU
7JFX"VEJU)JTUPSZ'PS5IJT%PDVNFOU
%P/PU"MMPX1SJOUJOHPG5IJT%PDVNFOU
4FDVSF1%'%FMJWFSZ
Document control provides confidentiality, authorization, and accountability. The illustration above shows some o the
document control options available with Adobe LiveCycle Policy Server and Adobe Acrobat sotware.
Te ollowing sections survey the major technologies used to provide document control and
digital signatures and identiy the technologies Adobe has implemented or its document
security solutions.
Document control plus digital signatures
means persistent document security
-
7/29/2019 Acrobat Livecycle Security Wp
4/14
A primer on electronic document security
Document controlConfidentialityencryption
Encryption is the process o transorming inormation (plaintext) into an incomprehensible
orm (ciphertext). Encryption is an eective technique or managing document access.
Decryption is the reverse process that transorms ciphertext back to the original plaintext.
Cryptographyreers to the two processes o encryption and decryption and its implementation
is reerred to as a cryptosystem.
Popular encryption systems use the concept o keys. An encryption key is data that combineswith an encryption algorithm to create ciphertext rom plaintext and recover plaintext rom
ciphertext. oday, security experts widely agree on Kerckhos principle as the basis o an
eective cryptosystem. Kerckhos principle states that the key is the only portion o a
cryptosystem that must remain secret or the entire system to be secure. I the strength o the
cryptosystem relies on the act that an attacker does not know how the algorithm works, then it
is just a matter o time beore it can be reverse-engineered and broken.
wo main types o encryption keys include symmetric and asymmetric.
Symmetric keys
Symmetric key cryptography uses the same key or both encryption and decryption and is very
ast and dicult to break with large keys. However, because both parties need the same key or
eective communication to occur, key distribution becomes an issue. oday, common
symmetric key encryption algorithms are AES, DES, DES, and RC4. Adobe products leverage
AES (28- and 25-bit) and RC4 (28-bit), as they have evolved into very strong standards.
Asymmetric keys
Asymmetric key cryptography, also ca lledpublic key cryptography, uses key pairs or encryption
and decryption. For instance, i the first key encrypts the content, then the second key o the pai
decrypts the content. Similarly, i the second key is used to encrypt the in ormation, then the
first key must be used to decrypt the content.
ypically, one key in the pair is labeled as the public key and the other as the private key. An
individual keeps the private key secret, while the public key is reely distributed to others who
wish to communicate with the individual. When someone wishes to send the individual a
confidential message, he or she can encrypt it with the reely available public key and send the
ciphertext to the individual. Because the individual is the only one who has the private key, he or
she is the only one who can decrypt the content.
Asymmetric keys help solve the key distribution problem, but the algorithms tend to be slower
or equivalent strengths. Some common asymmetric algorithms are RSA, DSA, and El Gamal.
Adobe leverages RSA (52-, 024-, and 2048-bit) as it has evolved into a global standard.
Hybrid Encryption
Security systems tend to use a hybrid solution to increase the security and speed o encrypting
documents. One approach is to use asymmetric keys to protect the symmetric keys, and then use
the symmetric keys or encrypting the inormation. Tis technique helps to solve both the key
distribution challenge o symmetric key cryptography while solving the perormance problem o
asymmetric key cryptography. Adobe Acrobat soware leverages hybrid approaches so single
documents can be protected or multiple recipients, each possessing unique key pairs. Te file
size is not significantly increased during this method because the entire document does not need
to be encrypted or each person. Instead, the document is encrypted with a single symmetric key
and that symmetric key is encrypted or each recipient with their respective public key.
-
7/29/2019 Acrobat Livecycle Security Wp
5/14
A primer on electronic document security
Authorization
In addition to managing who can open a document, organizations gain additional protection
through authorization. Authorization specifies what a user can do with a document and is
achieved via permissions and dynamic document control.
Permissions govern a users actions while working with a protected document. Permissions
can speciy whether or not a recipient who has access to the document is allowed to print or
copy content, fill in fields, add comments or annotate the document, insert or remove pages,
orward the document, access the document ofne, digital ly sign the document, and so orth.
Dynamic document control maintains access rights and permissions assigned to an electronic
document once it has been published and distributed. A documents author can make changes
to a released document without having to manually redistribute it since the changes are
automatically pushed to all existing versions o the document no matter where they reside.
Using dynamic document control, organizations can manage and monitor electronic
document use inside and outside the firewall, online and ofne, and across multiple document
Dynamic document control includes the ollowing capabilities:
Document expiration and revocationPost-publication document control can
be maintained through the application o expiration dates and the ability to revoke access to a
document. For example, an author can send a document that will expire in two weeks so that
recipients will not be able to access it once the expiration date has passed. Or, access to a
document can be automatically revoked i an authorized recipient leaves the project or changesdepartments.
Ofne access managementOrganizations can manage how long an authorized recipient can
access a document ofne. Once the specified length o time has passed, the recipient can no
longer view the document and must go back online to gain urt her access. Any access or
permission changes that the author has made to the distributed document will be applied when
the recipient goes back online.
Persistent version controlContent and document management systems provide an eective
mechanism or version control as long as a document stays within the confines o the system.
Persistent version control expands on these capabilities by maintaining version control outside
the system and ofne. It allows document authors to make changes to a documents usage
policies and prevent the obsolete version rom being accessed while providing end users with
the location o the updated version, no matter where the document resides.
Epdvnfou!Tfdvsjuz
Authorization is achieved via permissions and dynamic document control. These are some o the authorization options
and levels o dynamic document control available with Adobe Acrobat and Adobe LiveCycle Policy Server.
-
7/29/2019 Acrobat Livecycle Security Wp
6/14
A primer on electronic document security
Accountability
Document auditing allows organizations to maintain accountability with regard to t he use o
protected documents, because they can know precisely:
How a recipient has used a document
How oen each type o usage occurred
When that usage occurred
Accountability is achieved when an author can track each recipients use o a document or each
permission assigned (such as allowing a user to fill in fields on a orm, print, orward, save a copy
and so orth.) Auditing should include automatic notifications about the use o protected
documents. For example, a customer service representative sends a customer a t ime-critical
electronic statement that requires an action on the customers part, such as a reply or digital
signature. Once the customer receives the electronic document, the representative is
automatically notified when the customer opens it. I the customer ails to open the document,
the representative is notified aer 24 hours. Alternatively, a customer relationship management
(CRM) system can leverage ailure notification to initiate an escalation or specific ollow-up task
by the customer service representative.
Digital signaturesWhen enterprises distribute documents electronically, it is oen important that recipients can veriy:
Tat the content has not been altered (integrity)
Tat the document is coming rom the actual person who sent it (authenticity)
Tat an individual who has signed the document cannot deny the signature(non-repudiation)
Digital signatures address these security requirements by providing greater assurances o
document integrity, authenticity, and non-repudiation.
Integrity
Digital signatures enable recipients to veriy the integrity o an electronic document that is used
in one-way or round-trip workflows. For example, when a digital signature is applied to a
quarterly financial statement, recipients have more assurance that the financial inormation has
not been altered since it was sent. Methods or maintaining integrity include:
Parity bits or cyclical redundancy checking (CRC) unctionsCRC unctions work well or
unintentional modifications, such as wire intererence, but they can be circumvented by aclever attacker.
One-way hashA one-way hash creates a fixed-length value, called the hash value or message
digest or a message o any length. A hash is like a unique fingerprint. With a hash attached to
the original message, a recipient can determine i the message was altered by recomputing the
hash and comparing his or her answer to the attached hash. Common hashing algorithms are
MD5, SHA-, and SHA-25. Adobe has adopted the SHA- and SHA-25 algorithms because o
their wide acceptance as a security standard.
Message Authentication Codes (MAC)A MAC prevents an attacker rom obtaining the
original message, modiying it, and attaching a new hash. In this case, a symmetric key is
connected to the MAC and then hashed (HMAC). Without the key, an attacker cannot orge a
new message. Adobe uses HMACs where appropriate.
&INAL2EVIEWER&OR6ERIFICATION0URPOSES
$IGITALLYSIGNEDBY*OHN3MITH$N#.*OHN3MITH#53$ATE*OHN3MITH
Digital signatures veriy
the integrity o an
electronic document
-
7/29/2019 Acrobat Livecycle Security Wp
7/14
A primer on electronic document security
Authenticity
Digital signatures provide document authenticity by veriying a signers digital identity. For
example, a digitally signed quar terly financial statement allows recipients to veriy the identity o
the sender and assures them that the financial inormation has not been a ltered since it was sent
Digital signatures are created using asymmetric key cryptography. For document encryption, a
documents author encrypts a document using a public key. Because the recipient is the only
person with the private key, he or she is the only one who can decrypt the message. Digital
signatures reverse the use o public and private keys or document authenticity. Te author
encrypts the hash o the message with a private key. Only the public key can correctly decrypt
the hash and use it to see i it matches a new hash o the document. Because recipients o the
document have the authors public key, they gain greater assurances that the individual who
signed the document was the person who encrypted the original hash.
he process that constitutes a digital signature is as ollows:
A hash is created o the original document.
Te digital signature is created, which encrypts the hash with a private key.
Te signature is included with the document.
Adobe Acrobat supports multiple digital signatures placed anywhere in the document or proper
presentation. In act, Adobe Acrobat tracks all previously signed versions within the documen
or easy verification o changes made during the documents liecycle. Furthermore, Adobe oers
a certified signature, which is the first signature on the document. With a certified signature,the author can speciy what changes are allowed or integrity purposes. Adobe Acrobat will then
detect and prevent those modifications.
&INAL2EVIEWER&OR6ERIFICATION0URPOSES
$IGITALLYSIGNEDBY*OHN3MITH$N#.*OHN3MITH#53$ATE*OHN3MITH $FSUJmDBUF"VUIPSJUZ
Digital signatures veriying a signers digital identity
Adobe Acrobat tracks all previously signed
versions within the document or easy
verification o changes made during the
documents liecycle
Non-repudiation
Non-repudiation is a document security service that prevents the signor o the document rom
denying that they signed the document. Support or this serv ice is oen driven by authentication
and time-stamping capabilities.
Public key infrastructure (PKI)
Public key inrastructure (PKI) mainly provides a digital certificate that enables a documents
recipient to know whether or not a specific public key really belongs to a specific individual.
Digital certificates bind a person (or entity) to a public key. Certificate authorities (CA) issue
these certificates and recipients must trust the CA who issued the certificate. X.50 is the widely
accepted certificate standard that Adobe uses.
I a certificate expires or a private key is compromised, the CA will revoke the cert ificate and
record the revocation. As part o the process o authenticating a digital certificate, recipients
can check the certificates status. Certificate validity can be checked using the ollowing
standard methods:
Certificate revocation list (CRL)
Online Certificate Status Protocol (OCSP)
Adobe uses both CRL and OCSP.
-
7/29/2019 Acrobat Livecycle Security Wp
8/14
A primer on electronic document security
Te ollowing additional mechanisms can make up a PKI:
Public-Key Cryptography Standards (PKCS)A set o standard protocols or PKI used by
multiple vendors. Te standards include RSA encryption, password-based encryption,
extended certificate syntax, and cryptographic message syntax or secure multipurpose
Internet mail extensions (S/MIME).
Registration authorityUsed to run background checks on individuals who wish to obtain
a certificate.
Certificate repositoryRepositories that house digital certificates.
Key update, backup, recovery, and historyMechanisms or key maintenance and archiving. Cross-certificationIn the absence o a single global PKI, which is highly unlikely, this
mechanism allows users rom one PKI to validate certificates rom users in another trusted PKI.
Time stampingA critical component o non-repudiation that oers a time stamp rom a
trusted third party.
Adobe has been delivering persistent
document security solutions for more
than ten years
In partnership with leading security vendors,
Adobe has been delivering persistent
document security solutions or more than
ten years. Since Adobe Acrobat was
introduced in 1994, Adobe has enabled
organizations to more successully manage
electronic document use by encry pting
Adobe PDF files and assig ning user access
permissions. Beginning in 1999, Adobe
Acrobat 4.0 oered organizations the ability
to apply digital signatures to Adobe PDF files
or greater assurance o document
authenticity, integrity, and non-repudiation.
Adobe security solutions or end-to-end document protection
A significantly more eective solution or protecting an electronic document is to assign security
parameters that are an integral part o the document itsel. Tis approach dierentiates the
Adobe document security solutions, which enable organizations to more eectively manage theuse o electronic documents with persistent protection. By applying security parameters to the
individual document, organizations gain greater assurance in the confidentiality, authenticity,
and integrity o electronically shared documents in addition to securing the communication line
or storage location.
As organizations accelerate online processing, Adobe security solutions deliver document
control and digital signature services t hat simpliy the process o protecting sensitive electronic
documents and orms. Because Adobe solutions are designed to protect electronic documents
inside and outside the network, online and ofne, organizations can more easily extend the use
o electronic processes to reduce costs or sharing inormation and increase customer
satisaction and loyalty. It is important to note that security is not an all or nothing proposal.
Security proessionals must practice proper risk mitigation when evaluating solutions or their
organizations. Adobe helps with this endeavor by oering a wide range o support rom solutionsor simple assurance levels, such as click-wrap agreements, personal identification numbers
(PINs), and passwords to those requiring stronger assurance levels, such as soware PKI, two-
actor authentication with tokens, or three-actor authentication with biometrics.
Adobe document security provides persistent, end-to-end protection throughout an electronic
documents liecycle, including desktop solutions that make it easy or every user in an
organization to protect documents and server-based solutions that automate the application and
monitoring o document protection on an enterprise-wide basis. Whether e-mailing monthly
4JHOBUVSFJTWBMJETJHOFE
CZ+PIO4NJUI
5IFEPDVNFOUIBTOPU
CFFONPEJmFETJODFUIJT
TJHOBUVSFXBTBQQMJFE
5IFEJHJUBMTJHOBUVSFXBT
BQQMJFEBUBDFSUBJOUJNF
&INAL2EVIEWER&OR6ERIFICATION0URPOSES
$IGITALLYSIGNEDBY*OHN3MITH$N#.*OHN3MITH#53$ATE*OHN3MITH
Digital signatures address security requirements by providing greater assurances o document integrity, authenticity,
and non-repudiation.
-
7/29/2019 Acrobat Livecycle Security Wp
9/14
A primer on electronic document security
statements, making tax orms available on citizen porta ls, sending design documents to
partners or review, approving loan applications, or preparing financial reports, Adobe helps
organizations conduct these processes with greater assurance o document confidentiality,
integrity, authenticity, non-repudiation, and accountability.
Summary of Adobe security capabilities
Adobe AcrobatFamily*
Adobe Reader Adobe LiveCycleReader Extensions
ES
Adobe LiveCycleDigital Signatures
ES
Adobe LiveCycleRights Management
ES
Quickly create secure
documentsrom native
applications
Use the ree, cross-
platorm solution to
view and interact with
protected documents
Easily share protected
interactive Adobe PDF
documents with
external parties
Automate the process
o encrypting and
digitally signing
thousands o
electronic documents
Dynamically apply
document usage rights
to manage use online,
oine, inside the
network, and outside
the network
Encrypt/decryptdocuments usingshared passwords, PKI,and Adobe LiveCyclePolicy Server sotware
Validate recipientsdigital signatures
Activate additionalunctionality in theree Adobe Readerto enable ofne ormfilling and digitalsignatures
Encrypt/decryptdocuments usingshared passwordsand PKI
Manage printing,content copying, ormfilling, digital signatureuse, screen readeraccess, review andcomment use, pageinsertion, deletion, androtation
Apply and validaterecipients digitalsignatures
Veriy author-certifieddocuments
Automatically applydigital signatures
Manage online andofne access
Create and veriyauthor-certified
documents
Apply recipient digitalsignatures
Automatically veriydigital signatures
Includes server andclient extensions or
PDF, Word, and Excel
Manage printing,content copying, ormfilling, digital signatureuse, screen readeraccess, review andcomment use, pageinsertion, deletion, androtation
Support or MicrosotCryptoAPI on Windows
Create and veriyauthor-certifieddocuments
Revoke access aterdistribution
Support or MicrosotCryptoAPI (MSCAPI)on the MicrosotWindows operatingsystem
Decrypt documentsusing sharedpasswords, PKI, andAdobe LiveCycleRights Management ESsotware
Support or HardwareSecurity Modules(HSMs) using PKCS#11
Establish time controlsor access
Pre-built support orVeriSign credentials inAdobe Reader
Audit user actions
Support or FIPS mode Leverage existingauthenticationinrastructure(LightweightDirectory AccessProtocol [LDAP]/Active Directory) ordocument control
* Includes Adobe Acrobat Proessional, Adobe Acrobat Standard, and Adobe Acrobat Elements. Not all security eatures are available in allproducts.
Requires documents to be rights-enabled with Adobe LiveCycle Reader Extensions ES.
Adobe Acrobat and Adobe Reader
Document authors can use Adobe Acrobat soware to create Adobe PDF documents, and apply
encryption, permissions, and digital signatures to Adobe PDF files. Te ease and convenience o
assigning security parameters to electronic documents via Adobe Acrobat encourages users to
keep inormation private and confidential.
Protected Adobe PDF documents can be viewed using ree Adobe Reader soware. With more
than 00 million copies distributed worldwide, Adobe Reader provides multi-platorm access to
Adobe PDF files, enabling organizations to share secured documents with users outside the
firewall and on a wide variety o client computers. Adobe Reader users can view protected
documents, validate digital signatures, and veriy document certification. In addition, when
documents are rights-enabled via Adobe LiveCycle Reader Extensions ES, Adobe Reader users
can digita lly sign Adobe PDF files.
Document control and digital signature
capabilities are built into the Adobe Acrobat
interace, making it easy or users to add
security parameters to documents
-
7/29/2019 Acrobat Livecycle Security Wp
10/14
1A primer on electronic document security
Adobe PDF, the Portable Document Format, is a general document representation language that
has been in use or document exchange on the Internet since . RFC 8 provides updated
inormation on t he registration o the MIME Media ype application/pd, with particular
ocus on the eatures that help to mitigate security concerns.
Adobe LiveCycle Reader Extensions ES
Adobe LiveCycle Reader Extensions ES enables organizations to extend the use o automated
business processes to participants who are outside the network and using disparate client
technologies. Using Adobe LiveCycle Reader Extensions ES, organizations embed usage rights in
Adobe PDF files that will activate unctionality within Adobe Reader soware. Tis hidden
unctionality is automatically activated when the Adobe Reader user launches a rights-enabled
Adobe PDF document. When the user is finished working with the document, those unctions
are once again disabled until the user receives another rights-enabled PDF file.
Rights-enabled Adobe PDF files allow users o Adobe Reader to save the file to a local hard drive,
fill it out, add comments and mark up content, share it with others, and submit a completed
document electronically. In addition, Adobe PDF files can be rights enabled to allow users to
digitally sign, cert iy, and authenticate a document. As a result, organizations can easily include
Adobe Reader users in simple and complex business processes that provide greater
assurance o document authenticity and confidentiality or users outside the network.
Adobe LiveCycle Rights Management ES
Adobe LiveCycle Rights Management soware is a document control solution that addresses the
challenges o managing access to and use o electronic documents on an enterprise-wide basis.
Adobe LiveCycle Rights Management soware oers a platorm-independent solution or
dynamic, persistent, and robust document policy management. Adobe LiveCycle Rights
Management soware manages three aspects o document securityconfidentiality,
authorization, and accountability.
Adobe LiveCycle Rights Management ES provides a solution or assigning and managing access rights
and user permissions
1 2 3 4
Author Manage View
1. Create lesin nativeapplications
2. Create Adobe PDFfrom native le
3. Add protection
with AdobeLiveCycle RightsMangement ES
4. Authenticate &authorize forpublic viewingusing AdobeReader andAdobe Acrobat
Adobe
LiveCycle
Rights
Management ES
Adobe LiveCycle Rights Mangement ES capabilities include the ollowing:
Persistent access managementAdobe LiveCycle Rights Management ES provides all o thepersistent document control eatures available with Adobe Acrobat. Security policies
established on the server can include access rights and user permissions. Document authors
simply select the appropriate policy stored on the server to be applied to an Adobe PDF
document.
Dynamic security policy managementAdobe LiveCycle Rights Management ES provides
dynamic policy management so that organizations can manage document access and use aer
an Adobe PDF file has been published and distributed. Authors can update a security policy
stored on the server to change any o the user permissions, add recipients, expire documents,
With more than 700 million copies distributed
worldwide, Adobe Reader sotware provides
cross-platorm access to Adobe PDF files,
enabling organizations to share protected
documents with users outside the firewall and
on a wide variety o client computers
Adobe LiveCycle Rights Management ES oersa multi-platorm solution or dynamic,
persistent, and robust document
policy management
-
7/29/2019 Acrobat Livecycle Security Wp
11/14
1A primer on electronic document security
revoke previous recipients access rights, and so orth. When a document recipient is oine,
any changes are automatically applied to the document when the recipient contacts Adobe
LiveCycle Rights Mangement ES again.
Network independenceWhether used online or oline, inside or outside the network,
the security policy applied to an Adobe PDF file remains.
Document auditingAuthors can easily monitor use o protected Adobe PDF documents with
Adobe LiveCycle Rights Management ES auditing capabilities. For each user permission
assigned to a document, Adobe LiveCycle Rights Management ES sotware provides a detailed
audit trail that keeps track o what each recipient did with the document, when, and how oten.
Enterprise integrationAdobe LiveCycle Rights Management ES sotware can be integrated
with current user administration and content management technologies or cost-eicient,
centralized document control administration. It can access ex isting LDAP and Active
Directory implementations to check recipients credentials, and it can maintain a security
policy assigned to a document in a content management system and wherever the document
travels.
Integration with Adobe LiveCycle productsAdobe LiveCycle Rights Management ES
sotware provides an Adobe Document Service that can be used by other Adobe LiveCycle ES
server products to acilitate automated workflows. Organizations can expand use o cost-
eective automated business processes with greater assurances that documents are more
eectively protected and regulatory requirements or maintaining in ormation privacy can bemet.
Integration with Adobe Acrobat and Adobe ReaderAuthoring and viewing protected
documents is simple and convenient. Authors can assign document control policies to
documents with the same controls they use to create Adobe PDF files rom popular
applications such as Microsot Word. Recipients can access Adobe LiveCycle Rights
Management EScontrolled PDF iles with the Adobe Reader Mac OS, Microsot Windows,
or Linux client platorms.
Adobe LiveCycle Digital Signatures ES
Adobe LiveCycle Digital Signatures ES soware enables organizations to bring more paper-based
processes online by providing digital signature and encryption capabilities in a server
environment, thus eliminating the need to manually open each file and add or veriy digital
signatures. With Adobe LiveCycle Digital Signatures ES, organizations can eciently integrate
protected electronic documents with core systems and existing workflows. Adobe LiveCycle
Digital Signatures ES soware automates the processes o:
Digitally signing and certiying Adobe PDF files
Validating digital signatures applied to Adobe PDF files
Encrypting and decrypting Adobe PDF files
Integrating with a Hardware Security Module or added security capabilities and perormance
Enterprises can process Adobe PDF documents with digital signatures rom third-party vendors
to enable large volumes o certified documents in batch (or bulk) on the server. Beore a
transaction is processed, Adobe LiveCycle Digital Signatures ES soware opens the document
and validates it based on signature status. Tis validation includes determining whether or not adocument has been altered and whether or not it was really approved by the person who signed it
Since Adobe LiveCycle Digital Signatures ES soware can validate any Adobe PDF file regardless
o its use inside or outside the network, it enables organizations to extend automated processes
beyond the firewall to include customers, partners, and constituents while meeting corporate
and government regulations or protecting the privacy o electronic inormation.
For organizations that have deployed a PKI, Adobe LiveCycle Digital Signatures ES soware
provides encryption and decryption capabilities. Documents that are automatically generated
can be automatically encrypted or distribution and encrypted documents that are submitted to
-
7/29/2019 Acrobat Livecycle Security Wp
12/14
1A primer on electronic document security
Adobe LiveCycle Digital Signatures ES can be automatically decrypted. Tese capabilities allow
enterprises to leverage existing technology investments in PKI and smart card solutions to
provide enhanced document protection. In addition, Adobe LiveCycle Digital Signatures ES
soware is the only solution that provides bulk digital signature capabilities or Adobe PDF files
using HSMs.
Summary of Adobe document control implementation
Te ollowing table summarizes the Adobe document control capabilities and the technologies used
Control Type Control Mechanism Technologies
Encryption Symmetric algorithm AES (128- and 256-bit)
RC4 (128-bit)
3DES
Asymmetric algorithm RSA (up to 2048-bit)
Authorization Document permissions
(modifications and use)
No changes allowed
Any changes except extracting pages
Fill in orm fields
Comment and annotate
Digitally sign
Insert, delete, and rotate pages
Copy text, images, and other content
Enable text access or screen reader devices or the visually impaired
No printing allowed
Low-resolution printing only (150 dpi)
High-resolution printing
Dynamic document
control
Modiy permissions ater publication and distribution
Expire and revoke distributed documents
Manage oine access
Enorce content management system security policies outside system
Accountability Auditing Know how recipient has used document
Know when usage occurred
Know how oten usage occurred
Summary of Adobe digital signature implemention
Te ollowing table summarizes the Adobe digital signature capabilities and t he technologies
used in their implementation:
Control Type Control Mechanism Technologies
Integrity One-way hash SHA-1 and SHA-256 algorithms
MD5
MAC/HMAC HMAC support with symmetric keys and SHA-1
Aut he nt ici ty D igi ta l s ign at ure s May be applied to any Adobe PDF document
Partnerships with leading digital signature vendors
PKCS #1, #7, #11, and #12
RSA (512-, 1024-, and 2048-bit)
DSA
Long-term signature validation support
Seed values (enorcement o certificate usage criteria)
eXtensible Markup Language (XML) signatures
MSCAPI support
Certificate val idity check Cert ificate revocat ion list
Online Certificate Status Protocol (uture)
Nation Institute o Standards and Technology (NIST) Public KeyInteroperability Test Suite (PKITS)
MSCAPI support
Non-repudiation Supported with authentication
and time-stamping
Adobe ollows RFC 3161
-
7/29/2019 Acrobat Livecycle Security Wp
13/14
1A primer on electronic document security
Partner integrationsAdobe has partnered with leading g lobal organizations to help provide an eective document
security environment. Whether digital signatures requiring certificates, certificate authorities,
smart cards, HSMs, or dynamic document control requiring authentication via LDAP providers,
databases, or integration services, Adobe and its partners can solve specific business needs that
require secure solutions. For more inormation about Adobe security partners, please visit:
http://partners.adobe.com/security.
ConclusionTe use o sensitive and mission-critical inormation in electronic processes is essential
or thousands o businesses and government agencies. Adobe security solutions leverage
standards-based techniques or document control and digital signatures to provide eective
solutions that enhance the privacy and confidentiality o electronic documents and orms.
With a comprehensive set o desktop- and server-based solutions, Adobe oers convenient, easy-
to-use document security capabilities that encourage users to keep inormation private and help
organizations meet the strictest regulations or sharing inormation elect ronica lly. Adobe
security solutions enable organizations to replace paper-based business processes with electronic
processes to reap the benefits o improved operational eciency, reduced costs, and increased
customer and constituent satisaction.
Appendix: Adobe standards and technologyAESAdvanced Encryption Standard is an encryption algorithm used by U.S. governmentagencies or securing sensitive but unclassified material.
Authentication TokenA small hardware device that the owner carries to authorize access to anetwork service. Te device may be in the orm o a smart card or may be embedded in acommonly used object such as a key ob. Security tokens provide an extra level o assurancethrough a method known as two-actor authentication. Te user has a personal identificationnumber that authorizes him or her as the owner o that particular device; the device thendisplays a number which uniquely identifies the user to t he service, allowing t he user to log in.Te identification number or each user is changed requently, usually every five minutes or so.
CAA certificate authority is an authority in a network that issues and manages securitycredentials and PKI or message encryption and digital signatures. As part o a PKI, a CA checkswith a registration authority (RA) to veriy inormation provided by the requestor o a
digital certificate. I the RA verifies the requestors inormation, the CA can then issue a certificate.CAPI/MSCAPICommon Application Programming Interace is an international standardinterace that applications can use to communicate directly with ISDN equipment. Using CAPI,an application program can be written to initiate and terminate phone calls in computers equippedor ISDN. MSCAPI is the Microso implementation.
Certificate (X.509)A common certificate ormat used in PKI systems.
CP/CPSA certificate policy and certification practice statement explain the practicesemployed by a CA to provide certification services including issuing, managing, revoking,and renewing certificates.
CRL (RFC 3280)Certificate revocation list is one o two common methods (OCSP is the other)when using a PKI or maintaining access to servers in a network.
CSPCryptographic Service Provider
FIPSFederal Inormation Processing Standards are a set o standards that describe documentprocessing, provide standard algorithms or searching, and provide other inormation processingstandards or use within government agencies.
KerberosKerberos is a secure method or authenticating a request or a service in a computernetwork. Kerberos lets a user request an encrypted ticket rom an authentication process thatcan then be used to request a particular service rom a server. Te users password does not haveto pass through the network.
http://partners.adobe.com/securityhttp://partners.adobe.com/security -
7/29/2019 Acrobat Livecycle Security Wp
14/14
LDAPLightweight Directory Access Protocol is a soware protocol or enabling anyone tolocate organizations, individuals, and other resources, such as files and devices, in a public orcorporate network.
MAC/HMACA MAC provides a digital fingerprint o a file by means o a hash. In this case, asymmetric key is concatenated to the message and then hashed (HMAC). Without the key, anattacker cannot orge a new message.
MDAn algorithm used to veriy data integrity through the creation o a 28-bit message
digest rom data input (which may be a message o any length) that is claimed to be as unique tothat specific data as a fingerprint is to a specific individual.
OCSP (RFC 2560)Online Certificate Status Protocol is one o two common schemes (CRL isthe other) or maintaining the security o a server and other network resources.
PKCSPublic-Key Cryptography Standards are a set o inter-vendor standard protocols or
making secure in ormation exchange on the Internet using a public key inrastructure. Adobesupports the ollowing standards:
PKCS 1RSA Cryptography standard
PKCS 7 Cryptographic message syntax standard
PKCS 11Cryptographic token interace standard
PKCS 12Personal inormation exchange syntax st andard
RAA registration authority is an authority that verifies user requests or a digital certificateand tells the CA to issue it. RAs are part o a PKI, a networked system that enables companies andusers to exchange inormation and money saely and securely.
RC4A shared key stream cipher algorithm that requires a secure exchange o a shared keyoutside the specification.
RSAAn asymmetric encryption and authentication system that uses an algorithm developed in1977 by Ron Rivest, Adi Shamir, and Leonard Adleman. Te RSA algorithm is a commonlyused encry ption and authentication algorithm and is included as part o the Web browsersrom Microso and Netscape.
SAMLSecurity Assertion Markup Lang uage is an XML standard t hat allows a user to login once or aliated but separate Web sites. SAML is designed or business-to-business andbusiness-to-consumer transactions.
SHA-1, SHA-256Secure Hash Algorithm used to generate a condensed representation o amessage called a message digest. Te SHA-1 algorithm is required or use with the DigitalSignature Algorithm (DSA) as specified in the Digital Signature Standard (DSS) and whenever asecure hash algorithm is required. Both the transmitter and intended receiver o a message incomputing and veriying a digital signature use the SHA-1.
Smart CardA plastic card about the size o a credit card with an embedded microchip that can beloaded with data and used or telephone calling, electronic cash payments, and otherapplications, and then periodically rereshed or additional use.
SSL/TLSSecure Socket Layer/ ransport Layer Security. Internet protocols that ensure privacybetween communicating applications and their users. When a server and client communicate,LS ensures that no third party may eavesdrop or tamper with any message. LS is the successorto the SSL.
Time-stamp Protocol (RFC 3161)A time-stamping service supports assertions o proo that adatum existed beore a particular time. RFC 3161 describes the ormat o a request sent to a timestamping authority (SA) and o the response that is returned. It also establishes several securityrelevant requirements or SA operation, with regards to processing requests to generateresponses.
Adobe Systems Incorporated345 Park AvenueSan Jose, CA 95110-2704USAwww.adobe.com
Adobe, the Adobe l ogo, Acrobat, Adobe Live Cycle, and Reader a re either registered trademarks or trademarks o Adobe Systems Incorporatedin the United States and/or other countries. Mac OS is a trademark o Apple Computer, Inc., registered in the United States and other countries.Linux is a registered trademark o Linus Torvalds. Microsot and Windows are either registered trademarks or trademarks o Microsot Corporation inthe United States and/or other countries. All other trademarks are the property o their respective owners.
2007 Adobe Systems Incorporated. All rights reserved. Printed in the USA.
95009146 5/07
For more informationFor more inormation about Adobe
security solutions, please visit
www.adobe.com/security
http://www.adobe.com/securityhttp://www.adobe.com/security