+ All Categories
Home > Technology > Best practices for data encryption in cloud implementations

Best practices for data encryption in cloud implementations

Date post: 02-Nov-2014
Category:
Upload: dcfrier
View: 230 times
Download: 1 times
Share this document with a friend
Description:
 
Popular Tags:
16
Best Practices for Data Encryption in Cloud Implementations David C. Frier, CISM, CISSP, CCSK, CRISC ISACA WNY - April 23, 2013
Transcript
Page 1: Best practices for data encryption in cloud implementations

Best Practices for Data Encryption in Cloud

ImplementationsDavid C. Frier, CISM, CISSP, CCSK, CRISC

ISACA WNY - April 23, 2013

Page 2: Best practices for data encryption in cloud implementations

Outline

• Who is this guy?

• What is encryption, anyway?

• Why do I need encryption?

• What should I encrypt in the cloud?

• How can I encrypt in the cloud?

• How can I tell if my encryption is any good?

• What are the best practices?

• Why is this outline nothing but questions?

Page 3: Best practices for data encryption in cloud implementations

Who is this guy?

1) David Frier has been an IT consultant since 1984

2) He has been specializing in Information Security since 2005

3) He holds the CISM, CISSP, CRISC and CCSK (Certificate of Cloud Security Knowledge)

4) He has toured with Sting and The Who

5) He has been providing implementation of enterprise security initiatives via Ciber since 2007

6) He has bungee-jumped Angel Falls in Venezuela

7) He can make any cloud implementation attack-proof.

8) Only the Fibonacci-numbered items on this list are true.

9) The preceding item is false.

Page 4: Best practices for data encryption in cloud implementations

What is encryption, anyway?

• Cleartext: The original data or message, in need of protection from disclosure

• Encryption: the activity of converting cleartext into coded form - ciphertext

• Encryption Algorithm: The process used to perform encryption given a cleartext and one or more keys

• Encryption Key: The secret piece of information that controls the output of the encryption algorithm

Page 5: Best practices for data encryption in cloud implementations

Why do I need encryption?

• APIs Rule: Anyone who can access some of the data from an admin session can move it all – at machine speed.

• Multi-Tenancy: the main threat is an attack from a co-resident user.

Page 6: Best practices for data encryption in cloud implementations

What should I encrypt in the cloud?

• Regulated Data: If you are putting data in a cloud that is in scope of PCI, restricted by HIPAA or GLBA… there are elements you must encrypt.

• Intellectual Property: Anything that would constitute your enterprise’s “Crown Jewels.”

Or… don’t send the data; use tokenization

Page 7: Best practices for data encryption in cloud implementations

How can I encrypt in the cloud?

IaaS

• Volume Encryption

• Virtual Private Storage

• Files/Folders (Object Storage)

• Three-tier approach o Engine / Data / Key Server

Page 8: Best practices for data encryption in cloud implementations

How can I encrypt in the cloud?

PaaS

• Virtual Private Storage

• Database Encryptiono Consider a three-tier approach

Page 9: Best practices for data encryption in cloud implementations

How can I encrypt in the cloud?

SaaS

• Client-side encryptiono Locally built client application that encrypts data

before sending it to the servers

• Encryption Proxyo Hardware or virtual appliance that intercepts web form

input before submitting it

• Trust the Providero They probably have pretty strong security measureso You can audit them… RIGHT?

Page 10: Best practices for data encryption in cloud implementations

How will I implement encryption?

• Standard (non-cloud) tools (I, some P)

• Client/app encryption (I, P)

• Database encryption (P)

• APIs (I, P)

• Proxy encryption (Any)

Page 11: Best practices for data encryption in cloud implementations

How can I tell if my encryption is any good?

Rule #1: PAASProprietary Algorithms All Stink

If an algorithm cannot face the scrutiny of the technical community… it’s not because it’s unbreakable.

Anyone can produce an algorithm that he himself can’t crack

Even the gold standard (AES-256)

will fall one day.

Page 12: Best practices for data encryption in cloud implementations

How can I tell if my encryption is any good?

Rule #2: Control the KeysThe algorithms are out there

They are being attacked all the time, but holding up

The only two ways the attacker is going to get through to your data are:

1. Brute Force

2. Compromise your Keys

Page 13: Best practices for data encryption in cloud implementations

What are the best practices?

• Know what you need to encrypt and why.

• Know what your cloud architecture supports

• Consider tokenization

• Ensure use of standards-based algorithms

• Plan the entire key-management lifecycle

Page 14: Best practices for data encryption in cloud implementations

More the best practices, please?

• Maximize granularity

• Capture and analyze all logs, audit trails

• Encrypt all portable devices

• Allow for integration

Page 15: Best practices for data encryption in cloud implementations

Tell ‘em what you told ‘em

• Encrypt what you need to… only.

• Use standards-based algorithmso PAAS!

• Guard your keys like they were… o …your keys

• Tokenize where it makes senseo They can’t steal what isn’t there

Page 16: Best practices for data encryption in cloud implementations

Question everything


Recommended