1 The Ultimate Data Protection for Cloud Data Security in the Cloud SecureData Whitepaper
2 Cloud Data Security Why is Data Security in the Cloud Necessary? Many surveys have cited data security as organiza ons prime concern when embarking on cloud compu ng services. News on detrimental data losses and leakages are also frequently being reported, like government agencies being compromised in Shady RAT a ack, Sony and Sega losing their users personal and financial informa on, and IT security companies like RSA having their two-factor authen ca on token secret compromised by hackers. Even cloud service providers like Dropbox could accidentally allow anyone to access any user s account without the user s knowledge. This would poten ally lead to massive data breaches which are beyond the user s control. How can we prevent such data breaches? To for fy the security for cloud compu ng, most organiza ons adopt standard enterprise security solu ons like firewall, IPS and an -virus. Since users can now access cloud services from anywhere in the world, some organiza ons may implement strong user authen ca on and access control solu ons as a defense against iden ty fraud. Unfortunately, these solu ons do not really protect the user s data in the cloud. Security measures like full disk encryp on, DLP and USB port control are most commonly adopted by enterprises to secure user data. But are these good enough measures to truly secure data in the cloud? Such solu ons are not effec- ve especially for systems that are up and running all the me. They also cannot protect user data against insider a acks. However, the insiders in this case are no longer your own employees. In fact, you need to be more wary of the employees from the cloud service providers who are opera ng your compute and storage servers. There is no way you will know who actually have direct access to your compute and storage servers. There is no way you can trust or even prevent them from accessing and leaking your sensi ve informa on. How can we prevent data breaches, data loss and data leakages? A robust data protec on solu on must be able to secure data for both enterprise end-points and computer servers running in the cloud. This is made possible with an end-to-end data protec on solu on, SecureAge SecureData. Secure- Data single-handedly safeguards organiza ons cri cal informa on and stops data leakages from different channels without having to combine a host of different solu ons. It entails a unified policy which can be configured and imposed to protect sensi ve data from being compromised regardless of where the data is stored - be it in the local hard drive, network file server, tape backups and so on. How does SecureData works? 1) 3P Encryp on Technology The basic design principle of SecureData is built on 3P (Proac ve, Pervasive and Persistent) encryp on technology to provide transparent encryp on of any data files, which will remain encrypted, whether at rest, in-transit or in any storage media. Proac ve All data files are automa cally encrypted when they are created, edited, moved, or copied to any local, external or network storage devices based on pre-defined policy. It is so seamless that users do not have to consciously and manually encrypt the data.
3 SecureData Anti-APT Solutions Pervasive All data files remain encrypted when they are stored in any storage media like local hard drive, external hard disk, USB flash drive, network file server, tape backups and even cloud storage. Hence, SecureData transparently ensures all important documents and data files are stored in encrypted format without changing the way the users make use of their computers. Any unauthorized copying of the sensi ve documents from a machine or fileserver will only expose encrypted data files and the risk of sensi- ve informa on leaking is thus mi gated. Persistent The data will be securely encrypted before leaving the client machine and con nuously stays encrypted as it travels over the network to the server. In short, the end-to-end architecture of SecureData is built on the 3P encryp on technology that prevents anyone sniffing the network from obtaining any useful informa on. 2) Data Protec on for Cloud Storage Organiza ons that store sensi ve data in the cloud storage should implement SecureData because its 3P encryp on technology protects their data from possible insider a acks by the cloud operator and network traffic sniffer. Any data files, when being uploaded to the cloud storage, will be automa cally encrypted before leaving the client machine and will remain encrypted as they travel all the way from the Internet to the cloud server. Hence, any a empts by the network traffic sniffers and the cloud operator to steal such informa on will only expose encrypted data files that can only be deciphered with the user encryp on key. 3) Data Protec on for Cloud Compu ng Similarly, organiza ons that are running applica ons in the cloud should install SecureData to securely protect data that is residing on the Virtual Machine (VM) server. It will stay protected when stored in the cloud storage and con nue to be protected when travelling between the VM server and the cloud storage. Most of the me, the data will remain encrypted when at rest or on-the-move. But it will only appear as plain data when it is processed in memory by the server applica ons. Since the data is always encrypted in the cloud compu ng environment, there is no way the cloud operator is able to decrypt it without the proper encryp on key. Hence, any insiders from the cloud operator will not be able to see all your confiden al data even when they are managing, moving, copying, backing up, or inspec ng it. This gives user peace of mind to leverage on the affordability and scalability of the cloud infrastructure without compromising the security and privacy of their sensi ve data. 4) Security Architectures SecureData encryp on is based on the strongest AES algorithm with each data file protected by a different randomly generated 256-bit AES session key. The session key is in turn protected by the user s RSA public key with key strength of 1024, 2048, 4096 or higher bit length. Advanced user could also opt for Ellip c Curve (ECC) public key system instead of RSA to improve the cryptographic efficiency. The usage of public key cryptography also allows sensi ve data files to be easily shared by any dynamic group of authorized users without having to put in place a complex key management system. The user s public and private keys can be stored on any PKCS#11-compliant smart card, USB token or HSM to provide strong two factor protec on. These two factor authen ca on devices are located in the user s environment, away from the cloud infrastructure so that the user can retain control of which cloud server can access the key when performing the data encryp on and decryp on opera ons.
4 Integrated Defense 5) Data Access Audit Log Besides protec ng data by encryp on, SecureData also provides a complete data access audit log. It can be configured to provide different levels of detail on data access entries to fit the user requirements. The audit trail could provide detailed informa on of every file being accessed by different applica ons, moving of informa on to external devices, file ownership informa on, and blocked opera ons. These logs can be automa cally uploaded to the SecureAge central management server to provide a consolidated view of user ac vi es. Entries pertaining to blocked applica on execu on or abnormal user data access ac vi es can help the system adminstrator to quickly iden fy poten al threats that are happening in the enterprise systems. 6) Data Protec on Against APT, rootkit, zero-day a ack and an -malware disabler What about malware? Can it steal your data even when the data is encrypted? Unfortunately, malware, running in a system with transparent encryp on, can access all the data files and then send them out in plain via proprietary network protocol to the a acker s server. Malware and especially Advanced Persistent Threats (APT), frequently target company servers, including those that run in the Cloud in order to steal sensi ve corporate informa on. In order to prevent such a acks, SecureData is bundled with two an -malware modules: applica on whitelis ng and applica on binding. Applica on whitelis ng is an an -malware engine that allows only trusted applica ons to run in an opera ng system. All unknown applica ons are automa cally considered not trusted and will not be allowed to run in the system. Consequently, malware executables will be unable to run without authoriza on. a) Threat of Malware However, applica on whitelis ng on its own cannot prevent all malware like zero-day a acks. A zero-day a ack can infiltrate the system easily with just a document containing malicious code. When such a document is loaded by a trusted applica on, the malicious code can infect the trusted applica on process in memory. Such a acks could be carried out by sending the document to a user via or over a web link. Another form of malware that can evade detec on by applica on whitelis ng is low level rootkit. Rootkit is usually very stealthy and is able to avoid detec on by a standard an -malware engine. Low level rootkits are loaded during system boot up and normally before the running of the an -malware engine. Hence, they cannot be detected at load me because the an -malware engine is not running yet. Finally, there are an -malware disablers which can disable a standard commercial an -malware engine, thus rendering the protec on solu on ineffec ve. They then allow a ackers to inject addi onal malware to steal sensi ve informa on from the user machine. b) Integrated Defense: 3P Encryp on Engine, Applica - on Whitelis ng and Applica on Binding: SecureData combines the 3P encryp on engine with the applica on whitelis ng and applica on binding engines. Together, they provide an integrated defense that can effec vely prevent rootkits and an -malware disablers from causing any harm to user sensi ve data. A low level rootkit stays at very low layers in the opera ng system stack. It can read the data without passing it through the SecureData engine to avoid detec on. However, the data is encrypted and will appear as garbage when received by the rootkit. In order for the rootkit to read the data properly, it will need to send the data through the
5 SecureData Features SecureData engine. But in this case, the request will pass through the applica on whitelis ng engine as well and will automa cally be blocked since the rootkit is not a trusted applica on. For the an -malware disabler, if it disables the SecureData applica on whitelis ng engine, it will also disable the SecureData encryp on engine. Consequently, all the malware in the system can no longer access the plain data because there is no longer a decryp on engine running in the system. Hence, the integrated defense of SecureData can effec vely prevent low level rootkits and an -malware disablers from compromising sensi ve user data. What about zero-day a acks? This is where the Applica on Binding feature of SecureData comes into play. Applica on binding allows users to specify rules that bind specific data to specific applica ons. The flexible rule system allows users to configure their systems based on their own security risk matrix. One generic applica on binding rule is to create an applica on sandbox for high risk applica ons like web browsers so that even when these applica ons are injected with malicious code, they cannot compromise sensi ve user data in the system. Another control using the applica on binding rule is to create a data sandbox which bind sensi ve data to a specific applica on. For instance, one can configure all Microso Word documents (*.doc, *.docx) to be accessible only by the Microso Word program. In this case, other applica ons that are compromised by a zero-day a ack will not be able to access the Word documents. Hence, zero-day a acks can be fully mi gated without affec ng the system func ons, and security of sensi ve data can be protected. In SecureData, applica on whitelis ng and applica on binding also provide detailed log for abnormal ac vi es including all unauthorized execu on of applica ons (applica on whitelis ng) and blocked access to data files by an applica on (applica on binding). Such log entries should immediately raise an alarm to the users that their systems are probably under a ack and urgent ac on should be taken to prevent malware or a ackers from inflic ng more damage on their systems. Highlights of SecureData Features 1. Protects Data Privacy Complete and automa c file encryp on, including all temporary files and system page file. End-to-end data encryp on with data remaining encrypted when transferred over network. Supports mul ple users using different keys on a single opera ng system. Supports secure sharing of encrypted data with mul ple users. 2. Stops Data Breach No change in computer usage by authorized users. One-stop transparent encryp on for all storage devices. Transparently encrypts all documents copied to network file servers and network disks. Protec on against worms and trojans from stealing sensi ve documents. Stop unauthorized users and processes from accessing sensi ve data.
6 SecureData Features 3. Protect Against Malware Applica on whitelis ng to prevent malware execu on. Applica on binding to mi gate the risk of zero-day a acks. Integrated defense to prevent low level rootkit and an -malware disabler. Ac ve logging to immediately alert user to system under a ack. 4. Achieve Regulatory Compliance Payment Card Industry (PCI), Data Security Standard Data Privacy Bill (e.g. California SB 1386) Protec on of Sensi ve Agency Info (White House OMB) Sarbanes-Oxley(SOX) Health Insurance Portability & Accountability Act (HIPPA) Gramm-Leach-Bliley Act (GLBA) 5. State-of-the-art Security Solu on Supports default 256-bit AES and 168-bit triple-des encryp on. Supports unlimited key length RSA, DSA, ECDH & ECDSA. 6. Two-Factor Security with Smart Card / USB Token PKCS#11 standard compliance. Supports smart card, USB token, TPM chip and HSM. Supports password protected so key. 7. Complete PKI Support Comprehensive cer ficate, CRL and OCSP support. Mul ple user profiles management with unlimited user key history support. PKI op miza on with local management of peer cer ficates. User created self-signed cer ficate. Need More Information? Sales Enquiry: Public Relations / Marketing: General Enquiry: Technical Support: Asia Pacific SecureAge Technology Pte Ltd 3, Fusionopolis Way #05-21, Symbiosis Singapore Japan SecureAge K.K. Barbizon 18, 7F Shirokanedai Minato-ku, Tokyo Japan North America SecureAge Technology Inc 3 Twin Dolphin Drive Suite 150 Redwood City CA U.S.A. Copyright 2012 SecureAge Technology Pte Ltd. All rights reserved.
Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered
Best Practices in Identity Management Introduction There are many definitions, both academic and scientific, for 'information security'. Some are technical, some are even philosophical - most are difficult
Cyber Security Planning Guide The below entities collaborated in the creation of this guide. This does not constitute or imply an endorsement by the FCC of any commercial product, service or enterprise
Are your multi-function printers a security risk? Here are five key strategies for safeguarding your data Printer Security Challenges Executive Summary Security breaches can damage both your operations
s for PCI DSS Compliance A Trend Micro White Paper Addressing PCI DSS Requirements with Trend Micro Enterprise July 2010 I. PCI DSS AND TREND MICRO ENTERPRISE SECURITY Targeted threats, distributed environments,
Addressing NIST and DOD Requirements for Mobile Device Management Whitepaper 2013 ForeScout Technologies, Inc. All rights reserved. Call Toll-Free: 1.866.377.8771 www.forescout.com Contents 1. OVERVIEW
AWS Security Best Practices Dob Todorov Yinal Ozkan November 2013 (Please consult http://aws.amazon.com/security for the latest version of this paper) Page 1 of 56 Table of Contents Abstract... 4 Overview...
What To Do If Compromised Visa Inc. Fraud Control and Investigations Procedures Version 3.0 (Global) Effective May 2011 Visa Public Table of Contents Introduction... 1 Identifying and Detecting Security
A GUIDE TO Security and privacy in a Hosted Exchange environment What s inside this white paper: A two-page checklist for comparing the security of hosted Exchange providers Definitions for each element
Secure, private, and trustworthy: enterprise cloud computing with Force.com WHITE PAPER Contents Abstract... 1 Introduction to security, privacy, and trust... 1 Cloud computing and information security
A Websense White Paper ADVANCED PERSISTENT THREATS AND OTHER ADVANCED ATTACKS: THREAT ANALYSIS AND DEFENSE STRATEGIES FOR SMB, MID-SIZE, AND ENTERPRISE ORGANIZATIONS REV 2 ADVANCED PERSISTENT THREATS AND
The Critical Security Controls for Effective Cyber Defense Version 5.0 1 Introduction... 3 CSC 1: Inventory of Authorized and Unauthorized Devices... 8 CSC 2: Inventory of Authorized and Unauthorized Software...
Payment and Security Experts Implementing PCI A Guide for Network Security Engineers Updated For PCI Data Security Standard Version 1.2.1 Tom Arnold, CISSP, ISSMP, CFS, CPISM/A, PCI/QSA Partner, PSC Sponsored
Nine Essential Requirements for Web Security Enabling safe, productive access to social media and other web applications Table of Contents Executive Summary...3 Introduction...4 Web Security Concerns....4
Cloud Computing: Public, Private, and Hybrid You ve heard a lot lately about Cloud Computing even that there are different kinds of Clouds. And you ve got questions:» What are the differences between Public
White Paper Security Recommendations for Cloud Computing Providers (Minimum information security requirements) www.bsi.bund.de Contents Contents Preamble 3 The BSI Serving the Public 5 1 Introduction 7
CCC Technologies, Inc. 700 Nicholas Blvd., Suite 300 Elk Grove Village, IL 60007 877.282.9227 www.ccctechnologies.com Online Backup Solution Features Introduction Computers are the default storage medium
WHITE PAPER Meeting Data Residency and Compliance Challenges in Global Enterprises Innovative Security Solutions Enhance Business Agility and Reduce Risk Data Security: A Competitive Advantage In today
One Stop Data & Networking Solutions PREVENT DATA LOSS WITH REMOTE ONLINE BACKUP SERVICE Prevent Data Loss with Remote Online Backup Service The U.S. National Archives & Records Administration states that
Cyber Security Planning Guide The below entities collaborated in the creation of this guide. This does not constitute or imply an endorsement by the FCC of any commercial product, service or enterprise
Three guiding principles to improve data security and compliance Sarah Cucuz firstname.lastname@example.org IBM Software October 2012 Thought Leadership White Paper Three guiding principles to improve data security
THE BENEFITS OF CLOUD NETWORKING 1 White Paper The Benefits of Cloud Networking Enable cloud networking to lower IT costs & boost IT productivity 2 THE BENEFITS OF CLOUD NETWORKING Table of Contents Introduction
Cyber-Security Essentials for State and Local Government Best Practices in Policy and Governance Operational Best Practices Planning for the Worst Case Produced by with content expertise provided by For
TM Creating Trust Online Comodo Internet Security Pro User Guide 1 Table of Contents 1 Comodo Internet Security Pro - Introduction... 6 1.1 Special Features... 10 1.2 Installation... 12 1.3 System Requirements...
SECURITY THREATS: A GUIDE FOR SMALL AND MEDIUM BUSINESSES What does an SMB need? A successful business works on the basis of revenue growth and loss prevention. Small and medium-sized businesses are particularly
PCI Quick Reference Guide Understanding the Payment Card Industry Data Security Standard version 1.2 For merchants and organizations that store, process or transmit cardholder data Contents Copyright 2008