The True Story of Data-At-Rest Encryption & the Cloud
|
|
|
- Maud Higgins
- 10 years ago
- Views:
Transcription
1 The True Story of Data-At-Rest Encryption & the Cloud by Karen Scarfone Principal Consultant Scarfone Cybersecurity Sponsored by (US) (UK) twitter.com/firehost
2 About Karen Scarfone Karen Scarfone is the principal consultant for Scarfone Cybersecurity in Clifton, Va. She was formerly a senior computer scientist for the National Institute of Standards and Technology (NIST), where she oversaw the development of system and network security publications for federal civilian agencies and the public. She has co-authored more than 50 NIST Special Publications and Inter-agency Reports during the past 10 years, including NIST Special Publications , Guide to Storage Encryption Technologies for End User Devices, and , Guide to General Server Security. 2
3 Executive Summary Encrypting sensitive data stored in the cloud data-atrest prevents attackers from gaining unauthorized access to that data. Standards such as the Health Insurance Portability and Accountability Act (HIPAA) already require this security control to be in place to reduce insider attacks, exfiltration through malware, and other threats. Unfortunately, these requirements don t specify what type of storage encryption is to be used, and many cloud vendors are choosing the wrong solutions for fighting these threats. Instead of relying on full disk encryption, which only protects data against unlikely physical theft when servers are not running cloud vendors must promote the use of logical/role-based encryption solutions. These solutions are effective whether a server is running or not because they limit access to data based on permissions/roles, providing much greater protection against today s threats than full disk or storage area network (SAN) based encryption. What s more, encryption should be implemented and controlled by the customer, not the cloud provider, so that the cloud provider does not have insider access to the sensitive data being protected by encryption. 3
4 The Core Problem Storing sensitive data in the cloud, also known as data-at-rest, subjects that data to certain risks inherent in any computing environment, as well as a few risks specific to cloud deployments. The main threats causing risks to cloud data-at-rest are as follows: Malware If a cloud instance becomes infected with malware, this malware could then be used to access all the sensitive data from the cloud instance and exfiltrate it to an external site chosen by the attacker. Malicious Insiders One threat is malicious insiders from the organization gaining access to sensitive data and exfiltrating it, much like the malware above would do. However, in cloud environments there s also the threat of malicious insiders from the cloud provider itself. Cloud Leakage In cloud environments, particularly public clouds, there s often concern about cloud leakage, which refers to an attack coming through one virtual machine to compromise another cloud instance on the same physical server. Basically, a vulnerability in one virtual environment could be used to gain unauthorized access to another. Loss of Physical Control Although cloud servers are normally in an always-on state, cloud storage is sometimes taken offline for example, when a hard drive is retired or transferred to a vendor for repair or replacement. Such a drive may contain sensitive data from one or more previous cloud instances. For illustrative purposes, healthcare-related examples are used in this white paper, with a focus on HIPAA compliance. However, the concepts and conclusions presented in this paper are equally applicable to other sectors and security compliance efforts, such as the Payment Card Industry Data Security Standard (PCI DSS). 4
5 The Wrong Solution: Full Disk or SAN-Based Encryption Full disk encryption (FDE), also known as whole disk encryption, is a form of storage encryption that involves protecting all the data on the entire hard drive from pre-boot threats. This means that it protects the hard drive while the device it is installed in is powered off or first powered on, before the user or administrator provides authentication to enable the device to boot up. FDE is widely used for laptop security, because laptops are typically powered off when transported and frequently lost or stolen during this transport. Without FDE, an attacker armed with widely available tools could take a stolen laptop and directly access its sensitive stored data, circumventing all operating system-level security controls. Once a device is booted successfully, FDE does nothing to protect its stored data until it returns to an off state. So, although FDE is a great solution for protecting laptops, it s not as useful for servers and other devices that are on most or all of the time. It does help protect them in one way if the SAN, server, or server storage is being transported from one facility to another. In that circumstance, having FDE protects the data from being compromised if the server or its storage is lost or stolen. But FDE does absolutely nothing to protect a server or SAN that is powered on and running in a cloud data center from malware, insider threats, and other current threats. This same type of encryption is also touted by many SAN vendors as being built in to their solutions as a suitable way to protect data. However, the data is only encrypted when the SAN is powered down or when a drive is removed from the SAN. 5
6 The Right Solution: Logical/Role-Based Encryption In order to ensure that data on an always-running server is properly protected, using a solution that includes logical/role-based access to encrypted data is critical. The act of encrypting data is generally straightforward, but control over the encryption keys is the most difficult and most important consideration. There are three primary types of encryption that can be used to encrypt data outside of FDE: application layer, file level, and database level. Each of these needs to be mated with a logical/role-based encryption key management solution to provide a proper total solution. The main difference between these three methods and FDE is that they all encrypt the data before it is written to the disk and require authenticated access to encryption keys to view decrypted data, thus ensuring that the data is encrypted on the disk while the server is operating and only available to authorized accounts. Due to the highly sensitive nature of encryption keys, their management should always be under the full control of the customer. See the Best Practices for Encryption Key Management section on the following pages for more information on the reasoning behind this. Encryption Guidance The U.S. Department of Health & Human Services (HHS) Office for Civil Rights (OCR) has issued guidance involving protecting stored health information. The guidance includes the following statement: Valid encryption processes for data at rest are consistent with NIST Special Publication , Guide to Storage Encryption Technologies for End User Devices. Unfortunately, this statement has caused a great deal of confusion. NIST Special Publication , as its title implies, is meant to be applicable only to end-user devices desktops, laptops, etc. and does not provide any recommendations for encryption on servers or within cloud environments. That being said, the NIST publication does contain general information on several dataat-rest techniques, and these techniques are certainly relevant for servers. So while the recommendations of NIST Special Publication shouldn t be directly applied to servers, the principles of should be, and these principles strongly indicate that full disk encryption is not an appropriate primary protection mechanism for servers. 6
7 Types of Encryption Encryption can take many forms, including the following, as mentioned: Application Layer Encryption In this form, the actual encryption of the data is carried out in software within the application. Developers can choose from a variety of strong encryption libraries and implement encryption and decryption routines within the application. It is critical that encryption key management be done securely outside of the application. Most encryption key management solutions involve a form of hardware security module (HSM) that provides for the creation and management of encryption keys via application programming interface (API). File Encryption In file encryption, files stored on a cloud server are individually encrypted as they are written to the disk. Accessing the contents of any of these files requires decrypting that particular file only, leaving all the other files encrypted. The main advantage of this type of encryption is that it is transparent to both applications and users, so it does not require any changes to application code or special process to grant user access. Database Encryption Database encryption can provide the most granular cloud encryption solution. Individual database records, or even particular fields within a record, can be maintained in an encrypted state and only decrypted individually when proper authorization is granted. Database encryption is widely used to protect electronic health information and other sensitive information stored in databases. Major database platforms including Microsoft SQL Server and Oracle include encryption solutions within specific versions and also provide key management solutions. 7
8 All of these forms of encryption have something in common: they can provide protection for sensitive data even when the cloud server is active. This makes them invaluable for mitigating a wide range of threats. In the past there have been concerns about encryption causing additional overhead; generally, though, this overhead is negligible, and the use of file encryption and database encryption supports the principle of least privilege granting the minimum access necessary. Enforcing least privilege through logical/role-based encryption mitigates threats involving malware and malicious insiders accessing and exfiltrating sensitive data outside of the organization s control. Because the data is encrypted at all times except when it is specifically being used, the window of opportunity for the data to be stolen is minimized. Best Practices for Encryption Key Management This section will highlight selected best practices for encryption key management. An example is storing the encryption key separately from the encrypted data, so that unauthorized access to the data does not also grant access to the key. Another example is configuring the encryption so that it is transparent, not requiring user or administrator intervention in order to decrypt and re-encrypt data. Organizations storing sensitive data in the cloud should follow best practices for encryption key management. These practices are intended to safeguard encryption keys and in general to make encryption usable while still secure. Best practices of note include the following: Even malware that gains administrator privileges or an insider with administrative privileges may be stymied by the use of logical/rolebased encryption, assuming that best practices for encryption key management are being followed Best Practices for Encryption Key Management continued It is strongly recommended that organizations storing sensitive data in the cloud use file or database encryption, as appropriate, to protect that data from unauthorized access. 8
9 Maintain control of all private/secret encryption keys. A common mistake is to allow the cloud provider to control the encryption keys. This creates a new risk, because a malicious insider from the cloud provider could use those keys to gain unauthorized access to the customers sensitive data stored in the cloud. Allowing another party to have access to the encryption keys raises issues of accountability. It s fine to use encryption services offered by the cloud provider or a reputable third party, as long as the party offering the services doesn t get access to the encryption keys. Store encryption keys separately from encrypted data. Suppose that encrypted medical records are stored in the same logical volume as the keys used to encrypt those records. This may be convenient, but unfortunately it also makes it much easier to gain unauthorized access to the encrypted data. A single compromise can allow an attacker to access both the keys and the data they protect, effectively circumventing the encryption. Encryption keys should also not be stored within application configuration files or compiled into the application itself. A best practice here Configure encryption to be transparent to users. If users are prompted to enter keys and passphrases every time they want to access protected information, they re quickly going to try to circumvent those protections. To make security usable, it s critical that encryption be as transparent as possible, ideally so that users aren t even aware it s in use. Many solutions, including both Microsoft SQL Server and Oracle, offer transparent encryption options. 9
10 Conclusion Sensitive data-at-rest in the cloud is subject to major threats that can lead to data breaches. Although full disk encryption is often used to protect this data, it is ineffective against nearly all the major categories of threats because it only works when the cloud servers are powered off. If you are unsure what form of encryption is protecting your sensitive cloud data, don t hesitate to contact your cloud provider and ask what forms of encryption they provide, if any, for cloud storage. You may find that they aren t providing sufficient protection for your data. Instead of or in addition to full disk encryption, cloud customers should use strong logical/role based encryption technologies, such as file encryption or database encryption, to protect their sensitive data from unauthorized access. These technologies protect data while the cloud server is in operation. Don t panic there are a variety of thirdparty encryption services available that will protect your data while still giving you full and exclusive control over it. But act quickly to get a solution in place before your organization becomes the subject of the next data breach headline. Organizations with sensitive data stored in clouds should encrypt this data in such a way that they maintain control over the encryption keys. These keys should be stored separately from the encrypted data to prevent a single compromise from granting access to both the keys and the data they protect. And encryption should be configured to be transparent to users so that it does not affect usability. 10
11 US UK 2360 Campbell Creek Boulevard, Suite 525, Richardson, Texas Phone: Bath Road, Slough, Berkshire, SL1 4DX Phone:
Uncheck Yourself. by Karen Scarfone. Build a Security-First Approach to Avoid Checkbox Compliance. Principal Consultant Scarfone Cybersecurity
Uncheck Yourself Build a Security-First Approach to Avoid Checkbox Compliance by Karen Scarfone Principal Consultant Scarfone Cybersecurity Sponsored by www.firehost.com (US) +1 844 682 2859 (UK) +44 800
Navigating Endpoint Encryption Technologies
Navigating Endpoint Encryption Technologies Whitepaper November 2010 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL INACCURACIES. THE CONTENT IS
Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology
20140115 Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology TABLE OF CONTENTS What s at risk for your organization? 2 Is your business
ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary
VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION
Kaspersky Lab s Full Disk Encryption Technology
Kaspersky Lab s Full Disk Encryption Technology In the US alone, an estimated 12,000 laptops are lost or stolen each week. According to the Ponemon Institute, a laptop is stolen every 53 seconds; more
YOUR DATA UNDER SIEGE. DEFEND IT WITH ENCRYPTION.
YOUR DATA UNDER SIEGE. DEFEND IT WITH ENCRYPTION. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next Your Data Under Siege. Defend it with Encryption. 1.0 Keeping up with the
Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security
Mitigating Server Breaches with Secure Computation Yehuda Lindell Bar-Ilan University and Dyadic Security The Problem Network and server breaches have become ubiquitous Financially-motivated and state-sponsored
Perceptions about Self-Encrypting Drives: A Study of IT Practitioners
Perceptions about Self-Encrypting Drives: A Study of IT Practitioners Executive Summary Sponsored by Trusted Computing Group Independently conducted by Ponemon Institute LLC Publication Date: April 2011
Data-Centric Security vs. Database-Level Security
TECHNICAL BRIEF Data-Centric Security vs. Database-Level Security Contrasting Voltage SecureData to solutions such as Oracle Advanced Security Transparent Data Encryption Introduction This document provides
Advanced File Integrity Monitoring for IT Security, Integrity and Compliance: What you need to know
Whitepaper Advanced File Integrity Monitoring for IT Security, Integrity and Compliance: What you need to know Phone (0) 161 914 7798 www.distology.com [email protected] detecting the unknown Integrity
Enterprise Security Solutions
Enterprise Security Solutions World-class technical solutions, professional services and training from experts you can trust ISOCORP is a Value-Added Reseller (VAR) and services provider for best in class
Managing BitLocker Encryption
Managing BitLocker Encryption WWW.CREDANT.COM Introduction Organizations are facing a data security crisis. Despite decades of investment in security, breaches of sensitive information continue to dominate
Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense
A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical
How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization
How to use the Alertsec Service to Achieve HIPAA Compliance for Your Organization Alertsec offers Cloud Managed - Policy Controlled - Security Modules for Ensuring Compliance at the Endpoints Contents
THE SECURITY OF HOSTED EXCHANGE FOR SMBs
THE SECURITY OF HOSTED EXCHANGE FOR SMBs In the interest of security and cost-efficiency, many businesses are turning to hosted Microsoft Exchange for the scalability, ease of use and accessibility available
FACT SHEET: Ransomware and HIPAA
FACT SHEET: Ransomware and HIPAA A recent U.S. Government interagency report indicates that, on average, there have been 4,000 daily ransomware attacks since early 2016 (a 300% increase over the 1,000
The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance
Date: 07/19/2011 The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance PCI and HIPAA Compliance Defined Understand
Protecting Your Data On The Network, Cloud And Virtual Servers
Protecting Your Data On The Network, Cloud And Virtual Servers How SafeGuard Encryption can secure your files everywhere The workplace is never static. Developments include the widespread use of public
Full Drive Encryption Security Problem Definition - Encryption Engine
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 Full Drive Encryption Security Problem Definition - Encryption Engine Introduction for the FDE Collaborative Protection Profiles
PCI Data Security Standards (DSS)
ENTERPRISE APPLICATION WHITELISTING SOLUTION Achieving PCI Compliance at the Point of Sale Using Bit9 Parity TM to Protect Cardholder Data PCI: Protecting Cardholder Data As the technology used by merchants
BEST PRACTICES. Encryption. www.kaspersky.com
BEST PRACTICES www.kaspersky.com 2 YOUR GUIDE TO ENCRYPTION BEST PRACTICES. Data Protection. Act. Proactive data protection is a global business imperative. Kaspersky Lab can help you implement many of
Making Data Security The Foundation Of Your Virtualization Infrastructure
Making Data Security The Foundation Of Your Virtualization Infrastructure by Dave Shackleford hytrust.com Cloud Under Control P: P: 650.681.8100 Securing data has never been an easy task. Its challenges
Driving Company Security is Challenging. Centralized Management Makes it Simple.
Driving Company Security is Challenging. Centralized Management Makes it Simple. Overview - P3 Security Threats, Downtime and High Costs - P3 Threats to Company Security and Profitability - P4 A Revolutionary
Vormetric Encryption Architecture Overview
Vormetric Encryption Architecture Overview Protecting Enterprise Data at Rest with Encryption, Access Controls and Auditing Vormetric, Inc. 2545 N. 1st Street, San Jose, CA 95131 United States: 888.267.3732
Pointsec Enterprise Encryption and Access Control for Laptops and Workstations
Pointsec Enterprise Encryption and Access Control for Laptops and Workstations Overview of PC Security Since computer security has become increasingly important, almost all of the focus has been on securing
Global security intelligence. YoUR DAtA UnDeR siege: DeFenD it with encryption. #enterprisesec kaspersky.com/enterprise
Global security intelligence YoUR DAtA UnDeR siege: DeFenD it with encryption #enterprisesec kaspersky.com/enterprise Contents Your Data Under Siege: Defend it with Encryption 3 Steps Taken to Minimise
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
Secure Cloud Hosting for Healthcare Organizations
Secure Cloud Hosting for Healthcare Organizations OUR MISSION FIREHOST MISSION Our core is an unshakable, no compromise commitment to protect our customer's digital assets with integrity and innovation
SafeNet DataSecure vs. Native Oracle Encryption
SafeNet vs. Native Encryption Executive Summary Given the vital records databases hold, these systems often represent one of the most critical areas of exposure for an enterprise. Consequently, as enterprises
A Wake-Up Call? Fight Back Against Cybercrime. Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014
A Wake-Up Call? Fight Back Against Cybercrime Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014 1 Coalfire Background Leading Information Security Consulting Firm Offices: Atlanta,
A Guide to Managing Microsoft BitLocker in the Enterprise
20140410 A Guide to Managing Microsoft BitLocker in the Enterprise TABLE OF CONTENTS Introduction 2 Why You Can t Ignore Effective FDE 3 BitLocker by Default 4 BitLocker s Total Cost of Ownership 5 SecureDoc
Keep Your Data Secure in the Cloud Using encryption to ensure your online data is protected from compromise
Protection as a Priority TM Keep Your Data Secure in the Cloud to ensure your online data is protected from compromise Abstract The headlines have been dominated lately with massive data breaches exposing
DATA SECURITY HACKS, HIPAA AND HUMAN RISKS
DATA SECURITY HACKS, HIPAA AND HUMAN RISKS MSCPA HEALTH CARE SERVICES SEMINAR Ken Miller, CPA, CIA, CRMA, CHC, CISA Senior Manager, Healthcare HORNE LLP September 25, 2015 AGENDA 2015 The Year of the Healthcare
PLATFORM ENCRYPTlON ARCHlTECTURE. How to protect sensitive data without locking up business functionality.
PLATFORM ENCRYPTlON ARCHlTECTURE How to protect sensitive data without locking up business functionality. 1 Contents 03 The need for encryption Balancing data security with business needs Principles and
Information Security Policy and Handbook Overview. ITSS Information Security June 2015
Information Security Policy and Handbook Overview ITSS Information Security June 2015 Information Security Policy Control Hierarchy System and Campus Information Security Policies UNT System Information
Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption
THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has
Enterprise Computing Solutions
Business Intelligence Data Center Cloud Mobility Enterprise Computing Solutions Security Solutions arrow.com Security Solutions Secure the integrity of your systems and data today with the one company
Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper
Securing Patient Data in Today s Mobilized Healthcare Industry Securing Patient Data in Today s Mobilized Healthcare Industry 866-7-BE-GOOD good.com 2 Contents Executive Summary The Role of Smartphones
White Paper. Keeping Your Private Data Secure
WHITE PAPER: Keeping Your Private Data Secure White Paper Keeping Your Private Data Secure Keeping Your Private Data Secure Contents Keeping Your Private Data Secure............................ 3 Why Encryption?......................................
ENCRYPTION KEY MANAGEMENT SIMPLIFIED A BEGINNER S GUIDE TO ENCRYPTION KEY MANAGEMENT
ENCRYPTION KEY MANAGEMENT SIMPLIFIED A BEGINNER S GUIDE TO ENCRYPTION KEY MANAGEMENT IS THIS ebook RIGHT FOR ME? Not sure if this is the right ebook for you? Check the following qualifications to make
Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery
Overview Password Manager Pro offers a complete solution to control, manage, monitor and audit the entire life-cycle of privileged access. In a single package it offers three solutions - privileged account
Overview of the HIPAA Security Rule
Office of the Secretary Office for Civil Rights () Overview of the HIPAA Security Rule Office for Civil Rights Region IX Alicia Cornish, EOS Sheila Fischer, Supervisory EOS Topics Upon completion of this
McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.
McAfee Endpoint Protection for SMB You grow your business. We keep it secure. Big Protection for Small to Medium-Sized Businesses With the Internet and connected devices now an integral part of your business,
Encryption Key Management for Microsoft SQL Server 2008/2014
White Paper 0x8c1a3291 0x56de5791 0x450a0ad2 axd8c447ae 8820572 0x5f8a153d 0x19df c2fe97 0xd61b5228 0xf32 4856 0x3fe63453 0xa3bdff82 0x30e571cf 0x36e0045b 0xad22db6a 0x100daa87 0x48df 0x5ef8189b 0x255ba12
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
How To Achieve Pca Compliance With Redhat Enterprise Linux
Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving
Cyber Security An Exercise in Predicting the Future
Cyber Security An Exercise in Predicting the Future Paul Douglas, August 25, 2014 AUDIT & ACCOUNTING + CONSULTING + TAX SERVICES + TECHNOLOGY I www.pncpa.com I www.pntech.net What is Cyber Security? Measures
Protecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer
Protecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer The Data Breach Epidemic Continues.. 1 Data Encryption Choices for Businesses................... 2 The Hardware
SecureAge SecureDs Data Breach Prevention Solution
SecureAge SecureDs Data Breach Prevention Solution In recent years, major cases of data loss and data leaks are reported almost every week. These include high profile cases like US government losing personal
Security Is Everyone s Concern:
Security Is Everyone s Concern: What a Practice Needs to Know About ephi Security Mert Gambito Hawaii HIE Compliance and Privacy Officer July 26, 2014 E Komo Mai! This session s presenter is Mert Gambito
SecureD Technical Overview
WHITEPAPER: SecureD Technical Overview WHITEPAPER: SecureD Technical Overview CONTENTS section page 1 The Challenge to Protect Data at Rest 3 2 Hardware Data Encryption Provides Maximum Security 3 3 SecureD
October 2014. Application Control: The PowerBroker for Windows Difference
Application Control: The PowerBroker for Windows Difference October 2014 1 Table of Contents Introduction... 4 The Default-Deny Approach to Application Control... 4 Application Control s Dependence on
A Strategic Approach to Enterprise Key Management
Ingrian - Enterprise Key Management. A Strategic Approach to Enterprise Key Management Executive Summary: In response to security threats and regulatory mandates, enterprises have adopted a range of encryption
For your eyes only - Encryption and DLP Erkko Skantz
For your eyes only - Encryption and DLP Erkko Skantz Symantec Finland 1 USER PRODUCTIVITY INFORMATION MANAGEMENT DATA CENTER SECURITY 2 Focus on information 3 Today's System-Centric Enterprise Data Center
Security Management. Keeping the IT Security Administrator Busy
Security Management Keeping the IT Security Administrator Busy Dr. Jane LeClair Chief Operating Officer National Cybersecurity Institute, Excelsior College James L. Antonakos SUNY Distinguished Teaching
Top virtualization security risks and how to prevent them
E-Guide Top virtualization security risks and how to prevent them There are multiple attack avenues in virtual environments, but this tip highlights the most common threats that are likely to be experienced
Securing Data-at-Rest in Files, Folders and Shares:
CRYPTO FOUNDATION UNIFIED DATA PROTECTION PLATFORM WHITE PAPER Securing Data-at-Rest in Files, Folders and Shares: Building a Sustainable Framework Data growth is accelerating faster than ever before from
SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS
SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS Karen Scarfone, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Many people
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
Whitepaper. What You Need to Know About Infrastructure as a Service (IaaS) Encryption
Whitepaper What You Need to Know About Infrastructure as a Service (IaaS) Encryption What You Need to Know about IaaS Encryption What You Need to Know About IaaS Encryption Executive Summary In this paper,
Protecting Sensitive Data Reducing Risk with Oracle Database Security
Protecting Sensitive Data Reducing Risk with Oracle Database Security [email protected] Information Security Architect Agenda 1 2 Anatomy of an Attack Three Steps to Securing an Oracle Database
Top Ten Technology Risks Facing Colleges and Universities
Top Ten Technology Risks Facing Colleges and Universities Chris Watson, MBA, CISA, CRISC Manager, Internal Audit and Risk Advisory Services [email protected] April 23, 2012 Overview Technology
Transparent Data Encryption: New Technologies and Best Practices for Database Encryption
Sponsored by Oracle : New Technologies and Best Practices for Database Encryption A SANS Whitepaper April 2010 Written by Tanya Baccam, SANS senior instructor and course author for SEC509: Oracle Database
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Securing Data in the Cloud
Securing Data in the Cloud Meeting the Challenges of Data Encryption and Key Management for Business-Critical Applications 1 Contents Protecting Data in the Cloud: Executive Summary.....................................................
A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards
A Websense Research Brief Prevent Loss and Comply with Payment Card Industry Security Standards Prevent Loss and Comply with Payment Card Industry Security Standards Standards for Credit Card Security
Securing Virtual Applications and Servers
White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating
Attachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
43% Figure 1: Targeted Attack Campaign Diagram
TrendLabs Data exfiltration is the final stage of a targeted attack campaign where threat actors steal valuable corporate information while remaining undetected. 1 43% of most serious threats to the company
RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief
RSA Encryption and Key Management Suite The threat of experiencing a data breach has never been greater. According to the Identity Theft Resource Center, since the beginning of 2008, the personal information
Cloud Security Case Study Amazon Web Services. Ugo Piazzalunga Technical Manager, IT Security [email protected]
Cloud Security Case Study Amazon Web Services Ugo Piazzalunga Technical Manager, IT Security [email protected] Agenda 1. Amazon Web Services challenge 2. Virtual Instances and Virtual Storage
ITAR Compliance Best Practices Guide
ITAR Compliance Best Practices Guide 1 Table of Contents Executive Summary & Overview 3 Data Security Best Practices 4 About Aurora 10 2 Executive Summary & Overview: International Traffic in Arms Regulations
The virtual safe: A user-focused approach to data encryption
The virtual safe: A user-focused approach to data encryption Steganos GmbH, 2008 1 The hard disk: a snapshot of our lives The personal computer has never been more personal. We routinely trust it with
Viewfinity Privilege Management Integration with Microsoft System Center Configuration Manager. By Dwain Kinghorn
4 0 0 T o t t e n P o n d R o a d W a l t h a m, M A 0 2 4 5 1 7 8 1. 8 1 0. 4 3 2 0 w w w. v i e w f i n i t y. c o m Viewfinity Privilege Management Integration with Microsoft System Center Configuration
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary
Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy
Presentation for : The New England Board of Higher Education Hot Topics in IT Security and Data Privacy October 22, 2010 Rocco Grillo, CISSP Managing Director Protiviti Inc. Quote of the Day "It takes
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
