Managed Encryption Service

Similar documents
Alliance Key Manager Cloud HSM Frequently Asked Questions

Complying with PCI Data Security

Transparent Data Encryption: New Technologies and Best Practices for Database Encryption

White Paper How Noah Mobile uses Microsoft Azure Core Services

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

Security Architecture Whitepaper

FileCloud Security FAQ

Securing an IP SAN. Application Brief

Rights Management Services

MS Design, Optimize and Maintain Database for Microsoft SQL Server 2008

How To Use Aws.Com

RSA SecurID Two-factor Authentication

Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008

Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

CRYPTOGRAPHY AS A SERVICE

Using BitLocker As Part Of A Customer Data Protection Program: Part 1

Overview of Luna High Availability and Load Balancing

Credit Card Security

PrivateServer HSM EKM Provider for Microsoft SQL Server

Using BroadSAFE TM Technology 07/18/05

MS 10751A - Configuring and Deploying a Private Cloud with System Center 2012

Alliance Key Manager Solution Brief

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February

Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy

Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules

Insight Guide. Encryption: A Guide

Video Conferencing and Security

Presented by Philippe Bogaerts Senior Field Systems Engineer Securing application delivery in the cloud

An Introduction to Cryptography and Digital Signatures

MS-55096: Securing Data on Microsoft SQL Server 2012

STRONGER AUTHENTICATION for CA SiteMinder

Global security intelligence. YoUR DAtA UnDeR siege: DeFenD it with encryption. #enterprisesec kaspersky.com/enterprise

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

SafeNet DataSecure vs. Native Oracle Encryption

Table of Contents. Introduction. Audience. At Course Completion

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

With Great Power comes Great Responsibility: Managing Privileged Users

OVERVIEW. DIGIPASS Authentication for Office 365

Data Backup Options for SME s

Big Data Analytics Service Definition G-Cloud 7

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

Service Definition Document

Microsoft SQL Server Integration Guide

Achieving PCI-Compliance through Cyberoam

Attix5 Pro Overview. V7.x. An overview of the Attix5 Pro product suite.

Database Security & Compliance with Audit Vault and Database Firewall. Pierre Leon Database Security

White Paper Secure Reverse Proxy Server and Web Application Firewall

Compiled By: Chris Presland v th September. Revision History Phil Underwood v1.1

Securing Data in Oracle Database 12c

Cloud & Security. Dr Debabrata Nayak Debu.nayak@huawei.com

Effective End-to-End Cloud Security

Securing Data on Microsoft SQL Server 2012

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

IoT Security Platform

Cornerstones of Security

Chapter 4 Application, Data and Host Security

SaaS Security for the Confirmit CustomerSat Software

Security Overview for Windows Vista. Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation

Enterprise level security, the Huddle way.

Applying Cryptography as a Service to Mobile Applications

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

ADDING STRONGER AUTHENTICATION for VPN Access Control

Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security

Kaspersky Lab s Full Disk Encryption Technology

BANKING SECURITY and COMPLIANCE

FAQ. Hosted Data Disaster Protection

Vess A2000 Series HA Surveillance with Milestone XProtect VMS Version 1.0

Encryption Key Management for Microsoft SQL Server 2008/2014

Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration

Clustering Windows File Servers for Enterprise Scale and High Availability

White Paper. Prepared by: Neil Shah Director, Product Management March, 2014 Version: 1. Copyright 2014, ezdi, LLC.

Meeting Technology Risk Management (TRM) Guidelines from the Monetary Authority of Singapore (MAS)

Information Security Policies. Version 6.1

OBM (Out of Band Management) Overview

Data Protection: From PKI to Virtualization & Cloud

Symantec Backup Exec 11d for Windows Servers New Encryption Capabilities

Configuring Security Features of Session Recording

RSA Digital Certificate Solution

How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup

Building Reliable, Scalable AR System Solutions. High-Availability. White Paper

The Porticor Virtual Private Data solution includes two or three major components:

HP ProtectTools Embedded Security Guide

YOUR DATA UNDER SIEGE. DEFEND IT WITH ENCRYPTION.

Encrypting Data at Rest

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

PRIME IDENTITY MANAGEMENT CORE

INTRODUCTION TO CRYPTOGRAPHY

Cyber Hygiene for Physical Security

Transcription:

Amethyst Cryptographic Services Ltd Managed Encryption Service An Overview Chris Greengrass March 2011

Encryption and Cryptography The use of encryption/decryption is as old as the art of communication. In wartime, a cipher could be employed to keep the enemy from obtaining the contents of a transmission. Simple ciphers include the substitution of letters for numbers, and the rotation of letters in the alphabet; this latter technique goes back to Roman times and is sometimes known as the Caesar Cipher. In today s systems, much more complex ciphers work according to sophisticated computer algorithms that rearrange the information so as to make it unreadable to anyone that intercepts the data or signals. In order to easily recover the contents of encrypted data or signals, the correct decryption key is required. There are two basic types of encryption methods, symmetric and asymmetric. A symmetric method relies on a single private key used to encrypt and decrypt data thus requiring all parties to have possession of that private key to be able to send and receive messages. Essentially the problem is one of how to securely distribute and store the private key, without it being compromised by non authorised people or systems. An asymmetric method uses two keys, a private key that is used to decrypt messages, and a public key, which is used to encrypt messages. This method has many benefits for an encryption system; firstly, the decryption (private) key does not have to be shared. Secondly, the encryption key can be, and indeed is, shared with as many parties as possible so that they can secure data or signals sent to the owner of the private key. Importantly, the possession and ownership of a private key is the intrinsic point of trus t of in both systems. Typically, asymmetric methods are used to establish secure channels of communication over open systems such as the Internet whilst symmetric methods are employed to encrypt data on more restricted channels. These two basic methods of encryption, or combinations thereof, are used throughout modern computer and communications systems to secure data within those systems. They are used extensively in financial and government systems for everything from on-line banking to secure mobile phone communications. What are the benefits of cryptography? As well as the many obvious benefits of keeping data secret, either when it is at rest on a computer disc or when traversing untrusted networks such as the Internet cryptography can be used to authenticate all communicating entities, be they machine or human, so long as all either possess or have access to a private key which is intrinsically trust. The data we encrypt may be sensitive for a number of reasons from medical data, financial records or indeed financial transactions. It may also contain information relating to national security. What are the problems with cryptography? Despite the numerous advantages of cryptography, as a technology it has yet to deliver its real benefits to businesses. Here are some of the reasons why: Cryptography can quickly become very complex; The encryption algorithms have to be implemented without error to be effective; Algorithms age and do not offer the same degree of protection over their entire lifetime because the longer they are in use the more vulnerable they become to attack and compromise; 1

High assurance cryptography has to be done in trusted environments using specialised hardware such as the Trusted Platform Module (TP M) found in laptops and other client-side devices, and/or the Hardware Security Module (HSM) in data centres, smartcards, phones and credit cards; The protection of any cryptographic system is only as strong as the protection used to secure the encryption/decryption keys; Deploying enterprise-level cryptography can quickly become very costly; Specialised hardware and software are often required; Specialist full time staff will be needed to manage an enterprise cryptographic service; Regulatory compliance costs can be very high e.g. within the financial services sector; Year on year support costs are high. Cryptographic devices often represent a single point of failure in a n infrastructure; Maintenance often requires significant downtime for business critical systems ; It is difficult (if not impossible) for cryptographic systems to match modern Data Centre operational capacity levels; Cryptography is very demanding of computer resources and current devices do not scale well to increasing demand; Cryptography vendor lock in, i.e. it can be very difficult to change, or even upgrade, a cryptographic device or system once a particular hardware vendor or certain interfaces have been selected; Cryptography is not plug and play friendly: application programming interfaces are diverse and often proprietary in nature, and they don t adapt or extend; It can be difficult to detect when illegitimate encryption is being used to bypass system security; Cryptography does not currently fit well into the cloud computing model. Current industry practise means that cryptographic systems are deployed on a project by project basis, with each project picking up the capital expenditure to deploy a cryptographic system. Applications have to manage encryption keys as well as the complexity of existing API s (e.g. PKCS #11 1 ) which frequently results in poor and ineffective implementation. Furthermore, project by project deployment in large data centres often means that where the full capacity of a cryptographic device is not used, there will be excess capacity that cannot be shared with other projects within the same enterprise. In summary there are substantial obstacles for the adoption of wide scale cryptography in an enterprise, despite its obvious benefits. Clearly in order for the benefits to be widely realised, all of these hurdles must be overcome. What is a Managed Encryption Service? In order to address the issues with cryptography and to meet the demands and realise the benefits of cloud computing, a new approach to cryptography deployment and application integration is needed. Instead of being centred on devices and projects, effective enterprise encryption must be based on a service oriented approach which provides cryptography as a managed utility or commodity service, much in the same way as broadband access is provided. This approach allows enterprises to gain the full advantages of cryptography: No capital expenditure, bought as a service from day one; Purchase a defined service with guaranteed capacity and level of assurance; 1 http:// www. rsa.com/rsa labs/ node.asp?id=2133 2

Centralised management of cryptographic devices via a Cryptographic Network Operations Centre (CNOC); Scalable cryptographic resources, not limited by the capacity of any single device; High Availability configuration, no single point of failure in service; Keys managed securely within the service and NOT by applications; Encryption algorithms selected by the service and under the control of a user-defined policy; can be updated transparently to the application; Vendor neutral interfaces, no vendor lock in to any supplier(s); A variety of industry standard API s; A highly abstracted business oriented API allowing rapid integration for bespoke applications (removes the need for application developers to have knowledge of cryptography); A variety of assurance levels for cryptographic devices; Extensive and secure audit, compliance and attestation records; Policy based access to cryptographic resources allowing exquisite control over who and what is encrypted and decrypted; RIPA compliance services; Reduced environmental impact (less power consumption, better utilisation). Amethyst Cryptographic Services Ltd (ACS) Managed Encryption Service (MES) provides a highly scalable enterprise encryption service. Because the core cryptographic devices are stateless in operation, additional devices and capacity bandwidth can be added without disruption to service continuity. What does a Managed Encryption Service look like? This diagram shows the components of the service. The ACS trusted boundary is either the ACS data centre or an appliance boundary within a client data centre that will be remotely managed from the ACS data centre depending upon the enterprise requirements. 3

With managed encryption it is possible to limit the visibility of the encryption keys purely within the ACS trusted boundary. This abstraction allows the application to focus on the business at hand and be completely unaware of the complexities of the algorithms and keys used to protect the data. It also allows the service to rollover the keys without interruption to the application. In order to make full use of the managed service, access to the encryption resources is granted by means of authentication credentials and by the enforcement of cryptographic policy by the service management layer. The authentication can be: Username/Password authenticated by LDAP or Microsoft Active Directory; Remote Authentications Dial in user Service (RADIUS); Digital certificate challenge. The cryptographic policy defines the detailed cryptographic policy to be used, the encryption key algorithm and the access rights assigned to the user or entity requesting access. As the service is the only point which has access to the application keys and the devices under which the cryptography (encryption and decryption) takes place, it is able to produce extensive audit and compliance information. This log is digitally signed for integrity and non repudiation. Managed Encryption Service Integration There are a variety of industry standard interfaces to cryptography, some are proprietary products and some are open standards. The ACS MES integrates with a wide range of OS platforms, middleware and applications including: Oracle; SQL Server; MS SharePoint; and bespoke applications. The service can also include a scalable SSL acceleration engine for all data in transit. One of the major advantages of the ACS MES is that the API is non-proprietary and extensible in nature, so any new commands can be added to the service without impacting the underlying service. The ACS MES integrates with HSM s from the following vendors: Safenet; AEP, (Commercial and CAPS approved); Thales; ncipher In addition, the ACS MES can provide a High Performance Software Security Module (SSM) for development and test during system integration phases. A Managed Encryption Service for all Sectors The ACS MES can be configured and operated to meet the needs of specific sectors. For HMG and MOD, the ACS MES incorporates CAPS Baseline and Enhanced Hardware Security Modules. This service provides protection for protectively marked IL2, IL3 and IL4 data. The CNOC is staffed by staff with DV security clearance. For other sectors, including financial services, the MES provides unique flexibility and resilience. Business Benefits The ACS MES delivers a number of business benefits: It can be used to provide a technical control against aggregation of data, which can otherwise lead to expensive enhancements to data centre infrastructure or limitations on use of the application system; 4

It allows the use of shared SAN disc arrays within a data centre, if used in conjunction with Transparent Disk Encryption (TDE), as it provides segregation between application data. Whilst TDE provides a blanket encryption of the data within a database, the ACS MES also provides exquisite control over the data that users can share; It can be deployed as a gateway between two systems working at different Im pact levels so that information traversing such systems is re keyed with different keys, denying users in the lower domain visibility to protected data in the higher domain. This is enforced centrally by cryptographic policy; It supports the HMG G-Cloud initiative by providing a centrally managed encryption service to applications running in virtual machine on clustered data centres. Service Levels Our service levels mirror those that are typically provided by the leading providers of data centre hosting services. Please contact us for details. Contact Amethyst Cryptographic Services Ltd Worting House Church Lane Basingstoke Hampshire RG2 8PX Email: sales@amethystcrypto.com Tel: 01256 345612 5