SlideShare una empresa de Scribd logo
1 de 16
Encrypting your data: Is there
  a difference between Cloud
and your internal data centre?
          Vladimir Jirasek, Founder of Jirasek Consulting Services
            Research director, Cloud Security Alliance, UK chapter


                                                      16 January 2013
What you will learn today

 Security architecture prime for CIOs

 Encrypt, or not encrypt, that is the question!

 Alternatives to encryption

 Types of encryption

 Encryption as a security boundary

 Cloud delivery models and encryption

 Practical examples of encryption in Public
AES-128 so it must be secure! Trust me!



          PDF
         Secret
                                 01010001
                                 10101010
                                 10110101                   PDF
                                                           Secret
                                 01001010
                                 10101011
                                 00110101


                                                          Cloud service
Cloud service
                                                            provider
    user

                  Just because it is encrypted does not
                  make it secure… Look end to end.
However not all data in the cloud are
secret!
Sometimes too much encryption is bad
though.




       Who holds encryption keys? Are they available?
Should data security be on CIOs agendas?



    PaaS/Saas


                                                                          Mandatory reading!




                    Saas
                                         Saas


 Cloud provider        Your company             Consolidation of             Cost savings in
reputation/costs      reputation/costs          Cloud providers               Enterprises


      Not many security breaches                Will become targeted as more enterprises rely
            so far. Why?                               more on public Cloud computing
CIOs! Security architecture is not just
firewalls and encryption…

                        A clever, sophisticated and fit
                          for purpose combination of
                          administrative and technical
                          controls

                        Right mix of controls at all
                          security domains:
                          preventative, detective
                          (mostly neglected) and
                          recovery

                        Start with Processes then fit
                          People and Technology
Types of encryption and security
boundary

     Encryption types                         Security boundary
 Symmetric – one key to encrypt and        Encryption can be used as a
   decrypt. Speed and better security
                                              security boundary:
 Asymmetric – large prime numbers             Key management is an
   create a pair of keys where one key           enforcement point
   can decrypt what other encrypted.
   Slower as bigger keys are needed
   (look for ECC twice the length of        Think of SSL VPN over
   symmetric for same strength) (size of      untrusted network
   output based on size of keys)

 Homomorphic - not new concept but         Encrypted data in database
   made practical by Craig gentry.
   Allows for operations on encrypted
   data without revealing the content!      eDRM
Different ways to protect data in Cloud


               Encryption at Customer end
     PDF
    Secret
             Encryption at Cloud provider end

              Tokenisation at Cloud user end

             Anonymisation at Cloud user end
Cloud deployment models effect data
    security

    Infrastructure as a
                                     Platform as a Service            Software as a Service
          Service


•   Cloud provider offers        •    Cloud provider offers       •    Cloud provider offers
    virtual machine                   standardised (mostly)            mostly custom build
    (typically) – Virtual CPU,        platforms for database,          Software (typically web
    Memory, Disks,                    middleware, web …                based)
    Network                      •    Operating system is         •    Full OS stack is
•   Operating system is               Provider’s responsibility        Provider’s responsibility
    Customer’s                   •    Extending key               •    Extending key
    responsibility                    management from                  management to Cloud
•   Extending key                     Internal DC possible             provider from Internal
    management from                                                    DC difficult
    Internal DC easy
Data protection options in cloud models
                 Infrastructure as a
                                                      Platform as a Service             Software as a Service
                       Service
SIEM




                 Extend company SIEM                                  Plug-in to Provider’s SIEM

                  Extend DLP or eDRM                          Provider operated data/database encryption
Data




              Extend company file or object                                            Encrypting/tokenising reverse
                       encryption                                                      proxy engines (e.g. CipherCloud)
Application




                                                               Tokenisation and anonymisation
                 Application encryption (customer retains keys)
               Encryption appliance
Host




                  (e.g. Safe-Net ProtectV)
                                                      Provider dependent and operated host encryption

                                             Web TLS (for IaaS operated by customer)
Network




                        Network VPN (could extend to SaaS)
Example of SaaS – Use of Gmail inside
and outside an organisation

Intra company                             SaaS web based application.
                                             Other standard interfaces –
                                             IMAP, POP3, SMTP, Web API

 Sender                                   Data in Gmail available to
                                             anyone with proper
                                             authentication
                Proxy

Recipient                                 TLS used on transport layer

                                          Consider using CipherCloud
                                             like product but be mindful of
                                             traffic flows with external
                                             customers
                        Sender   Recipient
Example of IaaS – Cloud provider offers virtual
 computing resources for Internal apps deployment

Intra company                                                              Cloud provider can
                     Key management
                                                                             theoretically access all
                         HSM                                                 data, if decryption
                                                                             happens on the virtual
Internal                                                                     machine! But would they?
  user
                                                                           Use two possible models:
                       VPN
                                                                             Local crypto operations
                                                                               with remote key
Administrator
                                                                               management. Consider
                                                                               SafeNet ProtectV
                                                                             Remote crypto
                                                                               operations over VPN –
                                                                               speed penalty
                                 Data encrypted
                                                       Data encrypted
                                    Remote
                                                       Local encryption
                                   encryption
                                                         operations
   Travelling user                 operations
                                                  Virtual servers
Recommendations
 Devise your security architecture holistically, not just looking at
   point solutions

 But with regards to data security in the cloud:
   Always try to manage your keys – however in some cases this would
     break cloud deployment model and therefore is not always
     practical
    Use Hardware Security Modules to maintain key security supported
     by robust key management processes
    Extend your enterprise key management, DLP, eDRP and SIEM to
     Cloud providers
    Explore format preserving encryption before data enters Cloud –
     typically for PaaS and SaaS (reverse web encryption proxy)
Links
   Cloud Security Guidance - https://cloudsecurityalliance.org/research/security-guidance/

   Verizon Data Breach reports - http://www.verizonbusiness.com/about/events/2012dbir/

   Dropbox access breach - http://www.securityweek.com/dropbox-confirms-data-breach-says-two-factor-authentication-coming

   Microsoft BPOS Address book leakage -
    http://www.pcworld.com/article/214591/Microsoft_BPOS_cloud_service_hit_with_data_breach.html

   Epsilon data breach - http://www.guardian.co.uk/technology/2011/apr/06/epsilon-email-hack-marks-spencer

   Google email accounts hacked - http://www.washingtonpost.com/blogs/post-tech/post/google-hundreds-of-gmail-accounts-hacked-
    including-some-senior-us-government-officials/2011/06/01/AGgASgGH_blog.html

   CipherCloud lists data breaches in Cloud - http://www.ciphercloud.com/learning-center/breach-watch.aspx

   CloudTweaks.com – Cloud Cartoons - http://www.cloudtweaks.com/category/cartoon/

   Privatecore - http://www.privatecore.com/
Contact me and CSA

 Vladimir Jirasek
   http://about.me/jirasek
   @vjirasek
   vladimir@jirasekconsulting.com

 Cloud Security Alliance
   https://cloudsecurityalliance.org.uk
   @csaukresearch

Más contenido relacionado

Más de Vladimir Jirasek

Security architecture for LSE 2009
Security architecture for LSE 2009Security architecture for LSE 2009
Security architecture for LSE 2009
Vladimir Jirasek
 
Mobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risksMobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risks
Vladimir Jirasek
 
Information Risk Security model and metrics
Information Risk Security model and metricsInformation Risk Security model and metrics
Information Risk Security model and metrics
Vladimir Jirasek
 
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
ISE UK&Ireland 2008  Showcase Nominee Presentation Vladimir JirasekISE UK&Ireland 2008  Showcase Nominee Presentation Vladimir Jirasek
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
Vladimir Jirasek
 
Federation For The Cloud Opportunities For A Single Identity
Federation For The Cloud  Opportunities For A Single IdentityFederation For The Cloud  Opportunities For A Single Identity
Federation For The Cloud Opportunities For A Single Identity
Vladimir Jirasek
 

Más de Vladimir Jirasek (11)

Security architecture for LSE 2009
Security architecture for LSE 2009Security architecture for LSE 2009
Security architecture for LSE 2009
 
Mobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risksMobile security summit - 10 mobile risks
Mobile security summit - 10 mobile risks
 
Information Risk Security model and metrics
Information Risk Security model and metricsInformation Risk Security model and metrics
Information Risk Security model and metrics
 
Integrating Qualys into the patch and vulnerability management processes
Integrating Qualys into the patch and vulnerability management processesIntegrating Qualys into the patch and vulnerability management processes
Integrating Qualys into the patch and vulnerability management processes
 
Securing mobile population for White Hats
Securing mobile population for White HatsSecuring mobile population for White Hats
Securing mobile population for White Hats
 
Security models for security architecture
Security models for security architectureSecurity models for security architecture
Security models for security architecture
 
Meaningfull security metrics
Meaningfull security metricsMeaningfull security metrics
Meaningfull security metrics
 
CAMM presentation for Cyber Security Gas and Oil june 2011
CAMM presentation for Cyber Security Gas and Oil june 2011CAMM presentation for Cyber Security Gas and Oil june 2011
CAMM presentation for Cyber Security Gas and Oil june 2011
 
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
ISE UK&Ireland 2008  Showcase Nominee Presentation Vladimir JirasekISE UK&Ireland 2008  Showcase Nominee Presentation Vladimir Jirasek
ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek
 
Qualys Webex 24 June 2008
Qualys Webex 24 June 2008Qualys Webex 24 June 2008
Qualys Webex 24 June 2008
 
Federation For The Cloud Opportunities For A Single Identity
Federation For The Cloud  Opportunities For A Single IdentityFederation For The Cloud  Opportunities For A Single Identity
Federation For The Cloud Opportunities For A Single Identity
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Último (20)

Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 

Encryption in the Cloud - BrightTalk Data Security Summit 2013

  • 1. Encrypting your data: Is there a difference between Cloud and your internal data centre? Vladimir Jirasek, Founder of Jirasek Consulting Services Research director, Cloud Security Alliance, UK chapter 16 January 2013
  • 2. What you will learn today  Security architecture prime for CIOs  Encrypt, or not encrypt, that is the question!  Alternatives to encryption  Types of encryption  Encryption as a security boundary  Cloud delivery models and encryption  Practical examples of encryption in Public
  • 3. AES-128 so it must be secure! Trust me! PDF Secret 01010001 10101010 10110101 PDF Secret 01001010 10101011 00110101 Cloud service Cloud service provider user Just because it is encrypted does not make it secure… Look end to end.
  • 4. However not all data in the cloud are secret!
  • 5. Sometimes too much encryption is bad though. Who holds encryption keys? Are they available?
  • 6. Should data security be on CIOs agendas? PaaS/Saas Mandatory reading! Saas Saas Cloud provider Your company Consolidation of Cost savings in reputation/costs reputation/costs Cloud providers Enterprises Not many security breaches Will become targeted as more enterprises rely so far. Why? more on public Cloud computing
  • 7. CIOs! Security architecture is not just firewalls and encryption…  A clever, sophisticated and fit for purpose combination of administrative and technical controls  Right mix of controls at all security domains: preventative, detective (mostly neglected) and recovery  Start with Processes then fit People and Technology
  • 8. Types of encryption and security boundary Encryption types Security boundary  Symmetric – one key to encrypt and  Encryption can be used as a decrypt. Speed and better security security boundary:  Asymmetric – large prime numbers  Key management is an create a pair of keys where one key enforcement point can decrypt what other encrypted. Slower as bigger keys are needed (look for ECC twice the length of  Think of SSL VPN over symmetric for same strength) (size of untrusted network output based on size of keys)  Homomorphic - not new concept but  Encrypted data in database made practical by Craig gentry. Allows for operations on encrypted data without revealing the content!  eDRM
  • 9. Different ways to protect data in Cloud Encryption at Customer end PDF Secret Encryption at Cloud provider end Tokenisation at Cloud user end Anonymisation at Cloud user end
  • 10. Cloud deployment models effect data security Infrastructure as a Platform as a Service Software as a Service Service • Cloud provider offers • Cloud provider offers • Cloud provider offers virtual machine standardised (mostly) mostly custom build (typically) – Virtual CPU, platforms for database, Software (typically web Memory, Disks, middleware, web … based) Network • Operating system is • Full OS stack is • Operating system is Provider’s responsibility Provider’s responsibility Customer’s • Extending key • Extending key responsibility management from management to Cloud • Extending key Internal DC possible provider from Internal management from DC difficult Internal DC easy
  • 11. Data protection options in cloud models Infrastructure as a Platform as a Service Software as a Service Service SIEM Extend company SIEM Plug-in to Provider’s SIEM Extend DLP or eDRM Provider operated data/database encryption Data Extend company file or object Encrypting/tokenising reverse encryption proxy engines (e.g. CipherCloud) Application Tokenisation and anonymisation Application encryption (customer retains keys) Encryption appliance Host (e.g. Safe-Net ProtectV) Provider dependent and operated host encryption Web TLS (for IaaS operated by customer) Network Network VPN (could extend to SaaS)
  • 12. Example of SaaS – Use of Gmail inside and outside an organisation Intra company  SaaS web based application. Other standard interfaces – IMAP, POP3, SMTP, Web API Sender  Data in Gmail available to anyone with proper authentication Proxy Recipient  TLS used on transport layer  Consider using CipherCloud like product but be mindful of traffic flows with external customers Sender Recipient
  • 13. Example of IaaS – Cloud provider offers virtual computing resources for Internal apps deployment Intra company  Cloud provider can Key management theoretically access all HSM data, if decryption happens on the virtual Internal machine! But would they? user  Use two possible models: VPN  Local crypto operations with remote key Administrator management. Consider SafeNet ProtectV  Remote crypto operations over VPN – speed penalty Data encrypted Data encrypted Remote Local encryption encryption operations Travelling user operations Virtual servers
  • 14. Recommendations  Devise your security architecture holistically, not just looking at point solutions  But with regards to data security in the cloud:  Always try to manage your keys – however in some cases this would break cloud deployment model and therefore is not always practical  Use Hardware Security Modules to maintain key security supported by robust key management processes  Extend your enterprise key management, DLP, eDRP and SIEM to Cloud providers  Explore format preserving encryption before data enters Cloud – typically for PaaS and SaaS (reverse web encryption proxy)
  • 15. Links  Cloud Security Guidance - https://cloudsecurityalliance.org/research/security-guidance/  Verizon Data Breach reports - http://www.verizonbusiness.com/about/events/2012dbir/  Dropbox access breach - http://www.securityweek.com/dropbox-confirms-data-breach-says-two-factor-authentication-coming  Microsoft BPOS Address book leakage - http://www.pcworld.com/article/214591/Microsoft_BPOS_cloud_service_hit_with_data_breach.html  Epsilon data breach - http://www.guardian.co.uk/technology/2011/apr/06/epsilon-email-hack-marks-spencer  Google email accounts hacked - http://www.washingtonpost.com/blogs/post-tech/post/google-hundreds-of-gmail-accounts-hacked- including-some-senior-us-government-officials/2011/06/01/AGgASgGH_blog.html  CipherCloud lists data breaches in Cloud - http://www.ciphercloud.com/learning-center/breach-watch.aspx  CloudTweaks.com – Cloud Cartoons - http://www.cloudtweaks.com/category/cartoon/  Privatecore - http://www.privatecore.com/
  • 16. Contact me and CSA  Vladimir Jirasek  http://about.me/jirasek  @vjirasek  vladimir@jirasekconsulting.com  Cloud Security Alliance  https://cloudsecurityalliance.org.uk  @csaukresearch

Notas del editor

  1. Working on a project – project managers says we have a VPN tunnel for data transfer so that is enough for security 
  2. Talk about data classification. We will talk about dropbox later
  3. Apply encryption only where needed and make sure that the key management is done properly. NIST document http://csrc.nist.gov/groups/ST/toolkit/key_management.html
  4. Look at processes required by ISO, Cobit..Control objective = process (typically)
  5. Also talk about extending DLP and eDRM