Metro Midrange Systems Association September 18, 2008 Introduction To Encryption and Data Security
Metro Midrange Systems Association September 18, 2008 Introduction To Encryption and Data Security
Metro Midrange Systems Association September 18, 2008 Introduction To Encryption and Data Security
1
Data security
2
Why should we protect sensitive
information?
3
Regulations
Payment Card Industry (PCI)
Privacy Notification (state laws requiring notification
of data loss)
Health Insurance Portability and Accountability Act
(HIPAA)
Gramm Leach Bliley Act (GLBA)
Sarbanes-Oxley (SOX)
… and more
4
The regulatory environment is evolving to
include broader definitions of sensitive data,
larger penalties for non-compliance, and more
specific requirements for data security.
5
What information do we need to
protect?
6
• Personally Identifiable
Information or PII
– First Name
– Last Name
– Former Name
– Maiden Name
– Address
– Birth date
– Drivers license number
– Health insurance number
– Checking account number
– PIN codes
– And a lot more!
7
Credit card information
8
Personally identifiable information
9
Name, former name, maiden name, mother’s maiden
name
Address, city, state, zip code
Social security number
Credit card, debit card, checking account, health
insurance number
Driver’s license, identify card, military ID
Home phone number, work number
Favorite pet’s name
PIN codes, passwords, prompts
eBay and PayPal account numbers
10
Data security is disruptive technology.
11
How do we go about securing credit
card and PII?
Don’t panic
Start with an assessment
Avoid point solutions
Data moves across platforms
Data crosses Enterprise boundaries
Remove sensitive data where possible
Develop good data security partners
12
Start with an assessment
13
Where does sensitive data live?
- Database and flat files
- IFS / QNTC / NFS files
- Backup tapes
- Save files
- On the network
- In the air (WiFi)
- Reports
- Program memory
- Laptops
- PDAs, cell phones, thumb drives
14
Components of an assessment
15
Avoid point solutions
Tape
Call Center
CRM
Laptop & PC
Query and BI
16
Point solutions:
17
Data flows inside the Enterprise
18
Data flows to vendors, customers,
employees
Banks Employees
Customers
19
Engage with software vendors
21
Purge historical data
22
What is encryption and how is it used?
23
1 3
AES
4
2
24
Symmetric and Asymmetric encryption
25
Symmetric encryption for field security
28
Symmetric decryption for data
Cust Name: ABC Cons
Cust Num: 499513 Decrypt
Prod Num: 212 Qty: 3
F2500C015G06518
29
Which symmetric algorithm to use?
www.nist.gov
30
Modes of encryption
AES encryption always involves some data to be
encrypted, an encryption key, and possibly an
initialization vector. The five NIST-approved modes
of encryption provide different ways of using these
elements. The modes of encryption are:
ECB – Electronic code book
CBC – Cipher block chaining
CTR – Counter
OFB – Output feed back
CFB – Cipher feed back
31
Why modes of encryption matter
Some modes of encryption add extra randomness
to the encryption process. With these modes you
can encrypt the same credit card number with the
same key, but you will get different results. This is
very important in database applications where
fields may be small or predictable, and exist in
many records.
CBC, CTR and other modes are appropriate
for securing fields in database files.
ECB is not appropriate because it lacks this
randomness.
32
What are encryption keys?
33
Key management strategies:
34
How are encryption keys managed?
35
Key Management systems:
37
Technology considerations
Certifications are important – document the
independent certifications and tests of your vendors
and solutions.
Plan for cross platform support – how will you
encrypt in Windows and decrypt in i5/OS? Linux?
UNIX? Mainframe?
Use best programming practices with encryption –
remove observability, initialize variables, optimize.
Have a key management strategy – know where
you are today and where you will be in the future.
38
Certifications
AES Validation is an NIST defined certification
process for AES encryption. Normally applied to
data security applications.
FIPS-140-2 is an NIST defined certification
process for cryptographic modules. Normally
applied to key management systems.
ISO 17799 is a European standard for security
practices. Covers security policies.
Certifications help insure compatibility, manage
loss investigations, and help limit legal liability.
39
Why certification is important
Confidence: It is how you will know that
encryption is being done the right way.
Compatibility: It is how you will know that you
can encrypt and decrypt across server, vendor, and
customer boundaries.
Risk management: It is how you will defend
yourself in the event of a loss.
IT investment protection: It is how you will
avoid re-engineering applications.
40
Cross-platform issues
Computer manufacturers and software vendors use
incompatible and proprietary interfaces:
- Microsoft .NET and SQL Server
- Oracle database
- IBM DB2
- Java
- Sun Solaris
- Open SSL
Using a common cross-platform encryption library
will reduce data exposure and minimize
development resources.
41
Performance
Encryption will impact:
CPU utilization
Total job run times
Interactive response time
44
Pitfalls
- Thinking “It won’t happen to us”
- Bypassing assessment
- Not using standard encryption
- Not using certified software
- Not using the correct encryption mode
- Not using Key Management
- Not securing data in motion
- Not using cross-platform technologies
- Not implementing compliance monitoring
- Not securing query and BI tools
45
Thank you
Patrick Townsend
Patrick Townsend & Associates, Inc.
Email: patrick.townsend@patownsend.com
(800) 357-1019
www.patownsend.com
46
Notes:
47