Cipher Trust Transparent Encryption 1
Cipher Trust Transparent Encryption 1
com
White Paper
Contents
3 Introduction
13 Use cases
13 Databases and Unstructured Files – Across Data Centers and Cloud Environments
14 Big Data
15 Advanced data protection for Amazon S3
16 Summary
16 About Thales
Just as no single attack method is responsible for all increased threats to enterprise data, no single digital transformation technology is
responsible for all increased risks from these new environments – as each technology adopted presents unique data security challenges.
However, the number and complexity of these new technologies and the individualized approach required to secure data throughout each
environment combine to compound the problem.
Within this environment of increased risks to sensitive data, enterprises require the ability to limit access to sensitive information to only
those users, groups, and processes that require the use of the data – and no more. This need extends across traditional data centers, cloud
environments, SaaS implementations, and to the data stores of every digitally transformative environment. What is required is a way to make
sensitive data useless (and valueless) when not in use and then to control access to the levers that make the data useful again, when it is
needed by a legitimate user. This is what transparent encryption with user access control does.
CipherTrust Transparent Encryption enables quick, effective and transparent protection of data at the system level without derailing business
processes, user tasks, and administrative workflows. With a single set of data security controls, information stored within physical and virtual
systems, big data environments, containers, and linked cloud storage are protected at the file system or volume level across data centers
and cloud environments. The result is greatly reduced risk, and an enhanced capability to meet compliance and regulatory data security
requirements.
FIP
e
ieve Complianc
PROTECT
provider’s infrastructure. Organizations can easily uncover and close
S 14
MONITOR
privacy gaps, prioritize protection, and make informed decisions
0-2 Validat
about privacy and security mandates before a digital transformation CipherTrust
implementation. Manager
Ach
ed
Accelerate Time to Compliance
o u d S e c u rit Cl y
Regulators and auditors require organizations to have control of
Key
regulated and sensitive data and reports to prove it. CipherTrust Management
Developer
APIs
Data Security Platform capabilities, such as data discovery and
classification, encryption, access control, audit logs, tokenization, CO N T R O L
and key management support ubiquitous data security and
privacy requirements. These controls can be quickly added to new
deployments or in response to evolving compliance requirements. The centralized and extensible nature of the platform enables new controls
to be added quickly through the addition of licenses and scripted deployment of the needed connectors in response to new data protection
requirements.
The deployment is simple, scalable and fast, with agents installed at operating file system or device layer, and encryption and decryption
is transparent to all applications that run above it. CipherTrust Transparent Encryption is designed to meet data security compliance and best
practice requirements with minimal disruption, effort, and cost. Implementation of the encryption software is seamless keeping both business
and operational processes working without changes even during deployment and roll out.
Scalable encryption
The CipherTrust Transparent Encryption agent runs at the file system or volume level on a server. The agent is available for a broad selection
of Windows, Linux, and AIX platforms and can be used in physical, virtual, cloud, container, and big data environments – regardless of the
underlying storage technology. Administrators perform all policy and key administration through the CipherTrust Manager. Encryption takes
place on the server, eliminating bottlenecks that plague legacy, proxy-based solutions. Performance and scalability are further enhanced by
leveraging cryptographic hardware modules that are built into such modern CPUs as Intel AES-NI and IBM POWER9.
App/Database level
Application/Database DBAdmins, DB Users SQL Injections
Cipher Trust
Application
Data Protection
Loss or theft of
Disk physical media Key
Management
Figure 2. CipherTrust Data Security Platform – Risks and Protection Layers for Transparent Encryption
Key features
• Transparent data protection. Continuously enforces file-level encryption that protects against unauthorized access by users and
processes and creates detailed data access audit logs of all activities without requiring changes to applications, infrastructure, systems
management tasks, or business practices.
• Seamless and easy to deploy. CipherTrust Transparent Encryption agents are deployed on servers at the file system or volume level
and support both local disks as well as cloud storage environments, such as Amazon S3 and Azure Files.
• Define granular access controls. Apply granular, least-privileged user access policies that protect data from external attacks and
misuse by privileged users. Specific policies can be applied by users and groups from systems, LDAP/Active Directory, Hadoop and
containers. Controls also include access by process, file type, and other parameters.
• High-performance hardware accelerated encryption. CipherTrust Transparent Encryption only employs strong, standard-based
encryption protocols, such as the Advanced Encryption Standard (AES) for data encryption and Elliptic Curve Cryptography (ECC) for
key exchange. Encryption overhead is minimized using the AES hardware encryption capabilities available in modern CPUs.
• Comprehensive security intelligence. Identify and stop threats faster with detailed data access audit logs that not only satisfy
compliance requirements, but also enable data security analytics. In addition, security intelligence logs and reports streamline compliance
reporting and speed up threat detection using leading security information and event management (SIEM) systems.
• Broadest system and environment support. The agent is available for a broad selection of Windows, Linux, and AIX platforms and
can be used in physical, virtual, cloud, container, and big data environments, regardless of the underlying storage technology.
Solution Elements
CipherTrust Manager
Encryption policies, keys and
• Minimum of 2 to enable high availability clustering data access audit logs
• Physical or Virtual formats available
A simple CipherTrust Transparent Encryption deployment scenario for file system or volume data within a local data center includes:
• A CipherTrust Transparent Encryption agent deployed to the host systems or virtual machines
• Two CipherTrust Manager appliances. Two appliances are required for clustering and failover capabilities that enable solution uptime.
Additional options extend the solution’s functionality.
File Volume
Policies administered by agents employ logic and Systems Managers
CipherTrust Manager
fine- grained access control settings configured at the
Storage
CipherTrust Manager to evaluate attempts to access
Server
protected data, and then either grant or deny access.
All activities are logged. Logs are available from the local Figure 4. CipherTrust Transparent Encryption encrypts, enforces access policies, and logs all file, volume and linked cloud storage access
system or the CipherTrust Manager and can be integrated
with leading SIEM systems. See the section of this white
paper on Security Intelligence for further detail.
Application uptime, for the solutions whose data CipherTrust Transparent Encryption protects, is supported with an easily available failover
capability. Simply deploy agents at the primary and failover locations and keep encrypted data stores in sync with standard processes. When
top level application failover is required, enable the same policy used at the primary location at the failover location. Sensitive information is
continuously protected, and business operations continue with standard failover operation.
CipherTrust Transparent Encryption is designed to minimize impact on overall system performance. The AES-256 hardware-accelerated
encryption capabilities available from modern CPUs are used by the agent regardless of the environment. AIX, Linux, and Windows
deployments to physical servers, virtual environments, cloud, and even container environments all benefit from the extremely low overhead on
encryption and decryption available from hardware acceleration.
Cloud Storage
Amazon AWS – EBS, EFS, and via the AWS Storage Gateway
also supports S3 Standard, S3 Infrequent and S3 Glacier
CipherTrust Manager
The CipherTrust Manager is the common centralized management environment for all CipherTrust Data Security Platform products. It provides
policy control as well as secure management and storage of encryption keys, includes a web-based console as well as CLI and REST APIs.
The CipherTrust Manager is available as FIPS 140-2 compliant virtual and physical appliances.
The CipherTrust Manager also provides a unified way to manage keys for third-party platforms, such as IBM Guardium Data Encryption
(GDE), Oracle Transparent Data Encryption (TDE), Microsoft SQL Server TDE, and KMIP-compliant encryption products. The CipherTrust
Manager can also store and manage X.509 certificates, symmetric keys, and asymmetric keys.
Users and groups for data security management tasks can be based on locally defined users or groups, or imported via LDAP from Active
Directory or other directory services and identity management environments.
Enterprise (CipherTrust)
Administrator
Key Policy Host Audit Key Policy Host Audit Key Policy Host Audit
Custodian Manager Admin Role Custodian Manager Admin Role Custodian Manager Admin Role
Domains can be location, business unit, Separation of roles for key management
customer, department security controls, encryption and audit
To further isolate and protect sensitive data, the CipherTrust Manager and CipherTrust Transparent Encryption work in tandem to allow security
administrators to create a strong separation of duties between data owners and privileged IT administrators. Users and groups used in policies
for access control to data can be based on system level roles, LDAP/AD, Hadoop users/groups/zones as well as container environment
users and groups.
If desired, CipherTrust Transparent Encryption can encrypt files while leaving their metadata in the clear. This capability enables IT
administrators to perform system administration tasks (such as replication, backup, migration, snapshots, and system updates), without exposure
to sensitive data. The CipherTrust Manager also can control basic system commands such as copy, write, and directory listings.
Transparent
Enterprise Key
Encryption File and
Management
volume encryption
CipherTrust Manager and access controls
Available interfaces Oracle and
Big Data
•RESTful API •CLI SQL native
Encryption and
•Web GUI TDE key
access controls
management
All configuration settings, including changes to administrators, domains, hosts, keys, and policies, are made on the primary CipherTrust
Manager, other CipherTrust Managers are read-only. Configuration changes and updates on the primary CipherTrust Manager are pushed to
the other CipherTrust Managers at set intervals using replication.
These logs provide deep visibility into data access, which can be used to alert administrators to unauthorized access attempts to protected
data that may represent a threat, and to build typical access patterns when combined with other infrastructure and access information. For
instance, a user that typically accesses information in small quantities from within a local network, if seen to be accessing large volumes of
data from a remote location, would represent a threat that should generate an alert and be investigated.
• Intelligent resource management. Encrypting large data sets can require significant CPU resources for an extended time. Live Data
Transformation provides sophisticated CPU use and I/O rate management capabilities so administrators can balance between the
resource demands of encryption and other business operations. For example, an administrator can define a resource management rule
specifying that, during business hours, encryption can only consume 10% of system CPU, while on nights and weekends, encryption can
consume 70% of CPU.
• Versioned backups and archives. With key versioning management, Live Data Transformation offers efficient backup and archive recovery
that enable more immediate access. In a data recovery operation, archived encryption keys recovered from the CipherTrust Manager are
automatically applied to an older data set. Restored data is encrypted with the current cryptographic key.
customer premises
The CipherTrust Data Security platform provides the capability for cloud service providers and enterprises to offer multi-tenanted access to
CipherTrust Managers that enables them to create and bring in data encryption keys used with CipherTrust Transparent Encryption agents
rather than use the data encryption keys generated by the CipherTrust Manager. Data encryption keys can be created by a trusted hardware
device (such as a Thales or third-party Hardware Security Module) or from an existing key management and creation application. Keys
imported for use with CipherTrust Transparent Encryption agents can then be used as needed with policies created within the CipherTrust
Manager.
Cloud
Customers generate their own
keys from in-house resources Enviroment
Customer 1
Wrapped keys imported
via RESTful API or GUI
Customers export wrapped
data encryption keys to Virtual
3rd Party HSM CipherTrust Manager using
REST API or GUI
Customer’s imported keys used
by CipherTrust applications
Customer 2
Figure 9. Maintain complete control of encryption keys, even within multi-tenant cloud environments
Most enterprises will opt for a solution that includes managing and controlling from their local data center encryption keys and access policies
for both local data center resources and cloud environments. This approach keeps control of keys firmly within the enterprise, eliminating the
risk of remote legal access or compromise at the cloud provider. Enterprises that are “all in” the cloud and make no use of local data center
compute resources may opt for a cloud-based deployment of key and policy management. Such organizations can either co-locate cloud
key management in the same cloud with data protected by CipherTrust Transparent Encryption, using a secondary cloud environment for the
CipherTrust Manager to provide a greater degree of separation and lower risk, or use a co-location or hosting provider for hardware versions
of CipherTrust Managers. All of these scenarios are easily supported with CipherTrust Transparent Encryption by locating physical or virtual
CipherTrust Managers in local data centers, co-location vendors, hosting solutions, or cloud environments as needed.
Regardless of the deployment model, a typical database protection scenario includes a CipherTrust Transparent Encryption agent deployed
to database servers with a simple policy – a signed database process and the database user are allowed cleartext access to the protected
data store, all others will only see file metadata and ciphertext. This effectively shields the database access from compromise by root and
privileged user-based attacks, local system, and LDAP users and groups while also meeting compliance and best practice requirements for
safeguarding the data set with encryption.
For larger data sets, customers will typically purchase the Live Data Transformation extension to CipherTrust Transparent Encryption, enabling
immediate encryption of the database without taking critical applications offline and periodic rekeying to meet compliance and best practice
requirements without downtime.
We will use a directory for a typical unstructured file system protection example. The CipherTrust Transparent Encryption agent is deployed to
the server with separate policies for LDAP/Active Directory user groups. For instance, allowing only finance department members to access
critical accounting data, HR to access confidential employee information, and Engineering to access development documents. Each data
store section is encrypted with an individual key by policy, effectively limiting the access to only those who require it for their work.
Figure 10. Fully integrated enterprise on-premises and cloud enviroment deployment
CipherTrust Transparent Encryption safeguards this information. The solution can be used to protect data at the file system level within compute
notes (and underlying storage), source data locations, as well as the repositories used for logs and reports. And, this protection extends
beyond the system level users/ groups and LDAP/AD users and groups that are enforced by CipherTrust Transparent Encryption on a typical
server. The solution also enforces policy-based encryption, access controls and data access logging by Hadoop users, groups and zones.
This capability provides further protection against privileged users within the big data lake or users within the environment.
A typical deployment includes agents installed on compute nodes, source data servers, and servers accessing log/report repositories. Data
is encrypted throughout the environment with appropriate access policies and data access logging controls provided by the CipherTrust
Manager. Further, the use of hardware encryption capabilities in underlying compute infrastructure results in minimal overhead from encrypt/
decrypt operations. This makes it possible to use the solution even where speed and compute capability are critical.
Further, Thales works with leading big data environment vendors as a partner to ensure solution capability and operation. At the time of this
writing, these partners include DataStax, MongoDB, Teradata, IBM, Cloudera, Couchbase, SAP HANA, and Hortonworks.
Encryption
Logs Big Data Reports
Database Data
Warehouse System level protection
•Full CipherTrust Transparent
Encryption functionality: encryption,
Financial Data access control, and data access logs
Dashboards
ERP CRM on underlying systems within the data
lake
Healthcare Data •Protect data sources from
What if queries inappropriate system access
Audio video Excel, CSV •Protect logs & configuration data
PII •Protect reports and results information
Unstructured
on systems
Hadoop user and zone protection
Credit cards Social media Logs System logs Configuration Data nodes Error logs •Extends encryption, access control
and data access logs to Hadoop
Figure 11. Protecting data within big data environments using CipherTrust Transparent Encryption
With advanced data protection for Amazon S3, organizations can apply transparent encryption and access controls to sensitive data in S3
buckets. The CipherTrust Trasnparent Encryption solution encrypts unstructured files, semi-structured data, or structured databases before they
are written to Amazon S3 buckets. This assures that the data is always encrypted in-flight, for example from on-premises hosts or Amazon EC2
instances to the S3 buckets. Decryption only occurs once the data is on the server where it will be used. In addition, CipherTrust Transparent
Encryption protection for Amazon S3 features enhanced granular access controls, which, when deployed with custom AWS IAM policies,
can enforce additional access controls to limit S3 access only to hosts running the CipherTrust Transparent Encryption for Amazon S3 agent.
CipherTrust
Manager Virtual Machine
S3 Bucket - Encryption and
Access Control with CipherTrust
Transparent Encryption
CipherTrust Transparent Encryption uses AES-NI instructions for hardware-based acceleration of data encryption and decryption. In fact,
CipherTrust Transparent Encryption has a proprietary encryption engine that is designed to take full advantage of the parallelism that can be
achieved with multi-core processor chipsets and it specifically leverages the pipelining capabilities of AES-NI. As a result, the solution delivers
the maximum performance possible.
In addition to leveraging hardware-based encryption capabilities, CipherTrust Transparent Encryption is tightly integrated with, and optimized
for, each supported operating system kernel. Consequently, CipherTrust Transparent Encryption leverages the latest features available for every
platform supported, rather than being coded to a lowest common denominator across multiple platforms. With each new release, Thales
continues to add new capabilities that enable the solution to exploit the latest operating system features.
For many applications, the performance overhead that CipherTrust Transparent Encryption introduces is negligible. However, as loads
associated with input/output (I/O) increase, there will be increased overhead associated with encryption. Even with demanding, I/O heavy
applications, such as databases or big data processing, CipherTrust Transparent Encryption generally introduces less than 10% overhead.
One example can be seen in the chart below. In this example, the Yahoo Cloud Serving Benchmark (YCSB) was run against MongoDB
4.0.3, with the WiredTiger storage engine running on top of CipherTrust Transparent Encryption. YCSB is a generally available open source
framework that has a common set of workloads for evaluating the performance of different “key-value” and “cloud” serving stores. The
workload was configured so that less than one-half of the data set could fit in memory, causing a heavy I/O load. As the chart illustrates,
CipherTrust Transparent Encryption only introduced minimal overhead.
50K
XFS 0
40K Readahead
Operations per second
CIpherTrust 4M
30K
Readahead
10K
10K
0
Load A B C D
Figure 12. Even when testing in a scenario with a heavy I/O load, CipherTrust Transparent Encryption introduces minimal performance overhead.
About Thales
The people you rely on to protect your privacy rely on Thales to protect their data. When it comes to data security, organizations are faced
with an increasing number of decisive moments. Whether the moment is building an encryption strategy, moving to the cloud, or meeting
compliance mandates, you can rely on Thales to secure your digital transformation.