SlideShare a Scribd company logo
Brave New World – Encryption and the Cloud

                     Ashvin Kamaraju – VP of Product Development




 www.Vormetric.com
Agenda
     Cloud Market Overview
     Security for the Cloud
     Encryption & Key Management
     Q&A




2
Cloud Market Overview
Data Centers Are Evolving




                                 Cloud
                       Virtual

            Physical


4
Enterprises Are Moving to the Cloud
There Are Different Types of Public Clouds


                                                    Fully functional applications provided such as
                                  SaaS              CRM, ERP, email, Project Management,
                                Software s a        Travel Services, etc.
                                  Service




                                 PaaS               Operating environments included such as
                           Platform as a Service    Windows/.NET, Linux/J2EE, applications of
                                                    choice deployed



                             Virtual Data Centers
             IaaS
          Infrastructure
                                                    Virtual platform on which required operating
                             Cloud Centers
           as a Service                             environment and application are deployed.
                                                    Also includes storage as a service offerings
                              Data Centers




6
Market Landscape
    Gartner September 2012


                             Public cloud services market is forecast to grow
                                   19.6 percent in 2012 to $109 billion



                             Business process as a service (BPaaS) represents
                                      77 percent of the total market


                         Infrastructure as a service (IaaS) is forecast to be
                         $6.2 billion in 2012 and growing at a rate of 45.4
                                               percent


                         The total public cloud services market is forecast
                                 to grow to $206.6 billion in 2016



7
Security for the Cloud
Barriers to Cloud Adoption




 Performance                 Security
Cloud Adoption  Need for Data Security

         Data = Cash
         • Reputation, Compliance, Penalties


         Layers of Network Security Applied Today
         • Next Gen Firewalls, VPNs, IPS, SIEM, DAM/DAP,


         Move to Include Data Security
         • Encryption, Key and Policy Management
Security of cloud infrastructure - Survey
Results
                                                                         What data types would you place in the cloud
                                                                                infrastructure environment?

       Regulated data (such as credit cards, health
       data, SSN, driver’s license number


       Employee data


       Non-regulated confidential business data (such
       as intellectual property, business plans, financial
       records)


       Non-regulated customer data (such as purchase
       history, email address list, shipping information)
                                                                0         10        20        30        40        50        60          70   80
                                                                                                 Responses (%)

                                                                                       Encrypted           Not Encrypted



     Source: Ponemon Institute survey of 1000 U.S IT and Compliance practioners (600 IT; 400 Compliance) –
     November 2011



11                                              Copyright © 2011 Vormetric, Inc. - Proprietary and Confidential. All Rights Reserved.
Why does encryption make data secure in
the cloud?
 Cloud is inherently multi-tenant
    All infrastructure i.e. compute and storage are shared among different customers
    (serially)
    In the event there is a physical theft at the service provider facilities unprotected
    data is left vulnerable
    In the event there is unauthorized access (malicious or inadvertent) unprotected
    data ends up in the wrong hands
 Sensitive data must be protected to meet regulatory
 requirements
    Payment Card Industry (PCI) Data Security Standard (DSS)
    HIPAA HITECH
    Safe Harbor
 Enable governance for hybrid clouds
    Seamlessly manage private and public clouds by complying with the corporate
    regulatory and security standards
Two Different Perspectives

                Cloud Service Provider
                • Want to provide assurances to their
                  customers that the service is secure
                • This is a competitive differentiator




                Cloud Service Provider Customer
                • Some will trust that their data is being
                  properly secured
                • Some will demand that they maintain
                  complete control of their data
Encryption and Key Management
3 Components of Data Security in the Cloud



                              Policy
                            Management




                  Key
               Management




                                         Encryption
Encryption, Policy and Key Management
Policy and key management are extremely
important aspects of encryption
Keys are used to encrypt/decrypt data
Policies, which are tied to business need, define
how keys are distributed and authorized for use
Enterprises typically have several encryption
solutions and keys are not centrally managed
Centralized policy and key management is essential
to meet the business needs, governance and
regulatory requirements
Centralized Key Management
Benefits
  Central repository for secure storage of keys
  Key life cycle management (creation, deletion, expiry
  notification, reporting)
  Policies (define how keys will be used)
  Separation of duties
  Secure backup
  Compliance with standards such as FIPS 140-2
  Manage encryption solutions using industry standards
  e.g. PKCS #11, KMIP
Centralized Key Management
Key Management: As a service or On Premise?
Approach                                         Tradeoffs

               Custodianship         Risk             Cost             Separation of             Multi-
                                                                          duties                Tenancy


On-Premise
 solution                                           High (can be
                                      Low                                                       Lines of
                  Customer                        amortized across             Yes
                                  (customized)                                                  business
                                                 large deployment)


    Key
Management
                                                                     Yes. But only if data is
as a Service                      Depends on                          not managed by key         Multiple
               Service Provider                        Low
                                    the SLA                          management service         customers
                                                                            provider
Understanding Data Security with Software
as a Service (SaaS)
 Doing your research: Data security due diligence
    Customer does not control how information is handled but can effect it
 The risk: data security threats
    Data exposure
        By SaaS provider
        By IaaS partner
        By customer through application controls
 SaaS touch points: SaaS controls that customer can effect
    Data handling and protection agreements in contractual negotiations
    Security administration for access controls
 Solutions
    Data encryption used by SaaS providers to fulfill customer requirements
    Tokenization by on-premise network appliances (Cloud Gateways)
Understanding Data Security for
Infrastructure as a Service (IaaS)
Doing your research: data security due diligence
   Customer does not control how infrastructure security is handled
   Customer responsible for data security
The risk: data security threats
   Data exposure
       By IaaS provider
       By customer through application controls
IaaS touch points: IaaS controls that customer can effect
   Data handling and protection agreements in contractual negotiations
   Security administration for access controls
   Encryption/Key Management for data protection
Solutions
   Customer encrypts data; Customer is custodian of keys
   Customer encrypts data; Different service provider for key management
Summary
 Cloud computing is a pervasive trend with
 compelling economics
 Ensuring data security and privacy is necessary to
 embracing cloud computing
 Encryption protects data and makes it safer to
 migrate to cloud
 Policies, separation of duties and key management
 are the underpinnings of encryption
 Tradeoffs in risk, costs and compliance to
 regulations must be considered in choosing a
 solution
Thank you!




www.Vormetric.com

More Related Content

PPTX
2012-01 How to Secure a Cloud Identity Roadmap
PPTX
Straight Talk on Data Tokenization for PCI & Cloud
PPTX
Executive Briefing: Strategic Issues Surrounding Cloud Services
PDF
NewStar NIMS Profile
PDF
Overview of Identity and Access Management Product Line
PDF
Secure Enterprise Cloud
PDF
Phoenix Claims Insurance Software Platform
PDF
2p Mta Data Sheet V1.7 X1a
2012-01 How to Secure a Cloud Identity Roadmap
Straight Talk on Data Tokenization for PCI & Cloud
Executive Briefing: Strategic Issues Surrounding Cloud Services
NewStar NIMS Profile
Overview of Identity and Access Management Product Line
Secure Enterprise Cloud
Phoenix Claims Insurance Software Platform
2p Mta Data Sheet V1.7 X1a

What's hot (20)

PDF
451 Research Client Event Nov 10
PPTX
Software Plus Services Customer Deck[1]
 
PDF
Building and Managing Cloud Applications and Infrastructure
PPSX
The security of SAAS and private cloud
PPTX
SunGard Enterprise Cloud Services @ Cloud Connect 2011
PDF
Your Data Center Boundaries Don’t Exist Anymore!
 
PDF
New Approaches to Security and Availability for Cloud Data
 
PDF
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
PPTX
Intel SaaS Security Playbook
PPTX
Presentation Pci-dss compliance on the cloud
PPT
Identity Access Management (IAM)
PPTX
Benefits and Functionality of Claims Processing Software
PPT
Hdcs Overview Final
PPTX
Sira insights from cloud vendor risk assessments
PDF
Windstream Hosted Solutions: Public Cloud Security
PPT
Cloudy with a chance of downtime
PDF
IT Controls Cloud Webinar - ISACA
PDF
Blue Turtle-Overview Introduction
PDF
Protecting against modern ddos threats
PPT
451 Research Client Event Nov 10
Software Plus Services Customer Deck[1]
 
Building and Managing Cloud Applications and Infrastructure
The security of SAAS and private cloud
SunGard Enterprise Cloud Services @ Cloud Connect 2011
Your Data Center Boundaries Don’t Exist Anymore!
 
New Approaches to Security and Availability for Cloud Data
 
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
Intel SaaS Security Playbook
Presentation Pci-dss compliance on the cloud
Identity Access Management (IAM)
Benefits and Functionality of Claims Processing Software
Hdcs Overview Final
Sira insights from cloud vendor risk assessments
Windstream Hosted Solutions: Public Cloud Security
Cloudy with a chance of downtime
IT Controls Cloud Webinar - ISACA
Blue Turtle-Overview Introduction
Protecting against modern ddos threats
Ad

Viewers also liked (12)

PPTX
5 pillars of private cloud
PPTX
CipherCloud Webinar - Cloud Encryption & Tokenization 101
PPTX
Homomorphic encryption in cloud computing final
PPT
PPT
Data encryption, Description, DES
PPTX
Cloud security ppt
PPTX
Cloud computing security issues and challenges
PDF
Cloud computing Basics
PPTX
Data security in cloud computing
PPT
Seminar on cloud computing by Prashant Gupta
PPT
DIstinguish between Parametric vs nonparametric test
PPTX
Introduction of Cloud computing
5 pillars of private cloud
CipherCloud Webinar - Cloud Encryption & Tokenization 101
Homomorphic encryption in cloud computing final
Data encryption, Description, DES
Cloud security ppt
Cloud computing security issues and challenges
Cloud computing Basics
Data security in cloud computing
Seminar on cloud computing by Prashant Gupta
DIstinguish between Parametric vs nonparametric test
Introduction of Cloud computing
Ad

Similar to Brave new world of encryption v1 (20)

PPTX
Enterprise Security in Hybrid Cloud ISACA-SV 2012
PPTX
Enterprise Security in Cloud
PDF
Are you ready for the private cloud? [WHITEPAPER]
PDF
IBM Point of View: Security and Cloud Computing
PDF
IBM Point of view -- Security and Cloud Computing (Tivoli)
PDF
Cloud Computing Risk Management (Multi Venue)
PDF
The Cloud Beckons, But is it Safe?
PPTX
The Move to the Cloud for Regulated Industries
PDF
Cloud Security - Made simple
PPTX
Extending security in the cloud network box - v4
PDF
Ciphercloud Solutions Overview hsa oct2011
PPTX
Cloud Security - Idealware
PDF
Understanding the Cloud
PDF
null Bangalore meet - Cloud Computing and Security
PDF
110307 cloud security requirements gourley
PPTX
Security in the cloud Workshop HSTC 2014
PDF
Peering Through the Cloud Forrester EMEA 2010
PDF
Data security in cloud
PDF
Who owns security in the cloud
PDF
Emc keynote 0945 1030
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Cloud
Are you ready for the private cloud? [WHITEPAPER]
IBM Point of View: Security and Cloud Computing
IBM Point of view -- Security and Cloud Computing (Tivoli)
Cloud Computing Risk Management (Multi Venue)
The Cloud Beckons, But is it Safe?
The Move to the Cloud for Regulated Industries
Cloud Security - Made simple
Extending security in the cloud network box - v4
Ciphercloud Solutions Overview hsa oct2011
Cloud Security - Idealware
Understanding the Cloud
null Bangalore meet - Cloud Computing and Security
110307 cloud security requirements gourley
Security in the cloud Workshop HSTC 2014
Peering Through the Cloud Forrester EMEA 2010
Data security in cloud
Who owns security in the cloud
Emc keynote 0945 1030

More from Khazret Sapenov (20)

PPTX
V mware evolutionary cloud 12 2012
PDF
Virtual sharp cloud aware bc dr up 2012 cloud
PPTX
Up2012edit daniel chalef
PPTX
Up2012 scaling my sql in the cloud by moshe shadmon, founder, cto scaledb
PDF
Up 2012 smart cloud presentation_final
PPTX
Up 2012 wally mac dermid - final
PDF
Up 2012 dave jilk - multi-tenancy in paa s (distribution version)
PPT
Transverse up cloud 2012 - final
PDF
Transforming cloud infrastructure to support big data storage and workflows b...
PPTX
The elephantintheroom bigdataanalyticsinthecloud
PPTX
Taking control of bring your own device byod with desktops as a service (daa ...
PPTX
Rethink cloud security to get ahead of the risk curve by kurt johnson, vice p...
PDF
Regulatory compliant cloud computing rethinking web application architectures...
PDF
Memsql product overview_2013
PDF
Managing application performance for cloud apps bmc
PPTX
Making case up
PDF
Green qloud up-con
PPTX
Glenn solomon up presso d 3.pptx
PPTX
Future of cloud up presentation m_dawson
PPTX
Efrat ip up con 2012 presentation
V mware evolutionary cloud 12 2012
Virtual sharp cloud aware bc dr up 2012 cloud
Up2012edit daniel chalef
Up2012 scaling my sql in the cloud by moshe shadmon, founder, cto scaledb
Up 2012 smart cloud presentation_final
Up 2012 wally mac dermid - final
Up 2012 dave jilk - multi-tenancy in paa s (distribution version)
Transverse up cloud 2012 - final
Transforming cloud infrastructure to support big data storage and workflows b...
The elephantintheroom bigdataanalyticsinthecloud
Taking control of bring your own device byod with desktops as a service (daa ...
Rethink cloud security to get ahead of the risk curve by kurt johnson, vice p...
Regulatory compliant cloud computing rethinking web application architectures...
Memsql product overview_2013
Managing application performance for cloud apps bmc
Making case up
Green qloud up-con
Glenn solomon up presso d 3.pptx
Future of cloud up presentation m_dawson
Efrat ip up con 2012 presentation

Brave new world of encryption v1

  • 1. Brave New World – Encryption and the Cloud Ashvin Kamaraju – VP of Product Development www.Vormetric.com
  • 2. Agenda Cloud Market Overview Security for the Cloud Encryption & Key Management Q&A 2
  • 4. Data Centers Are Evolving Cloud Virtual Physical 4
  • 5. Enterprises Are Moving to the Cloud
  • 6. There Are Different Types of Public Clouds Fully functional applications provided such as SaaS CRM, ERP, email, Project Management, Software s a Travel Services, etc. Service PaaS Operating environments included such as Platform as a Service Windows/.NET, Linux/J2EE, applications of choice deployed Virtual Data Centers IaaS Infrastructure Virtual platform on which required operating Cloud Centers as a Service environment and application are deployed. Also includes storage as a service offerings Data Centers 6
  • 7. Market Landscape Gartner September 2012 Public cloud services market is forecast to grow 19.6 percent in 2012 to $109 billion Business process as a service (BPaaS) represents 77 percent of the total market Infrastructure as a service (IaaS) is forecast to be $6.2 billion in 2012 and growing at a rate of 45.4 percent The total public cloud services market is forecast to grow to $206.6 billion in 2016 7
  • 9. Barriers to Cloud Adoption Performance Security
  • 10. Cloud Adoption  Need for Data Security Data = Cash • Reputation, Compliance, Penalties Layers of Network Security Applied Today • Next Gen Firewalls, VPNs, IPS, SIEM, DAM/DAP, Move to Include Data Security • Encryption, Key and Policy Management
  • 11. Security of cloud infrastructure - Survey Results What data types would you place in the cloud infrastructure environment? Regulated data (such as credit cards, health data, SSN, driver’s license number Employee data Non-regulated confidential business data (such as intellectual property, business plans, financial records) Non-regulated customer data (such as purchase history, email address list, shipping information) 0 10 20 30 40 50 60 70 80 Responses (%) Encrypted Not Encrypted Source: Ponemon Institute survey of 1000 U.S IT and Compliance practioners (600 IT; 400 Compliance) – November 2011 11 Copyright © 2011 Vormetric, Inc. - Proprietary and Confidential. All Rights Reserved.
  • 12. Why does encryption make data secure in the cloud? Cloud is inherently multi-tenant All infrastructure i.e. compute and storage are shared among different customers (serially) In the event there is a physical theft at the service provider facilities unprotected data is left vulnerable In the event there is unauthorized access (malicious or inadvertent) unprotected data ends up in the wrong hands Sensitive data must be protected to meet regulatory requirements Payment Card Industry (PCI) Data Security Standard (DSS) HIPAA HITECH Safe Harbor Enable governance for hybrid clouds Seamlessly manage private and public clouds by complying with the corporate regulatory and security standards
  • 13. Two Different Perspectives Cloud Service Provider • Want to provide assurances to their customers that the service is secure • This is a competitive differentiator Cloud Service Provider Customer • Some will trust that their data is being properly secured • Some will demand that they maintain complete control of their data
  • 14. Encryption and Key Management
  • 15. 3 Components of Data Security in the Cloud Policy Management Key Management Encryption
  • 16. Encryption, Policy and Key Management Policy and key management are extremely important aspects of encryption Keys are used to encrypt/decrypt data Policies, which are tied to business need, define how keys are distributed and authorized for use Enterprises typically have several encryption solutions and keys are not centrally managed Centralized policy and key management is essential to meet the business needs, governance and regulatory requirements
  • 17. Centralized Key Management Benefits Central repository for secure storage of keys Key life cycle management (creation, deletion, expiry notification, reporting) Policies (define how keys will be used) Separation of duties Secure backup Compliance with standards such as FIPS 140-2 Manage encryption solutions using industry standards e.g. PKCS #11, KMIP
  • 18. Centralized Key Management Key Management: As a service or On Premise? Approach Tradeoffs Custodianship Risk Cost Separation of Multi- duties Tenancy On-Premise solution High (can be Low Lines of Customer amortized across Yes (customized) business large deployment) Key Management Yes. But only if data is as a Service Depends on not managed by key Multiple Service Provider Low the SLA management service customers provider
  • 19. Understanding Data Security with Software as a Service (SaaS) Doing your research: Data security due diligence Customer does not control how information is handled but can effect it The risk: data security threats Data exposure By SaaS provider By IaaS partner By customer through application controls SaaS touch points: SaaS controls that customer can effect Data handling and protection agreements in contractual negotiations Security administration for access controls Solutions Data encryption used by SaaS providers to fulfill customer requirements Tokenization by on-premise network appliances (Cloud Gateways)
  • 20. Understanding Data Security for Infrastructure as a Service (IaaS) Doing your research: data security due diligence Customer does not control how infrastructure security is handled Customer responsible for data security The risk: data security threats Data exposure By IaaS provider By customer through application controls IaaS touch points: IaaS controls that customer can effect Data handling and protection agreements in contractual negotiations Security administration for access controls Encryption/Key Management for data protection Solutions Customer encrypts data; Customer is custodian of keys Customer encrypts data; Different service provider for key management
  • 21. Summary Cloud computing is a pervasive trend with compelling economics Ensuring data security and privacy is necessary to embracing cloud computing Encryption protects data and makes it safer to migrate to cloud Policies, separation of duties and key management are the underpinnings of encryption Tradeoffs in risk, costs and compliance to regulations must be considered in choosing a solution