SlideShare a Scribd company logo
Countdown to CCPA:
Is Your IBM i Secure and Compliant?
Becky Hjellming
Sr. Director, Product Marketing, Syncsort
Patrick Townsend
President & CEO, Townsend Security
Housekeeping
Webcast Audio
• Today’s webcast audio is streamed through your
computer speakers.
• If you need technical assistance with the web interface
or audio,
please reach out to us using the chat window.
Questions Welcome
• Submit your questions at any time during the
presentation
using the chat window.
• We will answer them during our Q&A session following
the presentation.
Recording and slides
• This webcast is being recorded. You will receive an
email following the webcast with a link to download
both the recording and the slides.
Patrick Townsend
Townsend Security
Becky Hjellming
Syncsort
Today’s Topics
1 Introduction to CCPA
2 Breach penalties under CCPA
3 Using encryption to prevent consumer data exposure
4 Hardening systems to prevent breach
5 How Syncsort can help
6 More resources
“
”
This presentation and related materials are provided for
informational purposes only, and are not intended to provide,
and should not be relied on for, legal advice pertaining to
regulatory compliance.
If you have specific questions on how this may affect your
organization, consult your legal advisor.
Disclaimer
An Overview of CCPA
What is CCPA?
The California Consumer Privacy Act gives California residents
numerous data privacy rights while penalizing organizations
that are in violation.
The law covers a much broader set of information than
any other regulation, including GDPR.
Legislation: California AB 375
Origins: Drafted and signed in just a few days to avoid ballot vote
on consumer-driven privacy initiative
Date passed: June 2018
Effective data: January 1, 2020
Clarification: Additional guidance promised in Fall 2019
New clarifying law by June 2020
The CCPA Timeline
You can read CCPA at
https://leginfo.legislature.ca.gov/faces/billTextCli
ent.xhtml?bill_id=201720180AB375
Organizations are required to comply with CCPA if they collect data on
residents of California and meet one or more of the following criteria:
1. Annual revenue > $25 million
2. Collected or purchase information on 50,000+ people
3. 50% of annual revenue comes from selling/sharing personal information
Thousands of global organizations are affected by CCPA
• Regardless of whether the organization is located in California
• Both public and private organizations are subject to CCPA
• For organizations also subject to other regulations, CCPA has additional
regulations not covered in those laws
Who Must Comply with CCPA?
Core rights given to consumers by the CCPA include:
• The right to know what information is being collected
• The right to opt-in to data sharing before information collected
• The right to opt-out of the sharing personal information
• The right to know how personal information is being used
• The right to receive a copy of personal information
• The right to delete personal information – and data shared with 3rd parties
• The right to not be discriminated against after exercising privacy rights
• And more
CCPA also puts pressure on organizations to protect personal data from being
exposed via a data breach
Rights Granted to Consumers
CCPA broadly defines personal information – extending beyond the definition in GDPR and other regulations
Scope of Personal Information
• Personal & commercial
behavior
• Protected class information
• Biometric information
• Property records
• Consumer histories – products
and services purchased
• Internet browsing history
• Internet search history
• Geolocation data
• Professional or employment
information
• Education information that is not
publicly available
• Inferences drawn from any of the
information above to create a
profile of the consumer’s
preferences, psychological trends,
preferences, behavior, attitudes,
abilities, aptitudes and more
• Name
• Alias
• Postal address
• IP address
• Email address
• Social security number
• Driver’s license number
• Passport number
Data collected since January 1, 2019, is covered by the law
Penalties can be imposed by the Attorney General of the State of California
• Fines per breached record
• $2500 per record lost or in non-compliance
• $7500 per record for an “intentional” violation
Ignoring a warning letter from the AG qualifies as intentional
Penalties enabled through consumer litigation
• Under CCPA, consumers have the right to bring a class action suit against
a company that loses UNENCRYPTED data
• Fully meeting CCPA requirements and encrypting data is the path to
limiting exposure
CCPA does not provide a maximum amount that can result from the
imposition of penalties
CCPA Penalties
• CCPA more broadly defines “person” to include data on either a
consumer or household
• CCPA defines a broader range of covered data – even inferred data
• CCPA allows for private class action suits for data breaches that
compromise unencrypted data – in addition to fines from the California
Attorney General
• CCPA does not state a maximum penalty
GDPR Compliance Is Not
Enough for CCPA
1. Identify and document all sensitive information that you collect or
derive from interpretations of the data.
2. Identify and document all of the third parties with whom you share
information and what you share.
3. Ensure you meet the explicit requirements of the CCPA, such as
updating your privacy statement per the CCPA requirements.
4. Institute processes for handling consumer privacy requests.
5. Revise agreements with 3rd party service providers to bind the them
to the new CCPA regulations.
6. Encrypt the data and use good encryption key management. Your
only safe-harbor from litigation in the event of a data loss is
encryption.
The time to get started is right now.
CCPA Compliance
Recommendations
Preventing Data Exposure
CCPA gives consumers the right to sue if their personal information is
disclosed and that data wasn’t encrypted or otherwise made unreadable.
In addition to encryption, CCPA mentions “redaction” or “deidentification”
of shared data.
To protect yourself from the penalties of non-compliance and potential
legal actions in the event of a breach, you must:
1. Obscure protected data so that it is unreadable should a breach occur
2. Deidentify data prior to sharing it
3. Implement technologies and processes that will prevent a breach
Protecting Data from Breach
• Encryption transforms readable information into an unreadable
format (or “ciphertext”)
• Encryption is based on proven, well-known algorithms – common
algorithms include AES, RSA, Triple DES and others
• The best encryption algorithms are open, vetted, and continuously
scrutinized – with regular attempts made to break them
• The best encryption solutions are independently certified to validate
compliance with standards (e.g. NIST)
• Algorithms rely on secret “keys” for encrypting/decrypting data
Encryption algorithms are never secret,
but encryption keys must be kept secret
Obscuring Data with Encryption
Field Procedures (FieldProc)
• Based on exit point technology
• Available beginning with IBM i V7R1
• FieldProc calls an encryption algorithm and the algorithm uses the key to
encrypt/decrypt the data
Few (if any!) application changes are required
• Most applications will run without changes
• There are a few caveats that may require minor application modifications
No database changes required with FieldProc
• No field type or size changes
• No problems with Zoned and Packed data
IBM i Field Encryption Is
Simple with Field Procedures
Encryption Key Management
Is Critical
• Hackers don’t break encryption algorithms – they find the keys
• Encryption keys are secret and must be protected since the
algorithms are public
• Compliance regulations (PCI, HIPAA, GLBA/FFIEC, and others)
require proper key management
• There are industry standards and best practices for key
management (FIPS 140-2)
Encrypting IBM i Data
with Assure Security
Assure Encryption
Complete protection for data at rest
• IBM i FieldProc exit point software for encryption
• High performance encryption libraries
• Built-in masking of decrypted data based on user or group
• Provides key management with a local key store
• Includes extensive data tokenization capabilities
The only NIST-certified
AES encryption solution for IBM i
Assure Encryption
Easy to manage and monitor data access
• Easy-to-use management interface
• User access controlled by policy with Group Profile support
• Built-in data access auditing
Assure Encryption
Integrates with other applications and key managers
• Encryption commands for Save Files, IFS, and much more
• Extensive encryption APIs for RPG and COBOL
• Built to integrate with Townsend Security’s Alliance Key
Manager for off-partition key management
• Integrates with any OASIS KMIP-compliant key manager
Alliance Key
Manager
Flexible
• Works with all major business
and cloud platforms
• Integrates with all leading
encryption applications
• Multiple deploying options
including a VMware VM,
Hardware Security Module
(HSM), or cloud module (AWS,
Microsoft Azure)
Compliant
• FIPS 140-2 compliant – the US
standard for approving
cryptographic solutions with
both hardware and software
components
• OASIS KMIP (Key Management
Interoperability Protocol)
compliant
• Certified for PCI-DSS version 3
by Coalfire, a certified QSA
auditor
Easy and Cost Effective
• Affordable for any size
Enterprise
• No additional client-side license
or usage fees
• Ready-to-use client software
speeds deployment and reduces
IT costs
Assure Encryption can also tokenize data
• Tokenization replaces sensitive data with substitute values or “tokens”
• Format-preserving tokens have the characteristics of the original data
• The same token can be used for every instance of the original data
• Tokens are stored in a database or “token vault”
• The relationship between the original value and token is maintained
by the vault
• The vault can (and should) be encrypted to secure the original data
• When displayed in its original form, data is masked based on user privilege
• Adheres to PCI DSS standards
Tokenization
with Assure Encryption
Assure Encryption’s tokenization also anonymizes data
• When token generated by Assure Encryption’s tokenization capabilities
are not stored in a token vault, they are non-recoverable and sensitive
data is permanently replaced
• This is also referred to as anonymization/deidentification/redaction
• A variety of anonymization methods can be used (e.g. scrambling)
• NOT a solution for use on a production server since tokens are
unrecoverable, but it is ideal for data shared with a 3rd party
Anonymization
with Assure Encryption
Adding Layers of Security
for Breach Prevention
Layers of Security
are required to
protect IBM i
systems and their
data from breach
Physical
Security
Network
Security
IBM i OS
Security
System
Access
Security
File and
Field
Security
Security
Monitoring
& Auditing
DATA
Physical
Security
DATA
Physical Security
Control access to computer
rooms and data centers,
ensure computing
equipment and peripherals
cannot be tampered with,
and secure end points.
Physical
Security
Network
Security
DATA
Network Security
Implement intrusion
prevention and detection
technologies, group and
protect related resources
within network segments,
encrypt network traffic.
Physical
Security
Network
Security
IBM i OS
Security
DATA
IBM i OS Security
Properly configure necessary
security settings within the
IBM i OS, keep the OS and
PTFs up to date, and closely
manage user profiles.
Physical
Security
Network
Security
IBM i OS
Security
System
Access
Security
DATA
System Access Security
Keep unauthorized users off
your IBM I and maintain
tight control over what
authorized users are able to
do once logged in.
Physical
Security
Network
Security
IBM i OS
Security
System
Access
Security
File and
Field
Security
DATA
File and Field Security
Ensure sensitive data cannot
be seen by unauthorized
individuals, whether internal
or external.
Physical
Security
Network
Security
IBM i OS
Security
System
Access
Security
File and
Field
Security
Security
Monitoring
& Auditing
DATA
Security Monitoring and
Auditing
Alert administrators and
security officers whenever
suspicious activity is
detected and log all security-
related events for the
purposes of tracing and
documentation
Physical
Security
Network
Security
IBM i OS
Security
System
Access
Security
File and
Field
Security
Security
Monitoring
& Auditing
DATA
Each layer is
designed to catch
anything that
manages to break
through another.
Assure
Access
Control
Assure
Data
Privacy
Assure
Compliance
Monitoring
Assure Security
Risk
Assessment
Assure Security
Assure Core Distribution Services
Assure
Multi-Factor
Authentication
Assure Elevated
Authority
Manager
Assure System
Access Control
Assure Encryption
Assure
Secure File
Transfer **
Assure Monitoring
& Reporting *
Assure Db2 Data
Monitor
* SIEM Add-On available
** PGP Add-On available
Choose the full product
Choose a feature bundle
Or select a specific capability
Assure Security
strengthens IBM i
security and assures
regulatory compliance
Security Risk
Assessment Service
Let Syncsort’s security experts
conduct a thorough risk
assessment and provide a report
with remediation guidance
Security Risk
Assessment Tool
Thoroughly check all aspects of
IBM i security and obtain detailed
reports and recommendations
Assure
Security Risk
Assessment
Assure Multi-Factor
Authentication
Strengthen login security by
requiring multiple forms of
authentication
Assure Elevated
Authority Manager
Automatically elevate user
authority as-needed and on a
limited basis
Assure System
Access Manager
Secure all points of entry into to
your system including network
access, database access,
command line access and more
Assure Access
Control
Assure Secure File Transfer
Securely transfer files across
internal or external networks
using encryption
Assure Encryption’s
Tokenization Feature
Remove sensitive data from a
server by replacing it with
substitute values that can be used
to retrieve the original data
Assure Encryption
Transform human-readable data
into unreadable cypher text using
industry-certified encryption &
key management solutions
Assure Data
Privacy
SIEM Integration
Add-On
Integrate IBM i security data with
data from other platforms by
transferring it to a Security
Information and Event
Management console
Assure Monitoring and
Reporting
Simplify analysis of IBM i journals
to monitor for security incidents
and generate reports and alertsAssure
Compliance
Monitoring
Assure Db2 Data Monitor
Monitor for views of sensitive
Db2 data and optionally block
data from view
Assure Security delivers innovative capabilities that lead the
market in multiple facets of security:
✓ Comprehensive control of both legacy and modern IBM i system
access points
✓ NIST-certified encryption, including integration with FIPS-
compliant, off-platform key management from Townsend Security
✓ Powerful, flexible multi-factor authentication with RSA certification
✓ Unique and innovative new solution for monitoring views of highly
confidential data
✓ Ability to forward IBM i security data to leading SIEM solutions,
including QRadar certification
✓ Integration with Syncsort HA solutions via monitoring dashboard
and failover scripting
Assure Security Advantages
S u p p o r t s C o m p l i a n c e w i t h
SOX GLBA
GDPR HIPAA
CCPA HITECH
23 NYCRR 500 BASEL II/III
PCI DSS and more
Additional CCPA Resources
Helpful Resources
Download our ebook to read more about CCPA
and IBM i security
Download Townsend Security’s podcast
on CCPA and how companies can better
protect consumer information
Data Quality and CCPA
Register now for other webinars in our CCPA-
preparedness series!
Click to Register Click to Register
• As the most populous US state and the world’s 5th largest economy, it’s
not unusual for California to be at the forefront of tech-related legislation.
• With CCPA on the books, data privacy legislation is now pending in New
York, Massachusetts, and Rhode Island. Other states are likely to follow.
• Regardless of whether your organization needs to comply with CCPA or
not, one or more data privacy regulations are likely to come your way.
• The time to prepare is now.
• Encrypt your data with strong, standards-based encryption and key
management to protect against breaches, penalties and legal action.
• Harden security and redact data shared with third parties to meet
compliance requirements.
• We are here to help!
Recap
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Protects keys from theft and loss
• Stores keys separately from the encrypted data
• Restricts access to keys
• Backs up keys securely
• Supports regular key rotation
Supports best practices for key management
• Separation of duties between data manager and key manager
• Dual control of key management processes
• Split knowledge of complete key values
• Ensuring origin and quality of keys
• As with encryption, key manager certifications are available; e.g. Federal
Information Processing Standards (FIPS) 140-2
• KMIP-compliance ensures future compatibility with encryption solutions
Pair a Key Manager with your
Encryption Solution

More Related Content

PPTX
EU's General Data Protection Regulation (GDPR)
PDF
Data Privacy & Security
PPTX
The general data protection act overview
PPTX
Security v. Privacy: the great debate
PDF
GDPR changes affect direct marketing
PDF
GDPR Webinar - feb
PDF
GDPR Cyber Insurance 11/1/2017
PDF
Gdpr overview ciso platform presentation
EU's General Data Protection Regulation (GDPR)
Data Privacy & Security
The general data protection act overview
Security v. Privacy: the great debate
GDPR changes affect direct marketing
GDPR Webinar - feb
GDPR Cyber Insurance 11/1/2017
Gdpr overview ciso platform presentation

What's hot (17)

PDF
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
PPTX
GDPR Workshop
PDF
Impact of GDPR on Third Party and M&A Security
PDF
Everything you Need to Know about The Data Protection Officer Role
PPTX
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
PDF
GDPR what you should know and how to minimize impact on your business
PPTX
Payroll Data & GDPR: What you need to know?
PPTX
GDPR – The Practicalities of a New Reality
PDF
How IBM Supports Clients around GDPR and Cybersecurity Legislation
PPTX
GDPR Presentation slides
PDF
20170323 are you ready the new gdpr is here
PDF
2016 11-17-gdpr-integro-webinar
PDF
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
PDF
PREPARING FOR THE GDPR
PPTX
Findability Day 2016 - What is GDPR?
PPTX
Data Privacy for Information Security Professionals Part 1
PDF
Data security and privacy
FLIGHT Amsterdam Presentation - Data Breaches and the Law: A Practical Guide
GDPR Workshop
Impact of GDPR on Third Party and M&A Security
Everything you Need to Know about The Data Protection Officer Role
GDPR & the Travel Industry: Practical recommendations for holiday rental owners
GDPR what you should know and how to minimize impact on your business
Payroll Data & GDPR: What you need to know?
GDPR – The Practicalities of a New Reality
How IBM Supports Clients around GDPR and Cybersecurity Legislation
GDPR Presentation slides
20170323 are you ready the new gdpr is here
2016 11-17-gdpr-integro-webinar
FLIGHT Amsterdam Presentation - Open Source, IP and Trade Secrets: An Impossi...
PREPARING FOR THE GDPR
Findability Day 2016 - What is GDPR?
Data Privacy for Information Security Professionals Part 1
Data security and privacy
Ad

Similar to Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured (20)

PPTX
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
PPTX
Improve IT Security and Compliance with Mainframe Data in Splunk
PDF
Complying with Cybersecurity Regulations for IBM i Servers and Data
PPTX
IBM i Security SIEM Integration
PDF
GDPR- The Buck Stops Here
PDF
Protecting Your Business from Unauthorized IBM i Access
PDF
Key Concepts for Protecting the Privacy of IBM i Data
PPTX
MYTHBUSTERS: Can You Secure Payments in the Cloud?
PDF
Security 101: Protecting Data with Encryption, Tokenization & Anonymization
PDF
2014 ota databreach3
PDF
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
PPTX
Erik Nachbahr "Dealership Technology"
PPTX
093049ov4.pptx
PPTX
Lock it Down: Access Control for IBM i
PPTX
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
PDF
Isaca new delhi india - privacy and big data
PDF
Isaca new delhi india privacy and big data
PPTX
ISSA Atlanta - Emerging application and data protection for multi cloud
PPTX
Why We Require GDPR?
PDF
Cloud Regulations and Security Standards by Ran Adler
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Improve IT Security and Compliance with Mainframe Data in Splunk
Complying with Cybersecurity Regulations for IBM i Servers and Data
IBM i Security SIEM Integration
GDPR- The Buck Stops Here
Protecting Your Business from Unauthorized IBM i Access
Key Concepts for Protecting the Privacy of IBM i Data
MYTHBUSTERS: Can You Secure Payments in the Cloud?
Security 101: Protecting Data with Encryption, Tokenization & Anonymization
2014 ota databreach3
#1NWebinar: GDPR and Privacy Best Practices for Digital Marketers
Erik Nachbahr "Dealership Technology"
093049ov4.pptx
Lock it Down: Access Control for IBM i
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Isaca new delhi india - privacy and big data
Isaca new delhi india privacy and big data
ISSA Atlanta - Emerging application and data protection for multi cloud
Why We Require GDPR?
Cloud Regulations and Security Standards by Ran Adler
Ad

More from Precisely (20)

PDF
The Future of Automation: AI, APIs, and Cloud Modernization.pdf
PDF
Unlock new opportunities with location data.pdf
PDF
Reimagining Insurance: Connected Data for Confident Decisions.pdf
PDF
Introducing Syncsort™ Storage Management.pdf
PDF
Enable Enterprise-Ready Security on IBM i Systems.pdf
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
PDF
Solving the CIO’s Dilemma: Speed, Scale, and Smarter SAP Modernization.pdf
PDF
Solving the Data Disconnect: Why Success Hinges on Pre-Linked Data.pdf
PDF
Cooking Up Clean Addresses - 3 Ways to Whip Messy Data into Shape.pdf
PDF
Building Confidence in AI & Analytics with High-Integrity Location Data.pdf
PDF
SAP Modernization Strategies for a Successful S/4HANA Journey.pdf
PDF
Precisely Demo Showcase: Powering ServiceNow Discovery with Precisely Ironstr...
PDF
The 2025 Guide on What's Next for Automation.pdf
PDF
Outdated Tech, Invisible Expenses – How Data Silos Undermine Operational Effi...
PDF
Modernización de SAP: Maximizando el Valor de su Migración a SAP S/4HANA.pdf
PDF
Outdated Tech, Invisible Expenses – The Hidden Cost of Disconnected Data Syst...
PDF
Migration vers SAP S/4HANA: Un levier stratégique pour votre transformation d...
PDF
Outdated Tech, Invisible Expenses: The Hidden Cost of Poor Data Integration o...
PDF
The Changing Compliance Landscape in 2025.pdf
The Future of Automation: AI, APIs, and Cloud Modernization.pdf
Unlock new opportunities with location data.pdf
Reimagining Insurance: Connected Data for Confident Decisions.pdf
Introducing Syncsort™ Storage Management.pdf
Enable Enterprise-Ready Security on IBM i Systems.pdf
A Day in the Life of Location Data - Turning Where into How.pdf
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Solving the CIO’s Dilemma: Speed, Scale, and Smarter SAP Modernization.pdf
Solving the Data Disconnect: Why Success Hinges on Pre-Linked Data.pdf
Cooking Up Clean Addresses - 3 Ways to Whip Messy Data into Shape.pdf
Building Confidence in AI & Analytics with High-Integrity Location Data.pdf
SAP Modernization Strategies for a Successful S/4HANA Journey.pdf
Precisely Demo Showcase: Powering ServiceNow Discovery with Precisely Ironstr...
The 2025 Guide on What's Next for Automation.pdf
Outdated Tech, Invisible Expenses – How Data Silos Undermine Operational Effi...
Modernización de SAP: Maximizando el Valor de su Migración a SAP S/4HANA.pdf
Outdated Tech, Invisible Expenses – The Hidden Cost of Disconnected Data Syst...
Migration vers SAP S/4HANA: Un levier stratégique pour votre transformation d...
Outdated Tech, Invisible Expenses: The Hidden Cost of Poor Data Integration o...
The Changing Compliance Landscape in 2025.pdf

Recently uploaded (20)

PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPT
Teaching material agriculture food technology
PPTX
Big Data Technologies - Introduction.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Cloud computing and distributed systems.
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
KodekX | Application Modernization Development
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
The Rise and Fall of 3GPP – Time for a Sabbatical?
Dropbox Q2 2025 Financial Results & Investor Presentation
Teaching material agriculture food technology
Big Data Technologies - Introduction.pptx
Unlocking AI with Model Context Protocol (MCP)
Review of recent advances in non-invasive hemoglobin estimation
Chapter 3 Spatial Domain Image Processing.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Empathic Computing: Creating Shared Understanding
Cloud computing and distributed systems.
Encapsulation_ Review paper, used for researhc scholars
Digital-Transformation-Roadmap-for-Companies.pptx
Network Security Unit 5.pdf for BCA BBA.
Mobile App Security Testing_ A Comprehensive Guide.pdf
KodekX | Application Modernization Development
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...

Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured

  • 1. Countdown to CCPA: Is Your IBM i Secure and Compliant? Becky Hjellming Sr. Director, Product Marketing, Syncsort Patrick Townsend President & CEO, Townsend Security
  • 2. Housekeeping Webcast Audio • Today’s webcast audio is streamed through your computer speakers. • If you need technical assistance with the web interface or audio, please reach out to us using the chat window. Questions Welcome • Submit your questions at any time during the presentation using the chat window. • We will answer them during our Q&A session following the presentation. Recording and slides • This webcast is being recorded. You will receive an email following the webcast with a link to download both the recording and the slides. Patrick Townsend Townsend Security Becky Hjellming Syncsort
  • 3. Today’s Topics 1 Introduction to CCPA 2 Breach penalties under CCPA 3 Using encryption to prevent consumer data exposure 4 Hardening systems to prevent breach 5 How Syncsort can help 6 More resources
  • 4. “ ” This presentation and related materials are provided for informational purposes only, and are not intended to provide, and should not be relied on for, legal advice pertaining to regulatory compliance. If you have specific questions on how this may affect your organization, consult your legal advisor. Disclaimer
  • 6. What is CCPA? The California Consumer Privacy Act gives California residents numerous data privacy rights while penalizing organizations that are in violation. The law covers a much broader set of information than any other regulation, including GDPR.
  • 7. Legislation: California AB 375 Origins: Drafted and signed in just a few days to avoid ballot vote on consumer-driven privacy initiative Date passed: June 2018 Effective data: January 1, 2020 Clarification: Additional guidance promised in Fall 2019 New clarifying law by June 2020 The CCPA Timeline You can read CCPA at https://leginfo.legislature.ca.gov/faces/billTextCli ent.xhtml?bill_id=201720180AB375
  • 8. Organizations are required to comply with CCPA if they collect data on residents of California and meet one or more of the following criteria: 1. Annual revenue > $25 million 2. Collected or purchase information on 50,000+ people 3. 50% of annual revenue comes from selling/sharing personal information Thousands of global organizations are affected by CCPA • Regardless of whether the organization is located in California • Both public and private organizations are subject to CCPA • For organizations also subject to other regulations, CCPA has additional regulations not covered in those laws Who Must Comply with CCPA?
  • 9. Core rights given to consumers by the CCPA include: • The right to know what information is being collected • The right to opt-in to data sharing before information collected • The right to opt-out of the sharing personal information • The right to know how personal information is being used • The right to receive a copy of personal information • The right to delete personal information – and data shared with 3rd parties • The right to not be discriminated against after exercising privacy rights • And more CCPA also puts pressure on organizations to protect personal data from being exposed via a data breach Rights Granted to Consumers
  • 10. CCPA broadly defines personal information – extending beyond the definition in GDPR and other regulations Scope of Personal Information • Personal & commercial behavior • Protected class information • Biometric information • Property records • Consumer histories – products and services purchased • Internet browsing history • Internet search history • Geolocation data • Professional or employment information • Education information that is not publicly available • Inferences drawn from any of the information above to create a profile of the consumer’s preferences, psychological trends, preferences, behavior, attitudes, abilities, aptitudes and more • Name • Alias • Postal address • IP address • Email address • Social security number • Driver’s license number • Passport number Data collected since January 1, 2019, is covered by the law
  • 11. Penalties can be imposed by the Attorney General of the State of California • Fines per breached record • $2500 per record lost or in non-compliance • $7500 per record for an “intentional” violation Ignoring a warning letter from the AG qualifies as intentional Penalties enabled through consumer litigation • Under CCPA, consumers have the right to bring a class action suit against a company that loses UNENCRYPTED data • Fully meeting CCPA requirements and encrypting data is the path to limiting exposure CCPA does not provide a maximum amount that can result from the imposition of penalties CCPA Penalties
  • 12. • CCPA more broadly defines “person” to include data on either a consumer or household • CCPA defines a broader range of covered data – even inferred data • CCPA allows for private class action suits for data breaches that compromise unencrypted data – in addition to fines from the California Attorney General • CCPA does not state a maximum penalty GDPR Compliance Is Not Enough for CCPA
  • 13. 1. Identify and document all sensitive information that you collect or derive from interpretations of the data. 2. Identify and document all of the third parties with whom you share information and what you share. 3. Ensure you meet the explicit requirements of the CCPA, such as updating your privacy statement per the CCPA requirements. 4. Institute processes for handling consumer privacy requests. 5. Revise agreements with 3rd party service providers to bind the them to the new CCPA regulations. 6. Encrypt the data and use good encryption key management. Your only safe-harbor from litigation in the event of a data loss is encryption. The time to get started is right now. CCPA Compliance Recommendations
  • 15. CCPA gives consumers the right to sue if their personal information is disclosed and that data wasn’t encrypted or otherwise made unreadable. In addition to encryption, CCPA mentions “redaction” or “deidentification” of shared data. To protect yourself from the penalties of non-compliance and potential legal actions in the event of a breach, you must: 1. Obscure protected data so that it is unreadable should a breach occur 2. Deidentify data prior to sharing it 3. Implement technologies and processes that will prevent a breach Protecting Data from Breach
  • 16. • Encryption transforms readable information into an unreadable format (or “ciphertext”) • Encryption is based on proven, well-known algorithms – common algorithms include AES, RSA, Triple DES and others • The best encryption algorithms are open, vetted, and continuously scrutinized – with regular attempts made to break them • The best encryption solutions are independently certified to validate compliance with standards (e.g. NIST) • Algorithms rely on secret “keys” for encrypting/decrypting data Encryption algorithms are never secret, but encryption keys must be kept secret Obscuring Data with Encryption
  • 17. Field Procedures (FieldProc) • Based on exit point technology • Available beginning with IBM i V7R1 • FieldProc calls an encryption algorithm and the algorithm uses the key to encrypt/decrypt the data Few (if any!) application changes are required • Most applications will run without changes • There are a few caveats that may require minor application modifications No database changes required with FieldProc • No field type or size changes • No problems with Zoned and Packed data IBM i Field Encryption Is Simple with Field Procedures
  • 18. Encryption Key Management Is Critical • Hackers don’t break encryption algorithms – they find the keys • Encryption keys are secret and must be protected since the algorithms are public • Compliance regulations (PCI, HIPAA, GLBA/FFIEC, and others) require proper key management • There are industry standards and best practices for key management (FIPS 140-2)
  • 19. Encrypting IBM i Data with Assure Security
  • 20. Assure Encryption Complete protection for data at rest • IBM i FieldProc exit point software for encryption • High performance encryption libraries • Built-in masking of decrypted data based on user or group • Provides key management with a local key store • Includes extensive data tokenization capabilities The only NIST-certified AES encryption solution for IBM i
  • 21. Assure Encryption Easy to manage and monitor data access • Easy-to-use management interface • User access controlled by policy with Group Profile support • Built-in data access auditing
  • 22. Assure Encryption Integrates with other applications and key managers • Encryption commands for Save Files, IFS, and much more • Extensive encryption APIs for RPG and COBOL • Built to integrate with Townsend Security’s Alliance Key Manager for off-partition key management • Integrates with any OASIS KMIP-compliant key manager
  • 23. Alliance Key Manager Flexible • Works with all major business and cloud platforms • Integrates with all leading encryption applications • Multiple deploying options including a VMware VM, Hardware Security Module (HSM), or cloud module (AWS, Microsoft Azure) Compliant • FIPS 140-2 compliant – the US standard for approving cryptographic solutions with both hardware and software components • OASIS KMIP (Key Management Interoperability Protocol) compliant • Certified for PCI-DSS version 3 by Coalfire, a certified QSA auditor Easy and Cost Effective • Affordable for any size Enterprise • No additional client-side license or usage fees • Ready-to-use client software speeds deployment and reduces IT costs
  • 24. Assure Encryption can also tokenize data • Tokenization replaces sensitive data with substitute values or “tokens” • Format-preserving tokens have the characteristics of the original data • The same token can be used for every instance of the original data • Tokens are stored in a database or “token vault” • The relationship between the original value and token is maintained by the vault • The vault can (and should) be encrypted to secure the original data • When displayed in its original form, data is masked based on user privilege • Adheres to PCI DSS standards Tokenization with Assure Encryption
  • 25. Assure Encryption’s tokenization also anonymizes data • When token generated by Assure Encryption’s tokenization capabilities are not stored in a token vault, they are non-recoverable and sensitive data is permanently replaced • This is also referred to as anonymization/deidentification/redaction • A variety of anonymization methods can be used (e.g. scrambling) • NOT a solution for use on a production server since tokens are unrecoverable, but it is ideal for data shared with a 3rd party Anonymization with Assure Encryption
  • 26. Adding Layers of Security for Breach Prevention
  • 27. Layers of Security are required to protect IBM i systems and their data from breach Physical Security Network Security IBM i OS Security System Access Security File and Field Security Security Monitoring & Auditing DATA
  • 28. Physical Security DATA Physical Security Control access to computer rooms and data centers, ensure computing equipment and peripherals cannot be tampered with, and secure end points.
  • 29. Physical Security Network Security DATA Network Security Implement intrusion prevention and detection technologies, group and protect related resources within network segments, encrypt network traffic.
  • 30. Physical Security Network Security IBM i OS Security DATA IBM i OS Security Properly configure necessary security settings within the IBM i OS, keep the OS and PTFs up to date, and closely manage user profiles.
  • 31. Physical Security Network Security IBM i OS Security System Access Security DATA System Access Security Keep unauthorized users off your IBM I and maintain tight control over what authorized users are able to do once logged in.
  • 32. Physical Security Network Security IBM i OS Security System Access Security File and Field Security DATA File and Field Security Ensure sensitive data cannot be seen by unauthorized individuals, whether internal or external.
  • 33. Physical Security Network Security IBM i OS Security System Access Security File and Field Security Security Monitoring & Auditing DATA Security Monitoring and Auditing Alert administrators and security officers whenever suspicious activity is detected and log all security- related events for the purposes of tracing and documentation
  • 34. Physical Security Network Security IBM i OS Security System Access Security File and Field Security Security Monitoring & Auditing DATA Each layer is designed to catch anything that manages to break through another.
  • 35. Assure Access Control Assure Data Privacy Assure Compliance Monitoring Assure Security Risk Assessment Assure Security Assure Core Distribution Services Assure Multi-Factor Authentication Assure Elevated Authority Manager Assure System Access Control Assure Encryption Assure Secure File Transfer ** Assure Monitoring & Reporting * Assure Db2 Data Monitor * SIEM Add-On available ** PGP Add-On available Choose the full product Choose a feature bundle Or select a specific capability Assure Security strengthens IBM i security and assures regulatory compliance
  • 36. Security Risk Assessment Service Let Syncsort’s security experts conduct a thorough risk assessment and provide a report with remediation guidance Security Risk Assessment Tool Thoroughly check all aspects of IBM i security and obtain detailed reports and recommendations Assure Security Risk Assessment
  • 37. Assure Multi-Factor Authentication Strengthen login security by requiring multiple forms of authentication Assure Elevated Authority Manager Automatically elevate user authority as-needed and on a limited basis Assure System Access Manager Secure all points of entry into to your system including network access, database access, command line access and more Assure Access Control
  • 38. Assure Secure File Transfer Securely transfer files across internal or external networks using encryption Assure Encryption’s Tokenization Feature Remove sensitive data from a server by replacing it with substitute values that can be used to retrieve the original data Assure Encryption Transform human-readable data into unreadable cypher text using industry-certified encryption & key management solutions Assure Data Privacy
  • 39. SIEM Integration Add-On Integrate IBM i security data with data from other platforms by transferring it to a Security Information and Event Management console Assure Monitoring and Reporting Simplify analysis of IBM i journals to monitor for security incidents and generate reports and alertsAssure Compliance Monitoring Assure Db2 Data Monitor Monitor for views of sensitive Db2 data and optionally block data from view
  • 40. Assure Security delivers innovative capabilities that lead the market in multiple facets of security: ✓ Comprehensive control of both legacy and modern IBM i system access points ✓ NIST-certified encryption, including integration with FIPS- compliant, off-platform key management from Townsend Security ✓ Powerful, flexible multi-factor authentication with RSA certification ✓ Unique and innovative new solution for monitoring views of highly confidential data ✓ Ability to forward IBM i security data to leading SIEM solutions, including QRadar certification ✓ Integration with Syncsort HA solutions via monitoring dashboard and failover scripting Assure Security Advantages S u p p o r t s C o m p l i a n c e w i t h SOX GLBA GDPR HIPAA CCPA HITECH 23 NYCRR 500 BASEL II/III PCI DSS and more
  • 42. Helpful Resources Download our ebook to read more about CCPA and IBM i security Download Townsend Security’s podcast on CCPA and how companies can better protect consumer information
  • 43. Data Quality and CCPA Register now for other webinars in our CCPA- preparedness series! Click to Register Click to Register
  • 44. • As the most populous US state and the world’s 5th largest economy, it’s not unusual for California to be at the forefront of tech-related legislation. • With CCPA on the books, data privacy legislation is now pending in New York, Massachusetts, and Rhode Island. Other states are likely to follow. • Regardless of whether your organization needs to comply with CCPA or not, one or more data privacy regulations are likely to come your way. • The time to prepare is now. • Encrypt your data with strong, standards-based encryption and key management to protect against breaches, penalties and legal action. • Harden security and redact data shared with third parties to meet compliance requirements. • We are here to help! Recap
  • 46. Protects keys from theft and loss • Stores keys separately from the encrypted data • Restricts access to keys • Backs up keys securely • Supports regular key rotation Supports best practices for key management • Separation of duties between data manager and key manager • Dual control of key management processes • Split knowledge of complete key values • Ensuring origin and quality of keys • As with encryption, key manager certifications are available; e.g. Federal Information Processing Standards (FIPS) 140-2 • KMIP-compliance ensures future compatibility with encryption solutions Pair a Key Manager with your Encryption Solution