SlideShare a Scribd company logo
IBM i Encryption
Made Easy
Jeff Uehling
Product Management Director, Syncsort
Patrick Townsend
Founder and CEO, Townsend Security
Today’s Presenters
2 | IBM i Encryption Made Easy
Jeff Uehling
Product Management Director, Syncsort
Patrick Townsend
Founder and CEO, Townsend Security
• IBM i encryption basics
• What FieldProc is and how it works
• How to easily encrypt and decrypt data without impacting existing applications
• Challenges and practical considerations for FieldProc encryption
• The importance of encryption key management to meet compliance requirements
• Introduction to encryption and key management from Syncsort and Townsend
Security
• Q&A
Agenda
3 | IBM i Encryption Made Easy
IBM i Encryption Algorithms
IBM i APIs exist to allow applications to encrypt data
• Included with the OS
• Key management integrated with the API design
(master keys and key store files)
Syncsort provides NIST-certified encryption support
• NIST-certified encryption algorithms in Alliance AES/400
• Key Management solution from Townsend Security, including
“off partition” support
4 | IBM i Encryption Made Easy
A data encryption key should be well protected or data
is exposed
• Key is used to encrypt data (SSN’s, credit card numbers, etc.)
It is recommended to encrypt the data key
with a key encrypting key (KEK)
• Used to encrypt data encryption keys
A Master Key can then be used to encrypt all KEKs
• A master key is used to encrypt KEKs or Data Encryption Keys
• Top level key, in the clear! If master key is compromised,
data is compromised.
• How do you securely store this master key?
Cryptographic Key Protection - Terminology
1 2 3KEK2
1 2 3
KEK1
Master
Clear Text
NOTE: Encryption Algorithms
are public knowledge.
Encryption keys must be kept
secret and protected.
5 | IBM i Encryption Made Easy
Crypto Key Management
IBM i has GUI & CL interfaces to manage master
keys & keystore files
• Included as part of the base OS
Syncsort provides “off partition” key management
via tight integration with the encryption products
with NIST-certified algorithm support
Off-partition encryption key management using
Townsend Security’s Alliance Key Manager
6 | IBM i Encryption Made Easy
Field Procedures
• Available beginning with IBM i V7R1
• Exit point technology
• Implemented on IBM System z in DB2 v9
• Implemented by customers or vendors
What is FIELDPROC and
How Does it Work?
7 | IBM i Encryption Made Easy
It’s an Application Software Project
• Identify all of the fields you want to encrypt
• Decide if triggers can work for you (partial solution)
• Identify all RPG or COBOL applications that must be changed
• Modify the applications
• Test, test, and test again
Encryption Before V7R1
8 | IBM i Encryption Made Easy
It’s a database change, not an application change
• Identify all of the fields you want to encrypt
• Install FIELDPROC exit point software
• Activate FIELDPROC protection
Encryption with FIELDPROC
9 | IBM i Encryption Made Easy
No database changes required with FIELDPROC
• No field type or size changes
• No problems with Zoned and Packed data
Few (if any!) application changes required
• Most applications can will run without changes
• There are a few caveats (covered later) that may require
minor application modifications
Your Encryption Project
Just Got a Whole Lot Easier!
10 | IBM i Encryption Made Easy
ORDMASTER
cardno
prodlib/exitpgm
How Does FIELDPROC Work?
11 | IBM i Encryption Made Easy
YOUR
FIELDPROC
APPLICATION
Like most exit points you must register your exit point program (uses SQL)
A SQL statement used to do this:
ALTER TABLE ordmaster
ALTER COLUMN cardno
SET FIELDPROC prodlib/exitpgm
CONSTANT ‘Unique-Value’
Now the DB will call your API program on every I/O operation
12 | IBM i Encryption Made Easy
13 | IBM i Encryption Made Easy
NO!
FIELDPROC works with files created with DDS. You don’t need to convert them to
SQL tables. There are some benefits to SQL conversion, but it is not required.
14 | IBM i Encryption Made Easy
- Encryption
- AuditDatabase Table
YOUR
FIELDPROC
APPLICATION
FIELDPROC:
What It Is and Isn’t
What it does:
• Provides a column level exit for insert/read/update operations on a database
What it does not do:
• Does not provide encryption, audit, or key management software
• You have to provide software for the Exit (an executable program) to handle encrypt/decrypt
• FIELDPROC does not provide security controls – that’s up to you!
• Does not log actions for compliance
FIELDPROC
FIELDPROC
DB2
Key Manager
MYPROG
ODBC
DFU
FTP
DBU
New Security Concerns
15 | IBM i Encryption Made Easy
APPLICATION
The new FIELDPROC exits expose new security challenges!
Once an exit point program is installed, it will be called
regardless of the user application. Common utilities such
as DBU, Display Physical File Member, Query, and FTP can
trigger automatic decryption of data.
You will need:
• User access controls
• Encryption key access controls
• Automatic masking of data by policy
• QAUDJRN logging of access
Security Concerns
16 | IBM i Encryption Made Easy
Everything you need to get FIELDPROC right
• Easy-to-use management interface
• Exit point software for encryption
• Key management (more later)
• User access controls by policy with Group Profile support
• Data masking
• Audit
• NIST-certified AES encryption
Alliance AES/400
and FIELDPROC
17 | IBM i Encryption Made Easy
• IBM i customers with legacy RPG applications can
now deploy automatic DB2 encryption over sensitive
data which are indexes
• Leverage OAR capabilities by replacing the legacy
RPG file I/O with modern SQL operations
• Sensitive indexes include social security numbers,
bank accounts, etc.
Major Step Forward
in FIELDPROC Encryption
18 | IBM i Encryption Made Easy
With Legacy RPG Encrypted
Indexes Often Do Not Work
19 | IBM i Encryption Made Easy
RPG Application
DB2
Legacy I/O Model (no SQL / SQE)
AES Encryption
Alliance Key Manager
SQL
Legacy RPG File I/O Model
• Does not implement SQL interface to DB2
• Record-oriented file access
• Translates I/O Operations (CHAIN, READE, etc.) to
Encrypted operations
• Does not resolve encrypted indexes to unencrypted
sort order
• I.e. no index scan
20 | IBM i Encryption Made Easy
Problem Symptoms with Legacy
RPG I/O and Encrypted Indexes
• Empty reports when sorted in a range
• Empty subfile displays
• Broken program logic with related tables/files
• Substring operations on encrypted indexes do not work
• Join logical files on encrypted indexes will not build
These issues are insurmountable for
many IBM i customers
21 | IBM i Encryption Made Easy
Any IBM i customer who indexes by sensitive data:
• Banks and credit unions
• Hospitals, HMOs, and other medical entities
• Insurance providers and brokers
(casualty, liability, PMI, auto, etc.)
• Brokerages and traders
• Pharmaceutical
• Retail
• Telecos
• And many others
Who is Most Affected by
the Encrypted Index Issue?
22 | IBM i Encryption Made Easy
With Open Access for RPG (OAR)
There Is A Way to Fix RPG!
23 | IBM i Encryption Made Easy
Open Access for RPG Enables:
• The replacement of the legacy RPG I/O engine
• You define a “Handler” to take over I/O operations
• A Handler is a program you write (*PGM or *SRVPGM)
• The Handler is passed the RPG operation
• READ, CHAIN, etc.
A Handler can do anything!
Think of a Handler as an Exit Point
for an RPG “F” specification
24 | IBM i Encryption Made Easy
OAR with SQL File Handler
to the Rescue
25 | IBM i Encryption Made Easy
RPG Application with OAR
SQE / DB2
SQL File Handler maps RPG I/O to SQL
AES Encryption
AKM Key Manager
+ S Q L
O A R
• Translates RPG I/O Operations (CHAIN, READE, etc.) to SQL
• Implements SQL interface to DB2
• Encrypted indexes now work as expected
RESULT:
• Display files work properly
• Reports work as expected
• Sort order is correct
RPG with SQL OAR Handler
26 | IBM i Encryption Made Easy
Requires One Line of New Code
FMyFile UF E Disk
F Handler(‘SrvProgram(function)’)
RPG application code must be modified to add the OAR handler on a file extension specification,
and the program must be re-compiled.
Normal system testing should be performed to assure proper operation.
RPG OAR Implementation
27 | IBM i Encryption Made Easy
Data
Protected Data
Key
• AES is not a “secret”
• The key is the real “secret”• Key Management SP800-57
• Cryptographic Module Validation
• Program (CMVP)
• National Voluntary Laboratory
• Accreditation Program (NVLAP)
• FIPS-140
Key Management
Is Crucial for Compliance
28 | IBM i Encryption Made Easy
• Dual control
• Separation of duties
• Split knowledge
• Key rotation
• Separate keys from the data they protect
Key Management
for Compliance
29 | IBM i Encryption Made Easy
Key management is critically important to encryption
• Hackers don’t break encryption, they find the keys
• A good key management system will…
1. Control access to keys
2. Manage keys through the life cycle
3. Log access to keys
4. Back up keys
5. Roll keys
6. Expire keys, etc
FIELDPROC and Key Management?
30 | IBM i Encryption Made Easy
• Local key store (based on X9.24)
• External encryption key management
• Alliance Key Manager
• FIPS 140-2 compliant
• Available As: HSM, Cloud HSM, VMware, Cloud
The keys are the secret –
they must be protected and managed
Two Choices for Key Management
31 | IBM i Encryption Made Easy
Encryption will have an impact – how much?
• AES encryption libraries vary in performance
• Alliance AES/400 libraries are highly optimized
• 116x faster than native IBM i software library
• 50x faster than IBM Power8 on-chip AES
• Key management impacts performance
• Alliance Key Manager TLS + secure caching
Practical Issues –
Performance
32 | IBM i Encryption Made Easy
Example: IBM model 515
Power 5 single processor,
1 Gig storage, 2 disks,
3800 CPW, 1 Million records,
unique index: 16,000+ records
per second decryption
Sort sequence of encrypted indexes
• IBM indexes based on encrypted value, not decrypted value
• Index lookups based on encrypted value, not plaintext value
• Range bound reads, some RPG operation impacts
• SETLL followed by READE, etc.
Practical Issues –
Encrypted Indexes
33 | IBM i Encryption Made Easy
Incompatible with DDS-based join files on encrypted values
• Joined fields are a different type (Input only)
• Errors when re-creating join logical file after FIELDPROC active
• NOT a problem with native SQL joins
Practical Issues –
Join Logical Files
34 | IBM i Encryption Made Easy
IBM DB2 FIELDPROC SQL Server EKM
Oracle 10g/11g SharePoint
Tape, storage, etc.
Critical infrastructure for multiple platforms
• Centralized key management reduces security exposure
• One key vault for all OSs – IBM i, Windows, Linux, UNIX, IBM z, etc.
• One key vault for all platforms – Client, server, cloud, mobile, etc.
• One key vault for all applications:
Practical Issues –
Enterprise Key Management
35 | IBM i Encryption Made Easy
Making it easy
• Fully functional software – Internet download
• Local key management included
• Alliance Key Manager as VMware or Internet instance
• Free training, Quick Start guides, on-line help
Alliance Key Manager
Software Evaluations
36 | IBM i Encryption Made Easy
How Syncsort
Can Help
37
Data Privacy
Protecting the privacy of sensitive
data by ensuring that it cannot be
read by unauthorized persons
using encryption, tokenization
and secure file transfer
Access and Authentication
Control
Ensuring comprehensive control
of unauthorized access and the
ability to trace any activity,
suspicious or otherwise
Security & Compliance
Assessments
Assessing your security risks or
regulatory compliance
Auditing and Monitoring
Gaining visibility into all security
activity on your IBM i and
optionally feeding it to an
enterprise console
Syncsort Security
addresses the issues
on every CISO and
system admin’s
radar screen
38 | IBM i Encryption Made Easy
• Only NIST-validated AES encryption for the IBM i
• High performance encryption libraries
• Does not use slow IBM libraries like other competitors
• Better performance than Power8 on-chip encryption
• Encryption key management options
• Local key store
• FIPS 140-2 compliant Key Manager
• Built-in data masking based on user, group
• Built-in data access audit
• Extensive encryption APIs for RPG and COBOL
• Encryption commands for Save Files, IFS, and more
Why Choose Alliance AES/400?
39 | IBM i Encryption Made Easy
Compatibility
• Works with all major business and cloud platforms
• Integrates with all leading encryption applications
Compliant
• FIPS 140-2 compliant – the US Federal Information Processing Standard for
approving cryptographic solutions with both hardware and software components.
• OASIS KMIP (Key Management Interoperability Protocol) compliant
• Certified for PCI-DSS version 3 by Coalfire, a certified QSA auditor
Flexible Deployment Options
• VMware, Hardware Security Module (HSM) or cloud deployment (AWS, Microsoft
Azure) options for deploying Key Manager
Cost Effective
• Affordable for any size Enterprise
• No additional client-side license or usage fees.
Easy to Use
• Ready-to-use client software speeds deployment and reduces IT costs
Why Alliance Key Manager?
40 | IBM i Encryption Made Easy
Syncsort’s Security Solutions
Syncsort Security
Cilasoft
QJRN/400
QJRN Database & QJRN System
CONTROLER
EAM
RAMi
CENTRAL
Alliance
Alliance
AES/400
Townsend’s Alliance
Key Manager
Alliance Token
Manager
Alliance
FTP Manager
Alliance
LogAgent Suite
Alliance Two Factor
Authentication
Enforcive
Enterprise Security Suite
Security Risk Assessment
Cross-Platform Audit
Cross-Platform Compliance
Password Self-Service
AIX Security
Quick
Quick-CSi
Quick-Anonymizer
Syncsort’s Security
solutions have the breadth and
depth to meet your IBM i
compliance or security needs.
41 | IBM i Encryption Made Easy
Flexible services offerings for security
• Security risk assessment
• Quick start services
• Quick check services
• Security update services (installing hot fixes, PTFs, new releases, etc.)
• System update services (ensuring security solution is properly configured
after system changes to IP addresses, OS versions, etc.)
• Auditor assist (supporting internal or external auditors)
• Managed security services
• A la carte consulting
Leverage Syncsort’s team of seasoned security experts!
Global Professional Services
Add Value to Your Investment
42 | IBM i Encryption Made Easy
Q&A
Learn more about Syncsort security
solutions at
www.syncsort.com/en/assure
IBM i Encryption Made Easy

More Related Content

PDF
IBM i Encryption Made Easy
PDF
Top 5 Encryption Myths for IBM i Users
PDF
Design rationales in the JRockit JVM
PDF
DEF CON 27 - XIAOHUIHUI - all the 4g modules could be hacked
PDF
EuskalHack 2017 - Secure initialization of TEEs: when secure boot falls short
PPTX
Pushing Data from S7-1200 to Cloud
PDF
CONFidence 2014: Yaniv Miron: ATMs – We kick their ass
PPTX
Multi-site WinCC 7 Development with Centralized Process Historian & Informati...
IBM i Encryption Made Easy
Top 5 Encryption Myths for IBM i Users
Design rationales in the JRockit JVM
DEF CON 27 - XIAOHUIHUI - all the 4g modules could be hacked
EuskalHack 2017 - Secure initialization of TEEs: when secure boot falls short
Pushing Data from S7-1200 to Cloud
CONFidence 2014: Yaniv Miron: ATMs – We kick their ass
Multi-site WinCC 7 Development with Centralized Process Historian & Informati...

Similar to IBM i Encryption Made Easy (20)

PPTX
Streamlining Data Encryption While Maintaining IBM i Availability
PPTX
Why Disk Level Encryption is Not Enough for Your IBM i
PPTX
WBN_Securing Your IBM i_E_250300003.pptx
PDF
Z111806 strengthen-security-sydney-v1910a
PDF
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
PDF
Z110932 strengthen-security-jburg-v1909c
PDF
Security 101: Protecting Data with Encryption, Tokenization & Anonymization
PPTX
SafeNet Enterprise Key and Crypto Management
PDF
How to Hack a Cryptographic Key
PDF
Key Concepts for Protecting the Privacy of IBM i Data
PPTX
What Does a Full Featured Security Strategy Look Like?
PPTX
Essential Layers of IBM i Security: File and Field Security
PPTX
Social Distance Your IBM i from Cybersecurity Risk
PPTX
Encryption in the enterprise
PDF
Ibm system storage data encryption sg247797
PPTX
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
PPTX
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
PDF
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
PDF
SafeNet DataSecure vs. Native SQL Server Encryption
PPTX
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
Streamlining Data Encryption While Maintaining IBM i Availability
Why Disk Level Encryption is Not Enough for Your IBM i
WBN_Securing Your IBM i_E_250300003.pptx
Z111806 strengthen-security-sydney-v1910a
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
Z110932 strengthen-security-jburg-v1909c
Security 101: Protecting Data with Encryption, Tokenization & Anonymization
SafeNet Enterprise Key and Crypto Management
How to Hack a Cryptographic Key
Key Concepts for Protecting the Privacy of IBM i Data
What Does a Full Featured Security Strategy Look Like?
Essential Layers of IBM i Security: File and Field Security
Social Distance Your IBM i from Cybersecurity Risk
Encryption in the enterprise
Ibm system storage data encryption sg247797
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
SafeNet DataSecure vs. Native SQL Server Encryption
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
Ad

More from Precisely (20)

PDF
The Future of Automation: AI, APIs, and Cloud Modernization.pdf
PDF
Unlock new opportunities with location data.pdf
PDF
Reimagining Insurance: Connected Data for Confident Decisions.pdf
PDF
Introducing Syncsort™ Storage Management.pdf
PDF
Enable Enterprise-Ready Security on IBM i Systems.pdf
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
PDF
Solving the CIO’s Dilemma: Speed, Scale, and Smarter SAP Modernization.pdf
PDF
Solving the Data Disconnect: Why Success Hinges on Pre-Linked Data.pdf
PDF
Cooking Up Clean Addresses - 3 Ways to Whip Messy Data into Shape.pdf
PDF
Building Confidence in AI & Analytics with High-Integrity Location Data.pdf
PDF
SAP Modernization Strategies for a Successful S/4HANA Journey.pdf
PDF
Precisely Demo Showcase: Powering ServiceNow Discovery with Precisely Ironstr...
PDF
The 2025 Guide on What's Next for Automation.pdf
PDF
Outdated Tech, Invisible Expenses – How Data Silos Undermine Operational Effi...
PDF
Modernización de SAP: Maximizando el Valor de su Migración a SAP S/4HANA.pdf
PDF
Outdated Tech, Invisible Expenses – The Hidden Cost of Disconnected Data Syst...
PDF
Migration vers SAP S/4HANA: Un levier stratégique pour votre transformation d...
PDF
Outdated Tech, Invisible Expenses: The Hidden Cost of Poor Data Integration o...
PDF
The Changing Compliance Landscape in 2025.pdf
The Future of Automation: AI, APIs, and Cloud Modernization.pdf
Unlock new opportunities with location data.pdf
Reimagining Insurance: Connected Data for Confident Decisions.pdf
Introducing Syncsort™ Storage Management.pdf
Enable Enterprise-Ready Security on IBM i Systems.pdf
A Day in the Life of Location Data - Turning Where into How.pdf
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Solving the CIO’s Dilemma: Speed, Scale, and Smarter SAP Modernization.pdf
Solving the Data Disconnect: Why Success Hinges on Pre-Linked Data.pdf
Cooking Up Clean Addresses - 3 Ways to Whip Messy Data into Shape.pdf
Building Confidence in AI & Analytics with High-Integrity Location Data.pdf
SAP Modernization Strategies for a Successful S/4HANA Journey.pdf
Precisely Demo Showcase: Powering ServiceNow Discovery with Precisely Ironstr...
The 2025 Guide on What's Next for Automation.pdf
Outdated Tech, Invisible Expenses – How Data Silos Undermine Operational Effi...
Modernización de SAP: Maximizando el Valor de su Migración a SAP S/4HANA.pdf
Outdated Tech, Invisible Expenses – The Hidden Cost of Disconnected Data Syst...
Migration vers SAP S/4HANA: Un levier stratégique pour votre transformation d...
Outdated Tech, Invisible Expenses: The Hidden Cost of Poor Data Integration o...
The Changing Compliance Landscape in 2025.pdf
Ad

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Encapsulation theory and applications.pdf
PDF
Electronic commerce courselecture one. Pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Tartificialntelligence_presentation.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Spectral efficient network and resource selection model in 5G networks
PPT
Teaching material agriculture food technology
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Programs and apps: productivity, graphics, security and other tools
Diabetes mellitus diagnosis method based random forest with bat algorithm
Network Security Unit 5.pdf for BCA BBA.
NewMind AI Weekly Chronicles - August'25-Week II
The Rise and Fall of 3GPP – Time for a Sabbatical?
A comparative analysis of optical character recognition models for extracting...
Encapsulation theory and applications.pdf
Electronic commerce courselecture one. Pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Tartificialntelligence_presentation.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Assigned Numbers - 2025 - Bluetooth® Document
Spectral efficient network and resource selection model in 5G networks
Teaching material agriculture food technology
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Group 1 Presentation -Planning and Decision Making .pptx

IBM i Encryption Made Easy

  • 1. IBM i Encryption Made Easy Jeff Uehling Product Management Director, Syncsort Patrick Townsend Founder and CEO, Townsend Security
  • 2. Today’s Presenters 2 | IBM i Encryption Made Easy Jeff Uehling Product Management Director, Syncsort Patrick Townsend Founder and CEO, Townsend Security
  • 3. • IBM i encryption basics • What FieldProc is and how it works • How to easily encrypt and decrypt data without impacting existing applications • Challenges and practical considerations for FieldProc encryption • The importance of encryption key management to meet compliance requirements • Introduction to encryption and key management from Syncsort and Townsend Security • Q&A Agenda 3 | IBM i Encryption Made Easy
  • 4. IBM i Encryption Algorithms IBM i APIs exist to allow applications to encrypt data • Included with the OS • Key management integrated with the API design (master keys and key store files) Syncsort provides NIST-certified encryption support • NIST-certified encryption algorithms in Alliance AES/400 • Key Management solution from Townsend Security, including “off partition” support 4 | IBM i Encryption Made Easy
  • 5. A data encryption key should be well protected or data is exposed • Key is used to encrypt data (SSN’s, credit card numbers, etc.) It is recommended to encrypt the data key with a key encrypting key (KEK) • Used to encrypt data encryption keys A Master Key can then be used to encrypt all KEKs • A master key is used to encrypt KEKs or Data Encryption Keys • Top level key, in the clear! If master key is compromised, data is compromised. • How do you securely store this master key? Cryptographic Key Protection - Terminology 1 2 3KEK2 1 2 3 KEK1 Master Clear Text NOTE: Encryption Algorithms are public knowledge. Encryption keys must be kept secret and protected. 5 | IBM i Encryption Made Easy
  • 6. Crypto Key Management IBM i has GUI & CL interfaces to manage master keys & keystore files • Included as part of the base OS Syncsort provides “off partition” key management via tight integration with the encryption products with NIST-certified algorithm support Off-partition encryption key management using Townsend Security’s Alliance Key Manager 6 | IBM i Encryption Made Easy
  • 7. Field Procedures • Available beginning with IBM i V7R1 • Exit point technology • Implemented on IBM System z in DB2 v9 • Implemented by customers or vendors What is FIELDPROC and How Does it Work? 7 | IBM i Encryption Made Easy
  • 8. It’s an Application Software Project • Identify all of the fields you want to encrypt • Decide if triggers can work for you (partial solution) • Identify all RPG or COBOL applications that must be changed • Modify the applications • Test, test, and test again Encryption Before V7R1 8 | IBM i Encryption Made Easy
  • 9. It’s a database change, not an application change • Identify all of the fields you want to encrypt • Install FIELDPROC exit point software • Activate FIELDPROC protection Encryption with FIELDPROC 9 | IBM i Encryption Made Easy
  • 10. No database changes required with FIELDPROC • No field type or size changes • No problems with Zoned and Packed data Few (if any!) application changes required • Most applications can will run without changes • There are a few caveats (covered later) that may require minor application modifications Your Encryption Project Just Got a Whole Lot Easier! 10 | IBM i Encryption Made Easy
  • 11. ORDMASTER cardno prodlib/exitpgm How Does FIELDPROC Work? 11 | IBM i Encryption Made Easy YOUR FIELDPROC APPLICATION Like most exit points you must register your exit point program (uses SQL) A SQL statement used to do this: ALTER TABLE ordmaster ALTER COLUMN cardno SET FIELDPROC prodlib/exitpgm CONSTANT ‘Unique-Value’ Now the DB will call your API program on every I/O operation
  • 12. 12 | IBM i Encryption Made Easy
  • 13. 13 | IBM i Encryption Made Easy NO! FIELDPROC works with files created with DDS. You don’t need to convert them to SQL tables. There are some benefits to SQL conversion, but it is not required.
  • 14. 14 | IBM i Encryption Made Easy - Encryption - AuditDatabase Table YOUR FIELDPROC APPLICATION FIELDPROC: What It Is and Isn’t What it does: • Provides a column level exit for insert/read/update operations on a database What it does not do: • Does not provide encryption, audit, or key management software • You have to provide software for the Exit (an executable program) to handle encrypt/decrypt • FIELDPROC does not provide security controls – that’s up to you! • Does not log actions for compliance FIELDPROC
  • 15. FIELDPROC DB2 Key Manager MYPROG ODBC DFU FTP DBU New Security Concerns 15 | IBM i Encryption Made Easy APPLICATION
  • 16. The new FIELDPROC exits expose new security challenges! Once an exit point program is installed, it will be called regardless of the user application. Common utilities such as DBU, Display Physical File Member, Query, and FTP can trigger automatic decryption of data. You will need: • User access controls • Encryption key access controls • Automatic masking of data by policy • QAUDJRN logging of access Security Concerns 16 | IBM i Encryption Made Easy
  • 17. Everything you need to get FIELDPROC right • Easy-to-use management interface • Exit point software for encryption • Key management (more later) • User access controls by policy with Group Profile support • Data masking • Audit • NIST-certified AES encryption Alliance AES/400 and FIELDPROC 17 | IBM i Encryption Made Easy
  • 18. • IBM i customers with legacy RPG applications can now deploy automatic DB2 encryption over sensitive data which are indexes • Leverage OAR capabilities by replacing the legacy RPG file I/O with modern SQL operations • Sensitive indexes include social security numbers, bank accounts, etc. Major Step Forward in FIELDPROC Encryption 18 | IBM i Encryption Made Easy
  • 19. With Legacy RPG Encrypted Indexes Often Do Not Work 19 | IBM i Encryption Made Easy RPG Application DB2 Legacy I/O Model (no SQL / SQE) AES Encryption Alliance Key Manager SQL
  • 20. Legacy RPG File I/O Model • Does not implement SQL interface to DB2 • Record-oriented file access • Translates I/O Operations (CHAIN, READE, etc.) to Encrypted operations • Does not resolve encrypted indexes to unencrypted sort order • I.e. no index scan 20 | IBM i Encryption Made Easy
  • 21. Problem Symptoms with Legacy RPG I/O and Encrypted Indexes • Empty reports when sorted in a range • Empty subfile displays • Broken program logic with related tables/files • Substring operations on encrypted indexes do not work • Join logical files on encrypted indexes will not build These issues are insurmountable for many IBM i customers 21 | IBM i Encryption Made Easy
  • 22. Any IBM i customer who indexes by sensitive data: • Banks and credit unions • Hospitals, HMOs, and other medical entities • Insurance providers and brokers (casualty, liability, PMI, auto, etc.) • Brokerages and traders • Pharmaceutical • Retail • Telecos • And many others Who is Most Affected by the Encrypted Index Issue? 22 | IBM i Encryption Made Easy
  • 23. With Open Access for RPG (OAR) There Is A Way to Fix RPG! 23 | IBM i Encryption Made Easy
  • 24. Open Access for RPG Enables: • The replacement of the legacy RPG I/O engine • You define a “Handler” to take over I/O operations • A Handler is a program you write (*PGM or *SRVPGM) • The Handler is passed the RPG operation • READ, CHAIN, etc. A Handler can do anything! Think of a Handler as an Exit Point for an RPG “F” specification 24 | IBM i Encryption Made Easy
  • 25. OAR with SQL File Handler to the Rescue 25 | IBM i Encryption Made Easy RPG Application with OAR SQE / DB2 SQL File Handler maps RPG I/O to SQL AES Encryption AKM Key Manager
  • 26. + S Q L O A R • Translates RPG I/O Operations (CHAIN, READE, etc.) to SQL • Implements SQL interface to DB2 • Encrypted indexes now work as expected RESULT: • Display files work properly • Reports work as expected • Sort order is correct RPG with SQL OAR Handler 26 | IBM i Encryption Made Easy
  • 27. Requires One Line of New Code FMyFile UF E Disk F Handler(‘SrvProgram(function)’) RPG application code must be modified to add the OAR handler on a file extension specification, and the program must be re-compiled. Normal system testing should be performed to assure proper operation. RPG OAR Implementation 27 | IBM i Encryption Made Easy
  • 28. Data Protected Data Key • AES is not a “secret” • The key is the real “secret”• Key Management SP800-57 • Cryptographic Module Validation • Program (CMVP) • National Voluntary Laboratory • Accreditation Program (NVLAP) • FIPS-140 Key Management Is Crucial for Compliance 28 | IBM i Encryption Made Easy
  • 29. • Dual control • Separation of duties • Split knowledge • Key rotation • Separate keys from the data they protect Key Management for Compliance 29 | IBM i Encryption Made Easy
  • 30. Key management is critically important to encryption • Hackers don’t break encryption, they find the keys • A good key management system will… 1. Control access to keys 2. Manage keys through the life cycle 3. Log access to keys 4. Back up keys 5. Roll keys 6. Expire keys, etc FIELDPROC and Key Management? 30 | IBM i Encryption Made Easy
  • 31. • Local key store (based on X9.24) • External encryption key management • Alliance Key Manager • FIPS 140-2 compliant • Available As: HSM, Cloud HSM, VMware, Cloud The keys are the secret – they must be protected and managed Two Choices for Key Management 31 | IBM i Encryption Made Easy
  • 32. Encryption will have an impact – how much? • AES encryption libraries vary in performance • Alliance AES/400 libraries are highly optimized • 116x faster than native IBM i software library • 50x faster than IBM Power8 on-chip AES • Key management impacts performance • Alliance Key Manager TLS + secure caching Practical Issues – Performance 32 | IBM i Encryption Made Easy Example: IBM model 515 Power 5 single processor, 1 Gig storage, 2 disks, 3800 CPW, 1 Million records, unique index: 16,000+ records per second decryption
  • 33. Sort sequence of encrypted indexes • IBM indexes based on encrypted value, not decrypted value • Index lookups based on encrypted value, not plaintext value • Range bound reads, some RPG operation impacts • SETLL followed by READE, etc. Practical Issues – Encrypted Indexes 33 | IBM i Encryption Made Easy
  • 34. Incompatible with DDS-based join files on encrypted values • Joined fields are a different type (Input only) • Errors when re-creating join logical file after FIELDPROC active • NOT a problem with native SQL joins Practical Issues – Join Logical Files 34 | IBM i Encryption Made Easy
  • 35. IBM DB2 FIELDPROC SQL Server EKM Oracle 10g/11g SharePoint Tape, storage, etc. Critical infrastructure for multiple platforms • Centralized key management reduces security exposure • One key vault for all OSs – IBM i, Windows, Linux, UNIX, IBM z, etc. • One key vault for all platforms – Client, server, cloud, mobile, etc. • One key vault for all applications: Practical Issues – Enterprise Key Management 35 | IBM i Encryption Made Easy
  • 36. Making it easy • Fully functional software – Internet download • Local key management included • Alliance Key Manager as VMware or Internet instance • Free training, Quick Start guides, on-line help Alliance Key Manager Software Evaluations 36 | IBM i Encryption Made Easy
  • 38. Data Privacy Protecting the privacy of sensitive data by ensuring that it cannot be read by unauthorized persons using encryption, tokenization and secure file transfer Access and Authentication Control Ensuring comprehensive control of unauthorized access and the ability to trace any activity, suspicious or otherwise Security & Compliance Assessments Assessing your security risks or regulatory compliance Auditing and Monitoring Gaining visibility into all security activity on your IBM i and optionally feeding it to an enterprise console Syncsort Security addresses the issues on every CISO and system admin’s radar screen 38 | IBM i Encryption Made Easy
  • 39. • Only NIST-validated AES encryption for the IBM i • High performance encryption libraries • Does not use slow IBM libraries like other competitors • Better performance than Power8 on-chip encryption • Encryption key management options • Local key store • FIPS 140-2 compliant Key Manager • Built-in data masking based on user, group • Built-in data access audit • Extensive encryption APIs for RPG and COBOL • Encryption commands for Save Files, IFS, and more Why Choose Alliance AES/400? 39 | IBM i Encryption Made Easy
  • 40. Compatibility • Works with all major business and cloud platforms • Integrates with all leading encryption applications Compliant • FIPS 140-2 compliant – the US Federal Information Processing Standard for approving cryptographic solutions with both hardware and software components. • OASIS KMIP (Key Management Interoperability Protocol) compliant • Certified for PCI-DSS version 3 by Coalfire, a certified QSA auditor Flexible Deployment Options • VMware, Hardware Security Module (HSM) or cloud deployment (AWS, Microsoft Azure) options for deploying Key Manager Cost Effective • Affordable for any size Enterprise • No additional client-side license or usage fees. Easy to Use • Ready-to-use client software speeds deployment and reduces IT costs Why Alliance Key Manager? 40 | IBM i Encryption Made Easy
  • 41. Syncsort’s Security Solutions Syncsort Security Cilasoft QJRN/400 QJRN Database & QJRN System CONTROLER EAM RAMi CENTRAL Alliance Alliance AES/400 Townsend’s Alliance Key Manager Alliance Token Manager Alliance FTP Manager Alliance LogAgent Suite Alliance Two Factor Authentication Enforcive Enterprise Security Suite Security Risk Assessment Cross-Platform Audit Cross-Platform Compliance Password Self-Service AIX Security Quick Quick-CSi Quick-Anonymizer Syncsort’s Security solutions have the breadth and depth to meet your IBM i compliance or security needs. 41 | IBM i Encryption Made Easy
  • 42. Flexible services offerings for security • Security risk assessment • Quick start services • Quick check services • Security update services (installing hot fixes, PTFs, new releases, etc.) • System update services (ensuring security solution is properly configured after system changes to IP addresses, OS versions, etc.) • Auditor assist (supporting internal or external auditors) • Managed security services • A la carte consulting Leverage Syncsort’s team of seasoned security experts! Global Professional Services Add Value to Your Investment 42 | IBM i Encryption Made Easy
  • 43. Q&A Learn more about Syncsort security solutions at www.syncsort.com/en/assure