2015
In Cloud We Encrypt
Vivian Gerritsen
Intuit
Oct 16, 2015
#GHC15
2015
2015
About Me
 Graduate of the Ohio State University (MSEE)
 Practice broad set of computer technologies from
hardware, system-level software, applications to UI
 Focus on security and compliance software for
the past 5 years
 I’m a security ninja who protects
against all possible attacks in cyber space
2015
The Need for Encryption
Security breaches
almost daily!
 It’s industry trend to encrypt all sensitive data in the cloud.
 Many cloud providers offer encryption solutions.
2015
What is Encryption?
Engine
Input Data
SSN
123-45-6789
Output Data
“Cipher Text”
QSBwZX24ncyBhI
HBlcnNvbiwgbm8g
bWF0JzbdGVyIGh
vdyBzbWFsbC4=
Three major components to any encryption system:
1. Data
2. Encryption engine
3. Key management
Encryption Key
2015
What Users Should Know
Users should ask two data encryption questions:
 Who has the key?
 Is my data protected end-to-end?
2015
Encryption in the Cloud
User-Oriented Storage
Example: File sharing
Best Practices:
 You own the key, not cloud administrator
 Choose a vendor that only you have the entire control of the key access
2015
Encryption in the Cloud
SaaS-PaaS-IaaS
Intuit example:
 SaaS services use a platform with key management APIs to encrypt
application data.
 The platform uses an Intuit-certified service to store encryption keys.
 Amazon AWS is used as building blocks and infrastructure.
2015
Encryption in the Cloud
Three-Tiered, End-to-End
Web Server
Database, File
System, Big Data
Key Manager
Applications
Application
Server
Three-tiered SaaS application – encryption in transit and at rest
2015
SaaS Encryption
 Client-side encryption
− Encrypts data before sending it to servers
• Protect highly sensitive information
• You own the key
 Server-side encryption
− Protects data at rest. Options:
• Trust the provider
• Use customer-provided keys
• Or separate out key management
2015
SaaS Encryption (cont’d)
 Cloud encryption gateway
− Act as proxy to encrypt or tokenize sensitive
SaaS data
• Between corporate network and cloud
• Single point of security configuration
• Encrypt with enterprise controlled keys
2015
PaaS Encryption
 Database encryption
− Transparent database encryption
• Whole database or finer-grained (e.g., column, tablespace)
• Keys managed by database
• Authorized users such as admin may see data
− Alternative:
• Encrypt data fields in the application (SaaS)
• Volume encryption (IaaS)
2015
IaaS Encryption
 Volume encryption
− Protect the storage systems of running instances
− Build encryption into your instance
• Keys in instance – only protects you from anyone without the right access
− Separate key from encryption engine
• Returns the key when a set of policy-based criteria are met
2015
laaS Encryption (cont’d)
 Object storage
− Transparent data encryption – protects
object(s), bucket(s) via server-side
encryption
− Client-side encryption – encrypts the
objects before sending up
Rest API
Application
2015
Encryption in Transit: Mechanisms
 SSL
− Used mostly by HTTPS to secure
browser session
 IPSec
− Host-to-host, network-to-network
transport
− Network tunneling - VPN
2015
Cloud Encryption Layers
2015
Data Residency
International data safety
Does your vendor’s vendor protect your data
the same way you do?
 Data sovereignty: government in other country
may look into your data
 Data residency: key needs to stay in US
2015
Conclusions
 Always try to manage your keys, and guard them like they
were … your keys
− Enforce strong policy (least privileged)
− Enable key rotation
− Be aware of jurisdiction!
 Devise your security architecture holistically, not just looking
at point solutions
− Classify your data and apply proper encryption
− Encrypt end-to-end in transit and at rest
2015
Got Feedback?
Rate and review the session on our mobile app
Download at http://ddut.ch/ghc15
or search GHC 2015 in the app store

More Related Content

PDF
Building Elastic into security operations
PPTX
Sam Herath - Six Critical Criteria for Cloud Workload Security
PDF
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
PDF
Operationalize with alerting, custom dashboards, and timelines
PPTX
Webinar: Adaptive Security
PDF
Full time PII data protection: How Randstad uses Elastic Security to keep cli...
PPTX
SplunkLive! London 2019: University of Exeter
PDF
Keynote: Elastic Security evolution and vision
Building Elastic into security operations
Sam Herath - Six Critical Criteria for Cloud Workload Security
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
Operationalize with alerting, custom dashboards, and timelines
Webinar: Adaptive Security
Full time PII data protection: How Randstad uses Elastic Security to keep cli...
SplunkLive! London 2019: University of Exeter
Keynote: Elastic Security evolution and vision

What's hot (20)

PDF
Palestra de abertura: Evolução e visão do Elastic Security
PPTX
Real2Time
PPTX
SplunkLive! Customer Presentation – athenahealth
PPTX
Protecting health and life science organizations from breaches and ransomware
PDF
Webinar - Feel Secure with revolutionary OTM Solution
PPTX
Flight Delay Compensation: How SwissRe is exploring new territories in Busine...
PPTX
Empowering Marketing Solutions Teams
PPTX
Splunk for ITOA Breakout Session
PPTX
Grainger: Our Rookie Year with Zenoss
PPTX
Splunk for ITOA Breakout Session
PPTX
Why Zenoss is Right for You
PDF
Análisis de seguridad integral con Elastic
PDF
An Introduction to Neo4j Aura Enterprise and the Key Features Designed to Mee...
PDF
Splunklive! Stockholm 2015 - IKEA
PPTX
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)
PDF
Maximize Software Investments with ePlus and Cisco ONE
PPTX
Delivering Business Value from Operational Inisights at ING Bank
PPTX
When to Move Your Practice to the Cloud
PPTX
Hoe het Azure ecosysteem een cruciale rol speelt in uw IoT-oplossing (Glenn C...
PDF
The role of integration in your cloud-native transformation (Richard Seroter ...
Palestra de abertura: Evolução e visão do Elastic Security
Real2Time
SplunkLive! Customer Presentation – athenahealth
Protecting health and life science organizations from breaches and ransomware
Webinar - Feel Secure with revolutionary OTM Solution
Flight Delay Compensation: How SwissRe is exploring new territories in Busine...
Empowering Marketing Solutions Teams
Splunk for ITOA Breakout Session
Grainger: Our Rookie Year with Zenoss
Splunk for ITOA Breakout Session
Why Zenoss is Right for You
Análisis de seguridad integral con Elastic
An Introduction to Neo4j Aura Enterprise and the Key Features Designed to Mee...
Splunklive! Stockholm 2015 - IKEA
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)
Maximize Software Investments with ePlus and Cisco ONE
Delivering Business Value from Operational Inisights at ING Bank
When to Move Your Practice to the Cloud
Hoe het Azure ecosysteem een cruciale rol speelt in uw IoT-oplossing (Glenn C...
The role of integration in your cloud-native transformation (Richard Seroter ...
Ad

Viewers also liked (10)

PDF
Velocity Conference: Building a Scalable, Global SaaS Offering: Lessons from ...
PDF
Facebook Audience Comparison: H&R Block vs. TurboTax
PPTX
Fy16 annual shareholder meeting final for print
PDF
Financing Small Business Success: The Rise of Online Lending
PDF
Intuit's - Investor Day 2015 Presentation
PPTX
Intuit Overview January 2017
PPTX
Intuit Investor Presentation November 2016
PDF
Intuit Annual Shareholder Meeting 2017
PDF
Intuit’s Annual Investor Day Presentation 2017
Velocity Conference: Building a Scalable, Global SaaS Offering: Lessons from ...
Facebook Audience Comparison: H&R Block vs. TurboTax
Fy16 annual shareholder meeting final for print
Financing Small Business Success: The Rise of Online Lending
Intuit's - Investor Day 2015 Presentation
Intuit Overview January 2017
Intuit Investor Presentation November 2016
Intuit Annual Shareholder Meeting 2017
Intuit’s Annual Investor Day Presentation 2017
Ad

Similar to In Cloud We Encrypt #GHC15 (20)

PDF
Cloud data governance, risk management and compliance ny metro joint cyber...
PPT
IBM Share Conference 2010, Boston, Ulf Mattsson
PDF
PTC Cloud Services Datasheet: Security Primer
 
PPTX
Cloud Security and some preferred practices
PPT
Aws training in bangalore
PPTX
Subscribed 2015: Architecture, Security, Scalability
PPT
Securing Sensitive Data in Your Hybrid Cloud
PDF
Tips to Remediate your Vulnerability Management Program
PDF
Logicalis Security Conference
PPTX
WBN_Securing Your IBM i_E_250300003.pptx
PPTX
Rik Ferguson
PPTX
Automating your AWS Security Operations
PDF
Daniel Grabski | Microsofts cybersecurity story
PPTX
Security in the cloud Workshop HSTC 2014
PPTX
Add-Structure-and-Credibility-to-Your-Security-Portfolio-with-CIS-Controls-v8...
PPTX
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
PDF
Zerotrusting serverless applications protecting microservices using secure d...
PDF
Security and privacy of cloud data: what you need to know (Interop)
PPTX
Justin Fox_NuData Security_A Master_Card_Company_June 9 2017_presentation
PDF
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
Cloud data governance, risk management and compliance ny metro joint cyber...
IBM Share Conference 2010, Boston, Ulf Mattsson
PTC Cloud Services Datasheet: Security Primer
 
Cloud Security and some preferred practices
Aws training in bangalore
Subscribed 2015: Architecture, Security, Scalability
Securing Sensitive Data in Your Hybrid Cloud
Tips to Remediate your Vulnerability Management Program
Logicalis Security Conference
WBN_Securing Your IBM i_E_250300003.pptx
Rik Ferguson
Automating your AWS Security Operations
Daniel Grabski | Microsofts cybersecurity story
Security in the cloud Workshop HSTC 2014
Add-Structure-and-Credibility-to-Your-Security-Portfolio-with-CIS-Controls-v8...
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Zerotrusting serverless applications protecting microservices using secure d...
Security and privacy of cloud data: what you need to know (Interop)
Justin Fox_NuData Security_A Master_Card_Company_June 9 2017_presentation
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017

More from Intuit Inc. (20)

PDF
State of Small Business – Growth and Success Report
PDF
The State of Small Business Cash Flow
PPTX
Small Business in the Age of AI
PPTX
Get financially Fit: Tips for Using QuickBooks
PPTX
SEO, Social, and More: Digital Marketing for your Business
PPTX
Why Building Your Brand is Key to Getting Customers
PPTX
Get Found Fast: Google AdWords Strategies for Growth
PPTX
Giving Clients What They Want
PPTX
What Accounting Will Look Like in 2030
PPTX
Pricing in the Digital Age
PDF
Handbook: Power Panel on Apps you need to give you more time to serve your cl...
PDF
Handbook: Advanced QuickBooks Online - Handling Tricky Transactions
PPTX
Advanced QuickBooks Online - Handling Tricky Transactions
PDF
Handling tricky transactions in QuickBooks Online
PDF
Social media is social business
PDF
Conversation guide: Forming deep relationships with your clients
PDF
Making tax digital
PDF
Giving clients what they want
PDF
100 percent cloud your action plan for success
PDF
Attracting and retaining top talent
State of Small Business – Growth and Success Report
The State of Small Business Cash Flow
Small Business in the Age of AI
Get financially Fit: Tips for Using QuickBooks
SEO, Social, and More: Digital Marketing for your Business
Why Building Your Brand is Key to Getting Customers
Get Found Fast: Google AdWords Strategies for Growth
Giving Clients What They Want
What Accounting Will Look Like in 2030
Pricing in the Digital Age
Handbook: Power Panel on Apps you need to give you more time to serve your cl...
Handbook: Advanced QuickBooks Online - Handling Tricky Transactions
Advanced QuickBooks Online - Handling Tricky Transactions
Handling tricky transactions in QuickBooks Online
Social media is social business
Conversation guide: Forming deep relationships with your clients
Making tax digital
Giving clients what they want
100 percent cloud your action plan for success
Attracting and retaining top talent

Recently uploaded (20)

PDF
Session 11 - Data Visualization Storytelling (2).pdf
PPTX
CYBER SECURITY the Next Warefare Tactics
PPTX
Caseware_IDEA_Detailed_Presentation.pptx
PDF
OneRead_20250728_1808.pdfhdhddhshahwhwwjjaaja
PPTX
1 hour to get there before the game is done so you don’t need a car seat for ...
PPTX
IMPACT OF LANDSLIDE.....................
PPT
statistics analysis - topic 3 - describing data visually
PDF
©️ 02_SKU Automatic SW Robotics for Microsoft PC.pdf
PDF
Systems Analysis and Design, 12th Edition by Scott Tilley Test Bank.pdf
PPTX
chrmotography.pptx food anaylysis techni
PPTX
New ISO 27001_2022 standard and the changes
PDF
Votre score augmente si vous choisissez une catégorie et que vous rédigez une...
PPT
DU, AIS, Big Data and Data Analytics.ppt
PPTX
statsppt this is statistics ppt for giving knowledge about this topic
PPT
expt-design-lecture-12 hghhgfggjhjd (1).ppt
PDF
©️ 01_Algorithm for Microsoft New Product Launch - handling web site - by Ale...
PPTX
AI AND ML PROPOSAL PRESENTATION MUST.pptx
PPTX
retention in jsjsksksksnbsndjddjdnFPD.pptx
PPTX
Crypto_Trading_Beginners.pptxxxxxxxxxxxxxx
PDF
Best Data Science Professional Certificates in the USA | IABAC
Session 11 - Data Visualization Storytelling (2).pdf
CYBER SECURITY the Next Warefare Tactics
Caseware_IDEA_Detailed_Presentation.pptx
OneRead_20250728_1808.pdfhdhddhshahwhwwjjaaja
1 hour to get there before the game is done so you don’t need a car seat for ...
IMPACT OF LANDSLIDE.....................
statistics analysis - topic 3 - describing data visually
©️ 02_SKU Automatic SW Robotics for Microsoft PC.pdf
Systems Analysis and Design, 12th Edition by Scott Tilley Test Bank.pdf
chrmotography.pptx food anaylysis techni
New ISO 27001_2022 standard and the changes
Votre score augmente si vous choisissez une catégorie et que vous rédigez une...
DU, AIS, Big Data and Data Analytics.ppt
statsppt this is statistics ppt for giving knowledge about this topic
expt-design-lecture-12 hghhgfggjhjd (1).ppt
©️ 01_Algorithm for Microsoft New Product Launch - handling web site - by Ale...
AI AND ML PROPOSAL PRESENTATION MUST.pptx
retention in jsjsksksksnbsndjddjdnFPD.pptx
Crypto_Trading_Beginners.pptxxxxxxxxxxxxxx
Best Data Science Professional Certificates in the USA | IABAC

In Cloud We Encrypt #GHC15

  • 1. 2015 In Cloud We Encrypt Vivian Gerritsen Intuit Oct 16, 2015 #GHC15 2015
  • 2. 2015 About Me  Graduate of the Ohio State University (MSEE)  Practice broad set of computer technologies from hardware, system-level software, applications to UI  Focus on security and compliance software for the past 5 years  I’m a security ninja who protects against all possible attacks in cyber space
  • 3. 2015 The Need for Encryption Security breaches almost daily!  It’s industry trend to encrypt all sensitive data in the cloud.  Many cloud providers offer encryption solutions.
  • 4. 2015 What is Encryption? Engine Input Data SSN 123-45-6789 Output Data “Cipher Text” QSBwZX24ncyBhI HBlcnNvbiwgbm8g bWF0JzbdGVyIGh vdyBzbWFsbC4= Three major components to any encryption system: 1. Data 2. Encryption engine 3. Key management Encryption Key
  • 5. 2015 What Users Should Know Users should ask two data encryption questions:  Who has the key?  Is my data protected end-to-end?
  • 6. 2015 Encryption in the Cloud User-Oriented Storage Example: File sharing Best Practices:  You own the key, not cloud administrator  Choose a vendor that only you have the entire control of the key access
  • 7. 2015 Encryption in the Cloud SaaS-PaaS-IaaS Intuit example:  SaaS services use a platform with key management APIs to encrypt application data.  The platform uses an Intuit-certified service to store encryption keys.  Amazon AWS is used as building blocks and infrastructure.
  • 8. 2015 Encryption in the Cloud Three-Tiered, End-to-End Web Server Database, File System, Big Data Key Manager Applications Application Server Three-tiered SaaS application – encryption in transit and at rest
  • 9. 2015 SaaS Encryption  Client-side encryption − Encrypts data before sending it to servers • Protect highly sensitive information • You own the key  Server-side encryption − Protects data at rest. Options: • Trust the provider • Use customer-provided keys • Or separate out key management
  • 10. 2015 SaaS Encryption (cont’d)  Cloud encryption gateway − Act as proxy to encrypt or tokenize sensitive SaaS data • Between corporate network and cloud • Single point of security configuration • Encrypt with enterprise controlled keys
  • 11. 2015 PaaS Encryption  Database encryption − Transparent database encryption • Whole database or finer-grained (e.g., column, tablespace) • Keys managed by database • Authorized users such as admin may see data − Alternative: • Encrypt data fields in the application (SaaS) • Volume encryption (IaaS)
  • 12. 2015 IaaS Encryption  Volume encryption − Protect the storage systems of running instances − Build encryption into your instance • Keys in instance – only protects you from anyone without the right access − Separate key from encryption engine • Returns the key when a set of policy-based criteria are met
  • 13. 2015 laaS Encryption (cont’d)  Object storage − Transparent data encryption – protects object(s), bucket(s) via server-side encryption − Client-side encryption – encrypts the objects before sending up Rest API Application
  • 14. 2015 Encryption in Transit: Mechanisms  SSL − Used mostly by HTTPS to secure browser session  IPSec − Host-to-host, network-to-network transport − Network tunneling - VPN
  • 16. 2015 Data Residency International data safety Does your vendor’s vendor protect your data the same way you do?  Data sovereignty: government in other country may look into your data  Data residency: key needs to stay in US
  • 17. 2015 Conclusions  Always try to manage your keys, and guard them like they were … your keys − Enforce strong policy (least privileged) − Enable key rotation − Be aware of jurisdiction!  Devise your security architecture holistically, not just looking at point solutions − Classify your data and apply proper encryption − Encrypt end-to-end in transit and at rest
  • 18. 2015 Got Feedback? Rate and review the session on our mobile app Download at http://ddut.ch/ghc15 or search GHC 2015 in the app store