SlideShare a Scribd company logo
Field Encryption
An overview & demo
Cherwell Rocky Mountain Users Group
• Chris’ Excellent training course on Video Learning Library
• https://www.cherwell.com/video-learning-library/course/enabling-
field-level-encryption-2/
• Also a great 3-minute video on Encryption in VLL by Jessica Adams
• Also Useful links on Community Site
• https://www.cherwell.com/community/f/administration/4572/how-to-encrypt-
a-field-in-Cherwell
• Links to documentation on Encrypted Fields:
• https://www.cherwellsupport.com/WebHelp/en/9.1/content/suite_features/business_objects/fields.html
First, a shout-out to Chris Wiggins @ Cherwell
2
A. Secure fields on Major Objects through AES 256 Encryption
• “Data at Rest” encryption
B. Field values can only be seen in decrypted form by authorized users in
Cherwell Client User Interface
• Everywhere else field value is either encrypted or not even visible
C. Field values are encrypted/decrypted by the Application Server
• Keys are stored securely on application server
D. Cherwell maintains an audit trail of any activity related to
encrypting/decrypting field values
In a Nutshell
3
• Creating the “Key”
• Check prerequisites of object
• Create Encrypted Fields
• Add to form
• Set up security
• Test/Use!
• API view (time allowing)
DEMO
4
Also:
• Can’t encrypt
attachments
• Can’t use encrypted
fields on portal, reports,
widgets
Limitations & Constraints
5
• Two forms of “Audit trail” for encrypted fields
• Via Journals (“View Level Auditing”)
• Via Splunk (“Compliance Level Auditing”)
• Field Encryption  Compliance
• But often plays an important and necessary role
Auditing and Impact on Compliance
6
• Create separate keys for separate set/types of encrypted fields
• (e.g. Customer PII vs. Financial Info)
• Important if different groups of people/users need access separate sets of encrypted (separation of roles)
• Cherwell suggests One key per BO
• Need CSM Admin and Access to Server Manager to set up
• SaaS - Contact Cherwell Support to get set up
• Optional: Set up key for "Compliance Level Auditing“ (via Splunk)
• Export Keys and Back them up (offline and in safe storage)
• Separate Keys from CZAR files/backups
• Password to encryption Keys - DOES NOT CONFIRM - So test it out
• Lose the Keys - YOU LOSE THE ABILITY TO DECRYPT!
• SEPARATE SETS OF KEYS FOR DEV, TEST, and PROD Environments! (But this also means…)
• Install Keys on Application Servers (if running multiple)
Suggested practices for setting up Encryption Keys
7
Identify Business Object and Fields you want to encrypt
• Recommended to Encrypt New Fields Only
Understand the tradeoffs and constraints of encrypting
Make sure it's a Major Business Object
Business Object is using Journals (has relationship)
Make sure Field Tracking is Turned on for the Business Object
• History properties are enabled for all Views
Plan out Security Group settings for each BO and field
Abbreviated Checklist before encrypting field(s)
8
• Masking of field on screen/page is visual only
• Invokes decryption; encryption only takes place on object save
• Support for Multilingual configurations
• Use of Windows DPAPI under the covers
• Seems to use DataProtectionScope.LocalMachine
• Not the same as “password storage”
• Can be used in conjunction with file system (BitLocker) or DB
level encryption (SQL Server TDE)
Other tidbits
9T4S Proprietary & Confidential
Thanks!
Rick Munoz
rick@T4SPartners.com
@Munozrick

More Related Content

PDF
Stopping the Hassle of SSH keys by using SSH certificates - Community Summit ...
PDF
SQL Server 2017 CLR
KEY
SQL Server: Security
PDF
SQL Server 2017 CLR
PDF
Streamline CI/CD with Just-in-Time Access
PPTX
How Container Schedulers and Software-based Storage will Change the Cloud
PPTX
SQL Server 2012 Security Task
PPTX
Pricing and Revenue Projection in a Cloud-Centric World
Stopping the Hassle of SSH keys by using SSH certificates - Community Summit ...
SQL Server 2017 CLR
SQL Server: Security
SQL Server 2017 CLR
Streamline CI/CD with Just-in-Time Access
How Container Schedulers and Software-based Storage will Change the Cloud
SQL Server 2012 Security Task
Pricing and Revenue Projection in a Cloud-Centric World

What's hot (20)

PPTX
IIS for Developers
PDF
Hardening Apache Web Server by Aswin
PPTX
BizTalk Server 2013 in Windows Azure IaaS
PPTX
Password Policies in Oracle Access Manager. How to improve user authenticatio...
PPT
IIS-Settings
PPTX
Zero credential development with managed identities
PPTX
Security for devs
PDF
Alfresco DevCon 2019: Encryption at-rest and in-transit
PPT
IIS 7: The Administrator’s Guide
PPT
INTRODUCTION TO IIS
PPTX
So, you wanna build a SSO
PPTX
Class Project: Security in Microsoft Azure
PPTX
SSO 5.1 start-up issues
PPTX
SSL deep dive vCenter Server 5.5
PPTX
(Re)Indexing Large Repositories in Alfresco
PPT
Understanding IIS
PPTX
SANS @Night Talk: SQL Injection Exploited
PDF
How to extend WSO2 Carbon for your middleware needs
PPTX
Toronto MuleSoft Meetup: Virtual Meetup #3
PDF
Security in practice with Java EE 6 and GlassFish
IIS for Developers
Hardening Apache Web Server by Aswin
BizTalk Server 2013 in Windows Azure IaaS
Password Policies in Oracle Access Manager. How to improve user authenticatio...
IIS-Settings
Zero credential development with managed identities
Security for devs
Alfresco DevCon 2019: Encryption at-rest and in-transit
IIS 7: The Administrator’s Guide
INTRODUCTION TO IIS
So, you wanna build a SSO
Class Project: Security in Microsoft Azure
SSO 5.1 start-up issues
SSL deep dive vCenter Server 5.5
(Re)Indexing Large Repositories in Alfresco
Understanding IIS
SANS @Night Talk: SQL Injection Exploited
How to extend WSO2 Carbon for your middleware needs
Toronto MuleSoft Meetup: Virtual Meetup #3
Security in practice with Java EE 6 and GlassFish
Ad

Similar to Overview of Field encryption in Cherwell 9.1 (20)

PPTX
Protecting Your Data with Encryption
PPTX
Streamlining Data Encryption While Maintaining IBM i Availability
PPTX
Why Disk Level Encryption is Not Enough for Your IBM i
PPTX
Optimizing Protected Indexes
PPTX
Encryption in the enterprise
PDF
Encryption: Who, What, When, Where, and Why It's Not a Panacea
PDF
SQL Server Column Based Encryption
PDF
SafeNet DataSecure vs. Native SQL Server Encryption
PPT
Formal Lecture.ppt
PDF
Programming
PDF
Security 101: Protecting Data with Encryption, Tokenization & Anonymization
PPTX
WBN_Securing Your IBM i_E_250300003.pptx
PDF
Protect your Private Data in your Hadoop Clusters with ORC Column Encryption
PDF
Protect your Private Data in your Hadoop Clusters with ORC Column Encryption
PPTX
501 ch 10 cryptography
PPTX
Fine Grain Access Control for Big Data: ORC Column Encryption
PPTX
Protecting Your SharePoint Content Databases using SQL Transparent Data Encry...
ODP
Encryption Techniques
PPTX
Transparent Data Encryption for SharePoint Content Databases
PDF
Elastic Kafka Meetup Singapore_Privacy Protected Data Management.pdf
Protecting Your Data with Encryption
Streamlining Data Encryption While Maintaining IBM i Availability
Why Disk Level Encryption is Not Enough for Your IBM i
Optimizing Protected Indexes
Encryption in the enterprise
Encryption: Who, What, When, Where, and Why It's Not a Panacea
SQL Server Column Based Encryption
SafeNet DataSecure vs. Native SQL Server Encryption
Formal Lecture.ppt
Programming
Security 101: Protecting Data with Encryption, Tokenization & Anonymization
WBN_Securing Your IBM i_E_250300003.pptx
Protect your Private Data in your Hadoop Clusters with ORC Column Encryption
Protect your Private Data in your Hadoop Clusters with ORC Column Encryption
501 ch 10 cryptography
Fine Grain Access Control for Big Data: ORC Column Encryption
Protecting Your SharePoint Content Databases using SQL Transparent Data Encry...
Encryption Techniques
Transparent Data Encryption for SharePoint Content Databases
Elastic Kafka Meetup Singapore_Privacy Protected Data Management.pdf
Ad

Recently uploaded (20)

PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Cloud computing and distributed systems.
PPTX
Big Data Technologies - Introduction.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
sap open course for s4hana steps from ECC to s4
20250228 LYD VKU AI Blended-Learning.pptx
Spectroscopy.pptx food analysis technology
Cloud computing and distributed systems.
Big Data Technologies - Introduction.pptx
Encapsulation_ Review paper, used for researhc scholars
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Empathic Computing: Creating Shared Understanding
Building Integrated photovoltaic BIPV_UPV.pdf
Approach and Philosophy of On baking technology
Review of recent advances in non-invasive hemoglobin estimation
Advanced methodologies resolving dimensionality complications for autism neur...
“AI and Expert System Decision Support & Business Intelligence Systems”
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Chapter 3 Spatial Domain Image Processing.pdf
MYSQL Presentation for SQL database connectivity
The Rise and Fall of 3GPP – Time for a Sabbatical?
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Unlocking AI with Model Context Protocol (MCP)
sap open course for s4hana steps from ECC to s4

Overview of Field encryption in Cherwell 9.1

  • 1. Field Encryption An overview & demo Cherwell Rocky Mountain Users Group
  • 2. • Chris’ Excellent training course on Video Learning Library • https://www.cherwell.com/video-learning-library/course/enabling- field-level-encryption-2/ • Also a great 3-minute video on Encryption in VLL by Jessica Adams • Also Useful links on Community Site • https://www.cherwell.com/community/f/administration/4572/how-to-encrypt- a-field-in-Cherwell • Links to documentation on Encrypted Fields: • https://www.cherwellsupport.com/WebHelp/en/9.1/content/suite_features/business_objects/fields.html First, a shout-out to Chris Wiggins @ Cherwell 2
  • 3. A. Secure fields on Major Objects through AES 256 Encryption • “Data at Rest” encryption B. Field values can only be seen in decrypted form by authorized users in Cherwell Client User Interface • Everywhere else field value is either encrypted or not even visible C. Field values are encrypted/decrypted by the Application Server • Keys are stored securely on application server D. Cherwell maintains an audit trail of any activity related to encrypting/decrypting field values In a Nutshell 3
  • 4. • Creating the “Key” • Check prerequisites of object • Create Encrypted Fields • Add to form • Set up security • Test/Use! • API view (time allowing) DEMO 4
  • 5. Also: • Can’t encrypt attachments • Can’t use encrypted fields on portal, reports, widgets Limitations & Constraints 5
  • 6. • Two forms of “Audit trail” for encrypted fields • Via Journals (“View Level Auditing”) • Via Splunk (“Compliance Level Auditing”) • Field Encryption  Compliance • But often plays an important and necessary role Auditing and Impact on Compliance 6
  • 7. • Create separate keys for separate set/types of encrypted fields • (e.g. Customer PII vs. Financial Info) • Important if different groups of people/users need access separate sets of encrypted (separation of roles) • Cherwell suggests One key per BO • Need CSM Admin and Access to Server Manager to set up • SaaS - Contact Cherwell Support to get set up • Optional: Set up key for "Compliance Level Auditing“ (via Splunk) • Export Keys and Back them up (offline and in safe storage) • Separate Keys from CZAR files/backups • Password to encryption Keys - DOES NOT CONFIRM - So test it out • Lose the Keys - YOU LOSE THE ABILITY TO DECRYPT! • SEPARATE SETS OF KEYS FOR DEV, TEST, and PROD Environments! (But this also means…) • Install Keys on Application Servers (if running multiple) Suggested practices for setting up Encryption Keys 7
  • 8. Identify Business Object and Fields you want to encrypt • Recommended to Encrypt New Fields Only Understand the tradeoffs and constraints of encrypting Make sure it's a Major Business Object Business Object is using Journals (has relationship) Make sure Field Tracking is Turned on for the Business Object • History properties are enabled for all Views Plan out Security Group settings for each BO and field Abbreviated Checklist before encrypting field(s) 8
  • 9. • Masking of field on screen/page is visual only • Invokes decryption; encryption only takes place on object save • Support for Multilingual configurations • Use of Windows DPAPI under the covers • Seems to use DataProtectionScope.LocalMachine • Not the same as “password storage” • Can be used in conjunction with file system (BitLocker) or DB level encryption (SQL Server TDE) Other tidbits 9T4S Proprietary & Confidential