SlideShare a Scribd company logo
Practical Advice for Cloud Data Protection 
Ulf Mattsson 
CTO, Protegrity 
Ulf.Mattsson@protegrity.com
Ulf Mattsson, Protegrity CTO 
Cloud Security Alliance (CSA) 
PCI Security Standards Council 
• Cloud & Virtualization SIGs 
• Encryption Task Force 
• Tokenization Task Force 
ANSI X9 
• American National Standard for Financial Services 
IFIP WG 11.3 Data and Application Security 
• International Federation for Information Processing 
ISACA (Information Systems Audit and Control Association) 
ISSA (Information Systems Security Association) 
2
Security - We Are Losing Ground 
“It’s clear the bad guys 
are winning at a faster 
rate than the good guys 
3 
are winning, and we’ve 
got to solve that.” 
- 2014 Verizon Data Breach Investigations Report 
Source: searchsecurity.techtarget.com/news/2240215422/In-2014-DBIR-preview-Verizon-says-data-breach-response-gap-widening
Security - We Are Losing Ground – Cloud is Next 
“…Even though security 
is improving, things are 
getting worse faster, so 
4 
we're losing ground 
even as we improve.” 
- Security expert Bruce Schneier 
Source: http://www.businessinsider.com/bruce-schneier-apple-google-smartphone-security-2012-11
Key Topics 
What are the Concerns with Cloud? 
What is the Guidance for Cloud Data Security? 
What New Data Security Technologies are 
Available for Cloud? 
How can Cloud Data Security work in Context to 
the Enterprise? 
What are the Common Use Cases? 
How can Search and Indexing be Performed? 
5
What are the 
Concerns 
with Cloud? 
6
What Is Your No. 1 Issue Slowing 
Adoption of Public Cloud Computing? 
7
Sensitive Data in the Cloud 
8 
Of organizations currently (or plan to) transfer 
sensitive/confidential data to the cloud in the next 
24 mo.
Lack of Cloud Confidence 
9 
Number of survey respondents that either agree or are unsure 
that the cloud services used by their organization are 
NOT thoroughly vetted for security.
Stopped or Slowed Adoption 
Source: The State of Cloud Security 
10 
Blue: Most recent data
Data Loss & Insecure Interfaces 
Number of Cloud Vulnerability Incidents by Threat Category 
11
What is Cloud Computing? 
Computing as a Service: 
• Software as a Service (SaaS) 
• Platform as a Service (PaaS) 
• Infrastructure as a Service (IaaS) 
Delivered Internally or Externally to the Enterprise: 
• Public 
• Private 
• Community 
• Hybrid 
12
Public Cloud 
13
Public Cloud 
14
Private Cloud 
Outsourced 
Private Cloud 
15 
On-site 
Private Cloud
On-site Community Cloud 
16
Outsourced Community Cloud 
17
Hybrid Cloud 
18
Software as a Service (SaaS) 
Typically web accessed internet-based 
applications (“on-demand software”) 
Platform as a Service (PaaS) 
An internet-based computing platform and 
solution stack. Facilitates deployment of 
Service Orchestration 
Applications 
Databases 
Storage 
19 
applications at much lower cost and 
complexity 
Infrastructure as a Service (IaaS) 
Delivers computer infrastructure (typically a 
virtualized environment) along with raw 
storage and networking built-in
The Conceptual Reference Model 
20
Governance, 
Risk Management 
and Compliance 
21
Trust vs. Elasticity 
Corporate 
Network 
Trust 
Private Cloud 
022 
Elasticity 
Public Cloud
Public Cloud – No Control 
23 
Consumers have no control over security once data is inside the public 
cloud. Completely reliant on provider for application and storage security.
Private Cloud – Limited Control 
Outsourced 
Private Cloud 
Consumer has 
limited capability to 
manage security 
within outsourced 
24 
On-site 
Private Cloud 
IaaS private cloud.
Threat Vector Inheritance 
25
Virtualization Concerns in Cloud 
Virtual machine guest hardening 
Hypervisor security 
Inter-VM attacks and blind spots 
Performance concerns 
Operational complexity from VM sprawl 
Instant-on gaps 
Virtual machine encryption 
Data comingling 
Virtual machine data destruction 
Virtual machine image tampering 
In-motion virtual machines 
26
27
Mapping the Cloud Model to 
Security Control & Compliance 
AAAApppppppplllliiiiccccaaaattttiiiioooonnnnssss 
DDDDaaaattttaaaa 
28
Governance, Risk Management and 
Compliance 
29
Data 
Protection 
Solutions 
30
Cloud Gateways Provide Enterprise Control 
Cloud Encryption Gateways 
• SaaS encryption 
Cloud Security Gateways 
• Policy enforcement 
Cloud Access Security Brokers (CASBs) 
Cloud Services Brokerage (CSB) 
Secure Email Gateways 
Secure Web gateway 
31
Public Cloud Gateway – SaaS Example 
Cloud 
032 
Gateway
Security Gateway Deployment – Application Example 
Corporate Network 
Backend 
System 
Cloud 
Gateway 
External 
Service 
033 
Enterprise 
Security 
Administrator 
Security Officer
Example of Cloud Security Gateway Features 
High-Performance Gateway Architecture 
Enterprise-extensible platform 
Tokenization and encryption 
Enterprise-grade key management 
Flexible policy controls 
• File or Field Security 
• Advanced function & usability preservation 
Comprehensive activity monitoring & reporting 
Support for internal, remote & mobile users 
Multiple deployment options 
34
Security Gateway Deployment – Database Example 
Corporate Network 
Backend 
System 
Cloud 
Gateway 
RDBMS 
035 
Enterprise 
Security 
Administrator 
Security Officer
Security Gateway Deployment – Indexing 
Corporate Network 
Backend 
System 
Cloud 
Gateway 
RDBMS 
Query 
re-write 
036 
Enterprise 
Security 
Administrator 
Security Officer 
Index 
Index
Security Gateway Deployment – Search 
Corporate Network 
Backend 
System 
Cloud 
Gateway 
RDBMS 
Query 
re-write 
037 
Enterprise 
Security 
Administrator 
Security Officer 
Order preserving 
encryption
Where is Encryption Applied 
to Protect Data in Cloud? 
38
How Data-Centric Protection Increases 
Security in Cloud Computing and Virtualization 
Rather than making the protection platform based, 
the security is applied directly to the data, 
protecting it wherever it goes, in any environment 
Cloud environments by nature have more access 
points and cannot be disconnected – data-centric 
protection reduces the reliance on controlling the 
high number of access points 
39
Encryption Guidance from CSA 
Encrypting the transfer of data to the cloud does not 
ensure the data is protected in the cloud 
Once data arrives in the cloud, it should remain protected 
both at rest and in use 
Do not forget to protect files that are often overlooked, but 
which frequently include sensitive information 
• Log files and metadata can be avenues for data leakage 
Encrypt using sufficiently durable encryption strengths 
(such as AES-256) 
Use open, validated formats and avoid proprietary 
encryption formats wherever possible 
40
CSA: Look at Alternatives to Encryption 
Data Anonymization and De-identification 
• This is where (for example) Personally Identifiable 
Information (PII) and Sensitive are stripped before 
processing. 
Utilizing access controls built into the database 
41
De-identification / Anonymization 
Field Real Data Tokenized / Pseudonymized 
Name Joe Smith csu wusoj 
Address 100 Main Street, Pleasantville, CA 476 srta coetse, cysieondusbak, CA 
Date of Birth 12/25/1966 01/02/1966 
Telephone 760-278-3389 760-389-2289 
E-Mail Address joe.smith@surferdude.org eoe.nwuer@beusorpdqo.org 
SSN 076-39-2778 076-28-3390 
CC Number 3678 2289 3907 3378 3846 2290 3371 3378 
Business URL www.surferdude.com www.sheyinctao.com 
Fingerprint Encrypted 
Photo Encrypted 
X-Ray Encrypted 
Healthcare / 
Financial 
Services 
Dr. visits, prescriptions, hospital stays 
and discharges, clinical, billing, etc. 
Financial Services Consumer Products 
and activities 
Protection methods can be equally 
applied to the actual data, but not 
needed with de-identification 
42
Data Tokenization 
De-identification / Pseudonomization / 
Anonymization 
Replaces real data with fake data – “Tokens” 
Data is protected before it goes to the cloud 
Benefits: 
• Eliminates data residency issues 
• Data remains usable in applications without modification 
• Vaultless tokenization 
• No data replication/collision issues, 
• High scalability 
43
Significantly Different Tokenization Approaches 
Vault-based Vaultless 
Property Dynamic Pre-generated 
44
Risk Adjusted Protection 
Data Protection Methods Scalability Storage Security Transparency 
System without data protection 
Weak Encryption (1:1 mapping) 
Searchable Gateway Index (IV) 
Vault-less Tokenization 
Vault-based Tokenization 
Partial Encryption 
Data Type Preservation Encryption 
Strong Encryption (AES CBC, IV) 
Best Worst 
45
Use Case - Commercial Information and 
Business Insight Company 
The company received trade files from customers daily, containing sensitive Card Holder 
Data (CHD), making them subject to Payment Card Industry Data Security Standard (PCI DSS) 
regulations. 
46
Use Case - Increasing Pressure from 
International Data Protection Regulations
Enterprise Data Security Policy 
What is the sensitive data that needs to be protected. 
How you want to protect and present sensitive data. There are several methods 
for protecting sensitive data. Encryption, tokenization, monitoring, etc. 
Who should have access to sensitive data and who should not. Security access 
control. Roles & Users 
What 
How 
Who 
48 
When should sensitive data access be granted to those who have access. Day 
of week, time of day. 
Where is the sensitive data stored? This will be where the policy is enforced. 
Audit authorized or un-authorized access to sensitive data. 
When 
Where 
Audit
Centralized Policy Management - Example 
Application 
RDBMS 
MPP 
Audit 
Log 
Audit 
Log 
Audit 
Log 
Enterprise 
Security 
Administrator 
Policy 
Cloud 
Security Officer 
Audit 
Log 
Audit 
Log 
Audit 
Log 
49 
File Servers 
Big Data 
Gateway 
Servers 
HP NonStop 
Base24 
IBM Mainframe 
Protector 
Audit 
Log 
Audit 
Log Audit 
Log 
Audit 
Log 
Protection 
Servers 
Audit 
Log 
Audit 
Log
Summary 
What are the Concerns with Cloud? 
How is Cloud Computing Defined? 
What is the Guidance for Cloud Data Security? 
What New Data Security Technologies are Available for 
Cloud? 
50 
How can Cloud Data Security work in Context to the 
Enterprise?
Thank you! 
Questions? 
Please contact us for more information 
www.protegrity.com 
Ulf.Mattsson@protegrity.com

More Related Content

PDF
Practical advice for cloud data protection ulf mattsson - bright talk webin...
PDF
Cloud data governance, risk management and compliance ny metro joint cyber...
PDF
Cloud Computing
PDF
Data centric security key to digital business success - ulf mattsson - bright...
PDF
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
PDF
ISSA: Cloud data security
PDF
Security and Audit for Big Data
PPTX
Cloud security - Auditing and Compliance
Practical advice for cloud data protection ulf mattsson - bright talk webin...
Cloud data governance, risk management and compliance ny metro joint cyber...
Cloud Computing
Data centric security key to digital business success - ulf mattsson - bright...
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
ISSA: Cloud data security
Security and Audit for Big Data
Cloud security - Auditing and Compliance

What's hot (20)

PPTX
Data Driven Security in SSAS
PDF
br-security-connected-top-5-trends
PDF
ISACA Houston Texas Chapter 2010
PDF
How the latest trends in data security can help your data protection strategy...
PPTX
Data Loss Prevention
PDF
Where data security and value of data meet in the cloud ulf mattsson
DOCX
Office 365 data loss prevention
PPTX
Symantec Data Loss Prevention 9
PDF
Data loss prevention by using MRSH-v2 algorithm
PDF
DLP Executive Overview
PPT
PPTX
Securing data today and in the future - Oracle NYC
PDF
The past, present, and future of big data security
PPTX
Global Azure Bootcamp 216 - Azure Rights Management
PDF
Data leakage prevention EN Final
PPTX
Technology Overview - Symantec Data Loss Prevention (DLP)
PPTX
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
PPTX
Big Data and Security - Where are we now? (2015)
PDF
Cyber security basics for law firms
PPTX
Practical Security for the Cloud
Data Driven Security in SSAS
br-security-connected-top-5-trends
ISACA Houston Texas Chapter 2010
How the latest trends in data security can help your data protection strategy...
Data Loss Prevention
Where data security and value of data meet in the cloud ulf mattsson
Office 365 data loss prevention
Symantec Data Loss Prevention 9
Data loss prevention by using MRSH-v2 algorithm
DLP Executive Overview
Securing data today and in the future - Oracle NYC
The past, present, and future of big data security
Global Azure Bootcamp 216 - Azure Rights Management
Data leakage prevention EN Final
Technology Overview - Symantec Data Loss Prevention (DLP)
CSA Atlanta and Metro Atlanta ISSA Chapter Meeting May 2014 - Key Threats to ...
Big Data and Security - Where are we now? (2015)
Cyber security basics for law firms
Practical Security for the Cloud
Ad

Similar to Practical advice for cloud data protection ulf mattsson - oracle nyoug sep 2014 (20)

PDF
Where data security and value of data meet in the cloud brighttalk webinar ...
PPTX
Practical advice for cloud data protection ulf mattsson - jun 2014
PDF
Where Data Security and Value of Data Meet in the Cloud
PPTX
The day when 3rd party security providers disappear into cloud bright talk se...
PPTX
Cloud Security By Dr. Anton Ravindran
PPTX
Infragard atlanta ulf mattsson - cloud security - regulations and data prot...
PDF
Lecture27 cc-security2
PPT
28_Security-Privacy-inxssudusd_Cloud.ppt
PPT
28_Security-Privacy-in_Cloud_AND_real.ppt
PDF
Isaca new delhi india - privacy and big data
PDF
Isaca new delhi india privacy and big data
PDF
Cross border - off-shoring and outsourcing privacy sensitive data
PPTX
Governance and Security in Cloud and Mobile Apps
PPTX
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
PPTX
Lss implementing cyber security in the cloud, and from the cloud-feb14
PDF
Aes based secured framework for cloud databases
PPTX
Security in the cloud Workshop HSTC 2014
PPTX
talk6securingcloudamarprusty-191030091632.pptx
PDF
Whitepaper: Security of the Cloud
PDF
Security of the Cloud
Where data security and value of data meet in the cloud brighttalk webinar ...
Practical advice for cloud data protection ulf mattsson - jun 2014
Where Data Security and Value of Data Meet in the Cloud
The day when 3rd party security providers disappear into cloud bright talk se...
Cloud Security By Dr. Anton Ravindran
Infragard atlanta ulf mattsson - cloud security - regulations and data prot...
Lecture27 cc-security2
28_Security-Privacy-inxssudusd_Cloud.ppt
28_Security-Privacy-in_Cloud_AND_real.ppt
Isaca new delhi india - privacy and big data
Isaca new delhi india privacy and big data
Cross border - off-shoring and outsourcing privacy sensitive data
Governance and Security in Cloud and Mobile Apps
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Lss implementing cyber security in the cloud, and from the cloud-feb14
Aes based secured framework for cloud databases
Security in the cloud Workshop HSTC 2014
talk6securingcloudamarprusty-191030091632.pptx
Whitepaper: Security of the Cloud
Security of the Cloud
Ad

More from Ulf Mattsson (20)

PPTX
Jun 29 new privacy technologies for unicode and international data standards ...
PPTX
Jun 15 privacy in the cloud at financial institutions at the object managemen...
PPTX
PPTX
May 6 evolving international privacy regulations and cross border data tran...
PPTX
Qubit conference-new-york-2021
PDF
Secure analytics and machine learning in cloud use cases
PPTX
Evolving international privacy regulations and cross border data transfer - g...
PDF
Data encryption and tokenization for international unicode
PPTX
The future of data security and blockchain
PPTX
New technologies for data protection
PPTX
GDPR and evolving international privacy regulations
PPTX
Privacy preserving computing and secure multi-party computation ISACA Atlanta
PPTX
Safeguarding customer and financial data in analytics and machine learning
PPTX
Protecting data privacy in analytics and machine learning ISACA London UK
PPTX
New opportunities and business risks with evolving privacy regulations
PPTX
What is tokenization in blockchain - BCS London
PPTX
Protecting data privacy in analytics and machine learning - ISACA
PPTX
What is tokenization in blockchain?
PPTX
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
PPTX
Unlock the potential of data security 2020
Jun 29 new privacy technologies for unicode and international data standards ...
Jun 15 privacy in the cloud at financial institutions at the object managemen...
May 6 evolving international privacy regulations and cross border data tran...
Qubit conference-new-york-2021
Secure analytics and machine learning in cloud use cases
Evolving international privacy regulations and cross border data transfer - g...
Data encryption and tokenization for international unicode
The future of data security and blockchain
New technologies for data protection
GDPR and evolving international privacy regulations
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Safeguarding customer and financial data in analytics and machine learning
Protecting data privacy in analytics and machine learning ISACA London UK
New opportunities and business risks with evolving privacy regulations
What is tokenization in blockchain - BCS London
Protecting data privacy in analytics and machine learning - ISACA
What is tokenization in blockchain?
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
Unlock the potential of data security 2020

Recently uploaded (20)

PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Empathic Computing: Creating Shared Understanding
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Cloud computing and distributed systems.
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
NewMind AI Weekly Chronicles - August'25 Week I
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
KodekX | Application Modernization Development
Spectral efficient network and resource selection model in 5G networks
Unlocking AI with Model Context Protocol (MCP)
Empathic Computing: Creating Shared Understanding
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Mobile App Security Testing_ A Comprehensive Guide.pdf
MYSQL Presentation for SQL database connectivity
Machine learning based COVID-19 study performance prediction
Cloud computing and distributed systems.
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
NewMind AI Monthly Chronicles - July 2025
NewMind AI Weekly Chronicles - August'25 Week I
The AUB Centre for AI in Media Proposal.docx
Encapsulation_ Review paper, used for researhc scholars
Dropbox Q2 2025 Financial Results & Investor Presentation
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
CIFDAQ's Market Insight: SEC Turns Pro Crypto
KodekX | Application Modernization Development

Practical advice for cloud data protection ulf mattsson - oracle nyoug sep 2014

  • 1. Practical Advice for Cloud Data Protection Ulf Mattsson CTO, Protegrity Ulf.Mattsson@protegrity.com
  • 2. Ulf Mattsson, Protegrity CTO Cloud Security Alliance (CSA) PCI Security Standards Council • Cloud & Virtualization SIGs • Encryption Task Force • Tokenization Task Force ANSI X9 • American National Standard for Financial Services IFIP WG 11.3 Data and Application Security • International Federation for Information Processing ISACA (Information Systems Audit and Control Association) ISSA (Information Systems Security Association) 2
  • 3. Security - We Are Losing Ground “It’s clear the bad guys are winning at a faster rate than the good guys 3 are winning, and we’ve got to solve that.” - 2014 Verizon Data Breach Investigations Report Source: searchsecurity.techtarget.com/news/2240215422/In-2014-DBIR-preview-Verizon-says-data-breach-response-gap-widening
  • 4. Security - We Are Losing Ground – Cloud is Next “…Even though security is improving, things are getting worse faster, so 4 we're losing ground even as we improve.” - Security expert Bruce Schneier Source: http://www.businessinsider.com/bruce-schneier-apple-google-smartphone-security-2012-11
  • 5. Key Topics What are the Concerns with Cloud? What is the Guidance for Cloud Data Security? What New Data Security Technologies are Available for Cloud? How can Cloud Data Security work in Context to the Enterprise? What are the Common Use Cases? How can Search and Indexing be Performed? 5
  • 6. What are the Concerns with Cloud? 6
  • 7. What Is Your No. 1 Issue Slowing Adoption of Public Cloud Computing? 7
  • 8. Sensitive Data in the Cloud 8 Of organizations currently (or plan to) transfer sensitive/confidential data to the cloud in the next 24 mo.
  • 9. Lack of Cloud Confidence 9 Number of survey respondents that either agree or are unsure that the cloud services used by their organization are NOT thoroughly vetted for security.
  • 10. Stopped or Slowed Adoption Source: The State of Cloud Security 10 Blue: Most recent data
  • 11. Data Loss & Insecure Interfaces Number of Cloud Vulnerability Incidents by Threat Category 11
  • 12. What is Cloud Computing? Computing as a Service: • Software as a Service (SaaS) • Platform as a Service (PaaS) • Infrastructure as a Service (IaaS) Delivered Internally or Externally to the Enterprise: • Public • Private • Community • Hybrid 12
  • 15. Private Cloud Outsourced Private Cloud 15 On-site Private Cloud
  • 19. Software as a Service (SaaS) Typically web accessed internet-based applications (“on-demand software”) Platform as a Service (PaaS) An internet-based computing platform and solution stack. Facilitates deployment of Service Orchestration Applications Databases Storage 19 applications at much lower cost and complexity Infrastructure as a Service (IaaS) Delivers computer infrastructure (typically a virtualized environment) along with raw storage and networking built-in
  • 21. Governance, Risk Management and Compliance 21
  • 22. Trust vs. Elasticity Corporate Network Trust Private Cloud 022 Elasticity Public Cloud
  • 23. Public Cloud – No Control 23 Consumers have no control over security once data is inside the public cloud. Completely reliant on provider for application and storage security.
  • 24. Private Cloud – Limited Control Outsourced Private Cloud Consumer has limited capability to manage security within outsourced 24 On-site Private Cloud IaaS private cloud.
  • 26. Virtualization Concerns in Cloud Virtual machine guest hardening Hypervisor security Inter-VM attacks and blind spots Performance concerns Operational complexity from VM sprawl Instant-on gaps Virtual machine encryption Data comingling Virtual machine data destruction Virtual machine image tampering In-motion virtual machines 26
  • 27. 27
  • 28. Mapping the Cloud Model to Security Control & Compliance AAAApppppppplllliiiiccccaaaattttiiiioooonnnnssss DDDDaaaattttaaaa 28
  • 29. Governance, Risk Management and Compliance 29
  • 31. Cloud Gateways Provide Enterprise Control Cloud Encryption Gateways • SaaS encryption Cloud Security Gateways • Policy enforcement Cloud Access Security Brokers (CASBs) Cloud Services Brokerage (CSB) Secure Email Gateways Secure Web gateway 31
  • 32. Public Cloud Gateway – SaaS Example Cloud 032 Gateway
  • 33. Security Gateway Deployment – Application Example Corporate Network Backend System Cloud Gateway External Service 033 Enterprise Security Administrator Security Officer
  • 34. Example of Cloud Security Gateway Features High-Performance Gateway Architecture Enterprise-extensible platform Tokenization and encryption Enterprise-grade key management Flexible policy controls • File or Field Security • Advanced function & usability preservation Comprehensive activity monitoring & reporting Support for internal, remote & mobile users Multiple deployment options 34
  • 35. Security Gateway Deployment – Database Example Corporate Network Backend System Cloud Gateway RDBMS 035 Enterprise Security Administrator Security Officer
  • 36. Security Gateway Deployment – Indexing Corporate Network Backend System Cloud Gateway RDBMS Query re-write 036 Enterprise Security Administrator Security Officer Index Index
  • 37. Security Gateway Deployment – Search Corporate Network Backend System Cloud Gateway RDBMS Query re-write 037 Enterprise Security Administrator Security Officer Order preserving encryption
  • 38. Where is Encryption Applied to Protect Data in Cloud? 38
  • 39. How Data-Centric Protection Increases Security in Cloud Computing and Virtualization Rather than making the protection platform based, the security is applied directly to the data, protecting it wherever it goes, in any environment Cloud environments by nature have more access points and cannot be disconnected – data-centric protection reduces the reliance on controlling the high number of access points 39
  • 40. Encryption Guidance from CSA Encrypting the transfer of data to the cloud does not ensure the data is protected in the cloud Once data arrives in the cloud, it should remain protected both at rest and in use Do not forget to protect files that are often overlooked, but which frequently include sensitive information • Log files and metadata can be avenues for data leakage Encrypt using sufficiently durable encryption strengths (such as AES-256) Use open, validated formats and avoid proprietary encryption formats wherever possible 40
  • 41. CSA: Look at Alternatives to Encryption Data Anonymization and De-identification • This is where (for example) Personally Identifiable Information (PII) and Sensitive are stripped before processing. Utilizing access controls built into the database 41
  • 42. De-identification / Anonymization Field Real Data Tokenized / Pseudonymized Name Joe Smith csu wusoj Address 100 Main Street, Pleasantville, CA 476 srta coetse, cysieondusbak, CA Date of Birth 12/25/1966 01/02/1966 Telephone 760-278-3389 760-389-2289 E-Mail Address joe.smith@surferdude.org eoe.nwuer@beusorpdqo.org SSN 076-39-2778 076-28-3390 CC Number 3678 2289 3907 3378 3846 2290 3371 3378 Business URL www.surferdude.com www.sheyinctao.com Fingerprint Encrypted Photo Encrypted X-Ray Encrypted Healthcare / Financial Services Dr. visits, prescriptions, hospital stays and discharges, clinical, billing, etc. Financial Services Consumer Products and activities Protection methods can be equally applied to the actual data, but not needed with de-identification 42
  • 43. Data Tokenization De-identification / Pseudonomization / Anonymization Replaces real data with fake data – “Tokens” Data is protected before it goes to the cloud Benefits: • Eliminates data residency issues • Data remains usable in applications without modification • Vaultless tokenization • No data replication/collision issues, • High scalability 43
  • 44. Significantly Different Tokenization Approaches Vault-based Vaultless Property Dynamic Pre-generated 44
  • 45. Risk Adjusted Protection Data Protection Methods Scalability Storage Security Transparency System without data protection Weak Encryption (1:1 mapping) Searchable Gateway Index (IV) Vault-less Tokenization Vault-based Tokenization Partial Encryption Data Type Preservation Encryption Strong Encryption (AES CBC, IV) Best Worst 45
  • 46. Use Case - Commercial Information and Business Insight Company The company received trade files from customers daily, containing sensitive Card Holder Data (CHD), making them subject to Payment Card Industry Data Security Standard (PCI DSS) regulations. 46
  • 47. Use Case - Increasing Pressure from International Data Protection Regulations
  • 48. Enterprise Data Security Policy What is the sensitive data that needs to be protected. How you want to protect and present sensitive data. There are several methods for protecting sensitive data. Encryption, tokenization, monitoring, etc. Who should have access to sensitive data and who should not. Security access control. Roles & Users What How Who 48 When should sensitive data access be granted to those who have access. Day of week, time of day. Where is the sensitive data stored? This will be where the policy is enforced. Audit authorized or un-authorized access to sensitive data. When Where Audit
  • 49. Centralized Policy Management - Example Application RDBMS MPP Audit Log Audit Log Audit Log Enterprise Security Administrator Policy Cloud Security Officer Audit Log Audit Log Audit Log 49 File Servers Big Data Gateway Servers HP NonStop Base24 IBM Mainframe Protector Audit Log Audit Log Audit Log Audit Log Protection Servers Audit Log Audit Log
  • 50. Summary What are the Concerns with Cloud? How is Cloud Computing Defined? What is the Guidance for Cloud Data Security? What New Data Security Technologies are Available for Cloud? 50 How can Cloud Data Security work in Context to the Enterprise?
  • 51. Thank you! Questions? Please contact us for more information www.protegrity.com Ulf.Mattsson@protegrity.com