SlideShare a Scribd company logo
Securing Sensitive IBM i Data
at Rest and in Motion
Alan Hamm
Sales Engineer
1
Agenda
1 – Encryption
2 – Tokenization
3 – Anonymization
4 – Secure file transfer
Tradeoffs: DIY or 3rd party solutions5 –
How Syncsort can help6 –
Why protect sensitive data?
• Prevent data breaches
• Prevent the negative publicity resulting from breaches
• Protect your customer’s trust in your handling of their data
Who should you protect your data from?
• Users should see only the data they need as part of their jobs
• Protect your data from internal staff, contractors and business
partners – as well as criminal intruders
What regulations require sensitive data protection?
• PCI DSS
• HIPAA
• GDPR
3
Sensitive Data Protection
• GLBA
• State privacy laws
• And more
Encryption
What Is Encryption?
• Use of one or more algorithms to
transform human-readable information
into an unreadable format
• Requires a decryption key to return data
to a human-readable format
• Key management is highly recommended
to keep encryption keys safe and manage
them throughout their lifecycle
• Integrates with IBM i FieldProc exit point
(IBM i 7.1 or greater) to enable field
encryption without application changes
• Encryption and decryption activities can
be logged
• Decrypted data can be masked based on
the user’s privileges
Pros
• Mature technology
• Standards offer independent certification
• Algorithms are continuously scrutinized
• Confidence in meeting requirements of
regulations that mandate sensitive data
protection such as HIPAA/HITECH, PCI-
DSS, state privacy laws and more
Tips
• Specified by certain regulations; verify
the requirements of the regulations your
business must comply with
• Better for applications requiring higher
performance
• Look for a secure implementation of a
secure algorithm
• Check for certifications
4
Cons
• Depending on the implementation,
encrypting and decrypting field data can
have a performance penalty
• Encryption may not preserve the original
format of fields, which can affect field
validation processes
• Applications may need modification to
prevent using encrypted indexes
Tokenization
What Is Tokenization?
• Replaces sensitive data with substitute
values or “tokens”
• Tokens are stored in a database or “token
vault” that maintains the relationship
between the original value and token
• Format-preserving tokens retain the
characteristics of the original data (e.g. a
VISA number would still look like a VISA
number and pass a LUHN check)
• Token consistency enables the same
token to be used for every instances of
the original data
• When tokenized data is displayed in its
original form, it should be masked based
on the privilege of the user
Pros
• Tokens cannot be reversed with a key as
there is no algorithmic relationship to the
original data
• Tokenization maintains database
relationships
• Removing data from the production server
reduces risk of exposure from a breach
• Tokenizing a server’s data can remove it
from the scope of compliance
• Specifically referenced for PCI DSS and
supports compliance other regulations
Tips
• Available thru credit card payment
networks for tokenizing credit card
numbers
• Good for BI and queries since
tokenization maintains database
relationships
• Useful when sending data to outside
services for processing when sensitive
data is not required – or for development
and test systems
5
Cons
• Tokenization is not recognized as widely
as encryption by standards bodies
• Tokenization has a performance impact to
register tokens and retrieve them
Anonymization
What Is Anonymization?
• A form of tokenization that permanently
replaces sensitive data with substitute
values (or “tokens”)
• Substitute values are not stored so a
secured token vault is not required
• Can replace every instances of a piece of
original data with the same token
• Format-preserving : Retain the
characteristics of the original data
• A variety of anonymization methods can
be used (masking, scrambling, etc.)
• NOT a solution for use on a production
server since tokens are unrecoverable
Pros
• Cannot be reversed with a key as there is
no algorithmic relationship to the original
data
• Supports compliance with GDPR and other
regulations
• Keeps non-production servers out of the
scope of compliance
Tips
• Not a solution for data on your
production server
• Ideally used for anonymizing sensitive
data on a development or test system
• Good for sending data to outside services
for processing
• When coupled with a high availability
solution for replication to non-HA node, it
can feed dev/test system with
anonymized data
6
Cons
• Anonymization is not recognized as
widely as encryption by standards bodies
Secure File Transfer
What Is Secure File Transfer
• Securing data in motion across internal or
external networks
• Data is secured by encrypting it on the
IBM i before transferring and decrypting
it on the receiving end
• Required by regulations such as PCI,
HIPAA, GDPR, GLBA and others
• Common protocol options include
• Secure Shell (SSH sFTP)
• Secure FTP (SSL FTPS)
• Desirable for solutions to negotiate
firewalls and creating an audit trail of file
transfer activities
• Solutions can automate the transfer
process
Pros
• Protects data from being seen in clear text
when transferred on the network
• Meets requirements of regulations such as
PCI, HIPAA and others that require
encrypted transfer and logging of transfer
activity
• Mature discipline with standards and
certifications available
Tips
• Look for solutions that meet standards
• Ensure any solution you consider can
navigate the complexities of your firewall
configurations
• Set up a hub-and-spoke configuration
that manages all your file transfer
activities
7
Cons
• Technical-Know-How
Tradeoffs
Do-It-Yourself In-House
• Resources may be stretched and pulled
off project
• May need to bring in consultants or hire
new employee because of lack of
knowledge
• Need to stay on top of new PTFs or
updates to the OS
• Knowledgeable resource may leave or
retire
Third-Party Solutions
• Frees up your resources for business
critical projects
• Leverages experts in the field
• Vendor is in the business of releasing
updated software
• Vendors ensure solutions stay current to
the latest threats and OS capabilities
• Ensures optimal performance
• Vendors also offer services to help you
get started and succeed with your
implementation long term
8
How Syncsort
Can Help
9
Data Privacy
Protect the privacy of data at-rest
or in-motion to prevent data
breaches
Access Control
Ensure comprehensive control of
unauthorized access and the
ability to trace any activity,
suspicious or otherwise
Compliance Monitoring
Gain visibility into all security activity
on your IBM i and optionally
feed it to an enterprise console
Security Risk Assessment
Assess your security threats
and vulnerabilities
10
Assure Security
addresses the issues on
the radar screen of
every security officer
and IBM i admin
Secure File Transfer
Securely transfer files across
internal or external networks
using encryption
Tokenization
Remove sensitive data from a
server by replacing it with
substitute values that can be used
to retrieve the original data
Encryption
Transform human-readable
database fields into unreadable
cypher text using industry-
certified encryption & key
management solutions
Assure Data
Privacy
11
Expert services are available for
• Security risk assessment
• Quick start services
• Quick check services
• Security update services (hot fixes, PTFs, new releases, etc.)
• System update services (ensuring security solution is properly configured
after system changes to IP addresses, OS versions, etc.)
• Auditor assist (supporting internal or external auditors)
• Managed security services
• A la carte consulting
Leverage the seasoned security experts in Syncsort Global Services!
The Syncsort Services Team
Is Here for You
12
Securing Sensitive IBM i Data At-Rest and In-Motion

More Related Content

PDF
Security 101: Protecting Data with Encryption, Tokenization & Anonymization
PDF
Security 101: Protecting Data with Encryption, Tokenization & Anonymization
PDF
Key Concepts for Protecting the Privacy of IBM i Data
PDF
6. Security Assessment and Testing
PDF
CNIT 125 7. Security Assessment and Testing
PDF
CNIT 125 Ch 3. Asset Security
PDF
1. Security and Risk Management
PPTX
Essential Layers of IBM i Security: File and Field Security
Security 101: Protecting Data with Encryption, Tokenization & Anonymization
Security 101: Protecting Data with Encryption, Tokenization & Anonymization
Key Concepts for Protecting the Privacy of IBM i Data
6. Security Assessment and Testing
CNIT 125 7. Security Assessment and Testing
CNIT 125 Ch 3. Asset Security
1. Security and Risk Management
Essential Layers of IBM i Security: File and Field Security

What's hot (20)

PPT
Protecting Sensitive Data using Encryption and Key Management
PDF
CISSP Prep: Ch 6. Identity and Access Management
PPTX
IBM i Security SIEM Integration
PPTX
Crypto academy
PDF
CNIT 125 6. Identity and Access Management
PDF
7. Security Operations
PDF
Data security in the age of GDPR – most common data security problems
PDF
1. Security and Risk Management
PDF
PDF
3. Security Engineering
PDF
CNIT 125: Ch 2. Security and Risk Management (Part 2)
PDF
CNIT 125: Ch 2. Security and Risk Management (Part 1)
PPTX
Essential Layers of IBM i Security: Security Monitoring and Auditing
PDF
CNIT 125: Ch 4. Security Engineering (Part 1)
PDF
CISSP Prep: Ch 7. Security Assessment and Testing
PDF
CNIT 125: Ch 2. Security and Risk Management (Part 2)
PDF
CNIT 160 Ch 4c: Security Program Development (Part 3)
PDF
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
PPTX
Protecting Sensitive Data (and be PCI Compliant too!)
PDF
CNIT 125 Ch 4. Security Engineering (Part 1)
Protecting Sensitive Data using Encryption and Key Management
CISSP Prep: Ch 6. Identity and Access Management
IBM i Security SIEM Integration
Crypto academy
CNIT 125 6. Identity and Access Management
7. Security Operations
Data security in the age of GDPR – most common data security problems
1. Security and Risk Management
3. Security Engineering
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 125: Ch 2. Security and Risk Management (Part 1)
Essential Layers of IBM i Security: Security Monitoring and Auditing
CNIT 125: Ch 4. Security Engineering (Part 1)
CISSP Prep: Ch 7. Security Assessment and Testing
CNIT 125: Ch 2. Security and Risk Management (Part 2)
CNIT 160 Ch 4c: Security Program Development (Part 3)
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
Protecting Sensitive Data (and be PCI Compliant too!)
CNIT 125 Ch 4. Security Engineering (Part 1)
Ad

Similar to Securing Sensitive IBM i Data At-Rest and In-Motion (20)

PPTX
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
PPTX
WBN_Securing Your IBM i_E_250300003.pptx
PPTX
Cacs na isaca session 414 ulf mattsson may 10 final
PDF
Enterprise Data Protection - Understanding Your Options and Strategies
PDF
Where Data Security and Value of Data Meet in the Cloud
PPT
Data security in the cloud
PPTX
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10
PPTX
Isaca how innovation can bridge the gap between privacy and regulations
PPTX
PCI DSS Conference in London UK 2011
PPTX
Streamlining Data Encryption While Maintaining IBM i Availability
PPTX
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
PPTX
Infragard atlanta ulf mattsson - cloud security - regulations and data prot...
PPTX
Data protection on premises, and in public and private clouds
PDF
IBM Security - 2015 - Client References Guide
PDF
Where data security and value of data meet in the cloud brighttalk webinar ...
PDF
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
PPTX
Social Distance Your IBM i from Cybersecurity Risk
PPTX
What Does a Full Featured Security Strategy Look Like?
PDF
What I learned from RSAC 2019
PPTX
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
WBN_Securing Your IBM i_E_250300003.pptx
Cacs na isaca session 414 ulf mattsson may 10 final
Enterprise Data Protection - Understanding Your Options and Strategies
Where Data Security and Value of Data Meet in the Cloud
Data security in the cloud
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10
Isaca how innovation can bridge the gap between privacy and regulations
PCI DSS Conference in London UK 2011
Streamlining Data Encryption While Maintaining IBM i Availability
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
Infragard atlanta ulf mattsson - cloud security - regulations and data prot...
Data protection on premises, and in public and private clouds
IBM Security - 2015 - Client References Guide
Where data security and value of data meet in the cloud brighttalk webinar ...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Social Distance Your IBM i from Cybersecurity Risk
What Does a Full Featured Security Strategy Look Like?
What I learned from RSAC 2019
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
Ad

More from Precisely (20)

PDF
The Future of Automation: AI, APIs, and Cloud Modernization.pdf
PDF
Unlock new opportunities with location data.pdf
PDF
Reimagining Insurance: Connected Data for Confident Decisions.pdf
PDF
Introducing Syncsort™ Storage Management.pdf
PDF
Enable Enterprise-Ready Security on IBM i Systems.pdf
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
PDF
Solving the CIO’s Dilemma: Speed, Scale, and Smarter SAP Modernization.pdf
PDF
Solving the Data Disconnect: Why Success Hinges on Pre-Linked Data.pdf
PDF
Cooking Up Clean Addresses - 3 Ways to Whip Messy Data into Shape.pdf
PDF
Building Confidence in AI & Analytics with High-Integrity Location Data.pdf
PDF
SAP Modernization Strategies for a Successful S/4HANA Journey.pdf
PDF
Precisely Demo Showcase: Powering ServiceNow Discovery with Precisely Ironstr...
PDF
The 2025 Guide on What's Next for Automation.pdf
PDF
Outdated Tech, Invisible Expenses – How Data Silos Undermine Operational Effi...
PDF
Modernización de SAP: Maximizando el Valor de su Migración a SAP S/4HANA.pdf
PDF
Outdated Tech, Invisible Expenses – The Hidden Cost of Disconnected Data Syst...
PDF
Migration vers SAP S/4HANA: Un levier stratégique pour votre transformation d...
PDF
Outdated Tech, Invisible Expenses: The Hidden Cost of Poor Data Integration o...
PDF
The Changing Compliance Landscape in 2025.pdf
The Future of Automation: AI, APIs, and Cloud Modernization.pdf
Unlock new opportunities with location data.pdf
Reimagining Insurance: Connected Data for Confident Decisions.pdf
Introducing Syncsort™ Storage Management.pdf
Enable Enterprise-Ready Security on IBM i Systems.pdf
A Day in the Life of Location Data - Turning Where into How.pdf
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Solving the CIO’s Dilemma: Speed, Scale, and Smarter SAP Modernization.pdf
Solving the Data Disconnect: Why Success Hinges on Pre-Linked Data.pdf
Cooking Up Clean Addresses - 3 Ways to Whip Messy Data into Shape.pdf
Building Confidence in AI & Analytics with High-Integrity Location Data.pdf
SAP Modernization Strategies for a Successful S/4HANA Journey.pdf
Precisely Demo Showcase: Powering ServiceNow Discovery with Precisely Ironstr...
The 2025 Guide on What's Next for Automation.pdf
Outdated Tech, Invisible Expenses – How Data Silos Undermine Operational Effi...
Modernización de SAP: Maximizando el Valor de su Migración a SAP S/4HANA.pdf
Outdated Tech, Invisible Expenses – The Hidden Cost of Disconnected Data Syst...
Migration vers SAP S/4HANA: Un levier stratégique pour votre transformation d...
Outdated Tech, Invisible Expenses: The Hidden Cost of Poor Data Integration o...
The Changing Compliance Landscape in 2025.pdf

Recently uploaded (20)

PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Approach and Philosophy of On baking technology
Diabetes mellitus diagnosis method based random forest with bat algorithm
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
The AUB Centre for AI in Media Proposal.docx
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Building Integrated photovoltaic BIPV_UPV.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Reach Out and Touch Someone: Haptics and Empathic Computing
Network Security Unit 5.pdf for BCA BBA.
A comparative analysis of optical character recognition models for extracting...
Per capita expenditure prediction using model stacking based on satellite ima...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Big Data Technologies - Introduction.pptx
Electronic commerce courselecture one. Pdf
Encapsulation_ Review paper, used for researhc scholars
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Empathic Computing: Creating Shared Understanding
Digital-Transformation-Roadmap-for-Companies.pptx
Approach and Philosophy of On baking technology

Securing Sensitive IBM i Data At-Rest and In-Motion

  • 1. Securing Sensitive IBM i Data at Rest and in Motion Alan Hamm Sales Engineer 1
  • 2. Agenda 1 – Encryption 2 – Tokenization 3 – Anonymization 4 – Secure file transfer Tradeoffs: DIY or 3rd party solutions5 – How Syncsort can help6 –
  • 3. Why protect sensitive data? • Prevent data breaches • Prevent the negative publicity resulting from breaches • Protect your customer’s trust in your handling of their data Who should you protect your data from? • Users should see only the data they need as part of their jobs • Protect your data from internal staff, contractors and business partners – as well as criminal intruders What regulations require sensitive data protection? • PCI DSS • HIPAA • GDPR 3 Sensitive Data Protection • GLBA • State privacy laws • And more
  • 4. Encryption What Is Encryption? • Use of one or more algorithms to transform human-readable information into an unreadable format • Requires a decryption key to return data to a human-readable format • Key management is highly recommended to keep encryption keys safe and manage them throughout their lifecycle • Integrates with IBM i FieldProc exit point (IBM i 7.1 or greater) to enable field encryption without application changes • Encryption and decryption activities can be logged • Decrypted data can be masked based on the user’s privileges Pros • Mature technology • Standards offer independent certification • Algorithms are continuously scrutinized • Confidence in meeting requirements of regulations that mandate sensitive data protection such as HIPAA/HITECH, PCI- DSS, state privacy laws and more Tips • Specified by certain regulations; verify the requirements of the regulations your business must comply with • Better for applications requiring higher performance • Look for a secure implementation of a secure algorithm • Check for certifications 4 Cons • Depending on the implementation, encrypting and decrypting field data can have a performance penalty • Encryption may not preserve the original format of fields, which can affect field validation processes • Applications may need modification to prevent using encrypted indexes
  • 5. Tokenization What Is Tokenization? • Replaces sensitive data with substitute values or “tokens” • Tokens are stored in a database or “token vault” that maintains the relationship between the original value and token • Format-preserving tokens retain the characteristics of the original data (e.g. a VISA number would still look like a VISA number and pass a LUHN check) • Token consistency enables the same token to be used for every instances of the original data • When tokenized data is displayed in its original form, it should be masked based on the privilege of the user Pros • Tokens cannot be reversed with a key as there is no algorithmic relationship to the original data • Tokenization maintains database relationships • Removing data from the production server reduces risk of exposure from a breach • Tokenizing a server’s data can remove it from the scope of compliance • Specifically referenced for PCI DSS and supports compliance other regulations Tips • Available thru credit card payment networks for tokenizing credit card numbers • Good for BI and queries since tokenization maintains database relationships • Useful when sending data to outside services for processing when sensitive data is not required – or for development and test systems 5 Cons • Tokenization is not recognized as widely as encryption by standards bodies • Tokenization has a performance impact to register tokens and retrieve them
  • 6. Anonymization What Is Anonymization? • A form of tokenization that permanently replaces sensitive data with substitute values (or “tokens”) • Substitute values are not stored so a secured token vault is not required • Can replace every instances of a piece of original data with the same token • Format-preserving : Retain the characteristics of the original data • A variety of anonymization methods can be used (masking, scrambling, etc.) • NOT a solution for use on a production server since tokens are unrecoverable Pros • Cannot be reversed with a key as there is no algorithmic relationship to the original data • Supports compliance with GDPR and other regulations • Keeps non-production servers out of the scope of compliance Tips • Not a solution for data on your production server • Ideally used for anonymizing sensitive data on a development or test system • Good for sending data to outside services for processing • When coupled with a high availability solution for replication to non-HA node, it can feed dev/test system with anonymized data 6 Cons • Anonymization is not recognized as widely as encryption by standards bodies
  • 7. Secure File Transfer What Is Secure File Transfer • Securing data in motion across internal or external networks • Data is secured by encrypting it on the IBM i before transferring and decrypting it on the receiving end • Required by regulations such as PCI, HIPAA, GDPR, GLBA and others • Common protocol options include • Secure Shell (SSH sFTP) • Secure FTP (SSL FTPS) • Desirable for solutions to negotiate firewalls and creating an audit trail of file transfer activities • Solutions can automate the transfer process Pros • Protects data from being seen in clear text when transferred on the network • Meets requirements of regulations such as PCI, HIPAA and others that require encrypted transfer and logging of transfer activity • Mature discipline with standards and certifications available Tips • Look for solutions that meet standards • Ensure any solution you consider can navigate the complexities of your firewall configurations • Set up a hub-and-spoke configuration that manages all your file transfer activities 7 Cons • Technical-Know-How
  • 8. Tradeoffs Do-It-Yourself In-House • Resources may be stretched and pulled off project • May need to bring in consultants or hire new employee because of lack of knowledge • Need to stay on top of new PTFs or updates to the OS • Knowledgeable resource may leave or retire Third-Party Solutions • Frees up your resources for business critical projects • Leverages experts in the field • Vendor is in the business of releasing updated software • Vendors ensure solutions stay current to the latest threats and OS capabilities • Ensures optimal performance • Vendors also offer services to help you get started and succeed with your implementation long term 8
  • 10. Data Privacy Protect the privacy of data at-rest or in-motion to prevent data breaches Access Control Ensure comprehensive control of unauthorized access and the ability to trace any activity, suspicious or otherwise Compliance Monitoring Gain visibility into all security activity on your IBM i and optionally feed it to an enterprise console Security Risk Assessment Assess your security threats and vulnerabilities 10 Assure Security addresses the issues on the radar screen of every security officer and IBM i admin
  • 11. Secure File Transfer Securely transfer files across internal or external networks using encryption Tokenization Remove sensitive data from a server by replacing it with substitute values that can be used to retrieve the original data Encryption Transform human-readable database fields into unreadable cypher text using industry- certified encryption & key management solutions Assure Data Privacy 11
  • 12. Expert services are available for • Security risk assessment • Quick start services • Quick check services • Security update services (hot fixes, PTFs, new releases, etc.) • System update services (ensuring security solution is properly configured after system changes to IP addresses, OS versions, etc.) • Auditor assist (supporting internal or external auditors) • Managed security services • A la carte consulting Leverage the seasoned security experts in Syncsort Global Services! The Syncsort Services Team Is Here for You 12