SlideShare a Scribd company logo
Streamlining Data
Encryption While
Maintaining IBM i
Availability
Bill Hammond | Director, Product Marketing
Bill Peedle | Principal Sales Engineer
Today’s Topics
• Benefits of encryption
• Challenges of encryption
• Comparing encryption
strategies
• Field-level encryption on IBM i
• Encrypt While Active option
• Q & A
2
What is Encryption?
3
• Data encryption is the process of converting data
into a format that is unreadable, known as
ciphertext, to protect sensitive information from
unauthorized access.
• This is accomplished using an encryption
algorithm and a key.
• The encryption algorithm is a mathematical
formula that scrambles the data, while the key is
a secret value that is used to decrypt the data.
Why use encryption at all?
4
• Data Protection
• Confidentiality: Prevents unauthorized access to sensitive information
• Integrity: Ensures that data remains unaltered and accurate – at rest and in motion
• Availability: Protects data from being held hostage through ransomware attacks.
• Compliance and Regulatory Adherence
• Industry Standards: Many industries have strict data protection regulations (HIPAA,
GDPR, CCPA) that mandate encryption.
• Risk Mitigation: Commitment to data security and reduces the risk of legal and
financial penalties.
• Brand Reputation and Customer Trust
• Data Breach Prevention: These can damage a company's reputation and lead to
customer loss.
• Customer Confidence: Builds trust by demonstrating a strong commitment to data
security.
• Competitive Advantage
• Intellectual Property Protection: Safeguards valuable innovations and trade
secrets.
• Secure Business Operations: Enables secure collaboration and information sharing.
Protect your stored data
with AES Encryption
• The encryption methods recognized by
the National Institute of Standards and
Technology (NIST) ensure that your data is
protected to the highest standards.
• The US government and agencies have
accepted the Advanced Encryption
Standard (AES) as a format standard for
encrypting data in databases.
• For PCI-DSS, HIPAA, and specific
government privacy rules, AES is the
preferred encryption method.
• Use the Advanced Encryption Standard
(AES-256)
5
What is a key management server?
6
When encrypting fields in a file, an encryption key is
required
• Many customers use an external key manager to store and manage the
master key as well as the encryption keys for the individual fields.
• They may already have an external key manager for other platforms and
can leverage that server for the IBM i encryption as well.
• An example of an external key server would be Thales Cipher trust or
Alliance Key Manager. There are others as well.
• For those who do not want to support an external key manager on a
Windows or Linux server, a local key store can be used on the IBM i to
store and manage the keys. Third party encryption tools typically include a
local key store for this use case.
Protect your encryption keys and data by
keeping them separate
If you keep your
encrypted data and keys
in the same place, it’s like
placing your house key
beneath the mat
Security best practices
require you to store
encryption keys
separately from your
encrypted data and
manage them with an
encryption key manager
7
Encryption
Challenges and
Best Practices
Encryption Challenges and Best Practices
Presentation name
9
Key
management
• Lifecycle management
• Generation
• Distribution
• Usage
• Rotation
• Revocation
• Destruction
• Compliance
• Human error
Performance
• Processing power
• Encryption/Decryption
overhead
• Hardware Acceleration
• Network latency
• Storage
• Application
Security and
usability
• Algorithm selection
• Quantum computing
• User experience
• Compatibility
• Access management
Key length
and strength
• Length
• Longer keys yield
stronger encryption
• Balancing security and
performance
• Strength
• Robust algorithm
• Effective key
management strategies
• Additional considerations
• Threats
• Compliance
• Future computing power
Implementin
g encryption
• Technical challenges
• Performance
• Integration
• Algorithm selection
• Data recovery
• Organization challenges
• Cost
• Human error
• Industry specific
regulations
• User acceptance
• Balancing security and
usability
Implementing
encryption has
its challenges
EXCLUSIVE
LOCKS SMALL WINDOW
• IBM i Field Procedures
(FieldProc) needs an Exclusive
Lock on file data to add/remove
an encryption program and
encrypt/decrypt a column
• Your maintenance window may
be too small to encrypt/decrypt
all files during the allotted time
APPLICATION
RISK
• Encryption processing changes
every record within a file –
increasing risk to applications
10
Comparing
encryption
strategies
What is disk level
encryption?
12
• On the IBM i, full disk encryption allows you to
encrypt data that is stored in basic disk pools
and independent disk pools
• Full disk encryption protects data from several
different threats:
• Protects data transmission to and from the disk
drive (important in a SAN environment)
• Protects data transmission in the cross-site
mirroring environment (only when the data being
mirrored is on an encrypted independent disk pool)
• Protects data in the case of theft of the disk drive
What is field level
encryption?
13
• Field procedures can provide field level (or column level)
encryption on DB2 for IBM i
• A field procedure is a user-written exit routine to
transform values in a single column
• When values in the column are changed, or new values inserted, the field
procedure is invoked for each value
• The field procedure can transform values (encode it) in any way.
• The encoded value is then stored
• When values are retrieved from the column, the field procedure is
invoked for each encoded value.
• The field procedure decodes each value back to the original value.
• Any indexes defined on a column that uses a field procedure are built with
encoded values.
• The fields are encrypted at rest and will be decrypted
when a database operation is performed against the file
that has the field in it.
• Fields can be ”masked” based on specific users or groups.
What is field level masking?
14
Individual fields can be
“masked” in addition to being
encrypted
• One of the big benefits of field
level masking versus disk level
encryption.
• For example, a Social Security
Number (SSN) field can be
masked so that:
• Only certain users or groups
can see the fully unmasked
SSN data
• Other users or groups can be
masked to see only the last
four digits of the field
• Other users will see a fully-
masked SSN
Let’s use the Social Security
Number 123456789 as an
example
• For users that need to see the
full SSN such as a payroll
administrator, the field is
encrypted but gets decrypted
on the fly and they can see
the full number
• For other users, you may
decide that they should not
see the full SSN, so in that
case, you can mask the first 5
digits, so the SSN# would look
like this: XXXXX6789
• You can mask the entire field
for certain people or groups if
appropriate, so the SS# would
look like this: XXXXXXXXX
Field level
masking
• If the field in question is a numeric field, the mask
will be the number 9. However, if the field in
question is a character field, you can choose the
character that you want to use for the mask.
• For example, if you want to mask a credit card
number that happens to be a character field, you
can choose “X” or whatever other character you
want to use for the mask.
• Let’s use the credit card number
1234567890123456 as an example. If we decide to
mask everything but the last 4 digits (or characters
in this case), it looks like this: XXXXXXXXXXXX3456
• If you decide to mask the entire field, it looks like
this: XXXXXXXXXXXXXXXX
15
Field-level
encryption on
IBM i
What does field level encryption look like on
the IBM i?
17
The best way to see that the field or fields are encrypted on the IBM i is by leveraging the DSPFFD
command. Below is an example of a social security number that is not encrypted:
What does field level encryption look like on
the IBM i?
18
After encrypting a field with field level encryption, you will notice new attributes on the field called
“Field Procedure Name” and “Field Procedure Library”. Below is an example of a social security
number that is encrypted via a field procedure.
How do I
encrypt
sensitive fields
in a file?
Working with Field
Procedures
Field procedures are part of
the IBM i OS. They can be
used for other purposes but
are primarily used for
encryption and masking
A field procedure is a
procedure that can be written
by hand and attached to the
field, however, that can be a
large undertaking
The best way to encrypt and
decrypt fields with field
procedures is to use a third-
party interface that will
develop the code for you,
attach it to the field in
question and help you to
manage and track which fields
are encrypted or decrypted
and to set up the masking
rules
19
Implications for field level encryption
20
• While encrypting or decrypting a file, the IBM i requires an exclusive lock on the file until the encryption or
decryption has completed. This means users need to be out of the file until the operation has completed.
• For smaller files, this may not be an issue as you may be able to lock the file for a short period of time.
However, for larger files, this process can take several hours.
• In addition, many customers have requirements to “roll” the encryption keys periodically, which requires
decryption and then re-encryption of the fields with a new key.
• For legacy RPG-ILE programs, if the encrypted field is an index or key on the file, the sort order will be based
on the encrypted data instead of the actual values. There are technologies that can help overcome this
situation available on the market.
Once you have decided on a tool to develop and manage field level encryption
on your IBM i, there are some technical considerations:
Minimizing the downtime required
to encrypt/decrypt fields
21
• In order to avoid the downtime required to encrypt fields in larger files,
there are technologies that allow you to ”Encrypt while active”.
• This technology allows you to make a copy of the file empty (using
CRTDUPOBJ) into a temporary library. Once the file is duplicated, it can
encrypt while it is empty.
• The “Encrypt while active” technology will then copy all the records from
the production copy of the file into the temporary copy. As they are being
copied in, the records are encrypted.
• This technology keeps the file in sync with ongoing changes since the file
is still being used by end users and applications.
Minimizing the downtime required
to encrypt/decrypt fields (cont.)
22
• Once you have a maintenance window and have users out of the file, the
process that keeps the file in sync is ended, the old copy of the file can be
moved out of production, and new encrypted version of the file can be
moved into production.
• The file is moved into production using the MOVOBJ command which
simply updates the pointer to the location of the file from the temporary
library to the production library. It does not perform a full copy of the data
so the process is very quick.
• The ”Encrypt while active” technology can save many hours of downtime
on initial encryption, and then also during the roll of the key when the file
needs to be decrypted and re-encrypted with a new key.
What can I do if I
have legacy RPG-
ILE programs
that no longer
sort correctly by
an encrypted key
field?
• There are technologies
available to help with the
sorting issues that may
occur because of an
encrypted key field in legacy
RPG-ILE programs
• These technologies require
access to your source code
• Handler software can be
used to convert traditional
record-oriented file access
to SQL Query Engine (SQE)
access
• Only one line of code is
added to make this
conversion
23
What can I do if I have legacy RPG-ILE
programs that no longer sort correctly by an
encrypted key field? (Continued)
24
• This is what the additional line of code would look like to handle the sorting issues in a legacy RPG-ILE
program:
• The handler program converts record-oriented reads into SQL access which corrects the sorting issues
experienced by having an encrypted key in legacy RPG-ILE programs
Encrypt While
Active
Introducing Encrypt While Active
26
Combines market-leading Assure technology to:
• Create a pre-production copy of your encrypted data
• Promote that file to production with only minutes of downtime
• Optionally compress the file being encrypted by removing deleted records
Based on Assure MIMIX and Assure Security products
• Assure MIMIX Enterprise for replication
• Assure MIMIX Promoter, a feature of MIMIX High Availability, for file promotion
• Assure Encryption, a component a Assure Security, for encryption
Combination of Software and Services
• Software to facilitate encryption without downtime and remove encryption risks
• Expert services to manage the process and ensure a successful outcome
Encrypt While Active
Architecture
27
ENCRYPT WHILE ACTIVE STEPS
1. Install Assure MIMIX HA (includes
Assure MIMIX Promoter) and Assure
Encryption on both systems
2. Create TEMP and ARCHIVE libraries on
the Source System
3. Create empty duplicate objects of files
being encrypted into the TEMP library
with all logicals and PFs joined by
joined logical (if any exist)
4. Configure Assure MIMIX HA for
replication to the Target System and
use Assure MIMIX Promoter for
moving PROD (future encrypted
Production files) to the TEMP Library
5. Configure Assure Encryption for fields
being encrypted and start encryption
on TEMP files which are empty. This is
very fast.
PROD
TEMP
ARCHIVE ARCHIVE
TEMP
PROD
Source System Target System
Replication
Replication
Replication
a
c
d
b
Assure MIMIX HA*
Assure Encryption
Assure MIMIX HA*
Assure Encryption
* Includes Assure MIMIX Promoter
Encrypt While Active
Architecture
28
ENCRYPT WHILE ACTIVE STEPS
(continued)
6. Start Copy While Active (CPYACTF)
process with Remove Deleted Records
option, if desired (a). Assure MIMIX
Promoter will copy all the records from
PROD to TEMP then wait for additional
changes to PROD files. CPYACTF will
encrypt the fields as they are copied
into the TEMP file and keep the files in
sync until you are ready to cutover (b).
7. At cutover, during an outage window,
Assure MIMIX Promoter is ended.
PROD files are moved to the ARCHIVE
library (c) and encrypted files in the
TEMP library are moved to the PROD
library (d).
8. Encrypted field definitions are modified
to the PROD library for all files moved
from the TEMP library to the PROD
library.
9. Assure MIMIX HA replication is in place
is in place. In the event of disk failure or
disaster, copies are available on the
Target System. An Assure MIMIX HA
system does not need to be in place for
this solution, but it is a good idea.
PROD
TEMP
ARCHIVE ARCHIVE
TEMP
PROD
Source System Target System
Replication
Replication
Replication
a
c
d
b
Assure MIMIX HA*
Assure Encryption
Assure MIMIX HA*
Assure Encryption
* Includes Assure MIMIX Promoter
Presentation name
Encrypt While
Active is useful
throughout
the lifetime of
your
encryption
project
INITIAL
ENCRYPTION
REMOVING
ENCRYPTION
• Adding encryption to fields/files
not currently encrypted
• Removing encryption from
fields/files currently encrypted
KEY ROTATION
• Cycling an encrypted file from
one set of encryption keys to
another
(annually or on another regular interval to
meet compliance requirements)
29
Benefits of Encrypt
While Active
• Minimizes downtime for encryption
operations
• Mitigates the risk of application
failure after encryption
• Ensures HA/DR-readiness throughout
the encryption process
30
As an added benefit, deleted records can
be removed from the file during the
encryption – a Compress While Active
service
Questions?
Streamlining Data Encryption While Maintaining IBM i Availability

More Related Content

PPTX
Why Disk Level Encryption is Not Enough for Your IBM i
PPTX
WBN_Securing Your IBM i_E_250300003.pptx
PDF
IBM i Encryption Made Easy
PDF
IBM i Encryption Made Easy
PPT
Formal Lecture.ppt
PDF
Choosing Encryption for Microsoft SQL Server
PDF
Security 101: Protecting Data with Encryption, Tokenization & Anonymization
PPTX
Data encryption in database management system
Why Disk Level Encryption is Not Enough for Your IBM i
WBN_Securing Your IBM i_E_250300003.pptx
IBM i Encryption Made Easy
IBM i Encryption Made Easy
Formal Lecture.ppt
Choosing Encryption for Microsoft SQL Server
Security 101: Protecting Data with Encryption, Tokenization & Anonymization
Data encryption in database management system

Similar to Streamlining Data Encryption While Maintaining IBM i Availability (20)

PPTX
Essential Layers of IBM i Security: File and Field Security
PDF
Top 5 Encryption Myths for IBM i Users
PDF
Encryption technology
PPTX
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
PDF
SafeNet DataSecure vs. Native SQL Server Encryption
PPT
Protecting Sensitive Data using Encryption and Key Management
PPTX
Encryption in the enterprise
PDF
Encryption: Who, What, When, Where, and Why It's Not a Panacea
PDF
Key Concepts for Protecting the Privacy of IBM i Data
PDF
Z111806 strengthen-security-sydney-v1910a
PDF
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
PDF
Z110932 strengthen-security-jburg-v1909c
PDF
Securing Sensitive IBM i Data At-Rest and In-Motion
PPTX
Optimizing Protected Indexes
PPT
IBM Share Conference 2010, Boston, Ulf Mattsson
PDF
Isaca global journal - choosing the most appropriate data security solution ...
PPTX
Encrypting and Protecting Your Data in Neo4j(Jeff_Tallman).pptx
PPT
Encryption Primer por Cathy Nolan
PPT
Database Security & Encryption
PPTX
Confidential data storage and deletion
Essential Layers of IBM i Security: File and Field Security
Top 5 Encryption Myths for IBM i Users
Encryption technology
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
SafeNet DataSecure vs. Native SQL Server Encryption
Protecting Sensitive Data using Encryption and Key Management
Encryption in the enterprise
Encryption: Who, What, When, Where, and Why It's Not a Panacea
Key Concepts for Protecting the Privacy of IBM i Data
Z111806 strengthen-security-sydney-v1910a
Strengthen your security posture! Getting started with IBM Z Pervasive Encryp...
Z110932 strengthen-security-jburg-v1909c
Securing Sensitive IBM i Data At-Rest and In-Motion
Optimizing Protected Indexes
IBM Share Conference 2010, Boston, Ulf Mattsson
Isaca global journal - choosing the most appropriate data security solution ...
Encrypting and Protecting Your Data in Neo4j(Jeff_Tallman).pptx
Encryption Primer por Cathy Nolan
Database Security & Encryption
Confidential data storage and deletion
Ad

More from Precisely (20)

PDF
The Future of Automation: AI, APIs, and Cloud Modernization.pdf
PDF
Unlock new opportunities with location data.pdf
PDF
Reimagining Insurance: Connected Data for Confident Decisions.pdf
PDF
Introducing Syncsort™ Storage Management.pdf
PDF
Enable Enterprise-Ready Security on IBM i Systems.pdf
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
PDF
Solving the CIO’s Dilemma: Speed, Scale, and Smarter SAP Modernization.pdf
PDF
Solving the Data Disconnect: Why Success Hinges on Pre-Linked Data.pdf
PDF
Cooking Up Clean Addresses - 3 Ways to Whip Messy Data into Shape.pdf
PDF
Building Confidence in AI & Analytics with High-Integrity Location Data.pdf
PDF
SAP Modernization Strategies for a Successful S/4HANA Journey.pdf
PDF
Precisely Demo Showcase: Powering ServiceNow Discovery with Precisely Ironstr...
PDF
The 2025 Guide on What's Next for Automation.pdf
PDF
Outdated Tech, Invisible Expenses – How Data Silos Undermine Operational Effi...
PDF
Modernización de SAP: Maximizando el Valor de su Migración a SAP S/4HANA.pdf
PDF
Outdated Tech, Invisible Expenses – The Hidden Cost of Disconnected Data Syst...
PDF
Migration vers SAP S/4HANA: Un levier stratégique pour votre transformation d...
PDF
Outdated Tech, Invisible Expenses: The Hidden Cost of Poor Data Integration o...
PDF
The Changing Compliance Landscape in 2025.pdf
The Future of Automation: AI, APIs, and Cloud Modernization.pdf
Unlock new opportunities with location data.pdf
Reimagining Insurance: Connected Data for Confident Decisions.pdf
Introducing Syncsort™ Storage Management.pdf
Enable Enterprise-Ready Security on IBM i Systems.pdf
A Day in the Life of Location Data - Turning Where into How.pdf
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Solving the CIO’s Dilemma: Speed, Scale, and Smarter SAP Modernization.pdf
Solving the Data Disconnect: Why Success Hinges on Pre-Linked Data.pdf
Cooking Up Clean Addresses - 3 Ways to Whip Messy Data into Shape.pdf
Building Confidence in AI & Analytics with High-Integrity Location Data.pdf
SAP Modernization Strategies for a Successful S/4HANA Journey.pdf
Precisely Demo Showcase: Powering ServiceNow Discovery with Precisely Ironstr...
The 2025 Guide on What's Next for Automation.pdf
Outdated Tech, Invisible Expenses – How Data Silos Undermine Operational Effi...
Modernización de SAP: Maximizando el Valor de su Migración a SAP S/4HANA.pdf
Outdated Tech, Invisible Expenses – The Hidden Cost of Disconnected Data Syst...
Migration vers SAP S/4HANA: Un levier stratégique pour votre transformation d...
Outdated Tech, Invisible Expenses: The Hidden Cost of Poor Data Integration o...
The Changing Compliance Landscape in 2025.pdf
Ad

Recently uploaded (20)

PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
sap open course for s4hana steps from ECC to s4
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Cloud computing and distributed systems.
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Approach and Philosophy of On baking technology
PDF
Empathic Computing: Creating Shared Understanding
PDF
Review of recent advances in non-invasive hemoglobin estimation
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Advanced methodologies resolving dimensionality complications for autism neur...
MIND Revenue Release Quarter 2 2025 Press Release
sap open course for s4hana steps from ECC to s4
“AI and Expert System Decision Support & Business Intelligence Systems”
Reach Out and Touch Someone: Haptics and Empathic Computing
The AUB Centre for AI in Media Proposal.docx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Encapsulation_ Review paper, used for researhc scholars
Spectroscopy.pptx food analysis technology
Cloud computing and distributed systems.
Spectral efficient network and resource selection model in 5G networks
MYSQL Presentation for SQL database connectivity
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Unlocking AI with Model Context Protocol (MCP)
Approach and Philosophy of On baking technology
Empathic Computing: Creating Shared Understanding
Review of recent advances in non-invasive hemoglobin estimation

Streamlining Data Encryption While Maintaining IBM i Availability

  • 1. Streamlining Data Encryption While Maintaining IBM i Availability Bill Hammond | Director, Product Marketing Bill Peedle | Principal Sales Engineer
  • 2. Today’s Topics • Benefits of encryption • Challenges of encryption • Comparing encryption strategies • Field-level encryption on IBM i • Encrypt While Active option • Q & A 2
  • 3. What is Encryption? 3 • Data encryption is the process of converting data into a format that is unreadable, known as ciphertext, to protect sensitive information from unauthorized access. • This is accomplished using an encryption algorithm and a key. • The encryption algorithm is a mathematical formula that scrambles the data, while the key is a secret value that is used to decrypt the data.
  • 4. Why use encryption at all? 4 • Data Protection • Confidentiality: Prevents unauthorized access to sensitive information • Integrity: Ensures that data remains unaltered and accurate – at rest and in motion • Availability: Protects data from being held hostage through ransomware attacks. • Compliance and Regulatory Adherence • Industry Standards: Many industries have strict data protection regulations (HIPAA, GDPR, CCPA) that mandate encryption. • Risk Mitigation: Commitment to data security and reduces the risk of legal and financial penalties. • Brand Reputation and Customer Trust • Data Breach Prevention: These can damage a company's reputation and lead to customer loss. • Customer Confidence: Builds trust by demonstrating a strong commitment to data security. • Competitive Advantage • Intellectual Property Protection: Safeguards valuable innovations and trade secrets. • Secure Business Operations: Enables secure collaboration and information sharing.
  • 5. Protect your stored data with AES Encryption • The encryption methods recognized by the National Institute of Standards and Technology (NIST) ensure that your data is protected to the highest standards. • The US government and agencies have accepted the Advanced Encryption Standard (AES) as a format standard for encrypting data in databases. • For PCI-DSS, HIPAA, and specific government privacy rules, AES is the preferred encryption method. • Use the Advanced Encryption Standard (AES-256) 5
  • 6. What is a key management server? 6 When encrypting fields in a file, an encryption key is required • Many customers use an external key manager to store and manage the master key as well as the encryption keys for the individual fields. • They may already have an external key manager for other platforms and can leverage that server for the IBM i encryption as well. • An example of an external key server would be Thales Cipher trust or Alliance Key Manager. There are others as well. • For those who do not want to support an external key manager on a Windows or Linux server, a local key store can be used on the IBM i to store and manage the keys. Third party encryption tools typically include a local key store for this use case.
  • 7. Protect your encryption keys and data by keeping them separate If you keep your encrypted data and keys in the same place, it’s like placing your house key beneath the mat Security best practices require you to store encryption keys separately from your encrypted data and manage them with an encryption key manager 7
  • 9. Encryption Challenges and Best Practices Presentation name 9 Key management • Lifecycle management • Generation • Distribution • Usage • Rotation • Revocation • Destruction • Compliance • Human error Performance • Processing power • Encryption/Decryption overhead • Hardware Acceleration • Network latency • Storage • Application Security and usability • Algorithm selection • Quantum computing • User experience • Compatibility • Access management Key length and strength • Length • Longer keys yield stronger encryption • Balancing security and performance • Strength • Robust algorithm • Effective key management strategies • Additional considerations • Threats • Compliance • Future computing power Implementin g encryption • Technical challenges • Performance • Integration • Algorithm selection • Data recovery • Organization challenges • Cost • Human error • Industry specific regulations • User acceptance • Balancing security and usability
  • 10. Implementing encryption has its challenges EXCLUSIVE LOCKS SMALL WINDOW • IBM i Field Procedures (FieldProc) needs an Exclusive Lock on file data to add/remove an encryption program and encrypt/decrypt a column • Your maintenance window may be too small to encrypt/decrypt all files during the allotted time APPLICATION RISK • Encryption processing changes every record within a file – increasing risk to applications 10
  • 12. What is disk level encryption? 12 • On the IBM i, full disk encryption allows you to encrypt data that is stored in basic disk pools and independent disk pools • Full disk encryption protects data from several different threats: • Protects data transmission to and from the disk drive (important in a SAN environment) • Protects data transmission in the cross-site mirroring environment (only when the data being mirrored is on an encrypted independent disk pool) • Protects data in the case of theft of the disk drive
  • 13. What is field level encryption? 13 • Field procedures can provide field level (or column level) encryption on DB2 for IBM i • A field procedure is a user-written exit routine to transform values in a single column • When values in the column are changed, or new values inserted, the field procedure is invoked for each value • The field procedure can transform values (encode it) in any way. • The encoded value is then stored • When values are retrieved from the column, the field procedure is invoked for each encoded value. • The field procedure decodes each value back to the original value. • Any indexes defined on a column that uses a field procedure are built with encoded values. • The fields are encrypted at rest and will be decrypted when a database operation is performed against the file that has the field in it. • Fields can be ”masked” based on specific users or groups.
  • 14. What is field level masking? 14 Individual fields can be “masked” in addition to being encrypted • One of the big benefits of field level masking versus disk level encryption. • For example, a Social Security Number (SSN) field can be masked so that: • Only certain users or groups can see the fully unmasked SSN data • Other users or groups can be masked to see only the last four digits of the field • Other users will see a fully- masked SSN Let’s use the Social Security Number 123456789 as an example • For users that need to see the full SSN such as a payroll administrator, the field is encrypted but gets decrypted on the fly and they can see the full number • For other users, you may decide that they should not see the full SSN, so in that case, you can mask the first 5 digits, so the SSN# would look like this: XXXXX6789 • You can mask the entire field for certain people or groups if appropriate, so the SS# would look like this: XXXXXXXXX
  • 15. Field level masking • If the field in question is a numeric field, the mask will be the number 9. However, if the field in question is a character field, you can choose the character that you want to use for the mask. • For example, if you want to mask a credit card number that happens to be a character field, you can choose “X” or whatever other character you want to use for the mask. • Let’s use the credit card number 1234567890123456 as an example. If we decide to mask everything but the last 4 digits (or characters in this case), it looks like this: XXXXXXXXXXXX3456 • If you decide to mask the entire field, it looks like this: XXXXXXXXXXXXXXXX 15
  • 17. What does field level encryption look like on the IBM i? 17 The best way to see that the field or fields are encrypted on the IBM i is by leveraging the DSPFFD command. Below is an example of a social security number that is not encrypted:
  • 18. What does field level encryption look like on the IBM i? 18 After encrypting a field with field level encryption, you will notice new attributes on the field called “Field Procedure Name” and “Field Procedure Library”. Below is an example of a social security number that is encrypted via a field procedure.
  • 19. How do I encrypt sensitive fields in a file? Working with Field Procedures Field procedures are part of the IBM i OS. They can be used for other purposes but are primarily used for encryption and masking A field procedure is a procedure that can be written by hand and attached to the field, however, that can be a large undertaking The best way to encrypt and decrypt fields with field procedures is to use a third- party interface that will develop the code for you, attach it to the field in question and help you to manage and track which fields are encrypted or decrypted and to set up the masking rules 19
  • 20. Implications for field level encryption 20 • While encrypting or decrypting a file, the IBM i requires an exclusive lock on the file until the encryption or decryption has completed. This means users need to be out of the file until the operation has completed. • For smaller files, this may not be an issue as you may be able to lock the file for a short period of time. However, for larger files, this process can take several hours. • In addition, many customers have requirements to “roll” the encryption keys periodically, which requires decryption and then re-encryption of the fields with a new key. • For legacy RPG-ILE programs, if the encrypted field is an index or key on the file, the sort order will be based on the encrypted data instead of the actual values. There are technologies that can help overcome this situation available on the market. Once you have decided on a tool to develop and manage field level encryption on your IBM i, there are some technical considerations:
  • 21. Minimizing the downtime required to encrypt/decrypt fields 21 • In order to avoid the downtime required to encrypt fields in larger files, there are technologies that allow you to ”Encrypt while active”. • This technology allows you to make a copy of the file empty (using CRTDUPOBJ) into a temporary library. Once the file is duplicated, it can encrypt while it is empty. • The “Encrypt while active” technology will then copy all the records from the production copy of the file into the temporary copy. As they are being copied in, the records are encrypted. • This technology keeps the file in sync with ongoing changes since the file is still being used by end users and applications.
  • 22. Minimizing the downtime required to encrypt/decrypt fields (cont.) 22 • Once you have a maintenance window and have users out of the file, the process that keeps the file in sync is ended, the old copy of the file can be moved out of production, and new encrypted version of the file can be moved into production. • The file is moved into production using the MOVOBJ command which simply updates the pointer to the location of the file from the temporary library to the production library. It does not perform a full copy of the data so the process is very quick. • The ”Encrypt while active” technology can save many hours of downtime on initial encryption, and then also during the roll of the key when the file needs to be decrypted and re-encrypted with a new key.
  • 23. What can I do if I have legacy RPG- ILE programs that no longer sort correctly by an encrypted key field? • There are technologies available to help with the sorting issues that may occur because of an encrypted key field in legacy RPG-ILE programs • These technologies require access to your source code • Handler software can be used to convert traditional record-oriented file access to SQL Query Engine (SQE) access • Only one line of code is added to make this conversion 23
  • 24. What can I do if I have legacy RPG-ILE programs that no longer sort correctly by an encrypted key field? (Continued) 24 • This is what the additional line of code would look like to handle the sorting issues in a legacy RPG-ILE program: • The handler program converts record-oriented reads into SQL access which corrects the sorting issues experienced by having an encrypted key in legacy RPG-ILE programs
  • 26. Introducing Encrypt While Active 26 Combines market-leading Assure technology to: • Create a pre-production copy of your encrypted data • Promote that file to production with only minutes of downtime • Optionally compress the file being encrypted by removing deleted records Based on Assure MIMIX and Assure Security products • Assure MIMIX Enterprise for replication • Assure MIMIX Promoter, a feature of MIMIX High Availability, for file promotion • Assure Encryption, a component a Assure Security, for encryption Combination of Software and Services • Software to facilitate encryption without downtime and remove encryption risks • Expert services to manage the process and ensure a successful outcome
  • 27. Encrypt While Active Architecture 27 ENCRYPT WHILE ACTIVE STEPS 1. Install Assure MIMIX HA (includes Assure MIMIX Promoter) and Assure Encryption on both systems 2. Create TEMP and ARCHIVE libraries on the Source System 3. Create empty duplicate objects of files being encrypted into the TEMP library with all logicals and PFs joined by joined logical (if any exist) 4. Configure Assure MIMIX HA for replication to the Target System and use Assure MIMIX Promoter for moving PROD (future encrypted Production files) to the TEMP Library 5. Configure Assure Encryption for fields being encrypted and start encryption on TEMP files which are empty. This is very fast. PROD TEMP ARCHIVE ARCHIVE TEMP PROD Source System Target System Replication Replication Replication a c d b Assure MIMIX HA* Assure Encryption Assure MIMIX HA* Assure Encryption * Includes Assure MIMIX Promoter
  • 28. Encrypt While Active Architecture 28 ENCRYPT WHILE ACTIVE STEPS (continued) 6. Start Copy While Active (CPYACTF) process with Remove Deleted Records option, if desired (a). Assure MIMIX Promoter will copy all the records from PROD to TEMP then wait for additional changes to PROD files. CPYACTF will encrypt the fields as they are copied into the TEMP file and keep the files in sync until you are ready to cutover (b). 7. At cutover, during an outage window, Assure MIMIX Promoter is ended. PROD files are moved to the ARCHIVE library (c) and encrypted files in the TEMP library are moved to the PROD library (d). 8. Encrypted field definitions are modified to the PROD library for all files moved from the TEMP library to the PROD library. 9. Assure MIMIX HA replication is in place is in place. In the event of disk failure or disaster, copies are available on the Target System. An Assure MIMIX HA system does not need to be in place for this solution, but it is a good idea. PROD TEMP ARCHIVE ARCHIVE TEMP PROD Source System Target System Replication Replication Replication a c d b Assure MIMIX HA* Assure Encryption Assure MIMIX HA* Assure Encryption * Includes Assure MIMIX Promoter
  • 29. Presentation name Encrypt While Active is useful throughout the lifetime of your encryption project INITIAL ENCRYPTION REMOVING ENCRYPTION • Adding encryption to fields/files not currently encrypted • Removing encryption from fields/files currently encrypted KEY ROTATION • Cycling an encrypted file from one set of encryption keys to another (annually or on another regular interval to meet compliance requirements) 29
  • 30. Benefits of Encrypt While Active • Minimizes downtime for encryption operations • Mitigates the risk of application failure after encryption • Ensures HA/DR-readiness throughout the encryption process 30 As an added benefit, deleted records can be removed from the file during the encryption – a Compress While Active service