SlideShare a Scribd company logo
Where Data Security and Value of Data Meet in the Cloud
- Practical advice for cloud data security
Ulf Mattsson
CTO, Protegrity
Ulf.Mattsson@protegrity.com
Cloud Security Alliance (CSA)
PCI Security Standards Council
• Cloud & Virtualization SIGs
• Encryption Task Force
• Tokenization Task Force
Ulf Mattsson, Protegrity CTO
ANSI X9
• American National Standards Institute
IFIP
• WG 11.3 Data and Application Security
• International Federation for Information Processing
2
Involvement in Payment Card Industry Data Security Standard:
1. PCI SSC Tokenization Task Force
2. PCI SSC Encryption Task Force
3. PCI SSC Point to Point Encryption Task Force
4. PCI SSC Risk Assessment SIG
5. PCI SSC eCommerce SIG
Ulf Mattsson, Protegrity CTO
5. PCI SSC eCommerce SIG
6. PCI SSC Cloud SIG
7. PCI SSC Virtualization SIG
8. PCI SSC Pre-Authorization SIG
9. PCI SSC Scoping SIG Working Group 2
10. PCI SSC 2014 Tokenization Task Force (TkTF).
3
4
The New Enterprise Paradigm
• Cloud computing, IoT and the disappearing perimeter
• Data is the new currency
Rethinking Data Security for a Boundless World
• The new wave of challenges to security and productivity
• Seamless, boundless security framework – data flow
• Maximize data utility & minimizing risk – finding the right balance
Agenda
• Maximize data utility & minimizing risk – finding the right balance
New Security Solutions, Technologies and Techniques
• Data-centric security technologies
• Data security and utility outside the enterprise
• Cloud data security in context to the enterprise
Best Practices
5
Verizon Data Breach Investigations Report
• Enterprises are losing ground in the fight
against persistent cyber-attacks
• We simply cannot catch the bad guys until it is
too late. This picture is not improving
• Verizon reports concluded that less than 14%
of breaches are detected by internal
Enterprises Losing Ground Against Cyber-attacks
of breaches are detected by internal
monitoring tools
JP Morgan Chase data breach
• Hackers were in the bank’s network for months
undetected
• Network configuration errors are inevitable,
even at the larges banks
We need a new approach to data security
6
High-profile Cyber Attacks
49% recommended Database security
40% of budget still on Network security
7
40%
only
19% to database security
Conclusion: Organisations have traditionally spent money on network security and so it is
earmarked in the budget and requires no further justification
The
Perimeter-less
8
Perimeter-less
World
Big data projects in 2015
• Integration with the
outside world
Security prevents big data
from becoming a prevalent
enterprise computing
Integration with Outside World
26 billion devices on the
Internet of Things by
2020 (Gartner)
9
www.infoworld.com/article/2866831/big-data/in-2015-big-data-will-slowly-
permeate-the-borders-of-the-enterprise.html
enterprise computing
platform
• 3rd party products are
helping
wikipedia.org
CHALLENGE
How can I
Secure the
10
Secure the
Perimeter-less
Enterprise?
Cloud
ComputingComputing
11
What Is Your No. 1 Issue Slowing
Adoption of Public Cloud Computing?
12
Data Security Holding Back Cloud Projects
13
Source: Cloud Adoption Practices & Priorities Survey Report January 2015
Security of Data in Cloud at Board-level
14
Source: Cloud Adoption Practices & Priorities Survey Report January 2015
Threat Vector Inheritance
15
New Options
to Secure
16
to Secure
Cloud Data
Rather than making the protection platform based,
the security is applied directly to the data
Protecting the data wherever it goes, in any
environment
Data-Centric Protection Increases
Security in Cloud Computing
Cloud environments by nature have more access
points and cannot be disconnected
Data-centric protection reduces the reliance on
controlling the high number of access points
17
Key Challenges
Storing and/or processing data in the cloud increases the risks
of noncompliance through unapproved access and data
breach
Service providers will limit their liabilities to potential data
breaches that may be taken for granted on-premises
Simplify Operations and Compliance in the Cloud
018
breaches that may be taken for granted on-premises
Gartner: Simplify Operations and Compliance in the Cloud by Protecting Sensitive Data, Jun 2015
Recommendations
Simplify audits & address data residency and compliance issues
by applying encryption or tokenization and access controls.
Digitally shred sensitive data at its end of life by deleting the
encryption keys or tokens
Understand that protecting sensitive data in cloud-based
Simplify Operations and Compliance in the Cloud
019
Understand that protecting sensitive data in cloud-based
software as a service (SaaS) applications may require trading off
security and functionality
Assess each encryption solution by following the data to
understand when data appears in clear text, where keys are
made available and stored, and who has access to the keys
Gartner: Simplify Operations and Compliance in the Cloud by Protecting Sensitive Data, Jun 2015
Corporate Network
Security Gateway Deployment – Hybrid Cloud
Client
System
Public Cloud
Cloud Gateway
Private Cloud
020
Enterprise
Security
Administrator
Security Officer
Out-sourced
Corporate NetworkCorporate Network
Security Gateway Deployment – Hybrid Cloud
Client
System
Private Cloud Public Cloud
Cloud
Gateway
021
Enterprise
Security
Administrator
Security Officer
Gateway
Out-sourced
Corporate Network
Client
System Cloud
Gateway
Security Gateway – Searchable Encryption
RDBMS
Query
re-write
022
Enterprise
Security
Administrator
Security Officer
Order preserving
encryption
Corporate Network
Client
System
Cloud
Gateway
Security Gateway – Search & Indexing
RDBMS
Query
re-write
023
Enterprise
Security
Administrator
Security Officer
IndexIndex
Comparing
Data ProtectionData Protection
Methods
24
Computational
Usefulness
Risk Adjusted Storage – Data Leaking Formats
H
25
Data
Leakage
Strong-encryption Truncation Sort-order-preserving-encryption Indexing
L
I I I I
Balancing Data Security & Utility
Value
Preserving
Classification of
Sensitive Data
Granular Protection
of Sensitive Data
26
Index Data
Leaking
Sensitive
Data ?
Encoding
Leaking
Sensitive
Data ?
Risk Adjusted Data Leakage
Index
Trust
H
Index
Leaking
Sensitive
Data
Sort Order Preserving
Encryption Algorithms
Leaking Sensitive
Data
27
Index Data
Elasticity
Out-sourcedIn-house
L
Index NOT
Leaking
Sensitive
Data
Reduction of Pain with New Protection Techniques
High
Pain
& TCO
Strong Encryption Output:
AES, 3DES
Format Preserving Encryption
DTP, FPE
Input Value: 3872 3789 1620 3675
!@#$%a^.,mhu7///&*B()_+!@
8278 2789 2990 2789
28
1970 2000 2005 2010
Low
Vault-based Tokenization
Vaultless Tokenization
8278 2789 2990 2789
Format Preserving
Greatly reduced Key
Management
No Vault
8278 2789 2990 2789
What is
Data Tokenization?
29
Data Tokenization?
Fine Grained Data Security Methods
Tokenization and Encryption are Different
Used Approach Cipher System Code System
Cryptographic algorithms
Cryptographic keys
TokenizationEncryption
30
Cryptographic keys
Code books
Index tokens
Source: McGraw-HILL ENCYPLOPEDIA OF SCIENCE & TECHNOLOGY
Tokenization Research
Tokenization Gets Traction
Aberdeen has seen a steady increase in enterprise
use of tokenization for protecting sensitive data over
encryption
Nearly half of the respondents (47%) are currently
using tokenization for something other than cardholder
data
Tokenization users had 50% fewer security-related
incidents than tokenization non-users
31
Source: http://www.protegrity.com/2012/08/tokenization-gets-traction-from-aberdeen/
10 000 000 -
1 000 000 -
100 000 -
10 000 -
Transactions per second*
Speed of Fine Grained Protection Methods
10 000 -
1 000 -
100 -
I
Format
Preserving
Encryption
I
Vaultless
Data
Tokenization
I
AES CBC
Encryption
Standard
I
Vault-based
Data
Tokenization
*: Speed will depend on the configuration
32
Significantly Different Tokenization Approaches
Property Dynamic Pre-generated
Vault-based Vaultless
33
Examples of Protected Data
Field Real Data Tokenized / Pseudonymized
Name Joe Smith csu wusoj
Address 100 Main Street, Pleasantville, CA 476 srta coetse, cysieondusbak, CA
Date of Birth 12/25/1966 01/02/1966
Telephone 760-278-3389 760-389-2289
E-Mail Address joe.smith@surferdude.org eoe.nwuer@beusorpdqo.org
SSN 076-39-2778 076-28-3390
CC Number 3678 2289 3907 3378 3846 2290 3371 3378
Business URL www.surferdude.com www.sheyinctao.com
Fingerprint Encrypted
Photo Encrypted
X-Ray Encrypted
Healthcare /
Financial
Services
Dr. visits, prescriptions, hospital stays
and discharges, clinical, billing, etc.
Financial Services Consumer Products
and activities
Protection methods can be equally
applied to the actual data, but not
needed with de-identification
34
Use
Case
How Should I Secure Different Data?
Simple – PCI
PII
Encryption
of Files
Card
Holder
Data
Tokenization
of Fields
Personally Identifiable Information
Type of
Data
I
Structured
I
Un-structured
Complex – PHI
Protected
Health
Information
35
Personally Identifiable Information
How to Balance
Risk andRisk and
Data Access
36
High -
Risk Adjusted Data Security – Access Controls
Risk Exposure
User Productivity and
Creativity
37
Access to
Sensitive Data in
Clear
Low Access to Data High Access to Data
Low -
I I
High -
Risk Adjusted Data Security – Tokenized Data
User Productivity and
Creativity
38
Access to
Tokenized Data
Low Access to Data High Access to Data
Low -
I I
Risk Exposure
Cost of
Application
Changes
High -
Risk Adjusted Data Security – Selective Masking
Risk Exposure
Cost Example: 16 digit credit card number
39
All-16-clear Only-middle-6-hidden All-16-hidden
Low -
I I I
Fine Grained Security: Securing Fields
Production Systems
Encryption of fields
• Reversible
• Policy Control (authorized / Unauthorized Access)
• Lacks Integration Transparency
• Complex Key Management
• Example: !@#$%a^.,mhu7///&*B()_+!@
40
Non-Production Systems
Masking of fields
• Not reversible
• No Policy, Everyone can access the data
• Integrates Transparently
• No Complex Key Management
• Example: 0389 3778 3652 0038
Fine Grained Security: Tokenization of Fields
Production Systems
Tokenization (Pseudonymization)
• No Complex Key Management
• Business Intelligence
• Example: 0389 3778 3652 0038
41
Non-Production Systems
• Reversible
• Policy Control (Authorized / Unauthorized Access)
• Not Reversible
• Integrates Transparently
Cloud Gateway - Requirements Adjusted Protection
Data Protection Methods Scalability Storage Security Transparency
System without data protection
Weak Encryption (1:1 mapping)
Searchable Gateway Index (IV)
Vaultless Tokenization
Partial EncryptionPartial Encryption
Data Type Preservation Encryption
Strong Encryption (AES CBC, IV)
Best Worst
42
Data–Centric Audit and Protection (DCAP)
Organizations that have not developed data-centric
security policies to coordinate management processes
and security controls across data silos need to act
By 2018, data-centric audit and protection strategies
will replace disparate siloed data security governance
approaches in 25% of large enterprises, up from less
043
Source: Gartner – Market Guide for Data – Centric Audit and Protection (DCAP), Nov 21 2014
approaches in 25% of large enterprises, up from less
than 5% today
Centrally managed security policy
Across unstructured and structured silos
Classify data, control access and monitoring
Protection – encryption, tokenization and masking
Segregation of duties – application users and privileged
Data–Centric Audit and Protection (DCAP)
044
Segregation of duties – application users and privileged
users
Auditing and reporting
Source: Gartner – Market Guide for Data – Centric Audit and Protection (DCAP), Nov 21 2014
Central Management – Policy Deployment
Application
Protector
Database
Protector
EDW
Protector
Enterprise
Security
Administrator
PolicyPolicyPolicyPolicyPolicyPolicyPolicyPolicyPolicy
Security Office /
Security Team
Audit
Log
45
File
Protector
Big Data
Protector
Cloud Gateway
Inline Gateway
Protection
Servers
IBM Mainframe
Protectors
PolicyPolicyPolicyPolicyPolicyPolicyPolicyPolicyPolicy
File Protector
Gateway
Enterprise Data Security Policy
What is the sensitive data that needs to be protected.
How you want to protect and present sensitive data. There are several methods
for protecting sensitive data. Encryption, tokenization, monitoring, etc.
Who should have access to sensitive data and who should not. Security access
control.
What
Who
How
46
When should sensitive data access be granted to those who have access. Day
of week, time of day.
Where is the sensitive data stored? This will be where the policy is enforced.
Audit authorized or un-authorized access to sensitive data.
When
Where
Audit
Audit
Log
Audit
Log
Audit
Log
Central Management – Audit Log Collection
Application
Protector
Database
Protector
EDW
Protector
Enterprise
Security
Administrator
Security Office /
Security Team
Audit
Log
Audit
Log
Audit
Log
Log
Audit
Log
Audit
Log
Audit
Log
Audit
Log
47
File
Protector
Big Data
Protector
Cloud Gateway
Inline Gateway
Protection
Servers
IBM Mainframe
Protectors File Protector
Gateway
The biggest challenge in this new paradigm
• Cloud and an interconnected world
• Merging data security with data value and productivity
What’s required?
• Seamless, boundless security framework – data flow
• Maximize data utility & Minimizing risk – finding the right balance
Value-preserving data-centric security methods
Summary
Value-preserving data-centric security methods
• How to keep track of your data and monitor data access outside the enterprise
• Best practices for protecting data and privacy in the perimeter-less enterprise.
What New Data Security Technologies are Available for Cloud?
How can Cloud Data Security work in Context to the Enterprise?
48
Thank you!Thank you!
Questions?
Please contact us for more information
www.protegrity.com
Ulf.Mattsson@protegrity.com
Brian.Samms@protegrity.com

More Related Content

PPTX
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
PPTX
Risk Management Practices for PCI DSS 2.0
PDF
ISSA: Cloud data security
PDF
Issa chicago next generation tokenization ulf mattsson apr 2011
PDF
ISACA Houston Texas Chapter 2010
PPT
Protecting Your Data in the Cloud - CSO - Conference 2011
PPTX
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10
PPTX
Emerging application and data protection for multi cloud
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
Risk Management Practices for PCI DSS 2.0
ISSA: Cloud data security
Issa chicago next generation tokenization ulf mattsson apr 2011
ISACA Houston Texas Chapter 2010
Protecting Your Data in the Cloud - CSO - Conference 2011
Bridging the gap between privacy and big data Ulf Mattsson - Protegrity Sep 10
Emerging application and data protection for multi cloud

What's hot (20)

PPTX
Data protection on premises, and in public and private clouds
PDF
Key note in nyc the next breach target and how oracle can help - nyoug
PPTX
New york oracle users group 2013 spring general meeting ulf mattsson
PPTX
Evolving regulations are changing the way we think about tools and technology
PPTX
New regulations and the evolving cybersecurity technology landscape
PPTX
Emerging application and data protection for cloud
PPTX
Jul 16 isaca london data protection, security and privacy risks - on premis...
PPTX
ISSA Atlanta - Emerging application and data protection for multi cloud
PPTX
A practical data privacy and security approach to ffiec, gdpr and ccpa
PPTX
Practical risk management for the multi cloud
PPTX
Unlock the potential of data security 2020
PDF
Where data security and value of data meet in the cloud brighttalk webinar ...
PPTX
ISACA Houston - How to de-classify data and rethink transfer of data between ...
PPTX
Big Data and Security - Where are we now? (2015)
PPTX
What I Learned at RSAC 2020
PDF
100+ Cyber Security Interview Questions and Answers in 2022
PPSX
Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...
PPTX
New technologies for data protection
PPTX
Privacy preserving computing and secure multi-party computation ISACA Atlanta
PDF
Isaca new delhi india privacy and big data
Data protection on premises, and in public and private clouds
Key note in nyc the next breach target and how oracle can help - nyoug
New york oracle users group 2013 spring general meeting ulf mattsson
Evolving regulations are changing the way we think about tools and technology
New regulations and the evolving cybersecurity technology landscape
Emerging application and data protection for cloud
Jul 16 isaca london data protection, security and privacy risks - on premis...
ISSA Atlanta - Emerging application and data protection for multi cloud
A practical data privacy and security approach to ffiec, gdpr and ccpa
Practical risk management for the multi cloud
Unlock the potential of data security 2020
Where data security and value of data meet in the cloud brighttalk webinar ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...
Big Data and Security - Where are we now? (2015)
What I Learned at RSAC 2020
100+ Cyber Security Interview Questions and Answers in 2022
Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...
New technologies for data protection
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Isaca new delhi india privacy and big data
Ad

Similar to Where Data Security and Value of Data Meet in the Cloud (20)

PDF
What I learned from RSAC 2019
PPTX
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
PPTX
Isaca atlanta - practical data security and privacy
PPTX
Emerging application and data protection for multi cloud
PDF
Practical advice for cloud data protection ulf mattsson - bright talk webin...
PDF
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
PDF
How the latest trends in data security can help your data protection strategy...
PPTX
Safeguarding customer and financial data in analytics and machine learning
PPTX
Infragard atlanta ulf mattsson - cloud security - regulations and data prot...
PPTX
Jun 15 privacy in the cloud at financial institutions at the object managemen...
PDF
Cloud data governance, risk management and compliance ny metro joint cyber...
PPTX
GDPR Part 5: Better Together Quest & Cyberquest
PDF
Data centric security key to digital business success - ulf mattsson - bright...
PPTX
Web 3.0 – From Buzzword to Security with Schellman
PDF
Enterprise Data Protection - Understanding Your Options and Strategies
PPTX
What is a secure enterprise architecture roadmap?
PPTX
Isaca how innovation can bridge the gap between privacy and regulations
PPTX
Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran
PDF
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
PPTX
Protecting data privacy in analytics and machine learning ISACA London UK
What I learned from RSAC 2019
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
Isaca atlanta - practical data security and privacy
Emerging application and data protection for multi cloud
Practical advice for cloud data protection ulf mattsson - bright talk webin...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
How the latest trends in data security can help your data protection strategy...
Safeguarding customer and financial data in analytics and machine learning
Infragard atlanta ulf mattsson - cloud security - regulations and data prot...
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Cloud data governance, risk management and compliance ny metro joint cyber...
GDPR Part 5: Better Together Quest & Cyberquest
Data centric security key to digital business success - ulf mattsson - bright...
Web 3.0 – From Buzzword to Security with Schellman
Enterprise Data Protection - Understanding Your Options and Strategies
What is a secure enterprise architecture roadmap?
Isaca how innovation can bridge the gap between privacy and regulations
Internet of Things (IOT) Cloud Security by Dr. Anton Ravindran
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Protecting data privacy in analytics and machine learning ISACA London UK
Ad

More from Ulf Mattsson (18)

PPTX
Jun 29 new privacy technologies for unicode and international data standards ...
PPTX
PPTX
May 6 evolving international privacy regulations and cross border data tran...
PPTX
Qubit conference-new-york-2021
PDF
Secure analytics and machine learning in cloud use cases
PPTX
Evolving international privacy regulations and cross border data transfer - g...
PDF
Data encryption and tokenization for international unicode
PPTX
The future of data security and blockchain
PPTX
GDPR and evolving international privacy regulations
PPTX
New opportunities and business risks with evolving privacy regulations
PPTX
What is tokenization in blockchain - BCS London
PPTX
Protecting data privacy in analytics and machine learning - ISACA
PPTX
What is tokenization in blockchain?
PPTX
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
PPTX
What is tokenization in blockchain?
PPTX
Protecting Data Privacy in Analytics and Machine Learning
PPTX
ISACA Houston - Practical data privacy and de-identification techniques
PPTX
Privacy preserving computing and secure multi party computation
Jun 29 new privacy technologies for unicode and international data standards ...
May 6 evolving international privacy regulations and cross border data tran...
Qubit conference-new-york-2021
Secure analytics and machine learning in cloud use cases
Evolving international privacy regulations and cross border data transfer - g...
Data encryption and tokenization for international unicode
The future of data security and blockchain
GDPR and evolving international privacy regulations
New opportunities and business risks with evolving privacy regulations
What is tokenization in blockchain - BCS London
Protecting data privacy in analytics and machine learning - ISACA
What is tokenization in blockchain?
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
What is tokenization in blockchain?
Protecting Data Privacy in Analytics and Machine Learning
ISACA Houston - Practical data privacy and de-identification techniques
Privacy preserving computing and secure multi party computation

Recently uploaded (20)

PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Cloud computing and distributed systems.
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Empathic Computing: Creating Shared Understanding
PDF
Machine learning based COVID-19 study performance prediction
PPT
Teaching material agriculture food technology
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Advanced Soft Computing BINUS July 2025.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Cloud computing and distributed systems.
“AI and Expert System Decision Support & Business Intelligence Systems”
Chapter 3 Spatial Domain Image Processing.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Reach Out and Touch Someone: Haptics and Empathic Computing
Empathic Computing: Creating Shared Understanding
Machine learning based COVID-19 study performance prediction
Teaching material agriculture food technology
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Advanced methodologies resolving dimensionality complications for autism neur...
Unlocking AI with Model Context Protocol (MCP)
NewMind AI Monthly Chronicles - July 2025
Advanced Soft Computing BINUS July 2025.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Per capita expenditure prediction using model stacking based on satellite ima...
GamePlan Trading System Review: Professional Trader's Honest Take
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....

Where Data Security and Value of Data Meet in the Cloud

  • 1. Where Data Security and Value of Data Meet in the Cloud - Practical advice for cloud data security Ulf Mattsson CTO, Protegrity Ulf.Mattsson@protegrity.com
  • 2. Cloud Security Alliance (CSA) PCI Security Standards Council • Cloud & Virtualization SIGs • Encryption Task Force • Tokenization Task Force Ulf Mattsson, Protegrity CTO ANSI X9 • American National Standards Institute IFIP • WG 11.3 Data and Application Security • International Federation for Information Processing 2
  • 3. Involvement in Payment Card Industry Data Security Standard: 1. PCI SSC Tokenization Task Force 2. PCI SSC Encryption Task Force 3. PCI SSC Point to Point Encryption Task Force 4. PCI SSC Risk Assessment SIG 5. PCI SSC eCommerce SIG Ulf Mattsson, Protegrity CTO 5. PCI SSC eCommerce SIG 6. PCI SSC Cloud SIG 7. PCI SSC Virtualization SIG 8. PCI SSC Pre-Authorization SIG 9. PCI SSC Scoping SIG Working Group 2 10. PCI SSC 2014 Tokenization Task Force (TkTF). 3
  • 4. 4
  • 5. The New Enterprise Paradigm • Cloud computing, IoT and the disappearing perimeter • Data is the new currency Rethinking Data Security for a Boundless World • The new wave of challenges to security and productivity • Seamless, boundless security framework – data flow • Maximize data utility & minimizing risk – finding the right balance Agenda • Maximize data utility & minimizing risk – finding the right balance New Security Solutions, Technologies and Techniques • Data-centric security technologies • Data security and utility outside the enterprise • Cloud data security in context to the enterprise Best Practices 5
  • 6. Verizon Data Breach Investigations Report • Enterprises are losing ground in the fight against persistent cyber-attacks • We simply cannot catch the bad guys until it is too late. This picture is not improving • Verizon reports concluded that less than 14% of breaches are detected by internal Enterprises Losing Ground Against Cyber-attacks of breaches are detected by internal monitoring tools JP Morgan Chase data breach • Hackers were in the bank’s network for months undetected • Network configuration errors are inevitable, even at the larges banks We need a new approach to data security 6
  • 7. High-profile Cyber Attacks 49% recommended Database security 40% of budget still on Network security 7 40% only 19% to database security Conclusion: Organisations have traditionally spent money on network security and so it is earmarked in the budget and requires no further justification
  • 9. Big data projects in 2015 • Integration with the outside world Security prevents big data from becoming a prevalent enterprise computing Integration with Outside World 26 billion devices on the Internet of Things by 2020 (Gartner) 9 www.infoworld.com/article/2866831/big-data/in-2015-big-data-will-slowly- permeate-the-borders-of-the-enterprise.html enterprise computing platform • 3rd party products are helping wikipedia.org
  • 10. CHALLENGE How can I Secure the 10 Secure the Perimeter-less Enterprise?
  • 12. What Is Your No. 1 Issue Slowing Adoption of Public Cloud Computing? 12
  • 13. Data Security Holding Back Cloud Projects 13 Source: Cloud Adoption Practices & Priorities Survey Report January 2015
  • 14. Security of Data in Cloud at Board-level 14 Source: Cloud Adoption Practices & Priorities Survey Report January 2015
  • 16. New Options to Secure 16 to Secure Cloud Data
  • 17. Rather than making the protection platform based, the security is applied directly to the data Protecting the data wherever it goes, in any environment Data-Centric Protection Increases Security in Cloud Computing Cloud environments by nature have more access points and cannot be disconnected Data-centric protection reduces the reliance on controlling the high number of access points 17
  • 18. Key Challenges Storing and/or processing data in the cloud increases the risks of noncompliance through unapproved access and data breach Service providers will limit their liabilities to potential data breaches that may be taken for granted on-premises Simplify Operations and Compliance in the Cloud 018 breaches that may be taken for granted on-premises Gartner: Simplify Operations and Compliance in the Cloud by Protecting Sensitive Data, Jun 2015
  • 19. Recommendations Simplify audits & address data residency and compliance issues by applying encryption or tokenization and access controls. Digitally shred sensitive data at its end of life by deleting the encryption keys or tokens Understand that protecting sensitive data in cloud-based Simplify Operations and Compliance in the Cloud 019 Understand that protecting sensitive data in cloud-based software as a service (SaaS) applications may require trading off security and functionality Assess each encryption solution by following the data to understand when data appears in clear text, where keys are made available and stored, and who has access to the keys Gartner: Simplify Operations and Compliance in the Cloud by Protecting Sensitive Data, Jun 2015
  • 20. Corporate Network Security Gateway Deployment – Hybrid Cloud Client System Public Cloud Cloud Gateway Private Cloud 020 Enterprise Security Administrator Security Officer Out-sourced
  • 21. Corporate NetworkCorporate Network Security Gateway Deployment – Hybrid Cloud Client System Private Cloud Public Cloud Cloud Gateway 021 Enterprise Security Administrator Security Officer Gateway Out-sourced
  • 22. Corporate Network Client System Cloud Gateway Security Gateway – Searchable Encryption RDBMS Query re-write 022 Enterprise Security Administrator Security Officer Order preserving encryption
  • 23. Corporate Network Client System Cloud Gateway Security Gateway – Search & Indexing RDBMS Query re-write 023 Enterprise Security Administrator Security Officer IndexIndex
  • 25. Computational Usefulness Risk Adjusted Storage – Data Leaking Formats H 25 Data Leakage Strong-encryption Truncation Sort-order-preserving-encryption Indexing L I I I I
  • 26. Balancing Data Security & Utility Value Preserving Classification of Sensitive Data Granular Protection of Sensitive Data 26 Index Data Leaking Sensitive Data ? Encoding Leaking Sensitive Data ?
  • 27. Risk Adjusted Data Leakage Index Trust H Index Leaking Sensitive Data Sort Order Preserving Encryption Algorithms Leaking Sensitive Data 27 Index Data Elasticity Out-sourcedIn-house L Index NOT Leaking Sensitive Data
  • 28. Reduction of Pain with New Protection Techniques High Pain & TCO Strong Encryption Output: AES, 3DES Format Preserving Encryption DTP, FPE Input Value: 3872 3789 1620 3675 !@#$%a^.,mhu7///&*B()_+!@ 8278 2789 2990 2789 28 1970 2000 2005 2010 Low Vault-based Tokenization Vaultless Tokenization 8278 2789 2990 2789 Format Preserving Greatly reduced Key Management No Vault 8278 2789 2990 2789
  • 30. Fine Grained Data Security Methods Tokenization and Encryption are Different Used Approach Cipher System Code System Cryptographic algorithms Cryptographic keys TokenizationEncryption 30 Cryptographic keys Code books Index tokens Source: McGraw-HILL ENCYPLOPEDIA OF SCIENCE & TECHNOLOGY
  • 31. Tokenization Research Tokenization Gets Traction Aberdeen has seen a steady increase in enterprise use of tokenization for protecting sensitive data over encryption Nearly half of the respondents (47%) are currently using tokenization for something other than cardholder data Tokenization users had 50% fewer security-related incidents than tokenization non-users 31 Source: http://www.protegrity.com/2012/08/tokenization-gets-traction-from-aberdeen/
  • 32. 10 000 000 - 1 000 000 - 100 000 - 10 000 - Transactions per second* Speed of Fine Grained Protection Methods 10 000 - 1 000 - 100 - I Format Preserving Encryption I Vaultless Data Tokenization I AES CBC Encryption Standard I Vault-based Data Tokenization *: Speed will depend on the configuration 32
  • 33. Significantly Different Tokenization Approaches Property Dynamic Pre-generated Vault-based Vaultless 33
  • 34. Examples of Protected Data Field Real Data Tokenized / Pseudonymized Name Joe Smith csu wusoj Address 100 Main Street, Pleasantville, CA 476 srta coetse, cysieondusbak, CA Date of Birth 12/25/1966 01/02/1966 Telephone 760-278-3389 760-389-2289 E-Mail Address joe.smith@surferdude.org eoe.nwuer@beusorpdqo.org SSN 076-39-2778 076-28-3390 CC Number 3678 2289 3907 3378 3846 2290 3371 3378 Business URL www.surferdude.com www.sheyinctao.com Fingerprint Encrypted Photo Encrypted X-Ray Encrypted Healthcare / Financial Services Dr. visits, prescriptions, hospital stays and discharges, clinical, billing, etc. Financial Services Consumer Products and activities Protection methods can be equally applied to the actual data, but not needed with de-identification 34
  • 35. Use Case How Should I Secure Different Data? Simple – PCI PII Encryption of Files Card Holder Data Tokenization of Fields Personally Identifiable Information Type of Data I Structured I Un-structured Complex – PHI Protected Health Information 35 Personally Identifiable Information
  • 36. How to Balance Risk andRisk and Data Access 36
  • 37. High - Risk Adjusted Data Security – Access Controls Risk Exposure User Productivity and Creativity 37 Access to Sensitive Data in Clear Low Access to Data High Access to Data Low - I I
  • 38. High - Risk Adjusted Data Security – Tokenized Data User Productivity and Creativity 38 Access to Tokenized Data Low Access to Data High Access to Data Low - I I Risk Exposure
  • 39. Cost of Application Changes High - Risk Adjusted Data Security – Selective Masking Risk Exposure Cost Example: 16 digit credit card number 39 All-16-clear Only-middle-6-hidden All-16-hidden Low - I I I
  • 40. Fine Grained Security: Securing Fields Production Systems Encryption of fields • Reversible • Policy Control (authorized / Unauthorized Access) • Lacks Integration Transparency • Complex Key Management • Example: !@#$%a^.,mhu7///&*B()_+!@ 40 Non-Production Systems Masking of fields • Not reversible • No Policy, Everyone can access the data • Integrates Transparently • No Complex Key Management • Example: 0389 3778 3652 0038
  • 41. Fine Grained Security: Tokenization of Fields Production Systems Tokenization (Pseudonymization) • No Complex Key Management • Business Intelligence • Example: 0389 3778 3652 0038 41 Non-Production Systems • Reversible • Policy Control (Authorized / Unauthorized Access) • Not Reversible • Integrates Transparently
  • 42. Cloud Gateway - Requirements Adjusted Protection Data Protection Methods Scalability Storage Security Transparency System without data protection Weak Encryption (1:1 mapping) Searchable Gateway Index (IV) Vaultless Tokenization Partial EncryptionPartial Encryption Data Type Preservation Encryption Strong Encryption (AES CBC, IV) Best Worst 42
  • 43. Data–Centric Audit and Protection (DCAP) Organizations that have not developed data-centric security policies to coordinate management processes and security controls across data silos need to act By 2018, data-centric audit and protection strategies will replace disparate siloed data security governance approaches in 25% of large enterprises, up from less 043 Source: Gartner – Market Guide for Data – Centric Audit and Protection (DCAP), Nov 21 2014 approaches in 25% of large enterprises, up from less than 5% today
  • 44. Centrally managed security policy Across unstructured and structured silos Classify data, control access and monitoring Protection – encryption, tokenization and masking Segregation of duties – application users and privileged Data–Centric Audit and Protection (DCAP) 044 Segregation of duties – application users and privileged users Auditing and reporting Source: Gartner – Market Guide for Data – Centric Audit and Protection (DCAP), Nov 21 2014
  • 45. Central Management – Policy Deployment Application Protector Database Protector EDW Protector Enterprise Security Administrator PolicyPolicyPolicyPolicyPolicyPolicyPolicyPolicyPolicy Security Office / Security Team Audit Log 45 File Protector Big Data Protector Cloud Gateway Inline Gateway Protection Servers IBM Mainframe Protectors PolicyPolicyPolicyPolicyPolicyPolicyPolicyPolicyPolicy File Protector Gateway
  • 46. Enterprise Data Security Policy What is the sensitive data that needs to be protected. How you want to protect and present sensitive data. There are several methods for protecting sensitive data. Encryption, tokenization, monitoring, etc. Who should have access to sensitive data and who should not. Security access control. What Who How 46 When should sensitive data access be granted to those who have access. Day of week, time of day. Where is the sensitive data stored? This will be where the policy is enforced. Audit authorized or un-authorized access to sensitive data. When Where Audit
  • 47. Audit Log Audit Log Audit Log Central Management – Audit Log Collection Application Protector Database Protector EDW Protector Enterprise Security Administrator Security Office / Security Team Audit Log Audit Log Audit Log Log Audit Log Audit Log Audit Log Audit Log 47 File Protector Big Data Protector Cloud Gateway Inline Gateway Protection Servers IBM Mainframe Protectors File Protector Gateway
  • 48. The biggest challenge in this new paradigm • Cloud and an interconnected world • Merging data security with data value and productivity What’s required? • Seamless, boundless security framework – data flow • Maximize data utility & Minimizing risk – finding the right balance Value-preserving data-centric security methods Summary Value-preserving data-centric security methods • How to keep track of your data and monitor data access outside the enterprise • Best practices for protecting data and privacy in the perimeter-less enterprise. What New Data Security Technologies are Available for Cloud? How can Cloud Data Security work in Context to the Enterprise? 48
  • 49. Thank you!Thank you! Questions? Please contact us for more information www.protegrity.com Ulf.Mattsson@protegrity.com Brian.Samms@protegrity.com