Leveraging Existing IT Standards

author-image
DQC News Bureau
Updated On
New Update

In addition to reducing IT expenses, it is important to leverage existing
technology standards that will help ensure security, performance, scalability,
interoperability, and supportability of the overall solution. Furthermore, by
leveraging existing technology where appropriate, enterprises can more quickly
and effectively deploy a complete data privacy solution.

Advertisment
  • Authentication, authorization, and auditing technologies-Leverage
    all of the AAA services within an organization to augment a data privacy
    solution. This includes users and processes that have access to different
    resources, as well as an audit trail that can provide detailed logs for each
    access event.
  • Specialized hardware-Dedicated hardware platforms can perform
    cryptographic operations at a much faster rate than a software-based solution
    running on standard hardware. Some hardware solutions even provide an
    additional level of security by never allowing private keys to leave the
    device and performing all cryptographic operations internally.
  • Cryptographic algorithms-Use of standard and proven cryptographic
    algorithms, such as AES and RSA, are critical to ensuring a high-level of
    security and managing risk associated with evolving to future data privacy
    solutions.
  • Software interfaces-Use of standard software interfaces is
    important for managing the risk of future enhancements to data privacy
    solutions.

    Derek Tumulak VP-Product Management, SafeNet, Inc

Enterprise data protection

With data breaches on the rise, financial institutions must constantly
develop new strategies and security architectures to safeguard their assets.
Failure to stay in front of data threats will inevitably result in further
breaches, financial losses, and tarnished reputations. With more than 50 percent
of security breaches perpetrated internally, perimeter defenses are no longer
sufficient for securing data.

Today, companies need to extend their data infrastructure across business
units, partners, suppliers, customers, and a growing mobile workforce. The
outsider is now an insider. Because of this, financial institutions must adopt
an enterprise data protection strategy in order to effectively protect data from
the core to the edge of the enterprise, an end-to-end encryption solution across
databases, applications, networks, and endpoint devices. The result is secure
data at all times-at rest, in motion, and in use.

Advertisment

Many financial institutions are looking towards consolidation and merging
security infrastructures in an effort to cut costs, retain customers, and
improve business processes. Be careful. Data is extremely vulnerable during
consolidations because it resides on multiple heterogeneous systems that are
often complex, incompatible, and difficult to secure; the slightest hiccup can
be disastrous.

Define a security policy

Once the data identification and classification process is complete, you are
ready to develop a security policy, which turns enterprise expectations into
tenable objectives. The essential points of a comprehensive security policy
include:

Acceptable threat level-keeping in mind that the sooner in the data
processing life cycle the data is encrypted, the more secure the overall
environment.

Advertisment

Authentication and authorization policies-that leverage best practices
and historical information to help determine which users, processes, and
applications have access to sensitive information.

Mode of data privacy

Implementing a data privacy solution can be done at multiple points within
the enterprise. Choosing the point of implementation dictates the work ahead and
significantly affects the overall security model.

While classifying sensitive data

  •  Determine data
    confidentiality level

  •  Identify and
    classify sensitive data

  • Determine where sensitive data
    is located

  • Determine data access models


  • Advertisment

    Network-level encryption guarantees the most secure deployment of a data
    privacy solution, ensuring that the data is secured at every point within the
    enterprise. Enterprises routinely interact with customers, partners, and other
    entities over the Internet, and secure the transport of those communications
    with well-defined and mature technologies, such as SSL and IPsec. Yet, once
    these secure communication points are terminated, typically at the network
    perimeter, secure transports are seldom used within the enterprise.
    Consequently, information that has been transmitted is in the clear and left
    unprotected. One solution is to selectively parse data after the secure
    communication is terminated and encrypt sensitive data elements at the SSL/Web
    layer. Doing so allows enterprises to choose, at a very granular level,
    sensitive data and secure it throughout the enterprise.

    Application-level encryption allows enterprises to selectively encrypt
    granular data within application logic. This solution provides a strong security
    framework and will leverage standard application cryptographic APIs. This type
    of solution is well-suited for data elements (eg credit cards, e-mail addresses,
    critical health records, etc.) that are processed, authorized, and manipulated
    at the application tier. Application-level encryption protects data against
    database and storage attacks, and theft of storage media.

    Essential building blocks

    When considering a data privacy solution, there are clear choices regarding
    the modes of implementation. All of these options vary in terms of security
    model, yet each provides a level of protection aligned with the potential
    requirements of an enterprise.

    Advertisment

    Secure key management-At the heart of any data privacy solution are
    the secret cryptographic keys used for encrypting and decrypting sensitive data.
    The data privacy solution must include the ability to securely generate and
    manage keys. This can be achieved by centralizing and automating key management
    tasks on a single platform, leading to both operational efficiency and reduced
    cost.

    Backup and recovery-Backing up all cryptographic keys and
    configuration information is essential so all information can be restored from a
    secure device after an unplanned outage. As the enterprise considers key
    rotation as part of a proper security strategy, they must also design a
    mechanism with which to associate cryptographic keys to periods of time during
    which the keys were used.

    Hardware-Today's complex and performance-sensitive environments
    require the use of specialized cryptographic chipsets built around handling
    high-volume cryptographic operations. Doing so will help keep application,
    database, and storage systems at optimal performance levels.

    Advertisment

    An effective data privacy solution must follow the data from the core, where
    key data repositories exist, to the edge, where the data is used. When selecting
    a data privacy solution-especially in times of transition or consolidation-you
    should know the fundamental elements of the solution, be sure to leverage
    standards-based technologies, and insist that proper planning and cooperation
    occur. Doing so will ensure an effective security solution that reduces the
    complexity, management, and maintenance costs of the organization's IT
    infrastructure, as well as provide a foundation for addressing future data
    protection needs, business processes, and regulatory compliance mandates.