8.0 - IBM - Security - Data - Encryption

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 21

IBM Guardium Data Encryption

Different Enterprise Use Cases Require Different Approaches


Original Value
4536 6382 9896 5200

Masking Redaction
The ability to desensitize personal information and
 The process of obscuring part of a text for
make it unreadable from original form while
security purposes.
preserving format and referential integrity
 it is a one way algorithm – ie. No unmasking data  The ability to replace real data with substitute
 SDM – Static Data Masking characters like (“*”)
 DDM – Dynamic
Data Masking Redacted Value
Masked Value
ABCD GDIC JIJG VXYZ **** **** **** 5200

Tokenization Encryption
 The process of substituting a “token” which can  The process of encoding data in such a way
be mapped to the original value that only authorized individuals can read it by
 Token is a non- personal data equivalent which decrypting the encoded data with a key
has no extrinsic value  Format Preserving Encryption (FPE) is a
 Must maintain a mapping between the tokens special form of encryption
and the original values

Token Value Encrypted Value


4212 5454 6565 7780 1@#43$%!xy1K2L4P

2 IBM Security IBM and Business Partner Confidential


Applying Encryption
• The process of encoding data EXAMPLE
so that only authorized users can Original Value Encrypted Value
read it by decrypting encrypted 4536 6382 9896 5200 1@#43$%!xy1K2L4P
data with a key

Database Unstructured Cloud


Encryption Data Encryption Encryption
Encrypt tablespace, Encrypt and control Encrypt and control
log and other access to any type of access to data used
database files data used by LUW server by cloud instances

3 IBM Security
Regulatory non-compliance is becoming more painful!
Regulatory Compliance is #1 reason
customers adopt encryption

COMPLIANCE PCI SOX HIPAA GDPR


REQUIREMENTS
Safeguard Protect Ensure patient Protect personal
cardholder data financial data privacy privacy and data

NON-COMPLIANCE $5K - $500K $1M - $5M Up to $1.5M Up to €20M


PENALTIES per month with possible per year or 4% annual
imprisonment WW turnover

How do you mitigate the RISK of data compromise and regulatory non-compliance?

4 IBM Security
And increasingly, demand for encryption is spurred by the need to protect
data, regardless of its location

Azure Private / Google


Micro

Cloud-based data:
AWS IBM
• Databases • File systems
• Data warehouses • Big data platforms

REMEMBER…
• You can’t always control what happens in cloud environments, but:
̶ You can control the DATA
̶ You must keep cloud service providers out of your sensitive data
• Compliance still applies - even in the cloud

5 IBM Security
2019 Data Security Encryption Portfolio

Guardium Data Multi-Cloud Data


Encryption (GDE) Encryption (MDE)
• On-Prem File Encryption • File, Volume, & S3 Encryption
• Agent-Server Architecture • Agent-Server Architecture
• OEM from Vormetric/Thales • OEM from Security First Corp

Security Key Lifecycle Guardium Data


Manager (SKLM) Encryption for IMS and
• Enterprise Key Mgmt DB2 (GDE4Z)
• KMIP Certified • Protects Database Contents
• Distributed and Z-versions • OEM from Rocket
available • Z-platform only

6 IBM Security
IBM Guardium Protect on-premises enterprise data while meeting
Data Encryption compliance mandates
Encryption Guardium Data Encryption

• Protects on-premise data from misuse


• Supports separation of duties
• Meets government and industry
compliance regulations
e.g., PCI, GDPR, etc. Oracle DB2

Hadoop Teradata NoSQL


Guardium
• Scales in heterogeneous Protect databases Data
Protect
and Big Data apps
environments Encryption

• Tokenization support
• Provides encryption for: Protect
files
̶ Files and Databases
̶ Applications
̶ Teradata environments

7 IBM Security
Imagine encryption… anywhere!

Encryption Encryption Encryption


Agents Agents Agents
Encryption Encryption
Agents Agents

On-Prem
Data Security
Manager (DSM) Encryption
Agents

REST API

IBM Guardium Data Encryption


helps provide distributed encryption and centralized management to protect
sensitive data for traditional, on-prem environments

8 IBM Security
IBM Guardium Guardium Data Encryption v3.0 Offers Different Components
Data Encryption
Guardium for File and Database Encryption
Encryption
• Encrypts Structured and Unstructured Data
• Agent-based solution with management server virtual appliance
• Next generation version of GDE v2.0 for files and database encryption
• GDE v2.0 can upgrade to Guardium for File and Database Encryption (v3.0) at no
charge as long as their S&S is current

Guardium for Application Encryption


• Offers an SDK that allows customers to directly integrate their applications with the
encryption agents
• Agent-based solution with management server virtual appliance
Guardium for Teradata Encryption
• Encrypts structured and unstructured data within a Teradata environment
• Agent-based solution with management server virtual appliance

Guardium for Tokenization


• Supports Database Tokenization though REST API calls
• Solution includes a tokenization server virtual appliance and a management server
virtual appliance

9 IBM Security
IBM Multi-Cloud Protect data in cloud and hybrid environments
Data Encryption while meeting compliance mandates
Encryption IBM Multi-Cloud Data Encryption

• Protect data in single cloud, multiple clouds


and hybrid environments from misuse
• Encrypts file, volume and object store data Protect cloud environments

while controlling and logging data access


• Meets government and industry compliance
regulations e.g., PCI, GDPR, etc.
IBM Multi-Cloud
Data
• Central console and agent model with over Encryption
On-Prem

10 languages supported
• Provides full REST API support Key
Management

• Integrates to IBM Security Key Lifecycle


Manager (SKLM) for more control

10 IBM Security
MDE 2.3 - Protecting data-at-rest wherever it resides

SIEM
System
Central
Administration
Management
Automation via Console
REST API
External Key Manager

NFS SERVER SERVER OBJECT


FILE VOLUME FILE STORE
AGENT AGENT AGENT AGENT
S3 API S3
OBJECT
STORAGE
NFS

provide access controls, encryption, monitoring and centralized management to


protect sensitive data in a single cloud, multiple clouds and hybrid environments

11 IBM Security
MDE 2.3 – Agents protect data-at-rest however it is stored

File Agent Protect local files and folders with access controls and encryption
File agent installed on the server with attached storage

Protect NFS mount with access controls and encryption


Linux NFS Support
File agent installed on the NFS client server
New in 2.3

Protect complete volumes/ partitions with access controls and encryption


Volume Agent Volume agent installed on the server with attached storage

Protect data with access controls and encryption via S3 API prior to transmit
Object Store Agent
Object store agent appliance serves as proxy for S3 object store

12 IBM Security
MDE 2.3 –Agents and Operating Systems

File Agent

Performance New in 2.3

Linux NFS Support


New in 2.3

Volume Agent

Object Store Agent Appliance

13 IBM Security
IBM Data Protection Ecosystem

Multi-Cloud
Da t a E nc r ypt i on

Security Key Lifecycle Manager QRadar


MDE
Agent

Object Store Agent

Data Risk Manager Cloud Object Storage


MDE
AGENT

File, Volume or NFS


Windows / Linux /
AIX
Guardium Data Protection Spectrum Protect

14 IBM Security
How Can We Protect Against S3 Threats?

Researchers from Kromtech Alliance Corp., based in


Dubai, found a Kubernetes console with no password
protection that included data from dozens of Amazon S3
buckets, but, allegedly, no personal data was accessed
in the Weight Watchers exposure.
Search tool accesses firms' documents in
the cloud
https://searchcloudsecurity.techtarget.com/news/252442
http://www.bbc.com/news/technology-
958/Weight-Watchers-exposure-due-to-unsecured-
43057681
Kubernetes-console

15 IBM Security
What is Object Store?

Block File Object


Interface Operating System User Program (API)

Cost $$-$$$ $$-$$$$ $

Performance

Dedicated Network
Proximity Fiber Channel / 10Gb
LAN / 10Gb Internet

Sharing user data, Images, PDFs,


Use Case OS, Database
web content Archives, Video

Scale

16 IBM Security
Encrypted Data Flow
Imagine a cloud … where you are in control! Clear Data Flow
Key and Policy Flow

AWS S3 Private S3 IBM COS


Object Store Object Store Object Store

Server with On-Prem


Object Store
MDE Policy Encryption Agent
Central Management and Keys
Console
S3 API
Keys and Policies
Local S3
Object Store

IBM Multi-Cloud Data Encryption – Object Store Encryption


Provide protection before it is sent to the cloud

17 IBM Security
Encrypted Data Flow
One Product – Multiple Solutions! Clear Data Flow
Encrypted Data Flow (split)
Keys and Policies

Servers protected by MDE File or Volume Agents High-Availability / Resiliency using Object Store Agent M-of-N splitting
on-prem or in the cloud

AWS S3 Private S3 IBM COS S3


AWS EC2 Server Object Storage Object Storage Object Storage
Volume with
Policy Agent
On-Cloud
Encrypt files and Folders On-Prem On-Prem
Server with Object
Store Encryption Agent
Central Management
Console S3 API
Private CoLo

File with Keys and Policies


Policy Agent

IBM Multi-Cloud Data Encryption – Flexibility


Provide protection wherever your data resides

18 IBM Security
SC Magazine Review of
Multi-Cloud Data Encryption (MDE)

“5 Stars”

“Verdict: This is a great product for large environments,


especially for those requiring GDPR support. It offers
Windows and Linux support, giving it versatility. The
customizability and security of the Multi-Cloud Data
Encryption, and the unique raid like setup gives
customers privacy assurance and flexibility. “
https://www.scmagazine.com/review/ibm-multi-cloud-data-encryption/

https://www.ibm.com/us-en/marketplace/cloud-data-encryption

19 IBM Security
https://securityintelligence.com/media/podcast-monitoring-national-cybersecurity-trends-with-former-nsa-deputy-director-bill-crowell/

20 IBM Security
THANK YOU
FOLLOW US ON:

ibm.com/security

securityintelligence.com
xforce.ibmcloud.com

@ibmsecurity

youtube/user/ibmsecuritysolutions

© Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind,
express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products
and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service
marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your
enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others.
No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems,
products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products
or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.

You might also like