Top 10 Encryption Benefits

Tuesday, April 30, 2013

Steve Pate

Cc281a493d63c492153ba35b86dcc794

If deployed correctly, encryption does not need to be a headache. Instead, encryption can be an enabler to achieve the flexibility, compliance and data privacy that is required in today’s business environments.

In a world that’s moving towards virtualization and cloud, the need for encryption is even more important, and the need for organizations to retain control over data, particularly in cloud environments, is paramount. Below are top 10 benefits for those considering encryption.

1. Encryption Helps Move to the Cloud

Everyone is concerned about moving sensitive data to the cloud, and most organizations perceive that the cloud is not as safe as their own data center. If your data is in the cloud, it’s not only possible that strangers might see it, but your data could be sitting on the same storage as your competitors. Imagine how much that treasure chest could be worth?

Encryption can make it possible to leverage the benefits of infrastructure as a service, while still ensuring the privacy of your data. You should ensure data is encrypted in flight, while in use, and at rest in storage. By retaining control of your encryption keys, you’re still in control, even when data has left your building. If the service provider makes copies of your VMs, only encrypted data is copied. And at all times, you determine when to deliver, or revoke, the keys.

2.  When You Own the Keys, You Can Easily Decommission/Deprovision

Would you put your jewels in a safe and give a stranger the key? Would you have your data encrypted in the cloud and have the cloud service provider own the keys? Probably not the most secure option.

Organizations want to take advantage of the cloud for its cost and flexibility. Part of this value is the ability to spin up or decommission servers, as business needs change. But what happens if you want to leave your service provider? You want to be sure you can get your data back, but you also want to make sure you’re not leaving sensitive data behind. How many copies or backups of your VMs has your service provider created so that they can achieve their operational uptime SLA’s? It’s simply impractical for a CSP to retrieve and delete every copy if you decide to leave.

3.  Encryption Helps Achieve Secure Multi-Tenancy in the Cloud

In virtualized cloud environments, multi-tenancy is what drives costs down and increases flexibility. Why dedicate one enterprise-level server to one workload when it can serve many? While virtualization is not new and organizations have taken advantage of its virtues for years, having your VMs and applications running on the same physical servers as other departments or organizations raises some security concerns.

Not only do virtualized servers become richer targets, but if those machines are running in a public cloud infrastructure, you have limited control over who ‘shares’ your hardware. And while strides have been made solving many of the network segmentation issues, another major security challenge still exists: what happens to your data within the storage fabric? If you encrypt data before it enters the cloud, and retain control of the encryption keys, you can ensure your data is safe, regardless of its neighbors.

4. Encryption Key Services Prevent Service Providers from Accessing my Data

 If the service provider has both your encrypted data and your encryption keys, they are able to access your data. To avoid this problem, encrypting your data in the cloud and holding your own keys just makes sense. However, many organizations simply don’t want to manage encryption keys, no matter how easy the key management solution is. They have concerns around backup, availability and DR. This is where a third party comes into play. Why not have your encrypted data with one service provider and have your keys managed by a different service provider?

“Data security as a Service” solves many of these challenges by making sure that key servers are always accessible - always backed up, replicated and protected from disaster. It’s a win-win situation. The service provider holding your data doesn’t own your keys. The security service provider holding your keys doesn’t have access to your data. Encryption now becomes a simple option.

5.  Encryption Helps You Meet Regulations

The Payment Card Industry (PCI) has strict guidelines to ensure protection of cardholder data. We all use credit cards and understandably want assurance that our information is safe. Naturally, encryption is a major piece of the PCI Data Security Standard (PCI DSS). But there’s also HIPAA/HITECH, regulations that mandate protection of health care information. Once again, encryption is a critical part of the standard.

Although not all standards mandate encryption, it’s highly recommended. And given the high cost of breach notification and the fact that DLP technology is always revealing sensitive data in places you wouldn’t have thought of, doesn’t encryption just make sense? After all, we wouldn’t shop online without it.

6.  Encryption Provides Safe Harbor from Breach Notification

Did you know that there are data breach notification laws in 46 of the 50 states. The cost of breaches continues to escalate: the average cost to an organization for a data breach was $5.5 million in 2012.

If a data breach occurs and personally identifiable information is lost, the breached party must notify all individuals who are impacted. Just recently, Global Payments indicated in their quarterly SEC filing that the company expects to pay $94M to address its 2012 security breach of 1.5 million credit and debit card numbers. Some of the states have a safe harbor clause from public notification if the stolen data is encrypted and if the encryption keys are not compromised. Therefore, deploying encryption and robust key management could save you millions of dollars in the event of a breach.

7. Encryption Gives Services Providers a Competitive Edge

As a cloud service provider, you are a guardian of your customers’ applications and data. Thieves are getting smarter and regulations are getting more stringent. The good news is that security technology is also getting better.

Encryption and key management software, designed specifically for virtualized environments, can help you significantly improve your security posture, attract new customers, and expand your business with existing clients. This allows you to:

-       Gain competitive advantage and differentiation

-       Expand revenue potential to customers with sensitive or regulated data

-       Protect customer data against access by unauthorized users

-       Satisfy data residency and privacy requirements

-       Reduce hardware costs through cryptographic multi-tenancy

-       Assure customers that they can de-provision securely without leaving data behind

Newer encryption technologies are easy-to-deploy and offer robust APIs that allow for transparent integration into the CSP environment.

8. Encryption Provides Confidence That Your Backups Are Safe

In October of 2012, TD Bank reported the loss of two backup tapes that may have exposed personally identifiable information for about 260,000 of the bank's eight million U.S. customers. In 2011 there was a massive data breach affecting 4.9 million individuals who received services from TRICARE, a provider of health care services to active and retired military personnel. Once again, the data breach occurred as a result of lost backup tapes.

These are not isolated cases. A simple Google search will show many more examples of backup tapes that go missing. Now what would happen if the data on these tapes or other backups were encrypted? The answer is quite simple - nothing! Without access to encryption keys, extremely powerful computation and knowledge that is beyond the ability of most people, there is next to no chance of retrieving any data from these backups.

9. Encryption Allows You to Secure Your Remote Offices

Many organizations have remote offices, which, by their very nature, are not very secure. The opportunity for physical theft of computers and storage is very real. Many of these organizations have sensitive data sitting on these servers unprotected. Just think about it. Financial planners, tax accountants and other service organizations all have important data sitting in their offices. And these are many of the same organizations that are afraid of data leaving the building and going to the cloud.

Well-trained IT staffs are often scarce at these sites, so remote management from the data center becomes the norm. Encrypting data on these servers helps against theft or accidental loss of data, and today’s encryption solutions have even broader capabilities. Imagine only delivering encryption keys to remote data during office hours, ensuring that the data is completely unusable to anyone once the lights go out.

10. Secure Outsourcing and Licensing

The flexibility of virtual machines has opened up a new world to many organizations. Instead of shipping software packages, why not just ship the virtual machine? After all, it’s just a set of files and the ease with which a VM can be spun up reduces the complexity of supporting different operating system versions and platforms. Organizations that are outsourcing often ship virtual machines. Many companies are also shipping their applications as physical or virtual appliances. When companies outsource, the VM may contain company IP such as program source code. For the application developer, shipping software via VMs creates a licensing challenge.

In both cases, the important data could be encrypted, the application stack can be configured to meet the security needs of the company shipping the VM. By holding keys in your data center, you control access to the data. Encryption and strong key management can help you meet these challenges.

Steve Pate is CTO and co-founder of HighCloud Security, bringing 25 years of designing, building, and delivering file system, operating system, and security technologies, with a proven history of converting market-changing ideas into enterprise-ready products. Before HighCloud Security, he built and led teams at ICL, SCO, VERITAS, HyTrust, Vormetric, and others. HighCloud’s resident author, Steve has published two well-respected books on UNIX kernel internals and UNIX file systems, as well as hundreds of articles and blogs

Possibly Related Articles:
14078
Encryption Compliance Cloud Encryption Keys regulations
Post Rating I Like this!
The views expressed in this post are the opinions of the Infosec Island member that posted this content. Infosec Island is not responsible for the content or messaging of this post.

Unauthorized reproduction of this article (in part or in whole) is prohibited without the express written permission of Infosec Island and the Infosec Island member that posted this content--this includes using our RSS feed for any purpose other than personal use.