SlideShare uma empresa Scribd logo
1 de 33
Baixar para ler offline
Cost Effective Data Protection

                Ulf Mattsson, CTO
Agenda

   Determining risks
   Risk valuation
   Data Protection options
   Cost effective approach
The Current Situation

                 While the economy is down, cybercrime is up
                 Data breach costs rise to $202 per record1




                                   Booming cybercrime economy sucks
                                   in recruits
                                   By John Leyden • Get more from this author
                                   Posted in Crime, 24th November 2008 13:47 GMT
                                   The underground economy is booming even as the rest
                                   of the economy lurches towards recession, according
                                   to a new study by Symantec.




1Source:   Ponemon Institute
Online Exposure2

            Online Data – largest number of breaches
            Offline data – larger number of records stolen




          87% of breaches could have been avoided through reasonable controls


2Slide   source: Verizon Business 2008 Data Breach Investigations Report
 04
The Goal: Good, Cost Effective Security

       The goal is to deliver a solution that is a balance
       between security, cost, and impact on the current
       business processes and user community

         Security plan - short term, long term, ongoing
         How much is ‘good enough’
         Security versus compliance
            • Good Security = Compliance
            • Compliance ≠ Good Security




05
Risk Adjusted Data Protection

         Assign value to your data
         Assess exposure
         Determine risk
         Understand which Data Protection solutions are
         available to you
         Estimate costs
         Choose most cost effective method




06
Assign Value to Your Data

         Identify sensitive data
            • If available, utilize data classification project
            • Rank what is sensitive on its own (think PCI)
            • Consider what is sensitive in combination (think Privacy)
         How valuable is the data to (1) your company and
         (2) to a thief
            • Corporate IP, Credit Card numbers, Personally
              Identifiable Information
         Assign a numeric value: high=5, low=1




07
Assess Exposure

        Locate the sensitive data
           • Applications, databases, files, data transfers across
             internal and external networks
        Location on network
           • Segmented
           • External or partner facing application
        Access
           • How many users have access to the sensitive data?
           • Who is accessing sensitive data?
           • How much and how frequently data is being accessed?
        Assign a numeric value: high=5, low=1

08
Determine Risk

         Data Security Risk=Data Value * Exposure

        Data Field             Value   Exposure   Risk Level
        Credit Card Number       5        5           25
        Social Security Number   5        4           20
        CVV                      5        4           20
        Customer Name            3        4           12
        Secret Formula           5        2           10
        Employee Name            3        3            9
        Employee Health Record   3        2            6
        Zip Code                 1        3            3



           Enables prioritization
           Groups data for potential solutions


09
Data Protection Approaches

          Data Access Control
            • How the data is presented to the end user and/or
              application


          Data Protection
            • How sensitive data is rendered unreadable




010
Data Protection Options

          Data Stored As
            • Clear – actual value is readable
            • Hash – unreadable, not reversible
            • Encrypted – unreadable, reversible
            • Replacement value (tokens) – unreadable, reversible
            • Partial encryption/replacement – unreadable, reversible




011
Data Protection Options

          Data in the Clear
            • Audit only
            • Masking
            • Access Control Limits
          Advantages
            • Low impact on existing applications
            • Performance
            • Time to deploy
          Considerations
            • Underlying data exposed
            • Discover breach after the fact

012
Data Protection Options

          Hash
            • Non – reversible
            • Strong protection
                 • Keyed hash (HMAC)
                 • Unique value if salt is used
          Advantages
            • None really
          Considerations
            • Key rotation for keyed hash
            • Size and type
            • Transparency

013
Data Protection Options

          Strong Encryption
            • Industry standard (AES CBC …)
            • Highest security level
          Advantages
            • Widely deployed
            • Compatibility
            • Performance
          Considerations
            • Storage and type
            • Transparency to applications
            • Key rotation

014
Data Protection Options

          Format Controlling Encryption
            • Maintains data type, length
          Advantages
            • Reduces changes to downstream systems
            • Storage
            • Partial encryption
          Considerations
            • Performance
            • Security
            • Key rotation
            • Transparency to applications

015
Data Protection Options

          Replacement Value (i.e. tokens, alias)
            • Proxy value created to replace original data
            • Centrally managed, protected
          Advantages
            • No changes to most downstream systems
            • Out of scope for compliance
            • No local key rotation
            • Partial replacement
          Considerations
            • Transparency for applications needing original data
            • Availability and performance for applications needing
              original data
016
Field Level Data Protection Methods vs. Time
         Protection
           Level
                                                   Tokenized Data
 High
                            Key
                          Rotation
                                             AES CBC




                                                 HMAC




                                                 AES FCE
             Plain Hash

Medium
                                                    Time
Format Controlling Encryption vs. Time
         Protection
           Level
                                             Tokenized Data
 High


                                                AES FCE
                                             (numeric & IV)




                                                 AES FCE
                                           (alphanumeric & fix IV)
Medium
                                                      Time
Field Level Data Protection Methods vs. Time
         Protection
           Level
                                                    Tokenized Data
 High



                                             AES CBC (rotating IV)



                                             AES CBC (fix IV, long data)


                                             AES CBC (fix IV, short data)
                                             AES ECB


Medium
                                                    Time
Data Protection Options & Cost Factors


       Storage              Performance   Storage   Security   Transparency

       Clear

       Strong Encryption

       Format Control
       Encryption
       Token (reversible)

       Hash




                    Highest                                    Lowest




020
Data Protection Capabilities


       Storage              Performance   Storage   Security    Transparency

       Clear

       Strong Encryption

       Format Controlling
       Encryption
       Token

       Hash




                    Highest                                    Lowest




021
Data Protection Implementation Choices

          Data Protection Options are not mutually exclusive
          Data Protection Layers
            • Application
            • Database
            • File System
          Data Protection Topologies
            • Remote services
            • Local service
          Data Security Management
            • Central management of keys, policy and reporting


022
Data Protection Implementation Choices


        System Layer            Performance   Transparency      Security

        Application

        Database

        File System




        Topology                Performance       Scalability   Security

        Local Service

        Remote Service



                      Highest                    Lowest


023
Determine Risk

          Data Security Risk=Data Value * Exposure

         Data Field             Value   Exposure   Risk Level
         Credit Card Number       5        5           25
         Social Security Number   5        4           20
         CVV                      5        4           20
         Customer Name            3        4           12
         Secret Formula           5        2           10
         Employee Name            3        3            9
         Employee Health Record   3        2            6
         Zip Code                 1        3            3



            Enables prioritization
            Groups data for potential solutions


024
Matching Data Protection Solutions with Risk Level

             Risk                      Solutions
         Low Risk                Monitor
           (1-5)

                                 Monitor, mask,
          At Risk
                                 access control
           (6-15)
                                 limits, format control
                                 encryption
                                 Replacement,
         High Risk
                                 strong encryption
          (16-25)




025
Matching Data Protection Solutions with Risk Level
Data Field             Risk Level
Credit Card Number         25
Social Security Number     20
CVV                        20
                                    Risk            Solutions
Customer Name              12
Secret Formula             10
                                    Low Risk
Employee Name              9                    Monitor
                                      (1-5)
Employee Health Record     6
Zip Code                   3
                                                Monitor, mask,
                                     At Risk    access control
                                      (6-15)    limits, format
  Select risk-adjusted                          control
                                                encryption
  solutions for costing
                                                Replacement,
                                    High Risk
                                                strong
                                     (16-25)
                                                encryption


026
Estimate Costs

        Cost = Solution Cost + Operations Cost
          Solution Cost = cost to license or develop, install
          and maintain
          Operations Cost = cost to change applications,
          impact on downstream systems, meeting SLAs,
          user experience




027
Operation Cost Factors

          Performance
            • Impact on operations - end users, data processing
              windows
          Storage
            • Impact on data storage requirements
          Security
            • How secure Is the data at rest
            • Impact on data access – separation of duties
          Transparency
            • Changes to application(s)
            • Impact on supporting utilities and processes

028
Operation Cost Factors

          Solution should be able to change with the
          environment
            • Progress from less to more secure solution, or the
              reverse
            • Add new defenses for future threats
            • Plug into existing infrastructure, integrate with other
              systems




029
The Protegrity Defiance© Suite

         Data Protection System (DPS)
           • Encryption, monitoring, masking
           • Database, file and application level
         Threat Management System (TMS)
           • Web application firewall
         Enterprise Security Administrator
           • Security policy
           • Key management
           • Alerting, reporting, and auditing




30
Data Security Management

         An integral part of technical and business process
         Security Policy
            • Centralized control of security policy
            • Consistent enforcement of protection
            • Separation of duties
         Reporting and Auditing
            • Compliance reports
            • Organization wide security event reporting
            • Alerting
            • Integration with SIM/SEM
         Key Management
031
Cost Effective Data Protection

          Uses Risk as an adjusting factor for determining a
          Data Protection strategy
          Risk=Data Value*Exposure
          Determines solutions that fit the risk level, then
          determines cost
          Cost=Solution Cost + Operational Cost
          Prepare for the future




032
Questions?

If you would like a copy of the slides,
                         please email
        ulf.mattsson@protegrity.com

Mais conteúdo relacionado

Semelhante a Cost Effective Data Protection

Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
Atlanta ISSA  2010 Enterprise Data Protection   Ulf MattssonAtlanta ISSA  2010 Enterprise Data Protection   Ulf Mattsson
Atlanta ISSA 2010 Enterprise Data Protection Ulf MattssonUlf Mattsson
 
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data ProtectionISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data ProtectionUlf Mattsson
 
ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data ProtectionISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data ProtectionUlf Mattsson
 
Cloud-enabled Protection of Data Integrity and Authenticity of Electronic Con...
Cloud-enabled Protection of Data Integrity and Authenticity of Electronic Con...Cloud-enabled Protection of Data Integrity and Authenticity of Electronic Con...
Cloud-enabled Protection of Data Integrity and Authenticity of Electronic Con...Surety, LLC
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Amazon Web Services
 
IBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf MattssonIBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf MattssonUlf Mattsson
 
MongoDB World 2019: New Encryption Capabilities in MongoDB 4.2: A Deep Dive i...
MongoDB World 2019: New Encryption Capabilities in MongoDB 4.2: A Deep Dive i...MongoDB World 2019: New Encryption Capabilities in MongoDB 4.2: A Deep Dive i...
MongoDB World 2019: New Encryption Capabilities in MongoDB 4.2: A Deep Dive i...MongoDB
 
DNS Security, is it enough?
DNS Security, is it enough? DNS Security, is it enough?
DNS Security, is it enough? Zscaler
 
Vormetric data security complying with pci dss encryption rules
Vormetric data security  complying with pci dss encryption rulesVormetric data security  complying with pci dss encryption rules
Vormetric data security complying with pci dss encryption rulesVormetric Inc
 
SafeNet - Data Protection Company
SafeNet - Data Protection CompanySafeNet - Data Protection Company
SafeNet - Data Protection CompanyASBIS SK
 
Secure Channels Presentation
Secure Channels PresentationSecure Channels Presentation
Secure Channels PresentationRichard Blech
 
Securing data today and in the future - Oracle NYC
Securing data today and in the future - Oracle NYCSecuring data today and in the future - Oracle NYC
Securing data today and in the future - Oracle NYCUlf Mattsson
 
Enterprise Data Protection - Understanding Your Options and Strategies
Enterprise Data Protection - Understanding Your Options and StrategiesEnterprise Data Protection - Understanding Your Options and Strategies
Enterprise Data Protection - Understanding Your Options and StrategiesUlf Mattsson
 
ISSA: Cloud data security
ISSA: Cloud data securityISSA: Cloud data security
ISSA: Cloud data securityUlf Mattsson
 
Tokenization vs encryption vs masking
Tokenization vs encryption vs maskingTokenization vs encryption vs masking
Tokenization vs encryption vs maskingUlf Mattsson
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutionsfrontone
 
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...Data Con LA
 

Semelhante a Cost Effective Data Protection (20)

Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
Atlanta ISSA  2010 Enterprise Data Protection   Ulf MattssonAtlanta ISSA  2010 Enterprise Data Protection   Ulf Mattsson
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
 
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data ProtectionISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
 
ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data ProtectionISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
 
Cloud-enabled Protection of Data Integrity and Authenticity of Electronic Con...
Cloud-enabled Protection of Data Integrity and Authenticity of Electronic Con...Cloud-enabled Protection of Data Integrity and Authenticity of Electronic Con...
Cloud-enabled Protection of Data Integrity and Authenticity of Electronic Con...
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012
 
Enterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - IntelEnterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - Intel
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
IBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf MattssonIBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf Mattsson
 
MongoDB World 2019: New Encryption Capabilities in MongoDB 4.2: A Deep Dive i...
MongoDB World 2019: New Encryption Capabilities in MongoDB 4.2: A Deep Dive i...MongoDB World 2019: New Encryption Capabilities in MongoDB 4.2: A Deep Dive i...
MongoDB World 2019: New Encryption Capabilities in MongoDB 4.2: A Deep Dive i...
 
DNS Security, is it enough?
DNS Security, is it enough? DNS Security, is it enough?
DNS Security, is it enough?
 
Vormetric data security complying with pci dss encryption rules
Vormetric data security  complying with pci dss encryption rulesVormetric data security  complying with pci dss encryption rules
Vormetric data security complying with pci dss encryption rules
 
SafeNet - Data Protection Company
SafeNet - Data Protection CompanySafeNet - Data Protection Company
SafeNet - Data Protection Company
 
Secure Channels Presentation
Secure Channels PresentationSecure Channels Presentation
Secure Channels Presentation
 
Encryption Primer por Cathy Nolan
Encryption Primer por Cathy NolanEncryption Primer por Cathy Nolan
Encryption Primer por Cathy Nolan
 
Securing data today and in the future - Oracle NYC
Securing data today and in the future - Oracle NYCSecuring data today and in the future - Oracle NYC
Securing data today and in the future - Oracle NYC
 
Enterprise Data Protection - Understanding Your Options and Strategies
Enterprise Data Protection - Understanding Your Options and StrategiesEnterprise Data Protection - Understanding Your Options and Strategies
Enterprise Data Protection - Understanding Your Options and Strategies
 
ISSA: Cloud data security
ISSA: Cloud data securityISSA: Cloud data security
ISSA: Cloud data security
 
Tokenization vs encryption vs masking
Tokenization vs encryption vs maskingTokenization vs encryption vs masking
Tokenization vs encryption vs masking
 
FrontOne our new and different solutions
FrontOne our new and different solutionsFrontOne our new and different solutions
FrontOne our new and different solutions
 
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
 

Mais de Ulf Mattsson

Jun 29 new privacy technologies for unicode and international data standards ...
Jun 29 new privacy technologies for unicode and international data standards ...Jun 29 new privacy technologies for unicode and international data standards ...
Jun 29 new privacy technologies for unicode and international data standards ...Ulf Mattsson
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Ulf Mattsson
 
May 6 evolving international privacy regulations and cross border data tran...
May 6   evolving international privacy regulations and cross border data tran...May 6   evolving international privacy regulations and cross border data tran...
May 6 evolving international privacy regulations and cross border data tran...Ulf Mattsson
 
Qubit conference-new-york-2021
Qubit conference-new-york-2021Qubit conference-new-york-2021
Qubit conference-new-york-2021Ulf Mattsson
 
Secure analytics and machine learning in cloud use cases
Secure analytics and machine learning in cloud use casesSecure analytics and machine learning in cloud use cases
Secure analytics and machine learning in cloud use casesUlf Mattsson
 
Evolving international privacy regulations and cross border data transfer - g...
Evolving international privacy regulations and cross border data transfer - g...Evolving international privacy regulations and cross border data transfer - g...
Evolving international privacy regulations and cross border data transfer - g...Ulf Mattsson
 
Data encryption and tokenization for international unicode
Data encryption and tokenization for international unicodeData encryption and tokenization for international unicode
Data encryption and tokenization for international unicodeUlf Mattsson
 
The future of data security and blockchain
The future of data security and blockchainThe future of data security and blockchain
The future of data security and blockchainUlf Mattsson
 
New technologies for data protection
New technologies for data protectionNew technologies for data protection
New technologies for data protectionUlf Mattsson
 
GDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsUlf Mattsson
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaUlf Mattsson
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningUlf Mattsson
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKUlf Mattsson
 
New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsUlf Mattsson
 
What is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS LondonWhat is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS LondonUlf Mattsson
 
Protecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACAProtecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACAUlf Mattsson
 
What is tokenization in blockchain?
What is tokenization in blockchain?What is tokenization in blockchain?
What is tokenization in blockchain?Ulf Mattsson
 
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2bNov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2bUlf Mattsson
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020Ulf Mattsson
 

Mais de Ulf Mattsson (20)

Jun 29 new privacy technologies for unicode and international data standards ...
Jun 29 new privacy technologies for unicode and international data standards ...Jun 29 new privacy technologies for unicode and international data standards ...
Jun 29 new privacy technologies for unicode and international data standards ...
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...
 
Book
BookBook
Book
 
May 6 evolving international privacy regulations and cross border data tran...
May 6   evolving international privacy regulations and cross border data tran...May 6   evolving international privacy regulations and cross border data tran...
May 6 evolving international privacy regulations and cross border data tran...
 
Qubit conference-new-york-2021
Qubit conference-new-york-2021Qubit conference-new-york-2021
Qubit conference-new-york-2021
 
Secure analytics and machine learning in cloud use cases
Secure analytics and machine learning in cloud use casesSecure analytics and machine learning in cloud use cases
Secure analytics and machine learning in cloud use cases
 
Evolving international privacy regulations and cross border data transfer - g...
Evolving international privacy regulations and cross border data transfer - g...Evolving international privacy regulations and cross border data transfer - g...
Evolving international privacy regulations and cross border data transfer - g...
 
Data encryption and tokenization for international unicode
Data encryption and tokenization for international unicodeData encryption and tokenization for international unicode
Data encryption and tokenization for international unicode
 
The future of data security and blockchain
The future of data security and blockchainThe future of data security and blockchain
The future of data security and blockchain
 
New technologies for data protection
New technologies for data protectionNew technologies for data protection
New technologies for data protection
 
GDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulations
 
Privacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA AtlantaPrivacy preserving computing and secure multi-party computation ISACA Atlanta
Privacy preserving computing and secure multi-party computation ISACA Atlanta
 
Safeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learningSafeguarding customer and financial data in analytics and machine learning
Safeguarding customer and financial data in analytics and machine learning
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UK
 
New opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulationsNew opportunities and business risks with evolving privacy regulations
New opportunities and business risks with evolving privacy regulations
 
What is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS LondonWhat is tokenization in blockchain - BCS London
What is tokenization in blockchain - BCS London
 
Protecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACAProtecting data privacy in analytics and machine learning - ISACA
Protecting data privacy in analytics and machine learning - ISACA
 
What is tokenization in blockchain?
What is tokenization in blockchain?What is tokenization in blockchain?
What is tokenization in blockchain?
 
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2bNov 2 security for blockchain and analytics   ulf mattsson 2020 nov 2b
Nov 2 security for blockchain and analytics ulf mattsson 2020 nov 2b
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020
 

Último

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 

Último (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 

Cost Effective Data Protection

  • 1. Cost Effective Data Protection Ulf Mattsson, CTO
  • 2. Agenda Determining risks Risk valuation Data Protection options Cost effective approach
  • 3. The Current Situation While the economy is down, cybercrime is up Data breach costs rise to $202 per record1 Booming cybercrime economy sucks in recruits By John Leyden • Get more from this author Posted in Crime, 24th November 2008 13:47 GMT The underground economy is booming even as the rest of the economy lurches towards recession, according to a new study by Symantec. 1Source: Ponemon Institute
  • 4. Online Exposure2 Online Data – largest number of breaches Offline data – larger number of records stolen 87% of breaches could have been avoided through reasonable controls 2Slide source: Verizon Business 2008 Data Breach Investigations Report 04
  • 5. The Goal: Good, Cost Effective Security The goal is to deliver a solution that is a balance between security, cost, and impact on the current business processes and user community Security plan - short term, long term, ongoing How much is ‘good enough’ Security versus compliance • Good Security = Compliance • Compliance ≠ Good Security 05
  • 6. Risk Adjusted Data Protection Assign value to your data Assess exposure Determine risk Understand which Data Protection solutions are available to you Estimate costs Choose most cost effective method 06
  • 7. Assign Value to Your Data Identify sensitive data • If available, utilize data classification project • Rank what is sensitive on its own (think PCI) • Consider what is sensitive in combination (think Privacy) How valuable is the data to (1) your company and (2) to a thief • Corporate IP, Credit Card numbers, Personally Identifiable Information Assign a numeric value: high=5, low=1 07
  • 8. Assess Exposure Locate the sensitive data • Applications, databases, files, data transfers across internal and external networks Location on network • Segmented • External or partner facing application Access • How many users have access to the sensitive data? • Who is accessing sensitive data? • How much and how frequently data is being accessed? Assign a numeric value: high=5, low=1 08
  • 9. Determine Risk Data Security Risk=Data Value * Exposure Data Field Value Exposure Risk Level Credit Card Number 5 5 25 Social Security Number 5 4 20 CVV 5 4 20 Customer Name 3 4 12 Secret Formula 5 2 10 Employee Name 3 3 9 Employee Health Record 3 2 6 Zip Code 1 3 3 Enables prioritization Groups data for potential solutions 09
  • 10. Data Protection Approaches Data Access Control • How the data is presented to the end user and/or application Data Protection • How sensitive data is rendered unreadable 010
  • 11. Data Protection Options Data Stored As • Clear – actual value is readable • Hash – unreadable, not reversible • Encrypted – unreadable, reversible • Replacement value (tokens) – unreadable, reversible • Partial encryption/replacement – unreadable, reversible 011
  • 12. Data Protection Options Data in the Clear • Audit only • Masking • Access Control Limits Advantages • Low impact on existing applications • Performance • Time to deploy Considerations • Underlying data exposed • Discover breach after the fact 012
  • 13. Data Protection Options Hash • Non – reversible • Strong protection • Keyed hash (HMAC) • Unique value if salt is used Advantages • None really Considerations • Key rotation for keyed hash • Size and type • Transparency 013
  • 14. Data Protection Options Strong Encryption • Industry standard (AES CBC …) • Highest security level Advantages • Widely deployed • Compatibility • Performance Considerations • Storage and type • Transparency to applications • Key rotation 014
  • 15. Data Protection Options Format Controlling Encryption • Maintains data type, length Advantages • Reduces changes to downstream systems • Storage • Partial encryption Considerations • Performance • Security • Key rotation • Transparency to applications 015
  • 16. Data Protection Options Replacement Value (i.e. tokens, alias) • Proxy value created to replace original data • Centrally managed, protected Advantages • No changes to most downstream systems • Out of scope for compliance • No local key rotation • Partial replacement Considerations • Transparency for applications needing original data • Availability and performance for applications needing original data 016
  • 17. Field Level Data Protection Methods vs. Time Protection Level Tokenized Data High Key Rotation AES CBC HMAC AES FCE Plain Hash Medium Time
  • 18. Format Controlling Encryption vs. Time Protection Level Tokenized Data High AES FCE (numeric & IV) AES FCE (alphanumeric & fix IV) Medium Time
  • 19. Field Level Data Protection Methods vs. Time Protection Level Tokenized Data High AES CBC (rotating IV) AES CBC (fix IV, long data) AES CBC (fix IV, short data) AES ECB Medium Time
  • 20. Data Protection Options & Cost Factors Storage Performance Storage Security Transparency Clear Strong Encryption Format Control Encryption Token (reversible) Hash Highest Lowest 020
  • 21. Data Protection Capabilities Storage Performance Storage Security Transparency Clear Strong Encryption Format Controlling Encryption Token Hash Highest Lowest 021
  • 22. Data Protection Implementation Choices Data Protection Options are not mutually exclusive Data Protection Layers • Application • Database • File System Data Protection Topologies • Remote services • Local service Data Security Management • Central management of keys, policy and reporting 022
  • 23. Data Protection Implementation Choices System Layer Performance Transparency Security Application Database File System Topology Performance Scalability Security Local Service Remote Service Highest Lowest 023
  • 24. Determine Risk Data Security Risk=Data Value * Exposure Data Field Value Exposure Risk Level Credit Card Number 5 5 25 Social Security Number 5 4 20 CVV 5 4 20 Customer Name 3 4 12 Secret Formula 5 2 10 Employee Name 3 3 9 Employee Health Record 3 2 6 Zip Code 1 3 3 Enables prioritization Groups data for potential solutions 024
  • 25. Matching Data Protection Solutions with Risk Level Risk Solutions Low Risk Monitor (1-5) Monitor, mask, At Risk access control (6-15) limits, format control encryption Replacement, High Risk strong encryption (16-25) 025
  • 26. Matching Data Protection Solutions with Risk Level Data Field Risk Level Credit Card Number 25 Social Security Number 20 CVV 20 Risk Solutions Customer Name 12 Secret Formula 10 Low Risk Employee Name 9 Monitor (1-5) Employee Health Record 6 Zip Code 3 Monitor, mask, At Risk access control (6-15) limits, format Select risk-adjusted control encryption solutions for costing Replacement, High Risk strong (16-25) encryption 026
  • 27. Estimate Costs Cost = Solution Cost + Operations Cost Solution Cost = cost to license or develop, install and maintain Operations Cost = cost to change applications, impact on downstream systems, meeting SLAs, user experience 027
  • 28. Operation Cost Factors Performance • Impact on operations - end users, data processing windows Storage • Impact on data storage requirements Security • How secure Is the data at rest • Impact on data access – separation of duties Transparency • Changes to application(s) • Impact on supporting utilities and processes 028
  • 29. Operation Cost Factors Solution should be able to change with the environment • Progress from less to more secure solution, or the reverse • Add new defenses for future threats • Plug into existing infrastructure, integrate with other systems 029
  • 30. The Protegrity Defiance© Suite Data Protection System (DPS) • Encryption, monitoring, masking • Database, file and application level Threat Management System (TMS) • Web application firewall Enterprise Security Administrator • Security policy • Key management • Alerting, reporting, and auditing 30
  • 31. Data Security Management An integral part of technical and business process Security Policy • Centralized control of security policy • Consistent enforcement of protection • Separation of duties Reporting and Auditing • Compliance reports • Organization wide security event reporting • Alerting • Integration with SIM/SEM Key Management 031
  • 32. Cost Effective Data Protection Uses Risk as an adjusting factor for determining a Data Protection strategy Risk=Data Value*Exposure Determines solutions that fit the risk level, then determines cost Cost=Solution Cost + Operational Cost Prepare for the future 032
  • 33. Questions? If you would like a copy of the slides, please email ulf.mattsson@protegrity.com