1
42 Infosecurity Today May/June 2006 c o l u m n W ith the distinction between the inside and outside of an enter- prise disappearing, and remote users demanding access from anywhere at anytime, organizations are turning to a more data-centric approach to security. Encryption is fundamental to this shift. While cryptography has long been used to protect data in transmission, it is now used to protect data at rest, in databases, file systems and storage devices. In addition, cryptography is expanding beyond privacy enforce- ment to establish the integrity of data and documents, and to ensure the se- curity of audit information, easing compliance. Many of the building blocks for this new data-centric security are already in place. Public key enabled applications. The 'year of PKI' never happened, but functionality based on public key cryptography is everywhere. The ability to use digital certifi- cates, signatures and encryption now support secure web sites, email messaging, mutual authentica- tion and document protection. SSL everywhere. No longer limited to e-commerce, Secure Socket Layer is a ubiquitous feature of enterprise appli- cations and networking equipment. Plug and play data level protection. Adopting data encryption has often meant modifying software applica- tions, writing custom code and changing business processes.Today, off the shelf solutions encrypt con- tent transparently within the data- base, filing system and storage fabric. Cryptographic bottlenecks.Worries that encryption would degrade sys- tem throughput have disappeared, thanks to fast cryptographic accel- erators and offload devices. Trusted computing and trustworthy devices.Authenticating users is only half the problem; it is also impor- tant to know if their terminal or ac- cess device can be trusted. Embedded security such as Trusted Platform Modules (TPMs), provide a 'seat of trust' for commercial com- puters and laptops. Despite these advances, there are still deployment and management challenges. But market factors are coming into play that will remove these roadblocks. Inexpensive tokens for strong au- thentication. Organizations do not want to rely on password-based se- curity for accessing decryption keys, but anything stronger has been prohibitively expensive.Now, competitive pressures are com- moditizing tokens, driving function- ality up and prices down, and USB card readers in laptops and key- boards are lowering deployment costs. Security standards with teeth. Unified standards are emerging. Web services led the way by defin- ing both encryption and signing. The Trusted Computing Group (TCG) is revolutionizing PC plat- form security,while the Payments Card Industry (PCI) standards de- fine an approach to data privacy and audits. Cryptographic management for scalability.The challenge of managing cryptographic keys be- comes more severe as cryptography proliferates.This drives the need for scalability. Products are emerging to manage and automate key distribu- tion across disparate applications that run on large numbers of geo- graphically dispersed computing devices. Identity management systems that look at devices and people. Early identity management systems have evolved to also manage rights and entitlements, provisioning and de- provisioning access to business ap- plications. Soon these systems will encompass the identity and rights of devices and automated systems, not just users.They will also define rights and entitlements in a more granular way,controlling access to individual data items, not simply to applications. It is becoming clear that enterpris- es will need to lay a cryptographic foundation for data and content se- curity. But establishing cryptography as the underlying ‘language’ of secu- rity is just the start. Success depends on the ability to set, manage and en- force fine-grained policies while at the same time automate the key management function, which is cen- tral to any robust cryptographic se- curity system. The building blocks are now in place. Cryptography is converging with other security technologies, including identity management systems and strong authentication. This will ensure that only those users and machines that have rights to view and use the data will be able to unlock it.At the same time, enterprise-wide key management is becoming a reality. About the author Daniel Murton is director of corporate marketing at nCipher. Crypto goes into the bloodstream Daniel Murton Cryptography is moving to centre-stage as companies seek to secure their data at rest and in transmission. Daniel Murton "Market factors are coming into play that will remove these roadblocks."

Crypto goes into the bloodstream

Embed Size (px)

Citation preview

Page 1: Crypto goes into the bloodstream

42

Info

security To

day

May/June 2006

co

lu

mn

With the distinction between theinside and outside of an enter-

prise disappearing, and remote usersdemanding access from anywhere atanytime, organizations are turning to amore data-centric approach to security.Encryption is fundamental to this shift.

While cryptography has long beenused to protect data in transmission,it is now used to protect data at rest,in databases, file systems and storagedevices. In addition, cryptography isexpanding beyond privacy enforce-ment to establish the integrity of dataand documents, and to ensure the se-curity of audit information, easingcompliance.

Many of the building blocks for thisnew data-centric security are alreadyin place.

• Public key enabled applications.The 'year of PKI' never happened,but functionality based on publickey cryptography is everywhere.The ability to use digital certifi-cates, signatures and encryptionnow support secure web sites,email messaging, mutual authentica-tion and document protection.

• SSL everywhere.No longer limited toe-commerce, Secure Socket Layer is aubiquitous feature of enterprise appli-cations and networking equipment.

• Plug and play data level protection.Adopting data encryption has oftenmeant modifying software applica-tions, writing custom code andchanging business processes.Today,off the shelf solutions encrypt con-tent transparently within the data-base, filing system and storage fabric.

• Cryptographic bottlenecks.Worriesthat encryption would degrade sys-tem throughput have disappeared,thanks to fast cryptographic accel-erators and offload devices.

• Trusted computing and trustworthydevices.Authenticating users is onlyhalf the problem; it is also impor-tant to know if their terminal or ac-cess device can be trusted.

• Embedded security such as TrustedPlatform Modules (TPMs), provide a'seat of trust' for commercial com-puters and laptops.

Despite these advances, there arestill deployment and managementchallenges. But market factors arecoming into play that will removethese roadblocks.

• Inexpensive tokens for strong au-thentication. Organizations do notwant to rely on password-based se-curity for accessing decryptionkeys, but anything stronger hasbeen prohibitively expensive. Now,competitive pressures are com-moditizing tokens, driving function-ality up and prices down, and USBcard readers in laptops and key-boards are lowering deploymentcosts.

• Security standards with teeth.Unified standards are emerging.Web services led the way by defin-ing both encryption and signing.The Trusted Computing Group(TCG) is revolutionizing PC plat-form security, while the PaymentsCard Industry (PCI) standards de-fine an approach to data privacyand audits.

• Cryptographic management for scalability.The challenge of managing cryptographic keys be-comes more severe as cryptography

proliferates.This drives the need forscalability. Products are emerging tomanage and automate key distribu-tion across disparate applicationsthat run on large numbers of geo-graphically dispersed computingdevices.

• Identity management systems thatlook at devices and people. Earlyidentity management systems haveevolved to also manage rights andentitlements, provisioning and de-provisioning access to business ap-plications. Soon these systems willencompass the identity and rightsof devices and automated systems,not just users.They will also definerights and entitlements in a moregranular way, controlling access toindividual data items, not simply toapplications.

It is becoming clear that enterpris-es will need to lay a cryptographicfoundation for data and content se-curity. But establishing cryptographyas the underlying ‘language’ of secu-rity is just the start. Success dependson the ability to set, manage and en-force fine-grained policies while atthe same time automate the keymanagement function, which is cen-tral to any robust cryptographic se-curity system.

The building blocks are now inplace. Cryptography is convergingwith other security technologies,including identity management systems and strong authentication.This will ensure that only thoseusers and machines that have rightsto view and use the data will beable to unlock it.At the same time,enterprise-wide key management isbecoming a reality. •About the authorDaniel Murton is director of corporate

marketing at nCipher.

Crypto goes into thebloodstreamDaniel Murton

Cryptography is moving to centre-stage as companies seek to secure theirdata at rest and in transmission.

Daniel Murton

"Market factors arecoming into playthat will remove

these roadblocks."