34

Data Protection Strategies with - CLOUDSEC to Protect Your Cloud...Are we ready for Cloud? #cloudsec Enterprise Cloud Strategy Resource: (ISC)2 2018 Cloud Security Report #cloudsec

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Data Protection Strategies with - CLOUDSEC to Protect Your Cloud...Are we ready for Cloud? #cloudsec Enterprise Cloud Strategy Resource: (ISC)2 2018 Cloud Security Report #cloudsec
Page 2: Data Protection Strategies with - CLOUDSEC to Protect Your Cloud...Are we ready for Cloud? #cloudsec Enterprise Cloud Strategy Resource: (ISC)2 2018 Cloud Security Report #cloudsec

www.cloudsec.com | #cloudsec

Data Protection Strategies with CloudJeff Chen, CISSPSecurity Consultant, GCKThales CPL

Page 3: Data Protection Strategies with - CLOUDSEC to Protect Your Cloud...Are we ready for Cloud? #cloudsec Enterprise Cloud Strategy Resource: (ISC)2 2018 Cloud Security Report #cloudsec

#cloudsec

The business environment is changing

Page 4: Data Protection Strategies with - CLOUDSEC to Protect Your Cloud...Are we ready for Cloud? #cloudsec Enterprise Cloud Strategy Resource: (ISC)2 2018 Cloud Security Report #cloudsec

#cloudsec

Challenge: Compliance in a Cloudy World

Page 5: Data Protection Strategies with - CLOUDSEC to Protect Your Cloud...Are we ready for Cloud? #cloudsec Enterprise Cloud Strategy Resource: (ISC)2 2018 Cloud Security Report #cloudsec

#cloudsec

APAC is MORE ready than most !!

Source: Asia Cloud Computing Association

Are we ready for Cloud?

Page 6: Data Protection Strategies with - CLOUDSEC to Protect Your Cloud...Are we ready for Cloud? #cloudsec Enterprise Cloud Strategy Resource: (ISC)2 2018 Cloud Security Report #cloudsec

#cloudsec

Enterprise Cloud Strategy

Resource: (ISC)2 2018 Cloud Security Report

Page 7: Data Protection Strategies with - CLOUDSEC to Protect Your Cloud...Are we ready for Cloud? #cloudsec Enterprise Cloud Strategy Resource: (ISC)2 2018 Cloud Security Report #cloudsec

#cloudsec

Thread Landscape

Page 8: Data Protection Strategies with - CLOUDSEC to Protect Your Cloud...Are we ready for Cloud? #cloudsec Enterprise Cloud Strategy Resource: (ISC)2 2018 Cloud Security Report #cloudsec

No organization is immune from data security threats

Page 9: Data Protection Strategies with - CLOUDSEC to Protect Your Cloud...Are we ready for Cloud? #cloudsec Enterprise Cloud Strategy Resource: (ISC)2 2018 Cloud Security Report #cloudsec

#cloudsec

Broad Cloud Security Concerns

Page 10: Data Protection Strategies with - CLOUDSEC to Protect Your Cloud...Are we ready for Cloud? #cloudsec Enterprise Cloud Strategy Resource: (ISC)2 2018 Cloud Security Report #cloudsec

#cloudsec

Complex Environment is the Top Barrier to Data Security

Source: 2019 Thales Data Threat Report Survey, IDC, November 2018

Page 11: Data Protection Strategies with - CLOUDSEC to Protect Your Cloud...Are we ready for Cloud? #cloudsec Enterprise Cloud Strategy Resource: (ISC)2 2018 Cloud Security Report #cloudsec

#cloudsec

It’s not that organizations don’t recognize the importance of data security; they clearly do. However, they realize that implementing data security is challenging and they need better, simpler solutions that allow them to address these challenges.”

Page 12: Data Protection Strategies with - CLOUDSEC to Protect Your Cloud...Are we ready for Cloud? #cloudsec Enterprise Cloud Strategy Resource: (ISC)2 2018 Cloud Security Report #cloudsec

#cloudsec

Shared Responsibility Model for Cloud Data Security

Page 13: Data Protection Strategies with - CLOUDSEC to Protect Your Cloud...Are we ready for Cloud? #cloudsec Enterprise Cloud Strategy Resource: (ISC)2 2018 Cloud Security Report #cloudsec

#cloudsec

You are responsible for data security.

What do you do?

Page 14: Data Protection Strategies with - CLOUDSEC to Protect Your Cloud...Are we ready for Cloud? #cloudsec Enterprise Cloud Strategy Resource: (ISC)2 2018 Cloud Security Report #cloudsec

#cloudsec

What First Comes to Mind When Protecting Data?▪ Top six data security tools already deployed, or planned to

be deployed in the next year.

Source: 2019 THALES DATA THREAT REPORTGLOBAL EDITION

Page 15: Data Protection Strategies with - CLOUDSEC to Protect Your Cloud...Are we ready for Cloud? #cloudsec Enterprise Cloud Strategy Resource: (ISC)2 2018 Cloud Security Report #cloudsec

#cloudsec

Enterprise Reality -- Islands of Encryption

Page 16: Data Protection Strategies with - CLOUDSEC to Protect Your Cloud...Are we ready for Cloud? #cloudsec Enterprise Cloud Strategy Resource: (ISC)2 2018 Cloud Security Report #cloudsec

Edward Snowden:

“Encryption works. Properly implemented

strong crypto systems are one of the few things

that you can rely on. ”

Page 17: Data Protection Strategies with - CLOUDSEC to Protect Your Cloud...Are we ready for Cloud? #cloudsec Enterprise Cloud Strategy Resource: (ISC)2 2018 Cloud Security Report #cloudsec

#cloudsec

IDC Recommendation: Encrypt Data and Control Your Keys

Page 18: Data Protection Strategies with - CLOUDSEC to Protect Your Cloud...Are we ready for Cloud? #cloudsec Enterprise Cloud Strategy Resource: (ISC)2 2018 Cloud Security Report #cloudsec

#cloudsec

But Where To Put the Keys?

Page 19: Data Protection Strategies with - CLOUDSEC to Protect Your Cloud...Are we ready for Cloud? #cloudsec Enterprise Cloud Strategy Resource: (ISC)2 2018 Cloud Security Report #cloudsec

www.cloudsec.com | #cloudsec

Bring Your Own Key (BYOK)

Page 20: Data Protection Strategies with - CLOUDSEC to Protect Your Cloud...Are we ready for Cloud? #cloudsec Enterprise Cloud Strategy Resource: (ISC)2 2018 Cloud Security Report #cloudsec

#cloudsec

What is BYOK?

Local Key Store (KMS/HSM)

Utility for BYOK

Keys Generated by local key store

CSP KMSBYOK

wrappedData (key) with BYOK certificate

Page 21: Data Protection Strategies with - CLOUDSEC to Protect Your Cloud...Are we ready for Cloud? #cloudsec Enterprise Cloud Strategy Resource: (ISC)2 2018 Cloud Security Report #cloudsec

#cloudsec

Cloud Key Management Pain Points

Encryption

Key

Visibility

Data

Loss

Vendor

Lock

Attaining

Compliance

Key

Lifecycle

Mgmt

Page 22: Data Protection Strategies with - CLOUDSEC to Protect Your Cloud...Are we ready for Cloud? #cloudsec Enterprise Cloud Strategy Resource: (ISC)2 2018 Cloud Security Report #cloudsec

#cloudsec

CipherTrust Cloud Key Manager ▪ Centralized, multi-cloud

key control and management for IaaS and SaaS

▪ As a service or on-premises deployment

▪ Secure Key Storage

▪ Logging and Reporting for enhanced visibility and compliance

Page 23: Data Protection Strategies with - CLOUDSEC to Protect Your Cloud...Are we ready for Cloud? #cloudsec Enterprise Cloud Strategy Resource: (ISC)2 2018 Cloud Security Report #cloudsec

#cloudsec

BUT…

Page 24: Data Protection Strategies with - CLOUDSEC to Protect Your Cloud...Are we ready for Cloud? #cloudsec Enterprise Cloud Strategy Resource: (ISC)2 2018 Cloud Security Report #cloudsec

#cloudsec

Different environment has different encryption mechanisms…

Different Cloud Service Provider has different Key Management policies…

Page 25: Data Protection Strategies with - CLOUDSEC to Protect Your Cloud...Are we ready for Cloud? #cloudsec Enterprise Cloud Strategy Resource: (ISC)2 2018 Cloud Security Report #cloudsec

www.cloudsec.com | #cloudsec

Bring Your Own Encryption (BYOE)

Page 26: Data Protection Strategies with - CLOUDSEC to Protect Your Cloud...Are we ready for Cloud? #cloudsec Enterprise Cloud Strategy Resource: (ISC)2 2018 Cloud Security Report #cloudsec

#cloudsec

HSM

On-Premises HSM as Root of Trust

Page 27: Data Protection Strategies with - CLOUDSEC to Protect Your Cloud...Are we ready for Cloud? #cloudsec Enterprise Cloud Strategy Resource: (ISC)2 2018 Cloud Security Report #cloudsec

#cloudsecStorage

Encryption Data at Rest –How to Protect Data Against Threat

Databases / SQL Layer

Users, Browsers, Mobiles, Apps

Data

Flow

Data Flow

File System Layer Files/Databases/Folders/Shares

Application Layer

Storage Admins

Sys Admins

DB Admins

AppAdmins

EndpointAdmin

Page 28: Data Protection Strategies with - CLOUDSEC to Protect Your Cloud...Are we ready for Cloud? #cloudsec Enterprise Cloud Strategy Resource: (ISC)2 2018 Cloud Security Report #cloudsec

#cloudsec

Challenge

▪ Must support multi-cloud, hybrid cloud environment such as AWS, Azure, VMWare, IBM Softlayer

▪ Encryption keys must be centralize store and management. A unified key management policy. Encryption keys will never store in any application or devices.

▪ Requirement for high security, high availability, and future scalability. Provide security controls such as audit logs, access control.

▪ Must be able to integrate with third-party solutions such as cloud encryption gateway, database encryption, and storage encryption solutions.

Page 29: Data Protection Strategies with - CLOUDSEC to Protect Your Cloud...Are we ready for Cloud? #cloudsec Enterprise Cloud Strategy Resource: (ISC)2 2018 Cloud Security Report #cloudsec

#cloudsec

Phase I– VM Disk Encryption

Page 30: Data Protection Strategies with - CLOUDSEC to Protect Your Cloud...Are we ready for Cloud? #cloudsec Enterprise Cloud Strategy Resource: (ISC)2 2018 Cloud Security Report #cloudsec

#cloudsec

Phase II – Expand Usage

Page 31: Data Protection Strategies with - CLOUDSEC to Protect Your Cloud...Are we ready for Cloud? #cloudsec Enterprise Cloud Strategy Resource: (ISC)2 2018 Cloud Security Report #cloudsec

#cloudsec

Phase III – Expand to Multi-Cloud

Page 32: Data Protection Strategies with - CLOUDSEC to Protect Your Cloud...Are we ready for Cloud? #cloudsec Enterprise Cloud Strategy Resource: (ISC)2 2018 Cloud Security Report #cloudsec

#cloudsec

Future

Page 33: Data Protection Strategies with - CLOUDSEC to Protect Your Cloud...Are we ready for Cloud? #cloudsec Enterprise Cloud Strategy Resource: (ISC)2 2018 Cloud Security Report #cloudsec

KEEP CALM

AND

ENCRYPT

Page 34: Data Protection Strategies with - CLOUDSEC to Protect Your Cloud...Are we ready for Cloud? #cloudsec Enterprise Cloud Strategy Resource: (ISC)2 2018 Cloud Security Report #cloudsec

www.cloudsec.com | #cloudsec

THANK YOU

Jeff Chen, CISSP

Security Consultant, GCK

Thales CPL