20
Who’s Protecting Your Keys? August 2018

Who’s Protecting Your Keys? - AFCEA · existing cyber security infrastructure. Trusted, U.S. based source for cyber security solutions… Our solutions enable agencies to deploy

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Who’s Protecting Your Keys? - AFCEA · existing cyber security infrastructure. Trusted, U.S. based source for cyber security solutions… Our solutions enable agencies to deploy

Who’s Protecting Your Keys?

August 2018

Page 2: Who’s Protecting Your Keys? - AFCEA · existing cyber security infrastructure. Trusted, U.S. based source for cyber security solutions… Our solutions enable agencies to deploy

© SafeNet AT 2

Protecting the most vital data from

the core to the cloud to the field

We develop, manufacture, sell

and support exclusive, trusted

data security solutions in the

U.S. that easily integrate into an

existing cyber security

infrastructure.

Trusted, U.S. based

source for cyber security

solutions…

Our solutions enable agencies

to deploy a holistic data

protection ecosystem where

data and cryptographic keys are

secured and managed, and

access and distribution are

controlled.

…from the core to the

cloud to the field…

Our solutions address many

pressing use cases including

PKI, digital signatures, TLS

Private Key Protection, data-

at-rest and in motion

protection, information

sharing and authentication.

…addressing the most

pressing use cases.

Page 3: Who’s Protecting Your Keys? - AFCEA · existing cyber security infrastructure. Trusted, U.S. based source for cyber security solutions… Our solutions enable agencies to deploy

Develop

ManufactureSell

Support

Trusted, U.S. Based Source for Cyber Security Solutions

© SafeNet AT 3

Trusted data security

solutions in the U.S. that

easily integrate into an

existing cyber security

infrastructure

• Design core solutions for U.S. Federal

agencies with code maintained and compiled

by SafeNet AT

• Provide U.S. federal agencies with solutions

that have a U.S. supply chain lifecycle

• Maintain required federal government

approvals and certifications to develop,

support and sell products to federal agencies

Page 4: Who’s Protecting Your Keys? - AFCEA · existing cyber security infrastructure. Trusted, U.S. based source for cyber security solutions… Our solutions enable agencies to deploy

Agenda

Cyber Security Landscape

Key Management Fundamentals

Enterprise Key Management

4

Page 5: Who’s Protecting Your Keys? - AFCEA · existing cyber security infrastructure. Trusted, U.S. based source for cyber security solutions… Our solutions enable agencies to deploy

© SafeNet AT 5

Cyber Security

Landscape

Page 6: Who’s Protecting Your Keys? - AFCEA · existing cyber security infrastructure. Trusted, U.S. based source for cyber security solutions… Our solutions enable agencies to deploy

© SafeNet AT 6

Breachlevelindex.com

Page 7: Who’s Protecting Your Keys? - AFCEA · existing cyber security infrastructure. Trusted, U.S. based source for cyber security solutions… Our solutions enable agencies to deploy

© SafeNet AT 7

Page 8: Who’s Protecting Your Keys? - AFCEA · existing cyber security infrastructure. Trusted, U.S. based source for cyber security solutions… Our solutions enable agencies to deploy

8

Key Management

Fundamentals

Page 9: Who’s Protecting Your Keys? - AFCEA · existing cyber security infrastructure. Trusted, U.S. based source for cyber security solutions… Our solutions enable agencies to deploy

Importance of Cryptographic Keys

© SafeNet AT 9

Encryption process generates

cryptographic keys used to lock

and unlock data.

If these keys are stolen or copied,

they can be used to decrypt

sensitive data.

Cryptographic keys are the keys

to the kingdom.

The more you encrypt, the more

encryption keys you have to store

& manage.

Page 10: Who’s Protecting Your Keys? - AFCEA · existing cyber security infrastructure. Trusted, U.S. based source for cyber security solutions… Our solutions enable agencies to deploy

What is Cryptographic Key Management

10

Page 11: Who’s Protecting Your Keys? - AFCEA · existing cyber security infrastructure. Trusted, U.S. based source for cyber security solutions… Our solutions enable agencies to deploy

Encryption Layers

11

• There is not a “best” layer to do

encryption

• Depends on the threat vector

• Complexity varies

• Often encrypt at multiple layers

• Principles of CSfC

• They ALL need key

management!

Application

Database

File

Virtual Machines

Storage/Disk

Se

cu

rity

& D

eplo

ym

ent

Effort

Page 12: Who’s Protecting Your Keys? - AFCEA · existing cyber security infrastructure. Trusted, U.S. based source for cyber security solutions… Our solutions enable agencies to deploy

Key Management Components

12

Encryption Endpoints

•Location where key is used

•Uses key management protocols

•Common endpoints: Applications, Files,Disks, Storage

Key Management

Server

• Centralized Key Management System

• Usually services running on physical or virtual server

• Robust key lifecycle management

Hardware Security Modules

(HSM)

• Dedicated Crypto Module to secure crypto keys

• Usually FIPS 140-2 Level 2 or 3.

• Hardware Root of Trust

Page 13: Who’s Protecting Your Keys? - AFCEA · existing cyber security infrastructure. Trusted, U.S. based source for cyber security solutions… Our solutions enable agencies to deploy

Important Standards

13

• SP 800-57 Recommendation for Key Management

• 3 Parts: General, Organization, ImplementationNIST 800-57

• SP 800-152 A Profile for US Federal Cryptographic Key Management Systems

• Requirements for design, implementation, management, etc.NIST 800-152

• Key Management Interoperability Protocol (KMIP)

• Specification, Profiles, Usage GuidesOASIS KMIP

• Public Key Cryptography Standards (PKCS)

• OASIS PKCS#11 Crypto Token InterfacePKCS

• Security Requirements for Cryptographic Modules

• Four Security LevelsFIPS 140-2

SP800-57 Key Lifecycle

Page 14: Who’s Protecting Your Keys? - AFCEA · existing cyber security infrastructure. Trusted, U.S. based source for cyber security solutions… Our solutions enable agencies to deploy

14

Enterprise Key

Management

Page 15: Who’s Protecting Your Keys? - AFCEA · existing cyber security infrastructure. Trusted, U.S. based source for cyber security solutions… Our solutions enable agencies to deploy

Encryption in Today’s Enterprise: The Current Situation

15

MORE DEPLOYMENTSOn-premises and in the public cloud

MORE SENSITIVE DATAProduced, processed, stored, and shared in more places

MORE THREATSMalicious internal or external threats and breaches

MORE “ISLANDS” OF SECURITYDisparate, isolated encryption projects and approaches

MORE OVERLAPMultiple encryption platforms deployed across the enterprise

Page 16: Who’s Protecting Your Keys? - AFCEA · existing cyber security infrastructure. Trusted, U.S. based source for cyber security solutions… Our solutions enable agencies to deploy

The Result: Isolated Islands of Encryption

16

Costly, Complex

Administration

Inhibited Data

And Business

Workflow

Audit

Challenges

No

Repeatable

Process

Inconsistent

Security Policy

Enforcement

Page 17: Who’s Protecting Your Keys? - AFCEA · existing cyber security infrastructure. Trusted, U.S. based source for cyber security solutions… Our solutions enable agencies to deploy

Implementing an Effective Encryption Strategy

Identify Sensitive Data

Where it Resides

Protect Sensitive Data

Manage the Protection

• Check data-at-rest in storage, file servers,

applications, databases, removable media.

• Look both on-premises and in the cloud.

• Don’t forget data-in-transit.

• Identify which users should have data access rights

• Encrypt data-at-rest - Apply granular encryption and

role-based access control for data residing in

databases, applications, files and storage both on-

premises and in the cloud.

• Encrypt data-in-transit - Secure data as it travels

across the network with high speed encryption.

• Control access to data – Use strong authentication,

especially for “privileged users”.

• Cryptographic keys should be treated with the

same level of care.

• For maximum security, dedicated hardware key

management protects sensitive cryptographic

keys from attack.

• Prepare for compliance audits by using

centralized logging for data and key access.

Page 18: Who’s Protecting Your Keys? - AFCEA · existing cyber security infrastructure. Trusted, U.S. based source for cyber security solutions… Our solutions enable agencies to deploy

Web and Application Servers

Databases

Application Servers

File Servers & Shares

Virtual Machines

Apps | GW | Tape Disk | KMIP | TDE

Disks

Data-at-Rest

ENCRYPT

DATA

AuthenticationCONTROL

ACCESS

Encrypt Everything

Manage the Keys

Control User Access

Data in Transit

High Speed Encryption

Holistic Data Protection Architecture

18

PROTECT & MANAGE

CRYPTO KEYS

Key Management

FIPS-Certified Hardware Root of Trust

Hardware Security

Modules

Page 19: Who’s Protecting Your Keys? - AFCEA · existing cyber security infrastructure. Trusted, U.S. based source for cyber security solutions… Our solutions enable agencies to deploy

Crypto Management &

Encryption Portfolio

Consolidates and centrally

manages cryptographic

objects and policies from

multiple, disparate encryption

platforms.

Scalability & High

Availability

Automatically synchronizes and

replicates keys to ensure data

availability – eliminating

key/data connectivity concerns.

Centralized Audit and

Reporting for Compliance

Captures key lifecycle

management activity to provide a

single audit point for compliance

validation

Enterprise Key Management Advantages

19

Page 20: Who’s Protecting Your Keys? - AFCEA · existing cyber security infrastructure. Trusted, U.S. based source for cyber security solutions… Our solutions enable agencies to deploy

20

Thank You