SlideShare a Scribd company logo
1 of 12
O WN Y OUR D ATA . R ENT THE C LOUD .


Top 10 Cloud Encryption Myths

               March 2013
Myth 1: Encryption Degrades System Performance

 Reality
  ▶   Implemented correctly, impact is
      minimal

  ▶   Crypto should leverage hardware:
      Intel and AMD processors support
      AES-NI, giving hardware speed

  ▶   Cloud CPU is cheap: add
      processing power as needed

  ▶   Look for caching capabilities that increase read performance

  ▶   Ensure storage is tuned – it’s the usual culprit for bottlenecks


                                                                    2
Myth 2: Crypto Terminology is Cryptic
                                                              Blowfish
                                               AES
 Reality                                               3DES      NIST
                                             Key Management

                                                     KMIP
  ▶   The right encryption and key management
      solution should remove this complexity

  ▶   Encryption based on policy, vs managing individual keys, is
      easier and more intuitive

  ▶   Only consider solutions with NIST- approved algorithms




                                                                         3
Myth 3: Key Management is a Nightmare

 Reality
 • You shouldn’t have to
   manage ‘keys’ at all. A
   system should do it for you.
 • Password-based key
   management doesn’t scale
 • The right system is highly-
   available and transparent.
 • Value add: the system should   "Key management is the hardest
   support key rotation with no   part of cryptography and often the
   downtime                       Achilles' heel of an otherwise secure
                                  system.”
                                                       - Bruce Schneier


                                                                  4
Myth 4: It’s Too Easy to Lose My Keys

 Reality
 • Use a layered, highly
   available key management
   system
 • Ensure no one person has
   complete control over keys
 • Cluster your key
   management servers in
   redundant locations
 • Don’t keep your keys and
   your data in the same place
 • Ensure key backups are also
   encrypted

                                        5
Myth 5: Encryption is Hard to Deploy

 Reality
 • Encryption can happen
   transparently. You use SSL daily
 • Modern crypto systems can be
   installed in minutes
 • Key management can run in
   locked down virtual appliances
   for fast configuration
 • The days of lengthy, complex professional services
   engagements are over




                                                        6
Myth 6: Encryption Only Secures the App

 Reality
 • It depends on the encryption
   system
 • VM snapshot and suspend
   files can contain sensitive
   data. Make sure your system
   can encrypt them.
 • VM backups should also be
   encrypted
 • You can encrypt VMs in
   public cloud, even without
   administrative privilege



                   High Cloud Security Inc. Confidential   7
Myth 7: Key Rotation Means Downtime

 Reality
 • Many regulations and security policies require periodic key
   rotation
 • Swapping keys has traditionally meant taking applications
   and data offline
 • Modern systems don’t require downtime and can do this
   transparently


     Initial Key          6 Month PCI Rotation   Administrator Leaves




        K0                      K1                         K2


                                                                        8
Myth 8: Enterprise-Grade Crypto is Expensive

 Reality
 • Avoid a hardware-based key
   management system
 • Modern encryption systems
   are equally secure, and install
   quickly and easily
 • Look for a system that lets
   you purchase encryption as a
   service, like you do for cloud
 • Your security system can and
   should scale with your needs




                   High Cloud Security Inc. Confidential   9
Myth 9: Encryption in the Cloud isn’t Secure

 Reality
 • No system protects against
   every threat, but find a system
   that protects against most of
   your concerns
 • Many organizations don’t like
   that CSPs offer encryption,
   but also manage your keys
 • Encrypted data is more secure than leaving it in cleartext
 • Find a crypto system that can encrypt your data in any public
   cloud, that also lets you manage your keys




                                                                   10
Myth 10: Solutions Don’t Support All Platforms

 Reality
 • Most organizations leverage
   virtualization platforms from
   different vendors, especially if
   they use IaaS

 • Find a system that will work
   across hypervisor
   platforms, or at the storage
   layer, giving you flexibility

 • In the public cloud, encrypt
   within the guest OS of the
   VM, so you are independent
   of CSP infrastructure
                                            11
Learn More About Cloud Encryption


     Visit http://www.highcloudsecurity.com

     Download a whitepaper on Virtualization Security

     Try HighCloud Security Software for Free!




                Own Your Data. Rent the Cloud.



                                                        12

More Related Content

What's hot

Cloud Native Nordics - Real world Istio
Cloud Native Nordics - Real world IstioCloud Native Nordics - Real world Istio
Cloud Native Nordics - Real world IstioFrederik Mogensen
 
What is cloud encryption
What is cloud encryptionWhat is cloud encryption
What is cloud encryptionPrancer Io
 
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...Trend Micro
 
ProtectV - Data Security for the Cloud
ProtectV - Data Security for the CloudProtectV - Data Security for the Cloud
ProtectV - Data Security for the CloudSafeNet
 
vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks Juniper Networks
 
Things will Change - Usenix Keynote UCMS'14
Things will Change - Usenix Keynote UCMS'14Things will Change - Usenix Keynote UCMS'14
Things will Change - Usenix Keynote UCMS'14Erica Windisch
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Bloombase
 
Blockchain azure 101
Blockchain azure 101Blockchain azure 101
Blockchain azure 101rajatpk
 
Cloud Security Myths vs Facts
Cloud Security Myths vs FactsCloud Security Myths vs Facts
Cloud Security Myths vs FactsOPAQ
 
Kubernetes Secrets - The Good, The Bad, and The Ugly - Akeyless
Kubernetes Secrets -  The Good, The Bad, and The Ugly - AkeylessKubernetes Secrets -  The Good, The Bad, and The Ugly - Akeyless
Kubernetes Secrets - The Good, The Bad, and The Ugly - AkeylessAkeyless
 
Kubernetes Secrets Management - Securing Your Production Environment
Kubernetes Secrets Management - Securing Your Production EnvironmentKubernetes Secrets Management - Securing Your Production Environment
Kubernetes Secrets Management - Securing Your Production EnvironmentAkeyless
 
Hardening Kubernetes Cluster
Hardening Kubernetes ClusterHardening Kubernetes Cluster
Hardening Kubernetes ClusterKnoldus Inc.
 
The Key to Strong Cloud Security
The Key to Strong Cloud SecurityThe Key to Strong Cloud Security
The Key to Strong Cloud SecurityAkeyless
 
IBM Secret Key management protoco
IBM Secret Key management protocoIBM Secret Key management protoco
IBM Secret Key management protocogori4
 
Infographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning FastInfographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning FastJuniper Networks
 
Microsoft Azure Security Infographic
Microsoft Azure Security InfographicMicrosoft Azure Security Infographic
Microsoft Azure Security InfographicMicrosoft Azure
 
Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013javagroup2006
 
2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdf2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdfYounesChafi1
 
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Mahmuda Rahman
 

What's hot (20)

Cloud Native Nordics - Real world Istio
Cloud Native Nordics - Real world IstioCloud Native Nordics - Real world Istio
Cloud Native Nordics - Real world Istio
 
What is cloud encryption
What is cloud encryptionWhat is cloud encryption
What is cloud encryption
 
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
 
ProtectV - Data Security for the Cloud
ProtectV - Data Security for the CloudProtectV - Data Security for the Cloud
ProtectV - Data Security for the Cloud
 
vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks
 
Things will Change - Usenix Keynote UCMS'14
Things will Change - Usenix Keynote UCMS'14Things will Change - Usenix Keynote UCMS'14
Things will Change - Usenix Keynote UCMS'14
 
Cloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption ExplainedCloud Security & Cloud Encryption Explained
Cloud Security & Cloud Encryption Explained
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
 
Blockchain azure 101
Blockchain azure 101Blockchain azure 101
Blockchain azure 101
 
Cloud Security Myths vs Facts
Cloud Security Myths vs FactsCloud Security Myths vs Facts
Cloud Security Myths vs Facts
 
Kubernetes Secrets - The Good, The Bad, and The Ugly - Akeyless
Kubernetes Secrets -  The Good, The Bad, and The Ugly - AkeylessKubernetes Secrets -  The Good, The Bad, and The Ugly - Akeyless
Kubernetes Secrets - The Good, The Bad, and The Ugly - Akeyless
 
Kubernetes Secrets Management - Securing Your Production Environment
Kubernetes Secrets Management - Securing Your Production EnvironmentKubernetes Secrets Management - Securing Your Production Environment
Kubernetes Secrets Management - Securing Your Production Environment
 
Hardening Kubernetes Cluster
Hardening Kubernetes ClusterHardening Kubernetes Cluster
Hardening Kubernetes Cluster
 
The Key to Strong Cloud Security
The Key to Strong Cloud SecurityThe Key to Strong Cloud Security
The Key to Strong Cloud Security
 
IBM Secret Key management protoco
IBM Secret Key management protocoIBM Secret Key management protoco
IBM Secret Key management protoco
 
Infographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning FastInfographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning Fast
 
Microsoft Azure Security Infographic
Microsoft Azure Security InfographicMicrosoft Azure Security Infographic
Microsoft Azure Security Infographic
 
Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013
 
2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdf2022 Q1 Webinar Securite du Cloud public (1).pdf
2022 Q1 Webinar Securite du Cloud public (1).pdf
 
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
 

Viewers also liked

Analysis (result spring 2011 with internal reports)
Analysis (result spring   2011 with internal reports)Analysis (result spring   2011 with internal reports)
Analysis (result spring 2011 with internal reports)Rehan Yousaf
 
Instrumental analysis BY Muhammad Fahad Ansari 12IEEM14
Instrumental analysis BY  Muhammad Fahad Ansari 12IEEM14Instrumental analysis BY  Muhammad Fahad Ansari 12IEEM14
Instrumental analysis BY Muhammad Fahad Ansari 12IEEM14fahadansari131
 
Linked Open Data - A Means for Public Sector Information Management
Linked Open Data - A Means for Public Sector Information ManagementLinked Open Data - A Means for Public Sector Information Management
Linked Open Data - A Means for Public Sector Information ManagementJohann Höchtl
 
mCommerce Takes Off
mCommerce Takes OffmCommerce Takes Off
mCommerce Takes OffBaynote
 
Trinity Kings World Leadership: "Ambassador of Leadership for the World" *Fin...
Trinity Kings World Leadership: "Ambassador of Leadership for the World" *Fin...Trinity Kings World Leadership: "Ambassador of Leadership for the World" *Fin...
Trinity Kings World Leadership: "Ambassador of Leadership for the World" *Fin...Terrell Patillo
 
More than a Photograph.
More than a Photograph.More than a Photograph.
More than a Photograph.Cachi Chien
 
Water cycle by Muhammad Fahad Ansari 12IEEM14
Water cycle by Muhammad Fahad Ansari 12IEEM14Water cycle by Muhammad Fahad Ansari 12IEEM14
Water cycle by Muhammad Fahad Ansari 12IEEM14fahadansari131
 
Fernando Aguirre - Preparativos para um torneio seguro e confiável
Fernando Aguirre - Preparativos para um torneio seguro e confiávelFernando Aguirre - Preparativos para um torneio seguro e confiável
Fernando Aguirre - Preparativos para um torneio seguro e confiávelWTC Business Club SP
 
Family Franchise Systems: NBA, NFL, MLB, & NHL and Families & Friends
Family Franchise Systems: NBA, NFL, MLB, & NHL and Families & FriendsFamily Franchise Systems: NBA, NFL, MLB, & NHL and Families & Friends
Family Franchise Systems: NBA, NFL, MLB, & NHL and Families & FriendsTerrell Patillo
 
16 το βυζαντινό κράτος μεγαλώνει μάγδα
16 το βυζαντινό κράτος μεγαλώνει μάγδα16 το βυζαντινό κράτος μεγαλώνει μάγδα
16 το βυζαντινό κράτος μεγαλώνει μάγδαgeorge papadopoulos
 
Penyempurnaan administrasi
Penyempurnaan administrasiPenyempurnaan administrasi
Penyempurnaan administrasiParunadi Buntok
 
Rise of the Apps
Rise of the AppsRise of the Apps
Rise of the AppsBaynote
 
Activity App that changes behaviour
Activity App that changes behaviourActivity App that changes behaviour
Activity App that changes behaviourStuart Hoy
 
The King of the United States Kingdom
The King of the United States KingdomThe King of the United States Kingdom
The King of the United States KingdomTerrell Patillo
 
The Case of opendataportal.at
The Case of opendataportal.atThe Case of opendataportal.at
The Case of opendataportal.atJohann Höchtl
 
How big is your Referral Gap - final
How big is your Referral Gap - finalHow big is your Referral Gap - final
How big is your Referral Gap - finalCustomer Return
 
Decalogue of the Artist. Decálogo del Artista (Gabriela Mistral)
Decalogue of the Artist. Decálogo del Artista (Gabriela Mistral) Decalogue of the Artist. Decálogo del Artista (Gabriela Mistral)
Decalogue of the Artist. Decálogo del Artista (Gabriela Mistral) Cachi Chien
 

Viewers also liked (20)

Analysis (result spring 2011 with internal reports)
Analysis (result spring   2011 with internal reports)Analysis (result spring   2011 with internal reports)
Analysis (result spring 2011 with internal reports)
 
Instrumental analysis BY Muhammad Fahad Ansari 12IEEM14
Instrumental analysis BY  Muhammad Fahad Ansari 12IEEM14Instrumental analysis BY  Muhammad Fahad Ansari 12IEEM14
Instrumental analysis BY Muhammad Fahad Ansari 12IEEM14
 
Linked Open Data - A Means for Public Sector Information Management
Linked Open Data - A Means for Public Sector Information ManagementLinked Open Data - A Means for Public Sector Information Management
Linked Open Data - A Means for Public Sector Information Management
 
mCommerce Takes Off
mCommerce Takes OffmCommerce Takes Off
mCommerce Takes Off
 
Trinity Kings World Leadership: "Ambassador of Leadership for the World" *Fin...
Trinity Kings World Leadership: "Ambassador of Leadership for the World" *Fin...Trinity Kings World Leadership: "Ambassador of Leadership for the World" *Fin...
Trinity Kings World Leadership: "Ambassador of Leadership for the World" *Fin...
 
More than a Photograph.
More than a Photograph.More than a Photograph.
More than a Photograph.
 
Water cycle by Muhammad Fahad Ansari 12IEEM14
Water cycle by Muhammad Fahad Ansari 12IEEM14Water cycle by Muhammad Fahad Ansari 12IEEM14
Water cycle by Muhammad Fahad Ansari 12IEEM14
 
Fernando Aguirre - Preparativos para um torneio seguro e confiável
Fernando Aguirre - Preparativos para um torneio seguro e confiávelFernando Aguirre - Preparativos para um torneio seguro e confiável
Fernando Aguirre - Preparativos para um torneio seguro e confiável
 
anni80
anni80anni80
anni80
 
Family Franchise Systems: NBA, NFL, MLB, & NHL and Families & Friends
Family Franchise Systems: NBA, NFL, MLB, & NHL and Families & FriendsFamily Franchise Systems: NBA, NFL, MLB, & NHL and Families & Friends
Family Franchise Systems: NBA, NFL, MLB, & NHL and Families & Friends
 
16 το βυζαντινό κράτος μεγαλώνει μάγδα
16 το βυζαντινό κράτος μεγαλώνει μάγδα16 το βυζαντινό κράτος μεγαλώνει μάγδα
16 το βυζαντινό κράτος μεγαλώνει μάγδα
 
Penyempurnaan administrasi
Penyempurnaan administrasiPenyempurnaan administrasi
Penyempurnaan administrasi
 
Rise of the Apps
Rise of the AppsRise of the Apps
Rise of the Apps
 
Activity App that changes behaviour
Activity App that changes behaviourActivity App that changes behaviour
Activity App that changes behaviour
 
The King of the United States Kingdom
The King of the United States KingdomThe King of the United States Kingdom
The King of the United States Kingdom
 
The Case of opendataportal.at
The Case of opendataportal.atThe Case of opendataportal.at
The Case of opendataportal.at
 
L´heure Bleue
L´heure BleueL´heure Bleue
L´heure Bleue
 
Luz/Light
Luz/LightLuz/Light
Luz/Light
 
How big is your Referral Gap - final
How big is your Referral Gap - finalHow big is your Referral Gap - final
How big is your Referral Gap - final
 
Decalogue of the Artist. Decálogo del Artista (Gabriela Mistral)
Decalogue of the Artist. Decálogo del Artista (Gabriela Mistral) Decalogue of the Artist. Decálogo del Artista (Gabriela Mistral)
Decalogue of the Artist. Decálogo del Artista (Gabriela Mistral)
 

Similar to Top 10 Encryption Myths

Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Security Innovation
 
Commit 2024 Secrets Management Made Easy
Commit 2024 Secrets Management Made EasyCommit 2024 Secrets Management Made Easy
Commit 2024 Secrets Management Made EasyAlfredo García Lavilla
 
Secure Secret Management on a Budget: Reasoning about Scalable SM with Vault ...
Secure Secret Management on a Budget: Reasoning about Scalable SM with Vault ...Secure Secret Management on a Budget: Reasoning about Scalable SM with Vault ...
Secure Secret Management on a Budget: Reasoning about Scalable SM with Vault ...Mary Racter
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Trend Micro
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
Secure Your AWS Cloud Data by Porticor
Secure Your AWS Cloud Data by PorticorSecure Your AWS Cloud Data by Porticor
Secure Your AWS Cloud Data by PorticorNewvewm
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
key-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storagekey-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storageswathi78
 
key-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storagekey-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storageswathi78
 
HighCloud Security CSA LA and Seattle chapter presentation
HighCloud Security CSA LA and Seattle chapter presentationHighCloud Security CSA LA and Seattle chapter presentation
HighCloud Security CSA LA and Seattle chapter presentationHighCloud Security
 
The Cloud Is NOT Just Someone Else's Computer
The Cloud Is NOT Just Someone Else's ComputerThe Cloud Is NOT Just Someone Else's Computer
The Cloud Is NOT Just Someone Else's ComputerJames Cupps
 
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
JPJ1408   Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageJPJ1408   Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storagechennaijp
 
Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021lior mazor
 
Intelligent Cloud Conference 2018 - Building secure cloud applications with A...
Intelligent Cloud Conference 2018 - Building secure cloud applications with A...Intelligent Cloud Conference 2018 - Building secure cloud applications with A...
Intelligent Cloud Conference 2018 - Building secure cloud applications with A...Tom Kerkhove
 
Introduce to Credstash
Introduce to CredstashIntroduce to Credstash
Introduce to CredstashAn Nguyen
 
Techdays Finland 2018 - Building secure cloud applications with Azure Key Vault
Techdays Finland 2018 - Building secure cloud applications with Azure Key VaultTechdays Finland 2018 - Building secure cloud applications with Azure Key Vault
Techdays Finland 2018 - Building secure cloud applications with Azure Key VaultTom Kerkhove
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Frameworkcentralohioissa
 
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Denodo
 
Cloud Security and some preferred practices
Cloud Security and some preferred practicesCloud Security and some preferred practices
Cloud Security and some preferred practicesMichael Pearce
 

Similar to Top 10 Encryption Myths (20)

Ken Smith - Tokenization
Ken Smith - TokenizationKen Smith - Tokenization
Ken Smith - Tokenization
 
Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)
 
Commit 2024 Secrets Management Made Easy
Commit 2024 Secrets Management Made EasyCommit 2024 Secrets Management Made Easy
Commit 2024 Secrets Management Made Easy
 
Secure Secret Management on a Budget: Reasoning about Scalable SM with Vault ...
Secure Secret Management on a Budget: Reasoning about Scalable SM with Vault ...Secure Secret Management on a Budget: Reasoning about Scalable SM with Vault ...
Secure Secret Management on a Budget: Reasoning about Scalable SM with Vault ...
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Secure Your AWS Cloud Data by Porticor
Secure Your AWS Cloud Data by PorticorSecure Your AWS Cloud Data by Porticor
Secure Your AWS Cloud Data by Porticor
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
key-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storagekey-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storage
 
key-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storagekey-aggregate cryptosystem for scalable data sharing in cloud storage
key-aggregate cryptosystem for scalable data sharing in cloud storage
 
HighCloud Security CSA LA and Seattle chapter presentation
HighCloud Security CSA LA and Seattle chapter presentationHighCloud Security CSA LA and Seattle chapter presentation
HighCloud Security CSA LA and Seattle chapter presentation
 
The Cloud Is NOT Just Someone Else's Computer
The Cloud Is NOT Just Someone Else's ComputerThe Cloud Is NOT Just Someone Else's Computer
The Cloud Is NOT Just Someone Else's Computer
 
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
JPJ1408   Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageJPJ1408   Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
JPJ1408 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
 
Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021
 
Intelligent Cloud Conference 2018 - Building secure cloud applications with A...
Intelligent Cloud Conference 2018 - Building secure cloud applications with A...Intelligent Cloud Conference 2018 - Building secure cloud applications with A...
Intelligent Cloud Conference 2018 - Building secure cloud applications with A...
 
Introduce to Credstash
Introduce to CredstashIntroduce to Credstash
Introduce to Credstash
 
Techdays Finland 2018 - Building secure cloud applications with Azure Key Vault
Techdays Finland 2018 - Building secure cloud applications with Azure Key VaultTechdays Finland 2018 - Building secure cloud applications with Azure Key Vault
Techdays Finland 2018 - Building secure cloud applications with Azure Key Vault
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
 
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
Cryptographie avancée et Logical Data Fabric : Accélérez le partage et la mig...
 
Cloud Security and some preferred practices
Cloud Security and some preferred practicesCloud Security and some preferred practices
Cloud Security and some preferred practices
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The Evolution of Money: Digital Transformation and CBDCs in Central Banking
The Evolution of Money: Digital Transformation and CBDCs in Central BankingThe Evolution of Money: Digital Transformation and CBDCs in Central Banking
The Evolution of Money: Digital Transformation and CBDCs in Central BankingSelcen Ozturkcan
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Recently uploaded (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Evolution of Money: Digital Transformation and CBDCs in Central Banking
The Evolution of Money: Digital Transformation and CBDCs in Central BankingThe Evolution of Money: Digital Transformation and CBDCs in Central Banking
The Evolution of Money: Digital Transformation and CBDCs in Central Banking
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Top 10 Encryption Myths

  • 1. O WN Y OUR D ATA . R ENT THE C LOUD . Top 10 Cloud Encryption Myths March 2013
  • 2. Myth 1: Encryption Degrades System Performance Reality ▶ Implemented correctly, impact is minimal ▶ Crypto should leverage hardware: Intel and AMD processors support AES-NI, giving hardware speed ▶ Cloud CPU is cheap: add processing power as needed ▶ Look for caching capabilities that increase read performance ▶ Ensure storage is tuned – it’s the usual culprit for bottlenecks 2
  • 3. Myth 2: Crypto Terminology is Cryptic Blowfish AES Reality 3DES NIST Key Management KMIP ▶ The right encryption and key management solution should remove this complexity ▶ Encryption based on policy, vs managing individual keys, is easier and more intuitive ▶ Only consider solutions with NIST- approved algorithms 3
  • 4. Myth 3: Key Management is a Nightmare Reality • You shouldn’t have to manage ‘keys’ at all. A system should do it for you. • Password-based key management doesn’t scale • The right system is highly- available and transparent. • Value add: the system should "Key management is the hardest support key rotation with no part of cryptography and often the downtime Achilles' heel of an otherwise secure system.” - Bruce Schneier 4
  • 5. Myth 4: It’s Too Easy to Lose My Keys Reality • Use a layered, highly available key management system • Ensure no one person has complete control over keys • Cluster your key management servers in redundant locations • Don’t keep your keys and your data in the same place • Ensure key backups are also encrypted 5
  • 6. Myth 5: Encryption is Hard to Deploy Reality • Encryption can happen transparently. You use SSL daily • Modern crypto systems can be installed in minutes • Key management can run in locked down virtual appliances for fast configuration • The days of lengthy, complex professional services engagements are over 6
  • 7. Myth 6: Encryption Only Secures the App Reality • It depends on the encryption system • VM snapshot and suspend files can contain sensitive data. Make sure your system can encrypt them. • VM backups should also be encrypted • You can encrypt VMs in public cloud, even without administrative privilege High Cloud Security Inc. Confidential 7
  • 8. Myth 7: Key Rotation Means Downtime Reality • Many regulations and security policies require periodic key rotation • Swapping keys has traditionally meant taking applications and data offline • Modern systems don’t require downtime and can do this transparently Initial Key 6 Month PCI Rotation Administrator Leaves K0 K1 K2 8
  • 9. Myth 8: Enterprise-Grade Crypto is Expensive Reality • Avoid a hardware-based key management system • Modern encryption systems are equally secure, and install quickly and easily • Look for a system that lets you purchase encryption as a service, like you do for cloud • Your security system can and should scale with your needs High Cloud Security Inc. Confidential 9
  • 10. Myth 9: Encryption in the Cloud isn’t Secure Reality • No system protects against every threat, but find a system that protects against most of your concerns • Many organizations don’t like that CSPs offer encryption, but also manage your keys • Encrypted data is more secure than leaving it in cleartext • Find a crypto system that can encrypt your data in any public cloud, that also lets you manage your keys 10
  • 11. Myth 10: Solutions Don’t Support All Platforms Reality • Most organizations leverage virtualization platforms from different vendors, especially if they use IaaS • Find a system that will work across hypervisor platforms, or at the storage layer, giving you flexibility • In the public cloud, encrypt within the guest OS of the VM, so you are independent of CSP infrastructure 11
  • 12. Learn More About Cloud Encryption Visit http://www.highcloudsecurity.com Download a whitepaper on Virtualization Security Try HighCloud Security Software for Free! Own Your Data. Rent the Cloud. 12