Dealing with Risk and Compliance to secure your growth 16th May - - PowerPoint PPT Presentation

dealing with risk and compliance to secure your growth
SMART_READER_LITE
LIVE PREVIEW

Dealing with Risk and Compliance to secure your growth 16th May - - PowerPoint PPT Presentation

Dealing with Risk and Compliance to secure your growth 16th May 2018 John Bycroft, SVP Sales Europe Top op d driv ivers f for D Data S Secu ecurit ity I Investment Reputation and Customer or partner Compliance brand protection


slide-1
SLIDE 1

Dealing with Risk and Compliance to secure your growth

16th May 2018

John Bycroft, SVP Sales Europe

slide-2
SLIDE 2

2

Top

  • p d

driv ivers f for D Data S Secu ecurit ity I Investment

Reputation and brand protection Customer or partner recommendation Compliance Regulations

http://www.infosecurity-magazine.com/news/research-data-breaches-up-security/ https://www.bloomberg.com/news/articles/2017-03-02/world-s-biggest-banks-fined-321-billion-since-financial-crisis

slide-3
SLIDE 3

3

Top

  • p d

driv ivers f for D Data S Secu ecurit ity I Investment

Reputation and brand protection Customer or partner recommendation Compliance Regulations

http://www.infosecurity-magazine.com/news/research-data-breaches-up-security/ https://www.bloomberg.com/news/articles/2017-03-02/world-s-biggest-banks-fined-321-billion-since-financial-crisis

slide-4
SLIDE 4

4

Comforte a and S Secu ecurit ity

slide-5
SLIDE 5

5

So

  • what c

can y you d do?

  • ?

>Ignore the issue or… >Hope that it does not happen to you >Do something

slide-6
SLIDE 6

6

PROTE TECT Y YOUR D R DATA W WITH H TOKEN KENISATI TION

PCI DSS 3.2 ASC X9 Standard 119-2 GDPR Render Primary Account Number (PAN) unreadable anywhere it is stored (clause 3.4) Defines the minimum security requirements for implementing tokenisation Data security measures should allow Pseudonymizing (tokenising or encrypting) of personal data

>“Data protection with tokenisation is proving to be more effective than network perimeter defenses or intrusion detection and is endorsed by the most well-known and respected compliance standards worldwide”

According to Gartner Research, tokenisation has emerged as a best practice for protecting sensitive fields or columns in databases during the past few years.

slide-7
SLIDE 7

7

Tok

  • kenis

isatio ion (data s secu curit ity)

>Is the process of substituting a sensitive data element (e.g. PAN) with a non-sensitive equivalent, referred to as a token, that has no extrinsic or exploitable meaning or value. >The token is a reference (i.e. identifier) that maps back to the sensitive data through a tokenisation system like comForte‘s SecurDPS

slide-8
SLIDE 8

9

tokenisation – the c e concep cept

Token: 67a1cefb12aa897d tokenisation engine PAN: 4026157151401408 (or SSN, Name,etc) OR : 67z1xExn12VT1408 OR : 4026158BDFAF1408 Target format configurable in tokenisation engine. Important to have a distinguish-method for online migration OR : ... Various mechanisms possible to perform actual tokenisation

slide-9
SLIDE 9

10

com

  • mForte Token

enisati tion Engine

> Stateless/Vaultless tokenisation > Security validated by independent cryptologists > High performance > Collision-free > Patented technology based on unbalanced Feistel networks > Linearly scalable

comForte

Tokenisation engine Tokenisation Algorithm Tokenisation Table

slide-10
SLIDE 10

11

Enterpris ise Tok

  • kenis

isatio ion system i is missio ion-cr criti tical

Looking for: > Availability > Scalability > Reliability > Security > Easy Integration > Fault-Tolerance > Performance …while keeping effort for tokenisation services management and consumers low

slide-11
SLIDE 11

12

SecurDPS framework

slide-12
SLIDE 12

13

NonStop

  • p a

as the e token enisati tion

  • n ser

erver

comForte SecurDPS comForte SecurDPS

MS Windows hosts Linux/Unix hosts

HPE NonStop

Other Enterprise hosts

Secure Channel (SSH) Secure Channel (SSH) Secure Channel (SSH)

Tokens Tokens Tokens

SecurDPS with Protection Engine

comForte SecurDPS

Tokens

slide-13
SLIDE 13

14

To Today - Satellite Prot

  • tecti

tion Node Appliance ce

comForte SecurDPS comForte SecurDPS

MS Windows hosts Linux/Unix hosts

Virtualized x86 Server

Other Enterprise hosts

Secure Channel (SSH) Secure Channel (SSH) Secure Channel (SSH)

Tokens Tokens Tokens

SecurDPS Protection Node Cluster

comForte SecurDPS

HPE NonStop

SecurDPS with Protection Engine

Tokens

Secure Channel (SSH)

  • Appliance based on custom minimal OpenBSD
  • No root access, just end point userids and keys
  • No persistent storage, just ram disk
  • logging via syslog or to
  • SDF & Vaults loaded from NonStop for local processing
  • Unlimited scalability and fail-over of protection nodes
  • High performance – first measurements easily 100k TPS
  • (depending on strategy and underlying hardware

performance)

slide-14
SLIDE 14

15

CO COMF MFORTE D DATA P PRO ROTECTION C N CLUSTER - ARCHI HITECTUR URE Y E YOU CAN R REL ELY O Y ON

PN PN PN PN PN PN EA EA EA EA EA EA EA EA EA EA MC AC

Cluster of Protection Nodes PN monitor/restart each other Failure of single PN will be transparent for enterprise application (EA) connectors,

  • ther PN will take over

Management Console (MC) configures SDF (configuration file) and generates token tables MC can be stopped after cluster startup! SDF & token tables & endpoint authentication data loaded into PN In environments with NonStop (optional), NS can run as MC and/or PN Audit Console creates a solid audit trail and allows real-time insights into key questions around enterprise data protection

slide-15
SLIDE 15

16

Secu ecurDPS – Integration C Capabilities

SecurDPS integration can be done by:

Transparent Integration capabilities

 No code change required  Full support of HP NonStop, and can also cover common use cases for

Windows and Linux/Unix

 Allows for protecting files that are accessed by 3rd party applications that

cannot be changed, such as file transfers clients, operating systems tools etc.

 Data processing layer provides capabilities to locate and replace sensitive

data in the intercepted I/O stream

 Transparency allows for migrating from non-tokenised to tokenised

without interruption of service

API access for explicit control of protection engine

If tight integration with the application is desired

SecurDPS Transparency Layer SecurDPS Data Processing Layer SecurDPS API Application A Application B Tokens SecurDPS API Data Protection Platform API (actual tokenisation

  • perations)

Tokens Data Protection Platform API (actual tokenisation

  • perations)

Use of API Transparent Integration

TKNs TKNs

slide-16
SLIDE 16

17

Secu ecurDPS S SmartAPI – Not j just a t a Simp mple A API

SecurDPS makes high availability tokenization easy > Automatic failover > Automatic load balancing > Automatic (re)distribution > Automatic integrity assurance > Automatic scaling All transparent to the Enterprise App!

PN PN EA

SmartAPI

PN PN EA

SmartAPI

PN PN

slide-17
SLIDE 17

18

SecurDPS deployment options

slide-18
SLIDE 18

19

Secu ecurDPS E Enterpris ise O On-Prem

MC AC PN PN

On

Premise

App

Tokens

PN

slide-19
SLIDE 19

20

Secu ecurDPS E Enterpris ise H Hybrid id w with th o

  • n-prem a

and cl clou

  • ud app

PN PN PN MC AC Cloud App

Public Cloud

Tokens

PN PN

On

Premise

App

Tokens

PN

slide-20
SLIDE 20

21

SecurDP rDPS Hy S Hybr brid C Cloud De Deploym yment – no

  • PANs t

to cl

  • clou
  • ud

SecurDPS Cloud

PN PN PN MC AC App

Cloud or On-Premise

Tokens

Index Table

Tweak

slide-21
SLIDE 21

22

SecurDP rDPS Hy S Hybr brid C Cloud De Deploym yment

Public Cloud

PN PN PN MC AC App

Cloud or On-Premise

Tokens

Index Table

Tweak

SecurDPS Log CASB Tokens

TKN<->USV USVs

slide-22
SLIDE 22

23

comFor

  • rte

e - contact cts

John Bycroft

SVP Sales EMEA Tel: +44 118 909 9076 Email: j.bycroft@comforte.com

slide-23
SLIDE 23

24

Security specials

slide-24
SLIDE 24

25

Key p prot

  • tect

ection & & HSM i integ egrati tion

  • n

 Multiple layers of key encryption  Optional vendor agnostic HSM integration  Optional Key custodians for split knowledge / dual control

 Key custodians can authorise key usage for unattended startup

slide-25
SLIDE 25

26

Secu ecurDPS Key h hier erarch chy

slide-26
SLIDE 26

27

The e typ ypes of

  • f t

the e keys an and t the e su supported alg algorit ithms ar are as as follows:

Key/Secret Type Supported Algorithms Purpose and Usage Vault KEK Asymmetric RSA OAEP 2048, 30721, 40961Bits Encrypt a DEK. DEK Symmetric cbc-aes-256-sha-128 cbc-aes-256-sha-256 cbc-aes-256-sha-512 Encrypt a file. Index Table Large Random Table ANSI X9.119-2-2017 i.e. comForte Tokenization Algorithm Tokenize a sensitive data string (such as the PAN).

slide-27
SLIDE 27

28

Key h hier erarch chy w with a a HSM

slide-28
SLIDE 28

29

Combining g the E Encryption K Key P Protection Layer ers ( (example e NonStop)

> As a result, the keys in the key store can be protected by multiple

  • ptional key encryption layers:

> Encryption with a secret derived from the

  • bfuscated code secret and the custodian’s

passphrases (if the key is under custodian control) > Encryption with an HSM/SCD working key > Encryption with the key store Masterkey.

> Obviously, for the SecurDPS Masterkey itself layer 3 is not

  • available. The diagram depicts an
  • verview of this multi-layer

approach.

KeyStore

SCD/HSM

HPE NonStop

SecurDPS Manager IPC TCP/IP

WK0

(e.g. HPE Atalla NSP)

MFK

Outline color of box indicates key used forencryption:

  • Master File Key (MFK)
  • Working Key for Masterkey (WK0)
  • Masterkey Custodian Passphrases
  • SecurDPS Code Secret (CS)
  • SecurDPSMasterkey
  • Working Key for Vault (WK1)
  • Vault Key Custodian Passphrases

Keyserver CS

Key Name Key Data Masterkey Masterkey Vaultkey WK1 Vaultkey

Encryption Proxy

slide-29
SLIDE 29

30

Keys ty types a and s supported a algorith thms f for

  • r K

Key P Protect ctio ion

Key/Secret Type Algorithms Purpose and Usage Obfuscated Code Secret Symmetric DES-EDE3-CBC AES-256-CBC2 Encrypt a key in the Keystore. Custodian Passphrases Symmetric PBKDF2 Authenticate Custodians Derive the KEK for encrypting a key in the Keystore. PBKDF2 Derived Key Symmetric DES-EDE3-CBC AES-256-CBC2 Encrypt a key in the Keystore Keystore Masterkey Asymmetric RSA OAEP 2048, 30722, 40962 Encrypt all keys in the Keystore HSM working key Symmetric Depends on HSM Encrypt a key in the key store HSM master key Depends on HSM Depends on HSM Encrypt an HSM key

slide-30
SLIDE 30

31

SDF (Sec ecurity ty D Definiti tion

  • n F

File) e) - Main T Types o

  • f O

Obje ject cts

Opject type Meaning audit-collectors An audit collector is a process belonging to the SecurDPS runtime environment which collects audit log messages received from one or multiple Managers. applications Identifiable processes communicating with Manager. vaults A vault in this context is an object controlling the translation of plain to protected data and vice versa. If SecurDPS is configured to perform data protection, at least one vault must be configured. It is possible to configure multiple vaults Strategies Specifies the details of how SecurDPS performs the data protection. At least one strategy referencing a previously configured vault must be configured for performing data protection. If necessary more than one strategy referencing the same or different vaults may be specified files ll the files containing data to be protected. At least one file object needs to be defined per file type, i.e. a set of file that share the same record format fields A field defines the properties of a data element in a file record, a message or a SQL table column. It may appear as part

  • f the description of files, records, servers, request and replies

iso8583-schemas This section defines ISO8583 field data format and structure to allow parsing of ISO data. This schema definition allows for defining both known and custom ISO data base24-tokens This section defines BASE24 token meta-data that describes fields to be tokenized within a specific token structure much like the iso8583-schemas

slide-31
SLIDE 31

32

comFor

  • rte

e - contact cts

John Bycroft

SVP Sales Europe 133a Finchampstead Road, Wokingham, Berkshire. RG40 3EX Tel: +44 118 909 9076 Email: j.bycroft@comforte.com