Guardium Data Encryption - Tech TalkFINAL
Guardium Data Encryption - Tech TalkFINAL
©
1 2014 IBM Corporation © 2013 IBM Corporation
Logistics
This tech talk is being recorded. If you object, please hang up and
leave the webcast now.
We’ll post a copy of slides and link to recording on the Guardium
community tech talk wiki page: http://ibm.co/Wh9x0o
You can listen to the tech talk using audiocast and ask questions in
the chat to the Q and A group.
We’ll try to answer questions in the chat or address them at
speaker’s discretion.
– If we cannot answer your question, please do include your email
so we can get back to you.
When speaker pauses for questions:
– We’ll go through existing questions in the chat
• Encryption Techniques
Antivirus
IPS
Firewall
• Cloud, Mobile and Data momentum is breaking down the traditional perimeter and forcing us to look at security differently
• Focus needs to shift from the perimeter to the data that needs to be protected
6 © 2014 IBM Corporation
Introducing IBM InfoSphere Guardium Data Encryption
EnsureEnsure compliance
compliance with
and protect
Requirements
enterprise data
datawith encryption
encryption • Protect sensitive enterprise
information and avoid data
breaches
Data Encryption
• Minimize impact to production
• Enforce separation of duties by
keeping security and data
administration separate
• Meet government and industry
regulations (eg. PCI-DSS)
Benefits
• Protect data from misuse
• Satisfy compliance
requirements including
proactive separation of duties
• Scale to protect structured and
unstructured data across
heterogeneous environments
without enterprise changes
HIPAA Security Standard Organizations that handle Confidentiality, integrity and availability
(OCR) patient health information of patient health information
Data Breach Disclosure in
Publically held
over 50 Countries Notifications and investigations of
organizations or
(Example: EU, South Korea, security breaches
government agencies
Turkey)
Local Government Data Publically held
Protection Acts organizations or Encryption of sensitive data
(Local governments around the
world)
government agencies
Storage Level
Encryption performed on path to the disks or on the disk itself
File Level
LAN/
WAN
File System Security Manager
File System
Volume Manager
Volume Manager
Remote
Web Server
Primary
Application
Application Servers
Servers
DSM
Secondary
Encrypted Folder/Guardpoint
Web Server Application
Servers GDE File System Agent
DSM
Secure High Availability Connection
Key Management
• Securely stores and manages keys used in the implementation
Name: J Smith
dfjdNk%(Amg
Credit Card #:
8nGmwlNskd 9f
6011579389213 Block-Writes
Sk9ineo93o2n*&*^
File Data
Bal: $5,145,789
xIu2Ks0BKsjd
Social Sec No: Block-Reads Nac0&6mKcoS
514-73-8970
File File qCio9M*sdopF
File
Data Data Data
©
212014 IBM Corporation © 2013 IBM Corporation
GDE Case Study for HIPAA Compliance
• Why GDE?
Seemlessly transparent.
– Had to do performance testing, but no applications were recompiled,
and no database changes were required.
Limited Bandwidth usage.
– Since polices are cached , can bring system up with limited network
access.
– Only does periodic heartbeats to DSM aside from bootup, so
minimum impact on network.
Gracias Spanish
Merci
French
Russian
Arabic
Obrigado
Brazilian Portuguese
Danke
German
Tack
Swedish
Simplified Chinese
Japanese
Grazie
Italian