Key Management Simplified
Key Management Simplified
KEY MANAGEMENT
SIMPLIFIED
A BEGINNER’S
GUIDE TO
ENCRYPTION KEY
MANAGEMENT
IS THIS eBOOK RIGHT FOR ME?
Not sure if this is the right eBook for you? Check the following qualifications to
make sure this eBook will get you the right information:
2
CONTENTS
3 IMPORTANT CERTIFICATIONS /7
3
WHAT IS ENCRYPTION KEY
MANAGEMENT?
The most important part of a data encryption strategy is the protection of the
encryption keys you use. Encryption keys are the real secret that protects your data,
and key management is the special province of security companies who create
encryption key hardware security modules (HSMs) for this purpose. These systems
are a combination of hardware and software specifically designed to create and
manage encryption keys, and to restrict their use to authorized users and
applications. Key management HSMs also incorporate a variety of security
techniques to thwart unauthorized access, report on suspicious system activity, and
mirror critical information to backup servers for high availability.
WHAT
IS
ENCRYPTION
KEY
MANAGEMENT? WATCH THIS BRIEF VIDEO FEATUREING DATA PRIVACY
EXPERT PATRICK TOWNSEND TO FIND OUT IF YOU
SHOULD BE USING ENCRYPTION KEY MANAGEMENT
TO PROTECT YOUR DATA.
4
KEY MANAGEMENT BEST PRACTICES
Because encryption key management is crucial to data protection the National
Institute of Standards and Technology (NIST) provides guidelines on best practices
for key management and a cryptographic module certification program.
These best practices are recognized by federal and industry standards as critical
steps to building a strong encryption and key management solution.
5
KEY MANAGEMENT BEST PRACTICES
Q
WHY IS INTEGRATED KEY MANAGEMENT A
BEST PRACTICE ‘RED FLAG’?
Q
WHAT ARE THE PRACTICAL IMPLICATIONS OF THESE
BEST PRACTICES AND CORE CONCEPTS?
6
IMPORTANT CERTIFICATIONS
The National Institute of Standards and Technology (NIST) issues non-military
government standards for a wide variety of technologies including data encryption
and encryption key management. Because NIST uses an open and professional
process to establish standards, the private sector usually adopts NIST standards
for commercial use. NIST is one of the most trusted sources for technology
standards. You should always look for an encryption and key management
solution that is NIST-certified.
ENCRYPTION CERTIFICATIONS
Established by NIST as the highest standard for
encryption, the most widely accepted cryptographic
standard is the Advanced Encryption Standard (AES).
AES supports nine modes of encryption, and NIST
defines three key sizes for encryption: 128-bit, 192-bit,
and 256-bit keys.
7
MEET COMPLIANCE REQUIREMENTS
Data security compliance regulations exist in order to protect personal and sensitive
information that businesses handle on a regular basis. Cyber crime and identity theft
are on the rise in today’s electronic world, and these regulations are designed to
help protect consumers against these threats.
8
Health Insurance Portability and Accountability Act / Health
Information Technology for Economic and Clinical Health Act
(HIPAA/HITECH)
If your company operates in the medical sector—which is any organization defined as
a covered entity within the HIPAA act—you fall under HIPAA/HITECH data security
regulations. The HITECH act of 2009 strengthened HIPAA regulations tremendously by
referring to NIST for encryption standards, best practices of encryption key
management, and the collection of system logs.
Although there is no mandate by HHS and HIPAA/HITECH that you must encrypt
patient information, there is a “back door” mandate that in the event of a data
breach, all covered entities must report the breach to HHS. The only safe harbor from
breach notification and potential fines is to be properly encrypting data.
9
Sarbanes-Oxley (SOX)
Any publicly traded company in the United States falls under SOX regulations. There
has been quite an increase in the focus on data privacy by SOX auditors--particularly
encryption key management and system logging. From the beginning SOX auditors
have held IT departments to high standards in terms of best practices and proper
control of data. This increased focus on data protection has developed within the last
12 months or so. Several of our customers have told us they’ve been penalized for
their insufficient encryption key management strategy by SOX auditors.
Apart from the data security standards listed above, there is currently a proposed
federal privacy law working through congress. It is safe to assume that a new federal
data privacy law will be enacted soon.
Ultimately, regulations are becoming more stringent, not less. Fines and penalties are
getting steeper, not cheaper. And certifications are becoming more important, not
less important. Even more critical is the fact that these regulators recommend or
require that you use industry standard, NIST and FIPS 140-2 certified key
management and encryption. Without these credentials, your company may not be
compliant.
10
KEY MANAGEMENT FOR
EVERY PLATFORM
Key management is a necessary part of encryption and compliance, and you
should be able to use key management on every platform including multi-platform
environments. Some major platforms including Microsoft SQL Server 2008, SQL
Server 2008 R2, SQL Server 2012, and IBM i V7R1 support easy and automatic
encryption with the ability to use a third-party key manager. Encryption and key
management can also be enabled on Oracle, Linux, DB2, and Windows.
In this section we’ll discuss encryption key management on two popular operating
systems: Microsoft SQL Server 2008/20012 and IBM i.
11
ENCRYPTION KEY MANAGEMENT FOR
SQL SERVER 2008/2012
ORGANIZATIONS CONTINUE TO EXPERIENCE DAMAGING LOSSES DUE TO DATA BREACHES.
These losses include legal costs, costs to reimburse customers and employees, lost
stakeholder value, and reduction of goodwill. The estimate of these financial losses range
into the billions of dollars every year. This section highlights excerpts from the White Paper,
ENCRYPTION KEY MANAGEMENT FOR SQL SERVER 2008/2012, and outlines how Microsoft
provides for the encryption of sensitive data in its flagship SQL Server database system.
12
ENCRYPTION KEY MANAGEMENT FOR
SQL SERVER 2008/2012
EXTENSIBLE KEY MANAGEMENT (EKM)
AND KEY MANAGER SECURE
CONNECTIONS WITH TLS
Key management best practices require that
encryption keys be protected at all times and not be
exposed to loss as they move from the key server
HSM to the SQL Server application.
CELL LEVEL ENCRYPTION
A good key manager should use authenticated and Cell Level Encryption, or column
secure Transport Layer Security (TLS) encryption, is also a part of the
communications and standard PKI methods to Microsoft SQL Server Extensible Key
insure that critical information is protected as it Management system. When
moves to and from the key server. Your organization implemented, cell level encryption
can use existing PKI infrastructure to create the encrypts a single column of a table.
necessary X509 certificate and private keys used to Unlike TDE, the Microsoft developer
protect TLS sessions, or you can use OpenSSL to must implement cell level encryption in
generate the necessary certificates and keys. their SQL statements. For Microsoft
customers and ISVs who have legacy
Regardless of the method you use to create the applications that perform encryption,
certificates and keys, your key management HSM this may be the best way to implement
should always protect encryption keys and sensitive data protection in the SQL Server
data as it moves between SQL Server and the HSM. database.
13
ENCRYPTION KEY MANAGEMENT
FOR IBM i
14
TOWNSEND SECURITY:
DEDICATED TO DATA PRIVACY
Townsend Security has earned the trust of over 3,000 customers worldwide with our easy-
to-use, affordable, and comprehensive encryption and key management solutions. With over
20 years of experience in the data security industry, Townsend Security has helped some of
the largest enterprises meet their evolving compliance requirements (PCI DSS,
HIPAA/HITECH, and others) and mitigate the risk of data breaches and cyber-attacks.
Our encryption key management solutions are FIPS 140-2 certified, and our data in motion
and data at rest products are certified by NIST.
Townsend Security is committed to both our end-users and partner channel. We provide our
partners with Enterprise ready appliances with simplified distribution models that make it
easy for OEMs, ISVs, and System Integrators to be successful. Our team is dedicated to
providing training, back-end support, and marketing materials to your technical and sales
staff and remains accessible long after the training is complete.
Web: www.townsendsecurity.com
Email: [email protected]
Phone: (800) 357-1019 or (360) 359-4400
Twitter: @townsendsecure
15