Encryption is Fundamental: A Technical Overview of Guardium

IBM Security Systems
Encryption is Fundamental: A Technical Overview of
Guardium Data Encryption
October 2014
Tim Parmenter – InfoSphere Guardium Technical Professional
Mark Jamison – Accelerated Value Specialist
©
1 2014 IBM Corporation
© 2013 IBM Corporation
Logistics
 This tech talk is being recorded. If you object, please hang up and
leave the webcast now.
 We’ll post a copy of slides and link to recording on the Guardium
community tech talk wiki page: http://ibm.co/Wh9x0o
 You can listen to the tech talk using audiocast and ask questions in
the chat to the Q and A group.
 We’ll try to answer questions in the chat or address them at
speaker’s discretion.
– If we cannot answer your question, please do include your email
so we can get back to you.
 When speaker pauses for questions:
– We’ll go through existing questions in the chat
2
© 2014 IBM Corporation
Reminder: Guardium Tech Talks
Next tech talk:
Finding a needle in a haystack: A real-world case study
identifying security risk with InfoSphere Guardium
Speakers: Joe DiPietro and Oded Sofer
Date &Time: Wednesday, Nov 12th, 2014
11:30 AM Eastern Time (75 minutes)
Register here: http://bit.ly/YQd6mO
Next tech talk +1:
InfoSphere Guardium for DB2 for z/OS (Part 2) and
Guardium for Data Sets
Speakers: Ernie Mancill
Date &Time: Tuesday, Nov 18th 2014
11:30 AM Eastern Time (75 minutes)
Register here: http://bit.ly/10lX5Gx
3
© 2014 IBM Corporation
Agenda
•
The Need for Encryption
•
Encryption Techniques
•
How Data Encryption Protects
•
Data Encryption Architecture & Integration
•
Q&A
Key Take Aways
•InfoSphere Guardium is the leader
in data protection and synergizes
with the rest of the IBM Security
Portfolio to extend protection reach.
•Encrypting Data is essential to
ensure security/compliance for all
sensitive data.
4
© 2014 IBM Corporation
2014 – The Year of Encryption
5
© 2014 IBM Corporation
Data Governance and Security have changed!
Data Explosion
Consumerization
of IT
Moving from traditional perimeterbased security…
Everything is
Everywhere
Attack
Sophistication
…to logical “perimeter” approach to
security—focusing on the data and
where it resides
Antivirus
IPS
Firewall
• Cloud, Mobile and Data momentum is breaking down the traditional perimeter and forcing us to look at security differently
• Focus needs to shift from the perimeter to the data that needs to be protected
6
© 2014 IBM Corporation
Introducing IBM InfoSphere Guardium Data Encryption
Ensure
compliance
with
Ensure
compliance
and protect
enterprise data
encryption
datawith
encryption
Data Encryption
Requirements
•
Protect sensitive enterprise
information and avoid data
breaches
•
Minimize impact to production
•
Enforce separation of duties by
keeping security and data
administration separate
•
Meet government and industry
regulations (eg. PCI-DSS)
Benefits
7
•
Protect data from misuse
•
Satisfy compliance
requirements including
proactive separation of duties
•
Scale to protect structured and
unstructured data across
heterogeneous environments
without enterprise changes
© 2014 IBM Corporation
InfoSphere Guardium Data Encryption Value Proposition:
Continuously restrict access to sensitive data including databases, data
warehouses, big data environments and file shares to….
1
2
3
Prevent data breaches
– Prevent disclosure or leakages of sensitive data
Ensure the integrity of sensitive data
– Prevent unauthorized changes to data, database
structures, configuration files and logs
Reduce cost of compliance
– Automate and centralize controls
o Across diverse regulations, such as PCI DSS, data privacy
regulations, HIPAA/HITECH etc.
o Across heterogeneous environments such as databases,
applications, data warehouses and Big Data platforms like Hadoop
4
8
Protect data in an efficient, scalable, and cost effective
way
– Increase operational efficiency
– No degradation of infrastructure or business processes
© 2014 IBM Corporation
Regulations Requiring Data Encryption
Regulation/Driver
Who is Effected?
Requirements
PCI DSS
(Visa, MC, Discover, AMEX)
Major retailers and
processors world wide
Encryption of credit card data with
associated secure key management
processes
HIPAA Security Standard
(OCR)
Organizations that handle
patient health information
Confidentiality, integrity and availability
of patient health information
Data Breach Disclosure in
over 50 Countries
(Example: EU, South Korea,
Turkey)
Publically held
organizations or
government agencies
Notifications and investigations of
security breaches
Publically held
organizations or
government agencies
Encryption of sensitive data
Executive Mandates
Private and public
organizations
Encryption employee and
customer data
IP/Trade Secret Protection
Private and public
organizations
Encryption and control access to
intellectual property
Local Government Data
Protection Acts
(Local governments around the
world)
9
© 2014 IBM Corporation
Encryption Approaches
 Storage Level
Encryption performed on path to the disks or on the disk itself
 Application Level / Column Level
Use application coding to encrypt data within columns of database data
Tokenization
 Database – TDE (tablespace)
Microsoft/Oracle – Encryption of database tablespaces
 File Level (GDE)
Data is encrypted at the File System level, as it’s created in the file
10
© 2014 IBM Corporation
Guardium Data Encryption Use Cases – Big Picture
Data Files
Usage: Sensitive data used
by systems and end users –
touched by privileged users
(DBA’s), Activity Monitoring
requirement for separation of
duties and consistent audit
policy. Also: Encrypt
Tablespace, Log, and other
Data files at File System to
protect against System OS
privileged user cred
Common Databases: DB2,
Informix, Oracle, MSSQL,
Sybase, MySQL…
11
Unstructured Data
Usage: Monitor WHO is
touching the files and for
WHAT purpose.
Usage: Encrypt and Control
access to any type of data
used by LUW server
Common Data Types:
Logs, Reports, Images, ETL,
Audio/Video Recordings,
Documents, Big Data…
Examples: FileNet,
Documentum, Nice, Hadoop,
Home Grown, etc…
Cloud
Usage: Monitor and know
WHO is touching your data
stored in the cloud and for
WHAT purpose
Usage: Encrypt and Control
Access to data used by Cloud
Instances
Common Cloud Providers:
IBM, Amazon EC2,
Rackspace, MS Azure
© 2014 IBM Corporation
GDE File/Table/Volume based Encryption
Authentication/ Authorization
Authentication/ Authorization
Applications
Applications
Databases/Applications
Databases/Applications
Data Security Manager
•
•
•
•
•
Centralized Key Management
Policy Decision Point
Highly Available
Rules-Policy Engine
Detailed Auditing
File Level
LAN/
WAN
Security Manager
File System
File System
Device Level
• Implements Encryption, Access Control,
Auditing on Host
•Support for file systems and raw
partitions
Volume Manager
Volume Manager
SAN / NAS / DAS / VM / Cloud
SAN / NAS / DAS / VM / Cloud
12
• Protect ALL sensitive data
…wherever/however it’s stored
© 2014 IBM Corporation
Web Server
Application
Servers
Primary
Remote
Enterprise/HA Architecture
Application
Servers
Secondary
DSM
Encrypted Folder/Guardpoint
Web Server
Application
Servers
GDE File System Agent
Data Security Manager/DSM
DSM
Secure High Availability Connection
13
© 2014 IBM Corporation
InfoSphere Guardium Data Encryption (GDE) - Addresses
compliance requirements and protects data at the File System Level
File And Volume Encryption
• High Performance / Low overhead – Intel/AMD X86 processor
AES-NI hardware encryption available
• Transparent– No changes to application or management required
• Broad OS, file system and volume support
Data File & Distributed File System Encryption
• Heterogeneous, transparent and high performance
• Encrypts the tablespace at the file and volume level
• Broad support for multiple database and big data vendors
Policy Based Access Control to Encrypted Data
•
•
•
•
Policy-based - Transparent
Linked to LDAP and system level accounts
By process, user, time and more
Prevents Privileged User access to protected data while allowing
normal application and systems management use
Key Management
• Securely stores and manages keys used in the implementation
14
© 2014 IBM Corporation
File Encryption Management
File System
Metadata
Clear Text
Data
Encryption
Name: Jsmith.doc
Created: 6/4/99
Modified: 8/15/02
Name: Jsmith.doc
Created: 6/4/99
Modified: 8/15/02
Name: J Smith
Credit Card #:
6011579389213
Block-Writes
File Data
Bal: $5,145,789
Social Sec No:
514-73-8970
File
Data



15
Block-Reads
File
Data
dfjdNk%(Amg
8nGmwlNskd 9f
Sk9ineo93o2n*&*^
xIu2Ks0BKsjd
Nac0&6mKcoS
qCio9M*sdopF
File
Data
File systems always read and write in fixed block sizes
Encryption takes place on the block IOs to a protected file
GDE simply encrypts or decrypts the block reads and writes
© 2014 IBM Corporation
Policy Rules
• WHO is attempting to access protected data?
 Configure one or more users, groups, or applications users may invoke who can access protected
data
• WHAT data is being accessed?
 Configure a mix of files and directories
• WHEN is the data being accessed?
 Configure a range of hours and days of the week for authorized access
• HOW is the data being accessed?
 Configure allowable file system operations allowed to access the data
e.g. read, write, delete, rename, etc.
• EFFECT: Permit; Deny; Apply Key; Audit
16
© 2014 IBM Corporation
Describing Policy Processing
Subject
1. Access request
2. Agent intercepts I/O and
checks Subject’s credentials:
User = oracle
Process = oracle.exe
3. Agent checks policy rules.
Rule 1: User = root
Rule 2: User = oracle and
Process = tar
Rule 3: User = oracle and
Process = oracle.exe
17
No Match
No Match
Match;
4. Effect
applied
© 2014 IBM Corporation
Enterprise-Ready, Cloud-Ready
Automation




API and script accessible controls
Web and command line APIs
For policy management, deployment, integration
Enables fast rollouts, easy integration with other infrastructure
and policy management solutions
Logs to identify the latest threats / malicious insiders




RFC5424 and CEF compatible log formats for use with SIEM
Detailed access records and access attempts
For individual protected locations and for management infrastructure
Identify anomalous usage from APTs and malicious insiders
Data Security Management
 Software Appliance – HW appliance available through separate
contract if HSM required in bid.
 Centralized, scalable, highly available common management
across all environments
 Cluster-able for scalability, redundancy, remote location support
 Simple web-based management UI
 Separation of duties and roles – supports tenancy models,
compliance requirements
 Audit reporting for encrypted data access, data protection
infrastructure use
18
© 2014 IBM Corporation
Administrator Roles
Roles provide separation of duties for Administrators
System
Administrator
• System Administrator Role – Responsible for adding administrator IDs to the
system, configuring the system’s logging and high availability, and creating
domains.
• Domain Administrator Role – Responsible for assigning roles to IDs within a
domain
Domain
Administrator
• Security Administrator Role – Responsible for implementing their assigned roles
(i.e. creating keys, creating policies, managing hosts); perform the more regular
routines of implementing encryption on managed systems
Security
Administrator
19
© 2014 IBM Corporation
Protecting Big Data
•
•
•
•
•
20
All data sources potentially
contain sensitive
information
Data is distributed as
needed throughout the
cluster by the Big Data
application
Deploy IBM InfoSphere
Guardium Data Encryption
Agents to all systems
hosting Data Stores
Agents protect the data
store at the file system or
volume level
Cloudera CDH4 Certified
© 2014 IBM Corporation
IBM Security Systems
GDE Case Study for HIPAA Compliance
©
212014 IBM Corporation
© 2013 IBM Corporation
GDE Case Study for HIPAA Compliance
• Large retail customer:
 Highly Distributed (More than 2000 stores with a local copy
of files and databases)
 Significant throughput (Handles hundreds of prescriptions
at each store every day)
 Central Management important
• Needs a means to encrypt data at rest to Meet
HIPAA compliance
 Needs a low cost alternative to encrypted SAN
22
© 2014 IBM Corporation
GDE Case Study for HIPAA Compliance
• The Solution? IBM Guardium Data Encryption
 A GDE agent on each box.
 A DSM cluster to manage policies for all systems.
• Why GDE?
 Seemlessly transparent.
– Had to do performance testing, but no applications were recompiled,
and no database changes were required.
 Limited Bandwidth usage.
– Since polices are cached , can bring system up with limited network
access.
– Only does periodic heartbeats to DSM aside from bootup, so
minimum impact on network.
23
© 2014 IBM Corporation
GDE Case Study for HIPAA Compliance
• Why GDE cont.
 Built in access management if needed.
– Compliance currently does not require data be locked from users at
certain times, but if requirement changes no new product license is
required.
 Command Line Interface available for large deployment.
– vmssc tool allows you to bypass the DSM gui and add hosts, and
guardpoints, and even automate adding all the guardpoints to a large
range of systems.
 The ability to cluster DSM’s.
– Giving an easy setup for your Policy Manager to be Highly Available.
24
© 2014 IBM Corporation
GDE Case Study for HIPAA Compliance
• Key Considerations Learned
 Backup and Recovery process time increased
 Database Query Performance largely unaffected
– Initial query of tables might be up to 5% slower, but the nature of
Bufferpool caching eliminated any subsequent performance issues.
 Restoring onto a new guardpoint is significantly faster in nearly all
cases
– ‘dataxform’ tool is best used when restore is not an option.
 Biggest performance hit is in the initial opening of a file.
25
© 2014 IBM Corporation
Reminder: Guardium Tech Talks
Next tech talk:
Finding a needle in a haystack: A real-world case study
identifying security risk with InfoSphere Guardium
Speakers: Joe DiPietro and Oded Sofer
Date &Time: Wednesday, Nov 12th, 2014
11:30 AM Eastern Time (75 minutes)
Register here: http://bit.ly/YQd6mO
Next tech talk +1:
InfoSphere Guardium for DB2 for z/OS (Part 2) and
Guardium for Data Sets
Speakers: Ernie Mancill
Date &Time: Tuesday, Nov 18th 2014
11:30 AM Eastern Time (75 minutes)
Register here: http://bit.ly/10lX5Gx
26
© 2014 IBM Corporation
Dziękuję
Polish
Traditional Chinese
Thai
Gracias
Spanish
Merci
French
Russian
Arabic
Obrigado
Danke
Brazilian Portuguese
German
Tack
Swedish
Simplified Chinese
Grazie
Japanese
27
Italian
© 2014 IBM Corporation