SlideShare a Scribd company logo
1 of 25
Let’s talk numbers!
“Only 4% of the total breaches involved data that was encrypted ...”
• 888 breaches across all verticals – Healthcare, Retail, Government
• Malicious Outsider – 62%
• Malicious Insider – 12%
• 80% of the attacks were in North America
• < 1% in South America
245 million records compromised in H1 of 2015
Source: 2015 H1 SafeNet Breach Level Index Report
Bit of History
Source & Image Courtesy: Wikipedia
Symmetric vs Asymmetric
• One key to encrypt and decrypt
• Example: DES, AES
• Length of the key improves
security
• Example: AES-128 vs AES-
256
• Used often in Disk/File/Database
encryption scenarios
• Two Keys
• Example: RSA
• Sender encrypts with Receiver’s
Public Key
• Receiver Decrypts his Private
Key
• Length of the key improves
security
• Example: RSA-1024 vs
RSA-3072
Since WW II
• DES – March 1975
• Diffie Hellman - 1976
• RSA Algorithm – 1978
• PGP - 1991
• 3DES – 1998
• AES – 2001
• Bitcoin – 2008
• AWS KMS - 2014
• Quantum Computing - ?
Attack Vectors
Attacks against DBs
• Weak Auth.
• Injection Attacks
• MITM
• Attacks against Backups
• Attacks against DB memory
• Attacks against data at rest
Attacks against Crypto (Cryptanalysis Attacks)
• Chosen Plaintext
• Known Plaintext (Alan Turing Used this)
• Chosen Cipher text
• Known Cipher text (and some other info)
Data Encryption in the Enterprise
• Disk/File Level Encryption
• Application Encryption
• Database Encryption
– Transparent Data Encryption
– Column Level Encryption
– Encryption Gateways
These techniques have important differences
Encryption Benefits
• Reduce Attack Surface
"I love crypto. it tells me what part of the system not to bother attacking"
- Drew Gross, Forensic Scientist
• Protect Sensitive Data
“Crypto won't be broken. It will be bypassed ”
- Adi Shamir, Cryptographer
• Get to compliance Faster
• CYA 
Disk Encryption
• Can be used to encrypt disk/partition/files
• Possible in most OSs
– Example: dm-crypt on most Linux flavors
• Cloud technologies such as AWS, Azure etc.
support native Disk Encryption.
– Key Management: KMS (AWS), Key Vault (Azure)
• Often used for DB encryption
– Simply encrypt volume containing /data dir.
1. Disk Encryption: Attack Vectors
Attack Vector Disk Encryption
Stolen Disk

Corruption of data (AEAD)
× (rarely)
Attacks against Backups
×
Attacks against memory
×
Notes:
• DIY has many pain points.
• However, Cloud platforms ease away most of these pain points
• Low hanging fruit.
• Actual Security benefits are debatable
2. Application Encryption
Application Encryption: Attack Vectors
Protection against Attack Vector App Encryption
DB Credential Compromise

Attacks against DB Backups

Attacks against DB Memory

MITM

Notes:
• Prone to error. Needs developers with expertise.
• Peer Reviews, IV & V is a must
• Constant upgrade/upkeep needed
• Reporting/Migration use cases need further thoughts
DB Internals
• Page Size = 8 KB (in Postgres)
• A table with 800 KB has ~100
pages
• File size in disk ~ 800 KB
• Each page has one or more
rows of data (called ‘tuples’)
Memory Page Structure (Postgres)
Source: Bruce Momjian (https://momjian.us/main/writings/pgsql/internalpics.pdf)
3. Transparent Data Encryption
(TDE)
More on TDE
• Fully transparent to applications
• Can be implemented at database, schema,
tablespace, or table level
• No need to change data types, stored procs,
indexes etc.
• Supported by DB Vendor directly
– No need of third party solutions or products
• Performance impact:
– Between 4 – 15%, depending on use case
– Negligible for read heavy applications
TDE: Attack Vectors
Protection against Attack Vector Disk Encryption
Stolen Disk

Corruption of data (AEAD)
 (rarely)
Attacks against Backups

Attacks against memory
×
SQL Injection
×
MITM
×
4. Column Level Encryption (CLE)
• All DBs have ‘functions’ to do crypto
– Encryption
– Hashing
– Key stretching
• Queries to use these functions:
insert into demo(col1) values (encrypt('data', 'key', 'aes'));
• Key Management Support is poor
CLE: Attack Vectors
Protection against Attack Vector Disk Encryption
Stolen Disk

Attacks against Backups

Attacks against memory
×
Corruption of data (AEAD)
×
Notes:
• Prone to error. Needs developers with expertise.
• Peer Reviews, IV & V is a must
5. Encryption Gateways
More on Encryption Gateways
• Quick way to do column level encryption
• Easy to deploy
• No changes to the applications
– But DB datatypes, stored procs may need to change
– Can’t index or query encrypted columns
• Can act as a DB firewall
– Detect attacks like ‘SQL Injection’, ‘DDoS’ before they
get to DB
• Performance Impact:
– About 15% overall
EG: Attack Vectors
Protection against Attack Vector Disk Encryption
Stolen Disk

Attacks against Backups

Attacks against memory

Corruption of data (AEAD)

SQL Injection Attacks

Cross Site Scripting (Stored) ….. [maybe]

MITM

Challenges
• Key Storage/Isolation
– Where do you store the keys?
– Impact on DevOps
– Who owns the keys
• Protecting Keys
– In memory
– At rest
• Key Rotation
• Backup/Restores
• HA, AutoScaling etc.
Best Practices
• Always use HSMs
• Don’t invent your crypto or crypto library
• Use tried and tested crypto libraries
• Isolate keys from data
– And from your code.
– Don’t check into GitHub
• IV & V code, and implementation
– There are only a few firms that could do this!
Questions?

More Related Content

Similar to Encryption in the Age of Breaches

MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...MongoDB
 
Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013javagroup2006
 
Using advanced security and data-protection features
Using advanced security and data-protection featuresUsing advanced security and data-protection features
Using advanced security and data-protection featuresMariaDB plc
 
Protecting Your Data with Encryption
Protecting Your Data with EncryptionProtecting Your Data with Encryption
Protecting Your Data with EncryptionEd Leighton-Dick
 
Transparent Encryption in HDFS
Transparent Encryption in HDFSTransparent Encryption in HDFS
Transparent Encryption in HDFSDataWorks Summit
 
Understanding SQL Server 2016 Always Encrypted
Understanding SQL Server 2016 Always EncryptedUnderstanding SQL Server 2016 Always Encrypted
Understanding SQL Server 2016 Always EncryptedEd Leighton-Dick
 
7 Ways To Cyberattack And Hack Azure
7 Ways To Cyberattack And Hack Azure7 Ways To Cyberattack And Hack Azure
7 Ways To Cyberattack And Hack AzureAbdul Khan
 
001 - Get acquainted with the AWS platform -- hide01.ir.pptx
001 - Get acquainted with the AWS platform  --  hide01.ir.pptx001 - Get acquainted with the AWS platform  --  hide01.ir.pptx
001 - Get acquainted with the AWS platform -- hide01.ir.pptxnitinscribd
 
Preatorian Secure partners with Cipher loc - New Encryption Technology
Preatorian Secure partners with Cipher loc -  New Encryption Technology Preatorian Secure partners with Cipher loc -  New Encryption Technology
Preatorian Secure partners with Cipher loc - New Encryption Technology Austin Ross
 
Database Security & Encryption
Database Security & EncryptionDatabase Security & Encryption
Database Security & EncryptionTech Sanhita
 
DNS Security, is it enough?
DNS Security, is it enough? DNS Security, is it enough?
DNS Security, is it enough? Zscaler
 
First 2015 szatmary-eric_defining-and-measuring-capability-maturity_20150625
First 2015 szatmary-eric_defining-and-measuring-capability-maturity_20150625First 2015 szatmary-eric_defining-and-measuring-capability-maturity_20150625
First 2015 szatmary-eric_defining-and-measuring-capability-maturity_20150625pladott1
 
Using encryption with_aws
Using encryption with_awsUsing encryption with_aws
Using encryption with_awssaifam
 
The Principles of Secure Development - BSides Las Vegas 2009
The Principles of Secure Development - BSides Las Vegas 2009The Principles of Secure Development - BSides Las Vegas 2009
The Principles of Secure Development - BSides Las Vegas 2009Security Ninja
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Frameworkcentralohioissa
 
Introduction to Security (Hardware, Software, Data & Policies)
Introduction to Security (Hardware, Software, Data & Policies)Introduction to Security (Hardware, Software, Data & Policies)
Introduction to Security (Hardware, Software, Data & Policies)Amr Salah
 

Similar to Encryption in the Age of Breaches (20)

Formal Lecture.ppt
Formal Lecture.pptFormal Lecture.ppt
Formal Lecture.ppt
 
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
MongoDB .local London 2019: New Encryption Capabilities in MongoDB 4.2: A Dee...
 
Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013Data Security Essentials for Cloud Computing - JavaOne 2013
Data Security Essentials for Cloud Computing - JavaOne 2013
 
Using advanced security and data-protection features
Using advanced security and data-protection featuresUsing advanced security and data-protection features
Using advanced security and data-protection features
 
Protecting Your Data with Encryption
Protecting Your Data with EncryptionProtecting Your Data with Encryption
Protecting Your Data with Encryption
 
Transparent Encryption in HDFS
Transparent Encryption in HDFSTransparent Encryption in HDFS
Transparent Encryption in HDFS
 
Understanding SQL Server 2016 Always Encrypted
Understanding SQL Server 2016 Always EncryptedUnderstanding SQL Server 2016 Always Encrypted
Understanding SQL Server 2016 Always Encrypted
 
7 Ways To Cyberattack And Hack Azure
7 Ways To Cyberattack And Hack Azure7 Ways To Cyberattack And Hack Azure
7 Ways To Cyberattack And Hack Azure
 
001 - Get acquainted with the AWS platform -- hide01.ir.pptx
001 - Get acquainted with the AWS platform  --  hide01.ir.pptx001 - Get acquainted with the AWS platform  --  hide01.ir.pptx
001 - Get acquainted with the AWS platform -- hide01.ir.pptx
 
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overviewPraetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
 
Preatorian Secure partners with Cipher loc - New Encryption Technology
Preatorian Secure partners with Cipher loc -  New Encryption Technology Preatorian Secure partners with Cipher loc -  New Encryption Technology
Preatorian Secure partners with Cipher loc - New Encryption Technology
 
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overviewPraetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
 
Praetorian_Secure_EncryptionServices_Overview
Praetorian_Secure_EncryptionServices_OverviewPraetorian_Secure_EncryptionServices_Overview
Praetorian_Secure_EncryptionServices_Overview
 
Database Security & Encryption
Database Security & EncryptionDatabase Security & Encryption
Database Security & Encryption
 
DNS Security, is it enough?
DNS Security, is it enough? DNS Security, is it enough?
DNS Security, is it enough?
 
First 2015 szatmary-eric_defining-and-measuring-capability-maturity_20150625
First 2015 szatmary-eric_defining-and-measuring-capability-maturity_20150625First 2015 szatmary-eric_defining-and-measuring-capability-maturity_20150625
First 2015 szatmary-eric_defining-and-measuring-capability-maturity_20150625
 
Using encryption with_aws
Using encryption with_awsUsing encryption with_aws
Using encryption with_aws
 
The Principles of Secure Development - BSides Las Vegas 2009
The Principles of Secure Development - BSides Las Vegas 2009The Principles of Secure Development - BSides Las Vegas 2009
The Principles of Secure Development - BSides Las Vegas 2009
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
 
Introduction to Security (Hardware, Software, Data & Policies)
Introduction to Security (Hardware, Software, Data & Policies)Introduction to Security (Hardware, Software, Data & Policies)
Introduction to Security (Hardware, Software, Data & Policies)
 

Recently uploaded

BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 

Recently uploaded (20)

BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 

Encryption in the Age of Breaches

  • 1.
  • 2. Let’s talk numbers! “Only 4% of the total breaches involved data that was encrypted ...” • 888 breaches across all verticals – Healthcare, Retail, Government • Malicious Outsider – 62% • Malicious Insider – 12% • 80% of the attacks were in North America • < 1% in South America 245 million records compromised in H1 of 2015 Source: 2015 H1 SafeNet Breach Level Index Report
  • 3. Bit of History Source & Image Courtesy: Wikipedia
  • 4. Symmetric vs Asymmetric • One key to encrypt and decrypt • Example: DES, AES • Length of the key improves security • Example: AES-128 vs AES- 256 • Used often in Disk/File/Database encryption scenarios • Two Keys • Example: RSA • Sender encrypts with Receiver’s Public Key • Receiver Decrypts his Private Key • Length of the key improves security • Example: RSA-1024 vs RSA-3072
  • 5. Since WW II • DES – March 1975 • Diffie Hellman - 1976 • RSA Algorithm – 1978 • PGP - 1991 • 3DES – 1998 • AES – 2001 • Bitcoin – 2008 • AWS KMS - 2014 • Quantum Computing - ?
  • 6. Attack Vectors Attacks against DBs • Weak Auth. • Injection Attacks • MITM • Attacks against Backups • Attacks against DB memory • Attacks against data at rest Attacks against Crypto (Cryptanalysis Attacks) • Chosen Plaintext • Known Plaintext (Alan Turing Used this) • Chosen Cipher text • Known Cipher text (and some other info)
  • 7. Data Encryption in the Enterprise • Disk/File Level Encryption • Application Encryption • Database Encryption – Transparent Data Encryption – Column Level Encryption – Encryption Gateways These techniques have important differences
  • 8. Encryption Benefits • Reduce Attack Surface "I love crypto. it tells me what part of the system not to bother attacking" - Drew Gross, Forensic Scientist • Protect Sensitive Data “Crypto won't be broken. It will be bypassed ” - Adi Shamir, Cryptographer • Get to compliance Faster • CYA 
  • 9. Disk Encryption • Can be used to encrypt disk/partition/files • Possible in most OSs – Example: dm-crypt on most Linux flavors • Cloud technologies such as AWS, Azure etc. support native Disk Encryption. – Key Management: KMS (AWS), Key Vault (Azure) • Often used for DB encryption – Simply encrypt volume containing /data dir.
  • 10. 1. Disk Encryption: Attack Vectors Attack Vector Disk Encryption Stolen Disk  Corruption of data (AEAD) × (rarely) Attacks against Backups × Attacks against memory × Notes: • DIY has many pain points. • However, Cloud platforms ease away most of these pain points • Low hanging fruit. • Actual Security benefits are debatable
  • 12. Application Encryption: Attack Vectors Protection against Attack Vector App Encryption DB Credential Compromise  Attacks against DB Backups  Attacks against DB Memory  MITM  Notes: • Prone to error. Needs developers with expertise. • Peer Reviews, IV & V is a must • Constant upgrade/upkeep needed • Reporting/Migration use cases need further thoughts
  • 13. DB Internals • Page Size = 8 KB (in Postgres) • A table with 800 KB has ~100 pages • File size in disk ~ 800 KB • Each page has one or more rows of data (called ‘tuples’)
  • 14. Memory Page Structure (Postgres) Source: Bruce Momjian (https://momjian.us/main/writings/pgsql/internalpics.pdf)
  • 15. 3. Transparent Data Encryption (TDE)
  • 16. More on TDE • Fully transparent to applications • Can be implemented at database, schema, tablespace, or table level • No need to change data types, stored procs, indexes etc. • Supported by DB Vendor directly – No need of third party solutions or products • Performance impact: – Between 4 – 15%, depending on use case – Negligible for read heavy applications
  • 17. TDE: Attack Vectors Protection against Attack Vector Disk Encryption Stolen Disk  Corruption of data (AEAD)  (rarely) Attacks against Backups  Attacks against memory × SQL Injection × MITM ×
  • 18. 4. Column Level Encryption (CLE) • All DBs have ‘functions’ to do crypto – Encryption – Hashing – Key stretching • Queries to use these functions: insert into demo(col1) values (encrypt('data', 'key', 'aes')); • Key Management Support is poor
  • 19. CLE: Attack Vectors Protection against Attack Vector Disk Encryption Stolen Disk  Attacks against Backups  Attacks against memory × Corruption of data (AEAD) × Notes: • Prone to error. Needs developers with expertise. • Peer Reviews, IV & V is a must
  • 21. More on Encryption Gateways • Quick way to do column level encryption • Easy to deploy • No changes to the applications – But DB datatypes, stored procs may need to change – Can’t index or query encrypted columns • Can act as a DB firewall – Detect attacks like ‘SQL Injection’, ‘DDoS’ before they get to DB • Performance Impact: – About 15% overall
  • 22. EG: Attack Vectors Protection against Attack Vector Disk Encryption Stolen Disk  Attacks against Backups  Attacks against memory  Corruption of data (AEAD)  SQL Injection Attacks  Cross Site Scripting (Stored) ….. [maybe]  MITM 
  • 23. Challenges • Key Storage/Isolation – Where do you store the keys? – Impact on DevOps – Who owns the keys • Protecting Keys – In memory – At rest • Key Rotation • Backup/Restores • HA, AutoScaling etc.
  • 24. Best Practices • Always use HSMs • Don’t invent your crypto or crypto library • Use tried and tested crypto libraries • Isolate keys from data – And from your code. – Don’t check into GitHub • IV & V code, and implementation – There are only a few firms that could do this!

Editor's Notes

  1. There was a time when … As a result a lot of SMBs and startups are not using encryption. Because with encryption, it is cost, complexity and time-to market.