Presentation is loading. Please wait.

Presentation is loading. Please wait.

Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.

Similar presentations


Presentation on theme: "Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd."— Presentation transcript:

1 Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.

2 Database Vulnerabilities Growth of eBusiness results in more and more sensitive data stored in corporate databases. Credit card number Account number Password User profile

3 Data is exposed to Internal Intruders Complete set of data Sensitive data are stored in clear text Logically related data are physically stored together Easy to correlate sensitive data with public data without knowledge of data storage format

4 Database security cannot protect sensitive data against: Attacks that bypass the database engine Unauthorized access to data files Abusive use of shared password Dictionary attack on user password DBA access Problems of Basic Database Security

5 Ways to Secure Data Storage Application level Encryption, use of security APIs to encrypt data before saving to database Database Encryption – software that tightly integrate with database to provide encryption, transparent to application

6 Overview of Data Storage Protection with Database Encryption Transform existing schema to two layers: Logical view Physical table View -- encrypt data  Table View  decrypt data -- Table Data encrypted at rest in data files Intruders only see unintelligible text

7 Applications View Database Table Public DataPrivate Data Public DataPrivate Data Authenticate SQL Queries Authentication Authorization Server Encrypt Decrypt

8 Advantages of Using Database Encryption Software Application Transparent Preserves logical schema Existing SQL queries continue to run No re-coding required for legacy applications Access control can be based on existing database security No need to set up and maintain a separate security policy Existing users continue to have the same data access rights

9 Considerations – Index Searching Support for Index Searching Building index on encrypted data Unable to do wildcard search, comparison since ciphered text cannot preserve order It is important to select software that can solve the searching problem

10 Considerations - Key Management Fine Grain Security Control Key Diversification Different encryption key for different users, tables, columns Data copied through illegal means to another schema cannot be decrypted Reduce risk exposure if encryption key is compromised

11 Considerations - Key Management Flexible Key Management Key Rollover Multiple Key versions can co-exist Decryption uses the key version with which the data was encrypted Encryption always uses the latest version Data can be re-encrypted over time

12 Considerations - Encryption Methods Software Based Encryption Hardware Based Encryption Use tamper resistant hardware Hardware Security Module (HSM) Secure Token Smart card USB token Store digital certificate Hardware Accelerator to speed up cryptographic operations RSA private key not exposed outside hardware Encryption keys protected even Database stolen

13 Question & Answer

14 Thank you for your time.


Download ppt "Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd."

Similar presentations


Ads by Google