Compliance
  Governance
  Risk-Management
  Security
Features


< Back

Security : Cloud : Encryption :  

Strong Cloud Encryption Top Tips


By Gilad Parann-Nissany
Gilad Parann-Nissany
Founder and CEO
Porticor

In a post Snowden world it is clear that for cloud data security, we need strong encryption. When properly implemented, encryption in the cloud reduces risk to levels acceptable for sensitive data.

There is no doubt data protection in the cloud computing era is never going to be a ‘one size fits all’ kind of a solution. It requires a 360-degree view of the company with 365-days a year dedication.

The best place to start is with a risk analysis so you know what kind of data you have, its levels of sensitivity, who’s using it, where it’s used and stored, and how and where and over what technologies it’s going to ‘commute’. You need to understand your company’s data - in terms of technology and human weaknesses. Data should be unreadable to an attacker. It must be incoherent at all times to anyone other than you and your trusted personnel: while it’s travelling - or you are; whether it’s in transit, storage, stopping, or resting, data is safest in encrypted form.

Once you’ve decided to encrypt your data, your next concern should definitely be the encryption key. If the encryption key is stolen or mislaid, the bad guys can crack the encryption code. You can’t let that happen, can you? You have to keep your encryption key safer than your house or car keys – as safe, say, as a Swiss Bank. In particular, you don’t want to hand over your cloud encryption key to your cloud or any other service provider, nor will you want it openly stored in the cloud or on the desktop of a laptop or any other device that could fall into the wrong hands within your company or outside its physical walls.

A handful of companies out there offer different flavors of encryption key storage and management. Here at Porticor, we opted for a solution that gives peace of mind and the highest level of encryption and encryption key protection to companies that must comply with the most stringent data and privacy protection standards in the world, notably HIPAA, PCI DSS, Safe Harbor and SOX, as well as many other global and regional legal requirements. As a result, our patented split-key encryption technology will make your encrypted data safe.

How do we protect the key?

With the Porticor solution, a unique key is used to encrypt each object of data and the key is split in two. The first half, call it the master key, will be in use by all the objects in the application. It’s your half of the key and we have no knowledge of it, nor do we store it. The second half, that part that is unique to the particular data object, is stored by our key management service. Both parts of the key are essential to dynamically encrypt and decrypt the data whenever you need to access it. The good news is that only you know of the half of the key in the cloud, stored by the Porticor Key Management Service. It is encrypted by our homomorphic key encryption algorithm, making it ‘bulletproof’ and more as it cannot be stolen or hacked. You can find the detail by downloading our Key Management White Paper here.

This goes together with standards-based data encryption, such as AES-256, to encrypt the entire the data – a complete solution to ensure that our clients’ keys and data are safely under their own control.

Sources provided:

  • http://www.raythos.com/cloud/cloud-data-security-privacy-confidentiality-the-isv-perspective/
  • http://www.infoworld.com/t/cloud-security/encryption-in-the-cloud-scarcer-you-think-241598
  • https://www.thales-esecurity.com/knowledge-base/analyst-reports/encryption-in-the-cloud-english
  • http://www.thesecurityadvocate.com/2013/10/14/5-cloud-encryption-tips/
  • http://www.porticor.com/2014/01/cloud-encryption-cloud-security-tip/
  • http://www.pharmacompliancemonitor.com/top-tips-for-hipaa-compliance-and-cloud-security-from-the-experts/5613/
  • http://www.bigdatanews.com/profiles/blogs/4-great-tips-cloud-security-for-big-data
  • http://www.ciphercloud.com/2014/04/24/vulnerable-5-tips-cloud-data-protection/

Sources other than those provided:

  • http://www.enterprisestorageforum.com/backup-recovery/data-storage-whos-got-the-encryption-key.html
  • http://googlecloudplatform.blogspot.co.il/2013/08/google-cloud-storage-now-provides.html
  • https://blogs.vmware.com/security/2014/03/vmware-security-compliance-news-team-assemble.html




Gilad Parann-Nissany
Founder and CEO
Porticor

Gilad Parann-Nissany, founder and CEO of Porticor, is a Cloud Computing pioneer.

As CTO for Small Business at SAP, Gilad built SaaS Clouds for medium and small enterprises and contributed to SAP products reaching more than 8 million users. Before founding Porticor, he created a consumer Cloud at G.ho.st - a cloud operating system that delighted hundreds of thousands of users while providing browser-based and mobile access to data, people and applications.








About Us Editorial

© 2019 Simplex Knowledge Company. All Rights Reserved.   |   TERMS OF USE  |   PRIVACY POLICY