Data encryption, a pillar of database security

Contents

Increasing security breaches are making security get more attention and budget than ever. Data encryption is, along with authentication, authorization and audit, one of the 4 pillars of database security.

security_data_encryption.jpg

Photo credits: istock CrulUA

Strengthening database security requires technical expertise and elevated privileges. Many aspects of database security require different utilities, system procedures and command implementation. But when users require access to multiple databases on multiple servers, distributed in different physical locations, database security gets even more complicated. Any security measure taken at the user level must be repeated in each of the databases and there is no central repository where it is easy to modify and delete user security settings.

What is data encryption?

From a high-level point of view, database security comes down to responding 4 questions:

  • Who is it? -> User authentication
  • Who can do it? -> Authorization to users
  • Who did it? -> Audit
  • Who can see it? -> Data encryption

Encryption is the procedure of obfuscating data through the use of a key or password that guarantees that those who access it without the proper password, can't find any use in them. since it is impossible to decipher its content. As an example, in the event that the database host computer was misconfigured and confidential data was obtained by a hacker, that stolen information would be totally useless if it was encrypted.

When considering data encryption, you should pay attention that:

  • Encryption does not solve access control problems.
  • This option improves security by limiting data loss even if those controls were bypassed.

These limitations are covered by another technique, the of data masking, which for this purpose does offer greater security coverage.

Data encryption key management

Encryption in a database can be applied to:

  • Stored Procedures.

For data encryption to be effective, when managing it, attention should be paid 4 keys:

a strategy.

Data encryption is not as effective if it is not understood as part of an information security strategy. In this plan, key management should be at the center of the organization's IT security infrastructure, since encryption is unbreakable. The key management system becomes a natural target for those looking for a way to access the company's informational assets... Some of the best practices are:

  • Avoid using software for key storage and replace it with hardware.
  • Keep a hard copy of the paper security policies.
  • Don't forget the relevance of security audits.

b) Authentication.

The threat comes from within in more cases than imaginable and, therefore, must authenticate administrators and ensure separation of duties. Don't be too trusting since even a physically secure key management system can be compromised if the administrator's access controls are not strong enough. In this aspect, institutions should:

  • Find alternatives to increase the reliability and strength of authentication techniques for administrators.
  • Employ different administrator access controls for encrypted data and provide controllers with access to keys.

c) Automation.

There are more and more keys, more passwords and, instead of strengthening security, may be weakened by increasing complexity, if this implies the appearance of errors. Automating key management tasks saves costs and increases information protection, an easy-to-apply solution, since most password management tasks focus on established procedures.

This decision guarantees very good results and Exceptions should only apply, in the case of emergency situations or when it is an urgent request for access to data.. In these kinds of circumstances, a comprehensive key management strategy should be used, to facilitate the location of passwords for backups created weeks, months or several years before.

d) Record.

Keeping a log of key management activities is essential to avoid potential problems from key destruction. Habitually, devices containing sensitive information deteriorate until they become unusable. Despite this, this status does not imply that they are no longer a potential source of data loss.. The physical destruction of the hardware cannot destroy the information it contains and, for that purpose, data encryption provides a highly effective means of ensuring the protection of company information assets since, destroying the key is effectively destroying the data.

The trade-off is that, anyway, It is imperative that the organization can demonstrate that every copy of the key that was made has been destroyed, and should be able to prove it, something that is only feasible when you have a strong audit trail. To avoid the consequences of the loss of data or keys, it is necessary to act on three levels:

  1. Do good key management.
  2. Maintain a record that allows the monitoring of all activities in connection with key management.
  3. Never forget to destroy the key when you want to permanently erase the associated data.

Subscribe to our Newsletter

We will not send you SPAM mail. We hate it as much as you.