SlideShare a Scribd company logo
1
Create a Data Encryption
Strategy using ADE
Ben Peach, Technical Support Engineer
2
Credits and Acknowledgements
Presenter
• Ben Peach, Technical Support Engineer
Developers
• Jing Cui, Principle Software Engineer (US)
• Jianhua Zhou, Software Engineer III (US)
Support Subject Matter Experts
• Ben Peach, Technical Support Engineer (Aus)
• John Jenkins, Technical Support Engineer (UK)
• Liam Collier, Technical Support Engineer (US)
©2015 Rocket Software, Inc. All Rights Reserved.
3
Abstract
 Automatic Data Encryption (ADE) is a security tool available for UniData
and UniVerse. This session will concentrate on more real world topics
rather than ‘how to’ . The intent is to provide the knowledge required for
creating a strategy for your application and customers.
©2015 Rocket Software, Inc. All Rights Reserved.
4
Agenda
Overview
Compliance regulations
Deciding what to encrypt
High Availability and Disaster Recovery
Migration
Client-side applications
Best practices
©2015 Rocket Software, Inc. All Rights Reserved.
5
Overview
Encrypts data in its resting state
Components
• Master key
• Encryption keys
• Wallets
• Algorithms
• Key Store
• Metadata
©2015 Rocket Software, Inc. All Rights Reserved.
Encryption modes
• WHOLERECORD
• Field/Attribute level
• @ID
• Index
6
Unencrypted
Data
Master Key Key Store
Encryption Meta
Data StoreAudit Trail
encman
Encrypted
Data
Other UsersUsers through U2 clients
DB /Sys
Admin
uvregen
U2 Applications
BASIC Query
Data Access
Key
Manager
Encryption
Engine
U2 Engine
Overview
©2015 Rocket Software, Inc. All Rights Reserved.
7
Overview
TCL commands - Key
• CREATE.ENCRYPTION.KEY
• DELETE.ENCRYPTION.KEY
• GRANT.ENCRYPTION.KEY
• REVOKE.ENCRYPTION.KEY
• CHANGE.ENCRYPTION.PASSWORD
• LIST.ENCRYPTION.KEY
• ACTIVATE.ENCRYPTION.KEY
• DEACTIVATE.ENCRYPTION.KEY
©2015 Rocket Software, Inc. All Rights Reserved.
8
Overview
TCL commands – Wallet
• CREATE.ENCRYPTION.WALLET
• DELETE.ENCRYPTION.WALLET
• GRANT.ENCRYPTION.KEY
• REVOKE.ENCRYPTION.KEY
• WALLET.ADD.KEY
• WALLET.REMOVE.KEY
• CHANGE.ENCRYPTION.PASSWORD
• LIST.ENCRYPTION.WALLET
• ACTIVATE.ENCRYPTION.KEY
• DEACTIVATE.ENCRYPTION.KEY
©2015 Rocket Software, Inc. All Rights Reserved.
9
Overview
TCL commands - File
• LIST.ENCRYPTION.FILE
• ENCRYPT.FILE
• DECRYPT.FILE
• REENCRYPT.FILE
• ENCRYPT.INDEX
• DECRYPT.INDEX
• REENCRYPT.INDEX
• DISABLE.DECRYPTION
• ENABLE.DECRYPTION
©2015 Rocket Software, Inc. All Rights Reserved.
10
Overview
Basic statements
• ACTIVATEKEY/DEACTIVATEKEY
• DISABLEDEC/ENABLEDEC
• STATUS()
• FILEINFO()
OS level
• encman
• confcmd (UniData) / uvregen (UniVerse)
XAdmin
©2015 Rocket Software, Inc. All Rights Reserved.
11
Compliance Regulations
PCI DSS
HIPAA and HITECH
GLBA and FFIEC
FISMA
Other regulations
Can ADE help me adhere to security regulations? Yes!
©2015 Rocket Software, Inc. All Rights Reserved.
12
MV Security Model
Automatic Data Encryption:
• Part of a much bigger picture.
©2015 Rocket Software, Inc. All Rights Reserved.
13
What to Encrypt
Compliance regulations
• Does my compliance regulation force me to encrypt this data?
Performance considerations
• Can I live without encrypting this file?
• Do I need to departmentalize this file?
Space considerations
• Do I have enough disk to encrypt this file?
• Again, do I need to departmentalize it?
©2015 Rocket Software, Inc. All Rights Reserved.
14
Compliance Regulations
Know your application and data
• Do I have to adhere to any compliance regulations?
Know your regulation(s) inside out
Compliance regulations will be the main driver of
what is encrypted on your system
©2015 Rocket Software, Inc. All Rights Reserved.
15
Performance
Any additional feature on a file will add processing time
ADE is no exception
• Record Level = 1 pass
• Attribute Level = 1 pass per encrypted attribute
• @ID = 1 additional pass
• Encrypted Index = 1 additional pass per encrypted index
Added processing time per record imperceptible
• Only noticeable in large batches
©2015 Rocket Software, Inc. All Rights Reserved.
16
Space
Encryption almost always grows the data
Data is padded to make 32-bit/64-bit blocks
• Independent of algorithm ‘strength’
More encrypted ‘segments’ = more padding
• Record level only padded once or not at all
 Better for larger records
• Attribute level padded for each encrypted field
©2015 Rocket Software, Inc. All Rights Reserved.
17
High Availability and Disaster Recovery
Backups – business data
Backups – encryption key data
Local and Offsite storage
Failover
Disaster recovery
©2015 Rocket Software, Inc. All Rights Reserved.
18
Backups
Important regardless of ADE
Ensure encryption components backed up
• ENCINFO and KEYSTORE
• product.info (UniData) and .uvconfig (UniVerse)
• Loss of keys or master key may lead to data loss
Verify and test backups
ADE key requirement for archived data
• If you change a key, archived data unreadable
• Must save a snapshot of key setup
©2015 Rocket Software, Inc. All Rights Reserved.
19
Local and Offsite Storage
Best of both worlds
• Local = Fast recovery
• Offsite = Protection against physical threats
Separate master key from data
• Fire safe, escrow company, another server
Master key doesn’t need to be ‘known’ to access data
• Needs to be present in product.info/.uvconfig
• Only needs to be entered for admin tasks
• If you lose it/forget it, decrypt everything asap
©2015 Rocket Software, Inc. All Rights Reserved.
20
Failover
 Depends greatly on method used
 Target system must have same master key and keys
• Can change passwords
• CHANGE.ENCRYPTION.PASSWORD
 Data can be ‘synced’ by front and back ends
• Activate key > copy clear text > write to encrypted file
• Move encrypted files at OS level
 Keys can be ‘synced’ by front and back ends
• encman –export/import
• Move ENCINFO/KEYSTORE at OS level – requires retag
©2015 Rocket Software, Inc. All Rights Reserved.
21
U2 Replication
Master key and keys must match on publisher and
subscriber
• Passwords can be different
Replication is not ADE aware
• It doesn’t need to be
• The two work perfectly side by side, but not together
• Encrypt/decrypt file must be done ‘outside’ of Replication
 Risk of clear and cipher text in same file, one will be inaccessible
• Same applies to other features
 RFS, Transaction Logging etc.
©2015 Rocket Software, Inc. All Rights Reserved.
22
Disaster Recovery
Get the master key back
• product.info (UniData)
• .uvconfig (UniVerse
• confcmd –m (UniData)
• uvregen –m (UniVerse)
Get the encryption keys back
• ENCINFO/KEYSTORE
• encman –import
• encman –retag
©2015 Rocket Software, Inc. All Rights Reserved.
23
Migration
 XAdmin and encman
 Export/Import
• Migrates key and metadata information
• Added at UniData 7.2 and UniVerse 10.3
• Platform independent, encrypted
• Password protected (optional)
• Can change key owner
• Can change file path
 Retag
• Use after copying KEYSTORE/ENCINFO to new server
• Added security, ties key store to server
©2015 Rocket Software, Inc. All Rights Reserved.
24
Export/Import
©2015 Rocket Software, Inc. All Rights Reserved.
25
Export/Import
©2015 Rocket Software, Inc. All Rights Reserved.
26
Export/Import
©2015 Rocket Software, Inc. All Rights Reserved.
27
Export/Import
©2015 Rocket Software, Inc. All Rights Reserved.
28
Client-side Applications
UniObjects.NET, UniObjects for Java, ODBC, JDBC,
etc.
UCI.config can hold wallet ID and password
• Previously held clear text
• UCI Editor in latest U2 Clients can now encrypt
Any client that can be coded can activate a wallet
• ACTIVATE_ENCRYPTION_WALLET()
©2015 Rocket Software, Inc. All Rights Reserved.
29
Best Practices
Master key
Reach back
Wallets
Password policies
Changing passwords
Re-encryption
Decryption disablement
©2015 Rocket Software, Inc. All Rights Reserved.
30
Best Practices
Master key
• Role based administration
• Not a single person
• Password protection
 Split responsibility between two groups
Reach back
• Keep ‘snapshot’ of master key and keys
• Separate from archived data
• Clearly labelled
©2015 Rocket Software, Inc. All Rights Reserved.
31
Best Practices
Wallets
• Single access point to a group of keys
• Can grant or revoke access ad hoc
• Changing a wallet does not affect data
Password policies
• XAdmin or encman
• Range of configurables
 Length, Age, Complexity, Repetition
• Master key, keys, and wallets
©2015 Rocket Software, Inc. All Rights Reserved.
32
Best Practices
©2015 Rocket Software, Inc. All Rights Reserved.
33
Best Practices
©2015 Rocket Software, Inc. All Rights Reserved.
34
Best Practices
Change passwords
• Most compliance regulations require this
• Master key passwords
 uvregen –p (UniVerse)
 confcmd –p (UniData)
 xAdmin
• Encryption key/wallet passwords
 CHANGE.ENCRYPTION.PASSWORD
 XAdmin
©2015 Rocket Software, Inc. All Rights Reserved.
35
Best Practices
One pass re-encryption
• Compliance regulations
 Re-key
• REENCRYPT.FILE
• XAdmin
• Single command
• Takes roughly 66% of the time
 Will vary depending on system, data, application
©2015 Rocket Software, Inc. All Rights Reserved.
36
Best Practices
Decryption disablement
• DISABLEDEC - Basic
• DISABLE.DECRYPTION – ECL/TCL
• Performance
 Can save unnecessary passes through encryption engine
 Don’t need that field during this program? Don’t decrypt it
• Privilege
 Departmentalized file may require different user privilege
 Decrypt what you have access to, disable the rest
• Only available for Attribute Level mode
©2015 Rocket Software, Inc. All Rights Reserved.
37
Summary
 Overview
 Compliance regulations
 Deciding what to encrypt
 High Availability and Disaster Recovery
 Migration
 Client-side applications
 Best practices
 And now…
©2015 Rocket Software, Inc. All Rights Reserved.
38
Create Your Encryption Strategy
Compliance: What MUST be encrypted
Commercial security: What SHOULD be encrypted
Encryption key management
• Policies
• Identities
 Key and password managers
 System administrators
 Data administrators
 Data users
 Departments
©2015 Rocket Software, Inc. All Rights Reserved.
39
Create Your Encryption Strategy
 Other product features
• Replication, RFS, TL etc.
 Document the strategy
 Test the complete strategy
• Do not put live data at risk until you are sure
• Someone not involved in the original process
 Implement
 Regularly check and verify your backups, HADR, etc.
 Revisit strategy annually and at major business changes
©2015 Rocket Software, Inc. All Rights Reserved.
40
Additional Resources
 Links
http://www.rocketsoftware.com
http://en.wikipedia.org/wiki/Category:Security_compliance
http://www.rocketsoftware.com/resource/u2-technical-documentation
 Need help?
U2support@rocketsoftware.com
support.rocketsoftware.com
http://www.rocketsoftware.com/rocket-u2-professional-services-request
©2015 Rocket Software, Inc. All Rights Reserved.
41
Disclaimer
THE INFORMATION CONTAINED IN THIS PRESENTATION IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY.
WHILE EFFORTS WERE MADE TO VERIFY THE COMPLETENESS AND ACCURACY OF THE INFORMATION CONTAINED
IN THIS PRESENTATION, IT IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED.
IN ADDITION, THIS INFORMATION IS BASED ON ROCKET SOFTWARE’S CURRENT PRODUCT PLANS AND STRATEGY,
WHICH ARE SUBJECT TO CHANGE BY ROCKET SOFTWAREWITHOUT NOTICE.
ROCKET SOFTWARE SHALL NOT BE RESPONSIBLE FOR ANY DAMAGES ARISING OUT OF THE USE OF, OR
OTHERWISE RELATED TO, THIS PRESENTATION OR ANY OTHER DOCUMENTATION.
NOTHING CONTAINED IN THIS PRESENTATION IS INTENDED TO, OR SHALL HAVE THE EFFECT OF:
• CREATING ANY WARRANTY OR REPRESENTATION FROM ROCKET SOFTWARE(OR ITS AFFILIATES OR ITS OR
THEIR SUPPLIERS AND/OR LICENSORS); OR
• ALTERING THE TERMS AND CONDITIONS OF THE APPLICABLE LICENSE AGREEMENT GOVERNING THE USE OF
ROCKET SOFTWARE.
©2015 Rocket Software, Inc. All Rights Reserved.
42
Trademarks and Acknowledgements
The trademarks and service marks identified in the following list are the exclusive properties of Rocket Software,
Inc. and its subsidiaries (collectively, “Rocket Software”). These marks are registered with the U.S. Patent and
Trademark Office, and may be registered or pending registration in other countries. Not all trademarks owned by
Rocket Software are listed. The absence of a mark from this page neither constitutes a waiver of any intellectual
property rights that Rocket Software has established in its marks nor means that Rocket Software is not owner of
any such marks.
Aldon, CorVu, Dynamic Connect, D3, FlashConnect, Pick, mvBase, MvEnterprise, NetCure,
Rocket, SystemBuilder, U2, U2 Web Development Environment, UniData, UniVerse, and
wIntegrate
Other company, product, and service names mentioned herein may be trademarks or service marks of
others.
©2015 Rocket Software, Inc. All Rights Reserved.
43

More Related Content

What's hot (20)

PPTX
Understanding cyber resilience
Christophe Foulon, CISSP
 
PDF
Combined MITRE Presentation.pdf
MukeshKr19
 
PPTX
All About Cybersecurity Frameworks.pptx
Metaorange
 
PDF
Cybersecurity Awareness Training Presentation v1.3
DallasHaselhorst
 
PPTX
SEIM-Microsoft Sentinel.pptx
AmrMousa51
 
PDF
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE - ATT&CKcon
 
PDF
Cyber Security Awareness
Ramiro Cid
 
PPTX
Threat hunting foundations: People, process and technology.pptx
Infosec
 
PDF
Cybersecurity Fundamental Course by Haris Chughtai.pdf
Haris Chughtai
 
PDF
Cyber security from military point of view
S.E. CTS CERT-GOV-MD
 
PDF
Global Cyber Threat Intelligence
NTT Innovation Institute Inc.
 
PDF
National Cybersecurity - Roadmap and Action Plan
Dr David Probert
 
PPTX
Malware and different types of malwares.
SangishettyDikshitha
 
PPTX
Classical cryptographic techniques, Feistel cipher structure
Adri Jovin
 
PPTX
Cybersecurity Awareness Overview.pptx
sanap6
 
PDF
Threat Hunting
Splunk
 
PDF
MITRE ATT&CK Framework
n|u - The Open Security Community
 
PDF
Endpoint Detection & Response - FireEye
Prime Infoserv
 
PPTX
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
OWASP Delhi
 
Understanding cyber resilience
Christophe Foulon, CISSP
 
Combined MITRE Presentation.pdf
MukeshKr19
 
All About Cybersecurity Frameworks.pptx
Metaorange
 
Cybersecurity Awareness Training Presentation v1.3
DallasHaselhorst
 
SEIM-Microsoft Sentinel.pptx
AmrMousa51
 
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE - ATT&CKcon
 
Cyber Security Awareness
Ramiro Cid
 
Threat hunting foundations: People, process and technology.pptx
Infosec
 
Cybersecurity Fundamental Course by Haris Chughtai.pdf
Haris Chughtai
 
Cyber security from military point of view
S.E. CTS CERT-GOV-MD
 
Global Cyber Threat Intelligence
NTT Innovation Institute Inc.
 
National Cybersecurity - Roadmap and Action Plan
Dr David Probert
 
Malware and different types of malwares.
SangishettyDikshitha
 
Classical cryptographic techniques, Feistel cipher structure
Adri Jovin
 
Cybersecurity Awareness Overview.pptx
sanap6
 
Threat Hunting
Splunk
 
MITRE ATT&CK Framework
n|u - The Open Security Community
 
Endpoint Detection & Response - FireEye
Prime Infoserv
 
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
OWASP Delhi
 

Viewers also liked (20)

PDF
SB Support System
Rocket Software
 
PDF
Node.js Tools Ecosystem
Rocket Software
 
PDF
8.1 In Depth: New 64-bit Files and File Management
Rocket Software
 
PDF
UniVerse11.2 Audit Logging
Rocket Software
 
PDF
MultiValue Security
Rocket Software
 
PDF
D3 FSI Hot Backup
Rocket Software
 
PDF
UniVerse Files
Rocket Software
 
PDF
D3 Troubleshooting
Rocket Software
 
PDF
U2 Replication with EDA for Report Servers
Rocket Software
 
PDF
U2 Replication for HADR
Rocket Software
 
PDF
What’s New in UniVerse 11.2
Rocket Software
 
PDF
D3 MVS Toolkit
Rocket Software
 
PDF
Giddy Up on GitHub
Rocket Software
 
PDF
Implementing Continuous Integration to Improve Software Quality
Rocket Software
 
PDF
D3 Unix Hot Backup
Rocket Software
 
PDF
Create a MV file sharing module using R/Link
Rocket Software
 
PDF
Managing the SSL Process
Rocket Software
 
PDF
Explore What’s New In UniData 8.1
Rocket Software
 
PDF
Building Applications Using the U2 Toolkit for .NET
Rocket Software
 
PDF
BI and Dashboarding Best Practices
Rocket Software
 
SB Support System
Rocket Software
 
Node.js Tools Ecosystem
Rocket Software
 
8.1 In Depth: New 64-bit Files and File Management
Rocket Software
 
UniVerse11.2 Audit Logging
Rocket Software
 
MultiValue Security
Rocket Software
 
D3 FSI Hot Backup
Rocket Software
 
UniVerse Files
Rocket Software
 
D3 Troubleshooting
Rocket Software
 
U2 Replication with EDA for Report Servers
Rocket Software
 
U2 Replication for HADR
Rocket Software
 
What’s New in UniVerse 11.2
Rocket Software
 
D3 MVS Toolkit
Rocket Software
 
Giddy Up on GitHub
Rocket Software
 
Implementing Continuous Integration to Improve Software Quality
Rocket Software
 
D3 Unix Hot Backup
Rocket Software
 
Create a MV file sharing module using R/Link
Rocket Software
 
Managing the SSL Process
Rocket Software
 
Explore What’s New In UniData 8.1
Rocket Software
 
Building Applications Using the U2 Toolkit for .NET
Rocket Software
 
BI and Dashboarding Best Practices
Rocket Software
 
Ad

Similar to Create a Data Encryption Strategy using ADE (20)

PDF
CSF18 - GDPR - Sami Laiho
NCCOMMS
 
PPTX
eFolder Expert Series Webinar — How to Back Up and Replicate Off-Site Using e...
eFolder
 
PPTX
Man in the Cloud Attacks
Imperva
 
PDF
Java Card Platform Security and Performance
Eric Vétillard
 
PPTX
Acceleration_and_Security_draft_v2
Srinivasa Addepalli
 
PPTX
Automic Support Tips and Tricks
CA | Automic Software
 
PDF
What's New in Security for IBM i?
HelpSystems
 
PDF
Securing the Internet of Things - Hank Chavers
WithTheBest
 
PPTX
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Qualcomm Developer Network
 
PPTX
eFolder Partner Chat Webinar — Spring Cleaning: Getting Your Clients to Ditch...
eFolder
 
PPTX
Top 5 .NET Challenges, Performance Monitoring Tips & Tricks
AppDynamics
 
PPTX
WBN_Securing Your IBM i_E_250300003.pptx
Precisely
 
PDF
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Teemu Tiainen
 
PDF
CSF18 - BitLocker Deep Dive - Sami Laiho
NCCOMMS
 
PDF
Controlling Access to IBM i Systems and Data
Precisely
 
PDF
10 tips for hardening your system
Revital Lapidot
 
PDF
10 tips for hardening your system
Revital Lapidot
 
PDF
From Disaster to Recovery: Preparing Your IT for the Unexpected
DataCore Software
 
PPTX
eFolder Webinar — Features and Facts: Replibit vs. Acronis vs. ShadowProtect
eFolder
 
PPTX
Webinar: Is Your Storage Ready for Disaster?
Storage Switzerland
 
CSF18 - GDPR - Sami Laiho
NCCOMMS
 
eFolder Expert Series Webinar — How to Back Up and Replicate Off-Site Using e...
eFolder
 
Man in the Cloud Attacks
Imperva
 
Java Card Platform Security and Performance
Eric Vétillard
 
Acceleration_and_Security_draft_v2
Srinivasa Addepalli
 
Automic Support Tips and Tricks
CA | Automic Software
 
What's New in Security for IBM i?
HelpSystems
 
Securing the Internet of Things - Hank Chavers
WithTheBest
 
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Qualcomm Developer Network
 
eFolder Partner Chat Webinar — Spring Cleaning: Getting Your Clients to Ditch...
eFolder
 
Top 5 .NET Challenges, Performance Monitoring Tips & Tricks
AppDynamics
 
WBN_Securing Your IBM i_E_250300003.pptx
Precisely
 
Zero Trust And Best Practices for Securing Endpoint Apps on May 24th 2021
Teemu Tiainen
 
CSF18 - BitLocker Deep Dive - Sami Laiho
NCCOMMS
 
Controlling Access to IBM i Systems and Data
Precisely
 
10 tips for hardening your system
Revital Lapidot
 
10 tips for hardening your system
Revital Lapidot
 
From Disaster to Recovery: Preparing Your IT for the Unexpected
DataCore Software
 
eFolder Webinar — Features and Facts: Replibit vs. Acronis vs. ShadowProtect
eFolder
 
Webinar: Is Your Storage Ready for Disaster?
Storage Switzerland
 
Ad

Recently uploaded (20)

PPTX
The Role of a PHP Development Company in Modern Web Development
SEO Company for School in Delhi NCR
 
PDF
Executive Business Intelligence Dashboards
vandeslie24
 
PDF
Thread In Android-Mastering Concurrency for Responsive Apps.pdf
Nabin Dhakal
 
PPTX
Feb 2021 Cohesity first pitch presentation.pptx
enginsayin1
 
PDF
Beyond Binaries: Understanding Diversity and Allyship in a Global Workplace -...
Imma Valls Bernaus
 
PPTX
Java Native Memory Leaks: The Hidden Villain Behind JVM Performance Issues
Tier1 app
 
PDF
GetOnCRM Speeds Up Agentforce 3 Deployment for Enterprise AI Wins.pdf
GetOnCRM Solutions
 
PDF
Powering GIS with FME and VertiGIS - Peak of Data & AI 2025
Safe Software
 
PDF
Salesforce CRM Services.VALiNTRY360
VALiNTRY360
 
PDF
MiniTool Partition Wizard 12.8 Crack License Key LATEST
hashhshs786
 
PDF
Capcut Pro Crack For PC Latest Version {Fully Unlocked} 2025
hashhshs786
 
PPTX
Fundamentals_of_Microservices_Architecture.pptx
MuhammadUzair504018
 
PPTX
Agentic Automation Journey Session 1/5: Context Grounding and Autopilot for E...
klpathrudu
 
PDF
iTop VPN With Crack Lifetime Activation Key-CODE
utfefguu
 
PPTX
How Apagen Empowered an EPC Company with Engineering ERP Software
SatishKumar2651
 
PPTX
3uTools Full Crack Free Version Download [Latest] 2025
muhammadgurbazkhan
 
PPTX
Tally_Basic_Operations_Presentation.pptx
AditiBansal54083
 
PPTX
Why Businesses Are Switching to Open Source Alternatives to Crystal Reports.pptx
Varsha Nayak
 
PDF
Alarm in Android-Scheduling Timed Tasks Using AlarmManager in Android.pdf
Nabin Dhakal
 
PDF
Linux Certificate of Completion - LabEx Certificate
VICTOR MAESTRE RAMIREZ
 
The Role of a PHP Development Company in Modern Web Development
SEO Company for School in Delhi NCR
 
Executive Business Intelligence Dashboards
vandeslie24
 
Thread In Android-Mastering Concurrency for Responsive Apps.pdf
Nabin Dhakal
 
Feb 2021 Cohesity first pitch presentation.pptx
enginsayin1
 
Beyond Binaries: Understanding Diversity and Allyship in a Global Workplace -...
Imma Valls Bernaus
 
Java Native Memory Leaks: The Hidden Villain Behind JVM Performance Issues
Tier1 app
 
GetOnCRM Speeds Up Agentforce 3 Deployment for Enterprise AI Wins.pdf
GetOnCRM Solutions
 
Powering GIS with FME and VertiGIS - Peak of Data & AI 2025
Safe Software
 
Salesforce CRM Services.VALiNTRY360
VALiNTRY360
 
MiniTool Partition Wizard 12.8 Crack License Key LATEST
hashhshs786
 
Capcut Pro Crack For PC Latest Version {Fully Unlocked} 2025
hashhshs786
 
Fundamentals_of_Microservices_Architecture.pptx
MuhammadUzair504018
 
Agentic Automation Journey Session 1/5: Context Grounding and Autopilot for E...
klpathrudu
 
iTop VPN With Crack Lifetime Activation Key-CODE
utfefguu
 
How Apagen Empowered an EPC Company with Engineering ERP Software
SatishKumar2651
 
3uTools Full Crack Free Version Download [Latest] 2025
muhammadgurbazkhan
 
Tally_Basic_Operations_Presentation.pptx
AditiBansal54083
 
Why Businesses Are Switching to Open Source Alternatives to Crystal Reports.pptx
Varsha Nayak
 
Alarm in Android-Scheduling Timed Tasks Using AlarmManager in Android.pdf
Nabin Dhakal
 
Linux Certificate of Completion - LabEx Certificate
VICTOR MAESTRE RAMIREZ
 

Create a Data Encryption Strategy using ADE

  • 1. 1 Create a Data Encryption Strategy using ADE Ben Peach, Technical Support Engineer
  • 2. 2 Credits and Acknowledgements Presenter • Ben Peach, Technical Support Engineer Developers • Jing Cui, Principle Software Engineer (US) • Jianhua Zhou, Software Engineer III (US) Support Subject Matter Experts • Ben Peach, Technical Support Engineer (Aus) • John Jenkins, Technical Support Engineer (UK) • Liam Collier, Technical Support Engineer (US) ©2015 Rocket Software, Inc. All Rights Reserved.
  • 3. 3 Abstract  Automatic Data Encryption (ADE) is a security tool available for UniData and UniVerse. This session will concentrate on more real world topics rather than ‘how to’ . The intent is to provide the knowledge required for creating a strategy for your application and customers. ©2015 Rocket Software, Inc. All Rights Reserved.
  • 4. 4 Agenda Overview Compliance regulations Deciding what to encrypt High Availability and Disaster Recovery Migration Client-side applications Best practices ©2015 Rocket Software, Inc. All Rights Reserved.
  • 5. 5 Overview Encrypts data in its resting state Components • Master key • Encryption keys • Wallets • Algorithms • Key Store • Metadata ©2015 Rocket Software, Inc. All Rights Reserved. Encryption modes • WHOLERECORD • Field/Attribute level • @ID • Index
  • 6. 6 Unencrypted Data Master Key Key Store Encryption Meta Data StoreAudit Trail encman Encrypted Data Other UsersUsers through U2 clients DB /Sys Admin uvregen U2 Applications BASIC Query Data Access Key Manager Encryption Engine U2 Engine Overview ©2015 Rocket Software, Inc. All Rights Reserved.
  • 7. 7 Overview TCL commands - Key • CREATE.ENCRYPTION.KEY • DELETE.ENCRYPTION.KEY • GRANT.ENCRYPTION.KEY • REVOKE.ENCRYPTION.KEY • CHANGE.ENCRYPTION.PASSWORD • LIST.ENCRYPTION.KEY • ACTIVATE.ENCRYPTION.KEY • DEACTIVATE.ENCRYPTION.KEY ©2015 Rocket Software, Inc. All Rights Reserved.
  • 8. 8 Overview TCL commands – Wallet • CREATE.ENCRYPTION.WALLET • DELETE.ENCRYPTION.WALLET • GRANT.ENCRYPTION.KEY • REVOKE.ENCRYPTION.KEY • WALLET.ADD.KEY • WALLET.REMOVE.KEY • CHANGE.ENCRYPTION.PASSWORD • LIST.ENCRYPTION.WALLET • ACTIVATE.ENCRYPTION.KEY • DEACTIVATE.ENCRYPTION.KEY ©2015 Rocket Software, Inc. All Rights Reserved.
  • 9. 9 Overview TCL commands - File • LIST.ENCRYPTION.FILE • ENCRYPT.FILE • DECRYPT.FILE • REENCRYPT.FILE • ENCRYPT.INDEX • DECRYPT.INDEX • REENCRYPT.INDEX • DISABLE.DECRYPTION • ENABLE.DECRYPTION ©2015 Rocket Software, Inc. All Rights Reserved.
  • 10. 10 Overview Basic statements • ACTIVATEKEY/DEACTIVATEKEY • DISABLEDEC/ENABLEDEC • STATUS() • FILEINFO() OS level • encman • confcmd (UniData) / uvregen (UniVerse) XAdmin ©2015 Rocket Software, Inc. All Rights Reserved.
  • 11. 11 Compliance Regulations PCI DSS HIPAA and HITECH GLBA and FFIEC FISMA Other regulations Can ADE help me adhere to security regulations? Yes! ©2015 Rocket Software, Inc. All Rights Reserved.
  • 12. 12 MV Security Model Automatic Data Encryption: • Part of a much bigger picture. ©2015 Rocket Software, Inc. All Rights Reserved.
  • 13. 13 What to Encrypt Compliance regulations • Does my compliance regulation force me to encrypt this data? Performance considerations • Can I live without encrypting this file? • Do I need to departmentalize this file? Space considerations • Do I have enough disk to encrypt this file? • Again, do I need to departmentalize it? ©2015 Rocket Software, Inc. All Rights Reserved.
  • 14. 14 Compliance Regulations Know your application and data • Do I have to adhere to any compliance regulations? Know your regulation(s) inside out Compliance regulations will be the main driver of what is encrypted on your system ©2015 Rocket Software, Inc. All Rights Reserved.
  • 15. 15 Performance Any additional feature on a file will add processing time ADE is no exception • Record Level = 1 pass • Attribute Level = 1 pass per encrypted attribute • @ID = 1 additional pass • Encrypted Index = 1 additional pass per encrypted index Added processing time per record imperceptible • Only noticeable in large batches ©2015 Rocket Software, Inc. All Rights Reserved.
  • 16. 16 Space Encryption almost always grows the data Data is padded to make 32-bit/64-bit blocks • Independent of algorithm ‘strength’ More encrypted ‘segments’ = more padding • Record level only padded once or not at all  Better for larger records • Attribute level padded for each encrypted field ©2015 Rocket Software, Inc. All Rights Reserved.
  • 17. 17 High Availability and Disaster Recovery Backups – business data Backups – encryption key data Local and Offsite storage Failover Disaster recovery ©2015 Rocket Software, Inc. All Rights Reserved.
  • 18. 18 Backups Important regardless of ADE Ensure encryption components backed up • ENCINFO and KEYSTORE • product.info (UniData) and .uvconfig (UniVerse) • Loss of keys or master key may lead to data loss Verify and test backups ADE key requirement for archived data • If you change a key, archived data unreadable • Must save a snapshot of key setup ©2015 Rocket Software, Inc. All Rights Reserved.
  • 19. 19 Local and Offsite Storage Best of both worlds • Local = Fast recovery • Offsite = Protection against physical threats Separate master key from data • Fire safe, escrow company, another server Master key doesn’t need to be ‘known’ to access data • Needs to be present in product.info/.uvconfig • Only needs to be entered for admin tasks • If you lose it/forget it, decrypt everything asap ©2015 Rocket Software, Inc. All Rights Reserved.
  • 20. 20 Failover  Depends greatly on method used  Target system must have same master key and keys • Can change passwords • CHANGE.ENCRYPTION.PASSWORD  Data can be ‘synced’ by front and back ends • Activate key > copy clear text > write to encrypted file • Move encrypted files at OS level  Keys can be ‘synced’ by front and back ends • encman –export/import • Move ENCINFO/KEYSTORE at OS level – requires retag ©2015 Rocket Software, Inc. All Rights Reserved.
  • 21. 21 U2 Replication Master key and keys must match on publisher and subscriber • Passwords can be different Replication is not ADE aware • It doesn’t need to be • The two work perfectly side by side, but not together • Encrypt/decrypt file must be done ‘outside’ of Replication  Risk of clear and cipher text in same file, one will be inaccessible • Same applies to other features  RFS, Transaction Logging etc. ©2015 Rocket Software, Inc. All Rights Reserved.
  • 22. 22 Disaster Recovery Get the master key back • product.info (UniData) • .uvconfig (UniVerse • confcmd –m (UniData) • uvregen –m (UniVerse) Get the encryption keys back • ENCINFO/KEYSTORE • encman –import • encman –retag ©2015 Rocket Software, Inc. All Rights Reserved.
  • 23. 23 Migration  XAdmin and encman  Export/Import • Migrates key and metadata information • Added at UniData 7.2 and UniVerse 10.3 • Platform independent, encrypted • Password protected (optional) • Can change key owner • Can change file path  Retag • Use after copying KEYSTORE/ENCINFO to new server • Added security, ties key store to server ©2015 Rocket Software, Inc. All Rights Reserved.
  • 24. 24 Export/Import ©2015 Rocket Software, Inc. All Rights Reserved.
  • 25. 25 Export/Import ©2015 Rocket Software, Inc. All Rights Reserved.
  • 26. 26 Export/Import ©2015 Rocket Software, Inc. All Rights Reserved.
  • 27. 27 Export/Import ©2015 Rocket Software, Inc. All Rights Reserved.
  • 28. 28 Client-side Applications UniObjects.NET, UniObjects for Java, ODBC, JDBC, etc. UCI.config can hold wallet ID and password • Previously held clear text • UCI Editor in latest U2 Clients can now encrypt Any client that can be coded can activate a wallet • ACTIVATE_ENCRYPTION_WALLET() ©2015 Rocket Software, Inc. All Rights Reserved.
  • 29. 29 Best Practices Master key Reach back Wallets Password policies Changing passwords Re-encryption Decryption disablement ©2015 Rocket Software, Inc. All Rights Reserved.
  • 30. 30 Best Practices Master key • Role based administration • Not a single person • Password protection  Split responsibility between two groups Reach back • Keep ‘snapshot’ of master key and keys • Separate from archived data • Clearly labelled ©2015 Rocket Software, Inc. All Rights Reserved.
  • 31. 31 Best Practices Wallets • Single access point to a group of keys • Can grant or revoke access ad hoc • Changing a wallet does not affect data Password policies • XAdmin or encman • Range of configurables  Length, Age, Complexity, Repetition • Master key, keys, and wallets ©2015 Rocket Software, Inc. All Rights Reserved.
  • 32. 32 Best Practices ©2015 Rocket Software, Inc. All Rights Reserved.
  • 33. 33 Best Practices ©2015 Rocket Software, Inc. All Rights Reserved.
  • 34. 34 Best Practices Change passwords • Most compliance regulations require this • Master key passwords  uvregen –p (UniVerse)  confcmd –p (UniData)  xAdmin • Encryption key/wallet passwords  CHANGE.ENCRYPTION.PASSWORD  XAdmin ©2015 Rocket Software, Inc. All Rights Reserved.
  • 35. 35 Best Practices One pass re-encryption • Compliance regulations  Re-key • REENCRYPT.FILE • XAdmin • Single command • Takes roughly 66% of the time  Will vary depending on system, data, application ©2015 Rocket Software, Inc. All Rights Reserved.
  • 36. 36 Best Practices Decryption disablement • DISABLEDEC - Basic • DISABLE.DECRYPTION – ECL/TCL • Performance  Can save unnecessary passes through encryption engine  Don’t need that field during this program? Don’t decrypt it • Privilege  Departmentalized file may require different user privilege  Decrypt what you have access to, disable the rest • Only available for Attribute Level mode ©2015 Rocket Software, Inc. All Rights Reserved.
  • 37. 37 Summary  Overview  Compliance regulations  Deciding what to encrypt  High Availability and Disaster Recovery  Migration  Client-side applications  Best practices  And now… ©2015 Rocket Software, Inc. All Rights Reserved.
  • 38. 38 Create Your Encryption Strategy Compliance: What MUST be encrypted Commercial security: What SHOULD be encrypted Encryption key management • Policies • Identities  Key and password managers  System administrators  Data administrators  Data users  Departments ©2015 Rocket Software, Inc. All Rights Reserved.
  • 39. 39 Create Your Encryption Strategy  Other product features • Replication, RFS, TL etc.  Document the strategy  Test the complete strategy • Do not put live data at risk until you are sure • Someone not involved in the original process  Implement  Regularly check and verify your backups, HADR, etc.  Revisit strategy annually and at major business changes ©2015 Rocket Software, Inc. All Rights Reserved.
  • 41. 41 Disclaimer THE INFORMATION CONTAINED IN THIS PRESENTATION IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY. WHILE EFFORTS WERE MADE TO VERIFY THE COMPLETENESS AND ACCURACY OF THE INFORMATION CONTAINED IN THIS PRESENTATION, IT IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. IN ADDITION, THIS INFORMATION IS BASED ON ROCKET SOFTWARE’S CURRENT PRODUCT PLANS AND STRATEGY, WHICH ARE SUBJECT TO CHANGE BY ROCKET SOFTWAREWITHOUT NOTICE. ROCKET SOFTWARE SHALL NOT BE RESPONSIBLE FOR ANY DAMAGES ARISING OUT OF THE USE OF, OR OTHERWISE RELATED TO, THIS PRESENTATION OR ANY OTHER DOCUMENTATION. NOTHING CONTAINED IN THIS PRESENTATION IS INTENDED TO, OR SHALL HAVE THE EFFECT OF: • CREATING ANY WARRANTY OR REPRESENTATION FROM ROCKET SOFTWARE(OR ITS AFFILIATES OR ITS OR THEIR SUPPLIERS AND/OR LICENSORS); OR • ALTERING THE TERMS AND CONDITIONS OF THE APPLICABLE LICENSE AGREEMENT GOVERNING THE USE OF ROCKET SOFTWARE. ©2015 Rocket Software, Inc. All Rights Reserved.
  • 42. 42 Trademarks and Acknowledgements The trademarks and service marks identified in the following list are the exclusive properties of Rocket Software, Inc. and its subsidiaries (collectively, “Rocket Software”). These marks are registered with the U.S. Patent and Trademark Office, and may be registered or pending registration in other countries. Not all trademarks owned by Rocket Software are listed. The absence of a mark from this page neither constitutes a waiver of any intellectual property rights that Rocket Software has established in its marks nor means that Rocket Software is not owner of any such marks. Aldon, CorVu, Dynamic Connect, D3, FlashConnect, Pick, mvBase, MvEnterprise, NetCure, Rocket, SystemBuilder, U2, U2 Web Development Environment, UniData, UniVerse, and wIntegrate Other company, product, and service names mentioned herein may be trademarks or service marks of others. ©2015 Rocket Software, Inc. All Rights Reserved.
  • 43. 43