SlideShare a Scribd company logo
Zettaset
XCrypt Service Encryption
October 7–10, 2019
Austin Convention Center
Tim Reilly, COO Maksim Yankovskiy, VP Engineering
Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
Never has DATA been so IMPORTANT
Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
of the world’s data
has been created
in the last 2 years
90%
Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
16 Zettabytes (16x1021)
The world’s largest
taxi company, owns
no vehicles.
Uber
The world’s most
popular media owner,
creates no content.
Alibaba
The world’s largest
accommodation provider,
owns no real estate.
Facebook
Airbnb
The most valuable retailer,
has no inventory
Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
Source: Visual Capitalist, Q4 2018
Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
Digital Disruption
10x 1/10th
More Innovation The Cost
100xThe Power
Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
DATARECORDS LOST OR STOLEN SINCE2013
6 million perday
onaverage
Technology
32%
Government
10%
Retail
9%
Financial
4%
Entertainment
3%
Healthcare
2%
Education
1%
Other
39%
Every type of organization is exposed
Traditional security is no longer sufficient
Breaches are growing year-on-year across all sectors
Source: Gemalto breachlevelindex, Q1 2018
Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
UNENCRYPTED DATA
95%
of breaches involved
unencrypted data
Source: breachlevelindex, Q1 2018
Main cause of damages
Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
Largest component of data breach is lost business2018 Survey
• Data breaches will
increase in frequency &
diminish shareholder value
• Pessimistic about ability to
protect from cyber threats
• Cybersecurity is still not
considered a strategic
priority
• Unsecured IoT devices will
likely cause a data breach
• More investment to achieve
regulatory compliance
Data Breaches Are Frequent & Costly
Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
DevOps & Data
• Storage platforms – scalable,
automated & dynamic
• Development data is still data
• Dev environment security lags
behind production
Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
How Do Systems Get Breached?
Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
The Foundation is Trust in Data
Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
Security & Compliance Requirements
Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
Why Not Just Use Traditional Data Protection Tools?
• Centralized
• Scalability issues
• Not data service agnostic
• Not cloud native
• Complicated
Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
Better Data Protection Through BOSH
• Transparency!
• Encrypt at runtime
• Data service agnostic: work with any data service
• Key management – separate but automated
• Scales with Pivotal Platform – set up, tear down
• No changes to existing processes
Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
XCrypt BOSH Platform Architecture
1
7
Data Service
Instance
MySQL, Redis, etc.
Virtual Key Manager (KMIP),
Soft HSM (PKCS#11)
BOSH Release
License Server
BOSH Release
XCrypt Encryption
Client for BOSH
Add-On
persistent storage
(encrypted)
BOSH
Director *
deployment
key exchange
BOSH Agent*
* modified CF components,
contributed to open-source CF
Certificate Authority
BOSH Release
Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
A Word About Containers
Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/
Thank you!

More Related Content

What's hot (17)

PPTX
Innovate for Cyber Resilience
accenture
 
PDF
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec
 
PPTX
Cisco IoT World Forum 2014: Airwatch Breakout Session
Basil Hashem
 
PPTX
Going Beyond the Cloud to Modernize Your Banking Infrastructure
Cloudflare
 
PDF
The Secure Path to Value in the Cloud by Denny Heaberlin
Cloud Expo
 
PDF
Security, Compliance and Cloud - Jelecos
Erin_Jelecos
 
PDF
Keynotes Akamai Trust No One City Tour
Elisabeth Bitsch-Christensen
 
PDF
Social Engineering and other Foes in the GDPR Year
Massimo Chirivì
 
PDF
Cybersecurity | D-fend: Counter drone solution for urban environments
Vertex Holdings
 
PPTX
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
Nur Shiqim Chok
 
PDF
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Cohesive Networks
 
PDF
How to Counter Cybersecurity Attacks - Trust No One
Elisabeth Bitsch-Christensen
 
PPTX
Ben goodman cybersecurity in the iiot
MassTLC
 
PPTX
Drones and logistics - What legal issues and how to handle them
Giulio Coraggio
 
PDF
IoT Update | Hoe implementeer je IoT Schaalbaar in je IT landschap
IoT Academy
 
PPTX
Living In a World of Data Exploitation - CPDP 2017
Frederike Kaltheuner
 
PPTX
IoT, arquitectura de solución y cómo enriquecerlo con Confluent
mimacom
 
Innovate for Cyber Resilience
accenture
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec
 
Cisco IoT World Forum 2014: Airwatch Breakout Session
Basil Hashem
 
Going Beyond the Cloud to Modernize Your Banking Infrastructure
Cloudflare
 
The Secure Path to Value in the Cloud by Denny Heaberlin
Cloud Expo
 
Security, Compliance and Cloud - Jelecos
Erin_Jelecos
 
Keynotes Akamai Trust No One City Tour
Elisabeth Bitsch-Christensen
 
Social Engineering and other Foes in the GDPR Year
Massimo Chirivì
 
Cybersecurity | D-fend: Counter drone solution for urban environments
Vertex Holdings
 
[Cisco Connect 2018 - Vietnam] Brink sanders cisco connect opening_keynote_vn_v4
Nur Shiqim Chok
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Cohesive Networks
 
How to Counter Cybersecurity Attacks - Trust No One
Elisabeth Bitsch-Christensen
 
Ben goodman cybersecurity in the iiot
MassTLC
 
Drones and logistics - What legal issues and how to handle them
Giulio Coraggio
 
IoT Update | Hoe implementeer je IoT Schaalbaar in je IT landschap
IoT Academy
 
Living In a World of Data Exploitation - CPDP 2017
Frederike Kaltheuner
 
IoT, arquitectura de solución y cómo enriquecerlo con Confluent
mimacom
 

Similar to Software-Defined Security: The New School of Security Designed for DevOps (20)

PDF
Data Security and Protection in DevOps
Karen Lopez
 
PPTX
Secure Data Sharing in OpenShift Environments
DevOps.com
 
PDF
Recent developments in data analytics and big data
Dez Blanchfield
 
PPTX
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
Ulf Mattsson
 
PPTX
Privacy Preserved Data Augmentation using Enterprise Data Fabric
Atif Shaikh
 
PDF
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
MarketingArrowECS_CZ
 
PDF
Data security as a top priority in the digital world: preserve data value by ...
Anastasija Nikiforova
 
PDF
Where data security and value of data meet in the cloud brighttalk webinar ...
Ulf Mattsson
 
PDF
apidays London 2023 - API Programs - Security by Design, Privacy by Default, ...
apidays
 
PDF
Data centric security key to digital business success - ulf mattsson - bright...
Ulf Mattsson
 
PDF
Isaca new delhi india - privacy and big data
Ulf Mattsson
 
PDF
Emerging Trends in Data Security for a Competitive Edge in 2024 and Beyond.pdf
Anil
 
PDF
Isaca new delhi india privacy and big data
Ulf Mattsson
 
PPTX
Data Modeling for Security, Privacy and Data Protection
Karen Lopez
 
PPTX
Data erasure's role in limiting cyber attacks
Blancco
 
PDF
Threat Ready Data: Protect Data from the Inside and the Outside
DLT Solutions
 
PDF
API World 2019 Presentation on Securing sensitive data through APIs and AI pa...
dsapps
 
PDF
Accelerating Cyber Threat Detection With GPU
Joshua Patterson
 
PDF
Pivotal Big Data Suite: A Technical Overview
VMware Tanzu
 
PDF
Powering the Future of Data  
Bilot
 
Data Security and Protection in DevOps
Karen Lopez
 
Secure Data Sharing in OpenShift Environments
DevOps.com
 
Recent developments in data analytics and big data
Dez Blanchfield
 
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
Ulf Mattsson
 
Privacy Preserved Data Augmentation using Enterprise Data Fabric
Atif Shaikh
 
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
MarketingArrowECS_CZ
 
Data security as a top priority in the digital world: preserve data value by ...
Anastasija Nikiforova
 
Where data security and value of data meet in the cloud brighttalk webinar ...
Ulf Mattsson
 
apidays London 2023 - API Programs - Security by Design, Privacy by Default, ...
apidays
 
Data centric security key to digital business success - ulf mattsson - bright...
Ulf Mattsson
 
Isaca new delhi india - privacy and big data
Ulf Mattsson
 
Emerging Trends in Data Security for a Competitive Edge in 2024 and Beyond.pdf
Anil
 
Isaca new delhi india privacy and big data
Ulf Mattsson
 
Data Modeling for Security, Privacy and Data Protection
Karen Lopez
 
Data erasure's role in limiting cyber attacks
Blancco
 
Threat Ready Data: Protect Data from the Inside and the Outside
DLT Solutions
 
API World 2019 Presentation on Securing sensitive data through APIs and AI pa...
dsapps
 
Accelerating Cyber Threat Detection With GPU
Joshua Patterson
 
Pivotal Big Data Suite: A Technical Overview
VMware Tanzu
 
Powering the Future of Data  
Bilot
 
Ad

More from VMware Tanzu (20)

PDF
Spring into AI presented by Dan Vega 5/14
VMware Tanzu
 
PDF
What AI Means For Your Product Strategy And What To Do About It
VMware Tanzu
 
PDF
Make the Right Thing the Obvious Thing at Cardinal Health 2023
VMware Tanzu
 
PPTX
Enhancing DevEx and Simplifying Operations at Scale
VMware Tanzu
 
PDF
Spring Update | July 2023
VMware Tanzu
 
PPTX
Platforms, Platform Engineering, & Platform as a Product
VMware Tanzu
 
PPTX
Building Cloud Ready Apps
VMware Tanzu
 
PDF
Spring Boot 3 And Beyond
VMware Tanzu
 
PDF
Spring Cloud Gateway - SpringOne Tour 2023 Charles Schwab.pdf
VMware Tanzu
 
PDF
Simplify and Scale Enterprise Apps in the Cloud | Boston 2023
VMware Tanzu
 
PDF
Simplify and Scale Enterprise Apps in the Cloud | Seattle 2023
VMware Tanzu
 
PPTX
tanzu_developer_connect.pptx
VMware Tanzu
 
PDF
Tanzu Virtual Developer Connect Workshop - French
VMware Tanzu
 
PDF
Tanzu Developer Connect Workshop - English
VMware Tanzu
 
PDF
Virtual Developer Connect Workshop - English
VMware Tanzu
 
PDF
Tanzu Developer Connect - French
VMware Tanzu
 
PDF
Simplify and Scale Enterprise Apps in the Cloud | Dallas 2023
VMware Tanzu
 
PDF
SpringOne Tour: Deliver 15-Factor Applications on Kubernetes with Spring Boot
VMware Tanzu
 
PDF
SpringOne Tour: The Influential Software Engineer
VMware Tanzu
 
PDF
SpringOne Tour: Domain-Driven Design: Theory vs Practice
VMware Tanzu
 
Spring into AI presented by Dan Vega 5/14
VMware Tanzu
 
What AI Means For Your Product Strategy And What To Do About It
VMware Tanzu
 
Make the Right Thing the Obvious Thing at Cardinal Health 2023
VMware Tanzu
 
Enhancing DevEx and Simplifying Operations at Scale
VMware Tanzu
 
Spring Update | July 2023
VMware Tanzu
 
Platforms, Platform Engineering, & Platform as a Product
VMware Tanzu
 
Building Cloud Ready Apps
VMware Tanzu
 
Spring Boot 3 And Beyond
VMware Tanzu
 
Spring Cloud Gateway - SpringOne Tour 2023 Charles Schwab.pdf
VMware Tanzu
 
Simplify and Scale Enterprise Apps in the Cloud | Boston 2023
VMware Tanzu
 
Simplify and Scale Enterprise Apps in the Cloud | Seattle 2023
VMware Tanzu
 
tanzu_developer_connect.pptx
VMware Tanzu
 
Tanzu Virtual Developer Connect Workshop - French
VMware Tanzu
 
Tanzu Developer Connect Workshop - English
VMware Tanzu
 
Virtual Developer Connect Workshop - English
VMware Tanzu
 
Tanzu Developer Connect - French
VMware Tanzu
 
Simplify and Scale Enterprise Apps in the Cloud | Dallas 2023
VMware Tanzu
 
SpringOne Tour: Deliver 15-Factor Applications on Kubernetes with Spring Boot
VMware Tanzu
 
SpringOne Tour: The Influential Software Engineer
VMware Tanzu
 
SpringOne Tour: Domain-Driven Design: Theory vs Practice
VMware Tanzu
 
Ad

Recently uploaded (20)

PDF
SciPy 2025 - Packaging a Scientific Python Project
Henry Schreiner
 
PPTX
Why Businesses Are Switching to Open Source Alternatives to Crystal Reports.pptx
Varsha Nayak
 
PDF
IDM Crack with Internet Download Manager 6.42 Build 43 with Patch Latest 2025
bashirkhan333g
 
PPTX
AEM User Group: India Chapter Kickoff Meeting
jennaf3
 
PDF
Thread In Android-Mastering Concurrency for Responsive Apps.pdf
Nabin Dhakal
 
PPTX
Tally software_Introduction_Presentation
AditiBansal54083
 
PDF
AI + DevOps = Smart Automation with devseccops.ai.pdf
Devseccops.ai
 
PPTX
Human Resources Information System (HRIS)
Amity University, Patna
 
PDF
Wondershare PDFelement Pro Crack for MacOS New Version Latest 2025
bashirkhan333g
 
PDF
Download Canva Pro 2025 PC Crack Full Latest Version
bashirkhan333g
 
PDF
Unlock Efficiency with Insurance Policy Administration Systems
Insurance Tech Services
 
PDF
Build It, Buy It, or Already Got It? Make Smarter Martech Decisions
bbedford2
 
PDF
SAP Firmaya İade ABAB Kodları - ABAB ile yazılmıl hazır kod örneği
Salih Küçük
 
PPTX
Help for Correlations in IBM SPSS Statistics.pptx
Version 1 Analytics
 
PPTX
Agentic Automation: Build & Deploy Your First UiPath Agent
klpathrudu
 
PPTX
Change Common Properties in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
PDF
vMix Pro 28.0.0.42 Download vMix Registration key Bundle
kulindacore
 
PDF
The 5 Reasons for IT Maintenance - Arna Softech
Arna Softech
 
PPTX
Agentic Automation Journey Series Day 2 – Prompt Engineering for UiPath Agents
klpathrudu
 
PDF
MiniTool Partition Wizard Free Crack + Full Free Download 2025
bashirkhan333g
 
SciPy 2025 - Packaging a Scientific Python Project
Henry Schreiner
 
Why Businesses Are Switching to Open Source Alternatives to Crystal Reports.pptx
Varsha Nayak
 
IDM Crack with Internet Download Manager 6.42 Build 43 with Patch Latest 2025
bashirkhan333g
 
AEM User Group: India Chapter Kickoff Meeting
jennaf3
 
Thread In Android-Mastering Concurrency for Responsive Apps.pdf
Nabin Dhakal
 
Tally software_Introduction_Presentation
AditiBansal54083
 
AI + DevOps = Smart Automation with devseccops.ai.pdf
Devseccops.ai
 
Human Resources Information System (HRIS)
Amity University, Patna
 
Wondershare PDFelement Pro Crack for MacOS New Version Latest 2025
bashirkhan333g
 
Download Canva Pro 2025 PC Crack Full Latest Version
bashirkhan333g
 
Unlock Efficiency with Insurance Policy Administration Systems
Insurance Tech Services
 
Build It, Buy It, or Already Got It? Make Smarter Martech Decisions
bbedford2
 
SAP Firmaya İade ABAB Kodları - ABAB ile yazılmıl hazır kod örneği
Salih Küçük
 
Help for Correlations in IBM SPSS Statistics.pptx
Version 1 Analytics
 
Agentic Automation: Build & Deploy Your First UiPath Agent
klpathrudu
 
Change Common Properties in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
vMix Pro 28.0.0.42 Download vMix Registration key Bundle
kulindacore
 
The 5 Reasons for IT Maintenance - Arna Softech
Arna Softech
 
Agentic Automation Journey Series Day 2 – Prompt Engineering for UiPath Agents
klpathrudu
 
MiniTool Partition Wizard Free Crack + Full Free Download 2025
bashirkhan333g
 

Software-Defined Security: The New School of Security Designed for DevOps

  • 1. Zettaset XCrypt Service Encryption October 7–10, 2019 Austin Convention Center Tim Reilly, COO Maksim Yankovskiy, VP Engineering
  • 2. Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Never has DATA been so IMPORTANT
  • 3. Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ of the world’s data has been created in the last 2 years 90%
  • 4. Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ 16 Zettabytes (16x1021)
  • 5. The world’s largest taxi company, owns no vehicles. Uber The world’s most popular media owner, creates no content. Alibaba The world’s largest accommodation provider, owns no real estate. Facebook Airbnb The most valuable retailer, has no inventory
  • 6. Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Source: Visual Capitalist, Q4 2018
  • 7. Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Digital Disruption 10x 1/10th More Innovation The Cost 100xThe Power
  • 8. Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ DATARECORDS LOST OR STOLEN SINCE2013 6 million perday onaverage Technology 32% Government 10% Retail 9% Financial 4% Entertainment 3% Healthcare 2% Education 1% Other 39% Every type of organization is exposed Traditional security is no longer sufficient Breaches are growing year-on-year across all sectors Source: Gemalto breachlevelindex, Q1 2018
  • 9. Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ UNENCRYPTED DATA 95% of breaches involved unencrypted data Source: breachlevelindex, Q1 2018 Main cause of damages
  • 10. Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Largest component of data breach is lost business2018 Survey • Data breaches will increase in frequency & diminish shareholder value • Pessimistic about ability to protect from cyber threats • Cybersecurity is still not considered a strategic priority • Unsecured IoT devices will likely cause a data breach • More investment to achieve regulatory compliance Data Breaches Are Frequent & Costly
  • 11. Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ DevOps & Data • Storage platforms – scalable, automated & dynamic • Development data is still data • Dev environment security lags behind production
  • 12. Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ How Do Systems Get Breached?
  • 13. Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ The Foundation is Trust in Data
  • 14. Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Security & Compliance Requirements
  • 15. Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Why Not Just Use Traditional Data Protection Tools? • Centralized • Scalability issues • Not data service agnostic • Not cloud native • Complicated
  • 16. Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Better Data Protection Through BOSH • Transparency! • Encrypt at runtime • Data service agnostic: work with any data service • Key management – separate but automated • Scales with Pivotal Platform – set up, tear down • No changes to existing processes
  • 17. Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ XCrypt BOSH Platform Architecture 1 7 Data Service Instance MySQL, Redis, etc. Virtual Key Manager (KMIP), Soft HSM (PKCS#11) BOSH Release License Server BOSH Release XCrypt Encryption Client for BOSH Add-On persistent storage (encrypted) BOSH Director * deployment key exchange BOSH Agent* * modified CF components, contributed to open-source CF Certificate Authority BOSH Release
  • 18. Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ A Word About Containers
  • 19. Unless otherwise indicated, these slides are © 2013-2019 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Thank you!