issa: next generation tokenization for compliance and cloud data protection

43
Next Generation Tokenization for Compliance and Cloud Data Protection Ulf Mattsson CTO Protegrity ulf . mattsson [at] protegrity . com

Upload: ulf-mattsson

Post on 13-Jan-2015

518 views

Category:

Technology


3 download

DESCRIPTION

 

TRANSCRIPT

Page 1: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

Next Generation Tokenization for Compliance and Cloud Data

Protection

Ulf MattssonCTO Protegrity

ulf . mattsson [at] protegrity . com

Page 2: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

Ulf Mattsson

20 years with IBM Development & Global Services

Inventor of 22 patents – Encryption and Tokenization

Co-founder of Protegrity (Data Security)

Research member of the International Federation for Information Processing (IFIP) WG 11.3 Data and Application Security

Member of• PCI Security Standards Council (PCI SSC)

• American National Standards Institute (ANSI) X9

• Cloud Security Alliance (CSA)

• Information Systems Security Association (ISSA)

• Information Systems Audit and Control Association (ISACA)

02

Page 3: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection
Page 4: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

PCI DSS

04

Page 5: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

AttackerPublicNetwork

OS File System

Database

Storage System

Application

SS

LPrivate Network

Encrypt Data

At Rest(PCI DSS)

Clear Text Data

EncryptData onPublic

Networks(PCI DSS)

Clear Text Data

PCI DSS is Evolving

Source: PCI Security Standards Council, 20115

Page 6: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

Protecting the Data Flow – PCI/PII Example

Protected sensitive information

Unprotected sensitive information:

: Enforcement point

6

Page 7: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

Enabling Technologies

07

Page 8: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

PCI DSS - Ways to Render the PAN* Unreadable

Two-way cryptography with associated key management processes

One-way cryptographic hash functions

Index tokens and pads

Truncation (or masking – xxxxxx xxxxxx 6781)

* PAN: Primary Account Number (Credit Card Number)

08

Page 9: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

Current, Planned Use of Enabling Technology

47%

35%

39%

28%

29%

23%

16%

10%

7%

7%

13%22%

7%

28%

21%

30%

18%

1% 91% 5%

4%

Access controls

Database activity monitoring

Database encryption

Backup / Archive encryption

Data masking

Application-level encryption

Tokenization

Evaluating Current Use Planned Use <12 Months

9

Page 10: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

How is Encryption Different from Tokenization?

10

Page 11: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

Application Databases

Hiding Data in Plain Sight – Data Tokenization

400000 123456 7899

400000 222222 7899

Y&SFD%))S(

Tokenization Server

Data Token

Data Entry

011

Page 12: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

What is Tokenization and what is the Benefit?

Tokenization• Tokenization is process that replaces sensitive data in

systems with inert data called tokens which have no value to the thief.

• Tokens resemble the original data in data type and length

Benefit• Greatly improved transparency to systems and

processes that need to be protected

Result• Reduced remediation

• Reduced need for key management

• Reduce the points of attacks

• Reduce the PCI DSS audit costs for retail scenarios

12

Page 13: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

What is Encryption and Tokenization?

Used Approach Cipher System Code System

Cryptographic algorithms

Cryptographic keys

Code books

Index tokens

Source: McGraw-HILL ENCYPLOPEDIA OF SCIENCE & TECHNOLOGY

TokenizationEncryption

13

Page 14: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

Best Practices for Tokenization *

One way Irreversible Function**

Unique Sequence Number

Hash

Randomly generated value

Secret per merchant

*: Published July 14, 2010

**: Multi-use tokens

014

Page 15: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

Visa recommendations should have been simply to use a random number

You should not write your own 'home-grown' token servers

Comments on Visa’s Tokenization Best Practices

015

Page 16: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

Applications & Databases

: Data Token

Data Tokenization – Reducing the Attack Surface

Protected sensitive information

Unprotected sensitive information:

123456 999999 1234 123456 999999 1234 123456 999999 1234

123456 123456 1234

123456 999999 1234

123456 123456 1234

123456 999999 1234 123456 999999 1234

16

Page 17: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

Positioning of Different Protection Options

17

Page 18: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

Positioning of Different Protection Options

Evaluation Criteria Strong Encryption

Formatted Encryption

Data Tokens

Security & Compliance

Total Cost of Ownership

Use of Encoded Data

Best Worst

18

Page 19: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

123456 777777 1234

123456 123456 1234

aVdSaH 1F4hJ 1D3a

!@#$%a^///&*B()..,,,gft_+!@4#$2%p^&*Hashing -

Strong Encryption -

Alpha Encoding -

Numeric Encoding -

Partial Encoding -

Clear Text Data -

Intrusiveness to Applications and Databases

I

Original

I

Longer

!@#$%a^.,mhu7/////&*B()_+!@

666666 777777 8888Tokenizing /FormattedEncryption

019

Data

Length

StandardEncryption

Comparing Field Encryption & Tokenization

Page 20: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

Speed and Security Of Different

Data Protection Methods

20

Page 21: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

10 000 000 -

1 000 000 -

100 000 -

10 000 -

1 000 -

100 -

Transactions per second (16 digits)

I

Format

Preserving

Encryption

Speed of Different Protection Methods

I

Data

Type

Preservation

I

Memory

Data

Tokenization

I

AES CBC

Encryption

Standard

I

Traditional

Data

Tokenization

Encryption

21 *: Speed will depend on the configuration

Page 22: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

I

Format

Preserving

Encryption

Security of Different Protection Methods

I

Data

Type

Preservation

I

Memory

Data

Tokenization

I

AES CBC

Encryption

Standard

I

Traditional

Data

Tokenization

High -

Low -

Security Level

Encryption

22

Page 23: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

10 000 000 -

1 000 000 -

100 000 -

10 000 -

1 000 -

100 -

Transactions per second (16 digits)

I

Format

Preserving

Encryption

Speed and Security of Different Protection Methods

I

Data

Type

Preservation

I

Memory

Data

Tokenization

I

AES CBC

Encryption

Standard

I

Traditional

Data

Tokenization

Speed*

Security

High

Low

Security Level

Encryption

*: Speed will depend on the configuration23

Page 24: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

Different Approaches for Tokenization

Traditional Tokenization• Dynamic Model or Pre-Generated Model

• 5 tokens per second - 5000 tokenizations per second

Next Generation Tokenization• Memory-tokenization

• 200,000 - 9,000,000+ tokenizations per second

• “The tokenization scheme offers excellent security, since it is based on fully randomized tables.” *

• “This is a fully distributed tokenization approach with no need for synchronization and there is no risk for collisions.“ *

*: Prof. Dr. Ir. Bart Preneel, Katholieke University Leuven, Belgium

024

Page 25: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

Evaluating Encryption &

Data Tokenization

25

Page 26: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

Best Worst

Area ImpactDatabase

File Encryption

DatabaseColumn

Encryption

CentralizedTokenization

(old)

MemoryTokenization

(new)

Scalability

Availability

Latency

CPU Consumption

Security

Data Flow Protection

Compliance Scoping

Key Management

Randomness

Separation of Duties

Evaluating Encryption & Tokenization Approaches

EncryptionEvaluation Criteria Tokenization

026

Page 27: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

Evaluation Criteria Strong Field Encryption

Formatted Encryption

Memory Tokenization

Disconnected environments

Distributed environments

Performance impact when loading data

Transparent to applications

Expanded storage size

Transparent to databases schema

Long life-cycle data

Unix or Windows mixed with “big iron” (EBCDIC)

Easy re-keying of data in a data flow

High risk data

Security - compliance to PCI, NIST

Best Worst

Evaluating Field Encryption & Distributed Tokenization

27

Page 28: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

Tokenization SummaryTraditional Tokenization Memory Tokenization

Footprint Large, Expanding. The large and expanding footprint of Traditional Tokenization is it’s Achilles heal. It is the source of poor performance, scalability, and limitations on its expanded use.

Small, Static. The small static footprint is the enabling factor that delivers extreme performance, scalability, and expanded use.

High Availability, DR, and Distribution

Complex replication required. Deploying more than one token server for the purpose of high availability or scalability will require complex and expensive replication or synchronization between the servers.

No replication required. Any number of token servers can be deployed without the need for replication or synchronization between the servers. This delivers a simple, elegant, yet powerful solution.

Reliability Prone to collisions.The synchronization and replication required to support many deployed token servers is prone to collisions, a characteristic that severely limits the usability of traditional tokenization.

No collisions.Protegrity Tokenizations’ lack of need for replication or synchronization eliminates the potential for collisions .

Performance, Latency, and Scalability

Will adversely impact performance & scalability.The large footprint severely limits the ability to place the token server close to the data. The distance between the data and the token server creates latency that adversely effects performance and scalability to the extent that some use cases are not possible.

Little or no latency. Fastest industry tokenization.The small footprint enables the token server to be placed close to the data to reduce latency. When placed in-memory, it eliminates latency and delivers the fastest tokenization in the industry.

Extendibility Practically impossible. Based on all the issues inherent in Traditional Tokenization of a single data category, tokenizing more data categories may be impractical.

Unlimited Tokenization Capability.Protegrity Tokenization can be used to tokenize many data categories with minimal or no impact on footprint or performance.

28

Page 29: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

Token Flexibility for Different Categories of Data

Type of Data Input Token Comment

Token Properties

Credit Card 3872 3789 1620 3675 8278 2789 2990 2789 Numeric

Medical ID 29M2009ID 497HF390D Alpha-Numeric

Date 10/30/1955 12/25/2034 Date

E-mail Address [email protected] [email protected] Alpha Numeric, delimiters in input preserved

SSN delimiters 075-67-2278 287-38-2567 Numeric, delimiters in input

Credit Card 3872 3789 1620 3675 8278 2789 2990 3675 Numeric, Last 4 digits exposed

Policy Masking

Credit Card 3872 3789 1620 3675 clear, encrypted, tokenized at rest3872 37## #### ####

Presentation Mask: Expose 1st 6 digits

29

Page 30: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

030

PCI Use Cases

Page 31: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

Some Tokenization Use Cases

Customer 1• Vendor lock-in: What if we want to switch payment processor?

• Performance challenge: What if we want to rotate the tokens?

• Performance challenge with initial tokenization

Customer 2• Reduced PCI compliance cost by 50%

• Performance challenge with initial tokenization

• End-to-end: looking to expand tokenization to all stores

Customer 3• Desired a single vendor

• Desired use of encryption and tokenization

• Looking to expand tokens beyond CCN to PII

Customer 4• Remove compensating controls on the mainframe

• Pushing tokens through to avoid compensating controls

31

Page 32: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

Tokenization Use Case #2

A leading retail chain• 1500 locations in the U.S. market

Simplify PCI Compliance• 98% of Use Cases out of audit scope

• Ease of install (had 18 PCI initiatives at one time)

Tokenization solution was implemented in 2 weeks • Reduced PCI Audit from 7 months to 3 months

• No 3rd Party code modifications

• Proved to be the best performance option

• 700,000 transactions per days

• 50 million card holder data records

• Conversion took 90 minutes (plan was 30 days)

• Next step – tokenization servers at 1500 locations

32

Page 33: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

Cloud Security

033

Page 34: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

Risks Associated with Cloud Computing

034

The evolving role of IT managers and CIOs Findings from the 2010 IBM Global IT Risk Study

Inability to customize applications

Financial strength of the cloud computing provider

Uptime/business continuity

Weakening of corporate network security

Threat of data breach or loss

Handing over sensitive data to a third party

0 10 20 30 40 50 60 70 %

Page 35: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

What Amazon AWS’s PCI Compliance Means to You, Dec 7 2010

1. Just because AWS is certified doesn't mean you are. You still need to deploy a PCI compliant application/service and anything on AWS is still within your assessment scope.

2. The open question? PCI-DSS 2.0 doesn't address multi-tenancy concerns

3. AWS is certified as a service provider doesn't mean all cloud IaaS providers will be

4. You can store PAN data on S3, but it still needs to be encrypted in accordance with PCI-DSS requirements

5. Amazon doesn't do this for you -- it's something you need to implement yourself; including key management, rotation, logging, etc.

6. If you deploy a server instance in EC2 it still needs to be assessed by your QSA

7. What this certification really does is eliminate any doubts that you are allowed to deploy an in-scope PCI system on AWS

8. This is a big deal, but your organization's assessment scope isn't necessarily reduced

9. it might be when you move to something like a tokenization service where you reduce your handling of PAN data

securosis.com035

Page 36: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

Data Protection Challenges

36

Page 37: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

The actual protection of the data is not the challenge

Centralized solutions are needed to managed complex security requirements

• Based on Security Policies with Transparent Key management

• Many methods to secure the data• Auditing, Monitoring and Reporting

Solutions that minimize the impact on business operations

• Highest level of performance and transparency

Rapid Deployment

Affordable with low TCO

Enable & Maintaining compliance

Data Protection Challenges

37

Page 38: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

Protegrity Data Security Management

Database Protector

File System Protector

Policy

AuditLog

Secure Archive

Application Protector

Tokenization Server

EnterpriseData SecurityAdministrator

: Encryption service38

Page 39: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

About Protegrity

Proven enterprise data security software and innovation leader • Sole focus on the protection of data

• Patented Technology, Continuing to Drive Innovation

Growth driven by compliance and risk management• PCI (Payment Card Industry)

• PII (Personally Identifiable Information)

• PHI (Protected Health Information) – HIPAA

• State and Foreign Privacy Laws, Breach Notification Laws

• High Cost of Information Breach ($4.8m average cost), immeasurable costs of brand damage , loss of customers

• Requirements to eliminate the threat of data breach and non-compliance

Cross-industry applicability• Retail, Hospitality, Travel and Transportation• Financial Services, Insurance, Banking• Healthcare• Telecommunications, Media and Entertainment• Manufacturing and Government

39

Page 40: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

040

Select Protegrity Customers

Page 41: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

Why Tokenization – A Triple Play

1. No Masking

2. No Encryption

3. No Key Management

041

Page 42: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

Why Protegrity Tokenization

1. Better

2. Faster

3. Lower Cost / TCO

042

$

Page 43: ISSA: Next Generation Tokenization for Compliance and Cloud Data Protection

Please contact us for more information

Ulf Mattsson, CTO

ulf . Mattsson [at] protegrity . com

April G. Healy, Global Alliance Director  

april . healy [at] protegrity . com