24
Teleconference Adopting An Enterprise Approach To Encryption Paul Stamp Senior Analyst Forrester Research April 3, 2007. Call in at 12:55 pm Eastern Time

Paul Stamp Senior Analyst Forrester Research

Embed Size (px)

Citation preview

Page 1: Paul Stamp Senior Analyst Forrester Research

TeleconferenceAdopting An Enterprise Approach To EncryptionPaul Stamp

Senior Analyst

Forrester Research

April 3, 2007. Call in at 12:55 pm Eastern Time

Page 2: Paul Stamp Senior Analyst Forrester Research

2Entire contents © 2007  Forrester Research, Inc. All rights reserved.

Agenda

• Why encryption?

• What encryption?

• How encryption?

Page 3: Paul Stamp Senior Analyst Forrester Research

3Entire contents © 2007  Forrester Research, Inc. All rights reserved.

Agenda

• Why encryption?

• What encryption?

• How encryption?

Page 4: Paul Stamp Senior Analyst Forrester Research

4Entire contents © 2007  Forrester Research, Inc. All rights reserved.

Encryption — why we do it

• Because somebody says we should do it

• Because we’ve been burned in the past

Very few people do it “because we think we ought to”

Page 5: Paul Stamp Senior Analyst Forrester Research

5Entire contents © 2007  Forrester Research, Inc. All rights reserved.

What do we encrypt?

• Typically — not a lot of . . .

» Networks & VPNs

» Laptops & desktops

» File transfers

» Email

» Databases

Page 6: Paul Stamp Senior Analyst Forrester Research

6Entire contents © 2007  Forrester Research, Inc. All rights reserved.

Email encryption adoption by vertical

0% 5% 10% 15% 20% 25% 30% 35% 40% 45%

Retail & wholesale trade

Business services

Public sector

Utilities &telecommunications

Manufacturing

Media, entertainment, &leisure

Finance & insurance

Base: 712 technology decision-makers at North American and European enterprises

Source: Business Technographics® September 2006 North American And European Enterprise Software Survey

“Are you likely to invest in email encryption in 2007?”

Page 7: Paul Stamp Senior Analyst Forrester Research

7Entire contents © 2007  Forrester Research, Inc. All rights reserved.

Why now?

• Contractual obligations

» PCI, partner agreements

• Safe Harbor from mandatory disclosure requirements

» “whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person” CA SB 1386

• Best practice-based demands

» HIPAA, EU Data Protection Directive etc. . . .

Page 8: Paul Stamp Senior Analyst Forrester Research

8Entire contents © 2007  Forrester Research, Inc. All rights reserved.

Laptop encryption is the new flavor of the month

0 10 20 30 40

To all computers

To desktops only

To laptops only

To select laptopsonly

No, but plan to inthe next year

No plans to useencryption tools

Don’t know

2006 2005

Source: Forrester Security Panel Survey 2005 and 2006

Base: 149 technology decision-makers at North American SMBs and enterprises (184 in 2006)

“Has your organization deployed full disk or file encryption to desktops and laptops?”

Page 9: Paul Stamp Senior Analyst Forrester Research

9Entire contents © 2007  Forrester Research, Inc. All rights reserved.

Agenda

• Why encryption?

• What encryption?

• How encryption?

Page 10: Paul Stamp Senior Analyst Forrester Research

10Entire contents © 2007  Forrester Research, Inc. All rights reserved.

When do we encrypt

• Data in motion

» Keys needed to authenticate and initiate connection

» Keys needed at the point in time of the connection

• Data at rest

» Keys needed to encrypt and decrypt stored data

» Keys needed at an unspecified time in the future

» Key escrow often required

Page 11: Paul Stamp Senior Analyst Forrester Research

11Entire contents © 2007  Forrester Research, Inc. All rights reserved.

Problems with encryption

• Cost

» Licensing costs, development costs

• Administrative overhead

» Key management, support processes

• Visibility

» Network monitoring has little visibility into encrypted traffic

Page 12: Paul Stamp Senior Analyst Forrester Research

12Entire contents © 2007  Forrester Research, Inc. All rights reserved.

Considerations for laptop encryption

• File level

» More elegant, allows more “follow the data” encryption

» BUT . . . more cumbersome, demands user decision

» Vendors include: Entrust, PGP

• Disk level

» Quicker and easier

» Support processes normally “save the laptop, not the data”

» Still demands user changes in behavior — laptop is “storage of convenience”

» Vendors include: Credant, Pointsec, Guardian Edge, Utimaco, Safeboot

Page 13: Paul Stamp Senior Analyst Forrester Research

13Entire contents © 2007  Forrester Research, Inc. All rights reserved.

Other areas of encryption not so well defined

• File transfers

» Variety of methods in place — file level, SFTP, FTPS, etc.

» Vendors include: Sterling Commerce, Attachmate, SSH Corporation, IPSwitch, Proatria, PGP . . .

• Email

» Estimated 80% of encrypted email is TLS or Web mail

» Vendors include: PGP, Voltage, Entrust, PostX

• Databases

» Largely PCI-driven

» Biggest advantage is protection from the DBA

» Vendors include: nCipher, Ingrian, Application Security Inc., Protegrity

Page 14: Paul Stamp Senior Analyst Forrester Research

14Entire contents © 2007  Forrester Research, Inc. All rights reserved.

Point-based approach leads to

• Inconsistent data protection

• Ad hoc key management

• High licensing costs and performance overheads

Page 15: Paul Stamp Senior Analyst Forrester Research

15Entire contents © 2007  Forrester Research, Inc. All rights reserved.

How do you manage keys?

• Typical answers

» Manage keys? What keys?

» We use embedded product functionality

» We use manual processes

Page 16: Paul Stamp Senior Analyst Forrester Research

16Entire contents © 2007  Forrester Research, Inc. All rights reserved.

Key management principles

• Key provisioning

» How will the key get to where it needs to go?

• Key escrow and backup

» How do I keep a copy for safekeeping?

• Key recovery

» How do I recover the key when it’s unavailable?

Page 17: Paul Stamp Senior Analyst Forrester Research

17Entire contents © 2007  Forrester Research, Inc. All rights reserved.

Key management principles (cont.)

• Key exchange and sharing

» How do I make keys available to those who need them?

• Key rollover

» How do I generate and provision new keys when old keys expire?

• Key destruction

» How do I destroy keys when I’ve finished with them?

Page 18: Paul Stamp Senior Analyst Forrester Research

18Entire contents © 2007  Forrester Research, Inc. All rights reserved.

Things to remember

• Key management complexity is a function of business processes — not number of keys

• Not all key management processes need to be uniform

• Key management technology will be useless without defined goals and processes

Page 19: Paul Stamp Senior Analyst Forrester Research

19Entire contents © 2007  Forrester Research, Inc. All rights reserved.

Agenda

• Why encryption?

• What encryption?

• How encryption?

Page 20: Paul Stamp Senior Analyst Forrester Research

© 2007, Forrester Research, Inc. Reproduction Prohibited

Different Types Of EncryptionMarch 2007, Trends “Adopting An Enterprise Approach To Encryption”

Page 21: Paul Stamp Senior Analyst Forrester Research

© 2007, Forrester Research, Inc. Reproduction Prohibited

Enterprise Key ManagementMarch 2007, Trends “Adopting An Enterprise Approach To Encryption”

Page 22: Paul Stamp Senior Analyst Forrester Research

© 2007, Forrester Research, Inc. Reproduction Prohibited

Vendor OfferingsMarch 2007, Trends “Adopting An Enterprise Approach To Encryption”

Page 23: Paul Stamp Senior Analyst Forrester Research

23Entire contents © 2007  Forrester Research, Inc. All rights reserved.

Recommendations

• Start with data classification and handling

• Prioritize based on specific requirements and compensating controls

• Keep a wider picture in mind when complying with specific mandates

Page 24: Paul Stamp Senior Analyst Forrester Research

24Entire contents © 2007  Forrester Research, Inc. All rights reserved.

Paul Stamp

+1 617/613-6263

[email protected]

www.forrester.com

Thank you