encryption option overview
DESCRIPTION
Encryption Option Overview. For VERITAS NetBackup. Lost backup tapes and potential fraudulent activity have real financial costs Violates the internal control process of Sarbanes-Oxley Act Financial losses from fraud (e.g., settlements, monitoring services) - PowerPoint PPT PresentationTRANSCRIPT
Encryption Option OverviewFor VERITAS NetBackup
Why Encrypt Backups?
Lost backup tapes and potential fraudulent activity have real financial costs
– Violates the internal control process of Sarbanes-Oxley Act
– Financial losses from fraud (e.g., settlements, monitoring services)
– Corporate brand, public relations impact, and customer confidence impact
Concentrated amount of data on highly portable backup tapes
– Impact of tape loss 2 - 5x greater than online breaches / stolen hardware1
– Multiple copies of unencrypted backup tapes increases exposure
Backup / tape service providers can and do lose data
– Iron Mountain had 4 instances of lost tapes (Jan – May 2005)
– Iron Mountain recommends encryption of customer data
Public disclosure of data loss impacts your company
– California law requires any company with a California customer record to report loss of data that comprises privacy
– 22 other states considering legislation similar to California
(1) Based on reported data losses Jan-May 2005 – www.privacyrights.org
Recent loses of backup tapes
Reported lost backup tapes Jan. – May 2005
"Very few people encrypt backup tapes, which means that they rely on the security of the backup and off-site rotation process."
Jon Oltsik, senior analyst, information security, Enterprise Strategy Group
An April 2005 survey of 322 IT professional revealed that more than 60% of companies across 10 industry segments never encrypt their backup data.
Enterprise Strategy Group, April 2005
Date Company # of tapes Affected individualsFeb-05 Bank of America 1 1,200,000 Apr-05 Ameritrade 1 200,000 May-05 Time Warner 4 600,000 Total 6 2,000,000
Risks from comprimised or lost personal data
Personal Records Lost 500,000 1-2 lost tapes*
$ per individual Total Notes
1 Yr Credit Reporting $5.00 $2,500,000
Administrative Materials $2.00 $1,000,000 Certified letters, papers, postage
Administrative Labor $1.00 $500,000 Create, Manage, Follow-up
Estimate of response costs $4,000,00 Does note include losses from fraud.
Financial Loss or Fraud– Affects company or government agency AND individuals (tax payers)
Institutional Credibility and Responsibility
* Because of their density and portability, the number of records lost with backups tapes has been substantially higher than online security breaches.
1 reference point: ChoicePoint spend $2 million to notify 135,000 customers
Hypothetical Cost Estimate
Where to start with backup encryption
Common themes for thinking about backup security– Control and protection of data– Access to local and backup data– Ensuring that backups of critical data are maintained
Target data for encryption– Customer data or other content with private data (e.g., forms with a
social security number only)– Intellectual property– Sensitive corporate and financial data
Understand regulations or laws that impact you– Health Information Portability Act (HIPPA) & Sarbanes-Oxley– California Senate Bill 1386 – disclosure of security breach
NetBackup Encryption Option Overview
Integrated with NetBackup
Encryption applied at source (client)
• No additional software, hardware, or training
• Easy to deploy based on existing policies
• Protect heterogeneous clients, applications, or databases
• Mitigates risk at other storage and hardware points
Multiple bit levels and ciphers for
encryption
Choose appropriate level of encryption for your needs
NetBackupclient
NetBackupserver
Tape or Disk
Encryption at 40, 56, 128, or 256-bit level
Vault
End-to-end securit
y
Client takes latest key from the keyfile on the client (keyfile created using a passphrase).
Client creates an “encryption tar header” (not encrypted) which contains checksum of key & cipher.
Client writes the file data encrypted with key using the cipher defined.
Client writes the file data encrypted with key & cipher Backup image on server includes a flag indicating an
encrypted backup (also identified through standard NetBackup Reports).
How a backup works
NetBackupclient
NetBackupserver
Tape or Disk
Vault
End-to-end securit
y
Media Server determines from the backup image if whether the backup was encrypted
Media Server sends file names, attributes, and encrypted file data to the client to be restored
Client reads encryption tar header & compares the checksum in the header with checksums of the keys in the keyfile. If a match occurs that key will be used to decrypt the file data.
File(s) are decrypted and restored if a key & cipher are available. Otherwise an error message is generated.
How a restore works
NetBackup client support – All client platforms** released with NetBackup
Database and application agent support– DB2, Informix, Oracle, Microsoft SQL Server
– SAP, Microsoft Exchange and SharePoint Portal Server, Lotus Notes
Encryption levels and ciphers
**Encryption is not available for NetBackup clients running NetWare
Cipher Bit LevelDES 40, 56, 112*AES 128, 256Blowfish 128* 2 Key Triple DES is 112-bit
Encryption Option - Details
Keyfile Management
A keyfile is required to restore encrypted data
Keyfile management and encryption policies should be clearly defined across the organization regardless of whether software or hardware is used for encryption
In the event of a lost keyfile, NetBackup can generate a new one if the user knows the pass phrase used to create the keyfile associated with the backup
For keyfile management NetBackup recommends either: – Manual Retention: Writing successive pass phrases on paper and
placing in a secure location – Automatic Retention: Create a non-encrypted policy to backup
client keyfiles to a separate and secure location– Minimize complexity behind pass phrase and keyfile management
Encrypting data is far less costly than the resource use and money associated with data loss
Backup tapes can be stolen or lost regardless of the physical location where they reside
Software encryption option available today for NetBackup:– Centralized deployment to clients with standard NetBackup process– Easy to target data for encryption through use of policies– Cost effective to deploy on a per client basis as needs dictate– Customers have a choice of ciphers (AES, DES, Blowfish) and bit
levels (40, 56, 128, 256)
Security of sensitive backup data required by law in some industries
Summary
&ANSWERS
QUESTIONS
Other articles and sources of interest
So you think your data is secure (Computer World QuickLink# 56000)http://www.computerworld.com/securitytopics/security/story/0,10801,103869,00.html
Are companies prepared for a security breach? (Computer World QuickLink# 56495 )
http://www.computerworld.com/securitytopics/security/privacy/story/0,10801,104311,00.html?SKC=security-104311
ChoicePoint – Feb 2005 breech – What it cost (Computer World QuickLink# 56527 )
http://www.computerworld.com/securitytopics/security/privacy/story/0,10801,104276,00.html?from=story%5Fkc
Chronology of security breaches in 2005
http://www.privacyrights.org