Trustway Hardware Security Module
Total Page:16
File Type:pdf, Size:1020Kb
Trustway Hardware Security Module Data Security Choosing the right path through compliance Trusted partner for your Digital Journey Adapt to changing regulations & threats As cyber threats are constantly evolving, securing data became a major stake for companies and critical infrastructures. The threat landscape is continuously changing: • Attack surface is expanding with the rise of cloud, mobile and IoT • Attack actors are motivated as they are after the company’s money, sensitive information, key data and reputation • Attack vectors are more targeted & complex and take advantage of all types of system vulnerabilities. Facing such challenges require organizations to adapt their security policy, including data protection measures. Moreover, they have to comply to laws and regulations such as the GDPR (General Data Protection Regulation). The objective of the GDPR, which has applied to organisations 25 May 2018, is to strengthen and unify data protection for European citizens in every country. It will have a structural impact on the security of IT systems. Organizations must comply with these new regulations that protect data privacy and include them in their security policy. They must therefore resort to high security solutions tailored to their situation. Beyond mere compliance, companies can build a relationship of trust with their customers and partners through cyber security. Personal Cloud security Payment IoT data protection Security Data breaches have a huge Cloud is rapidly and Data protection is paramount in In the context of IoT, large impact on an organization and exponentially increasing every the financial sector. In a growing quantities of data are generated its activities. Data protection year and has revolutionized the environment characterized by and have to be transmitted must be one of the main working life. Many businesses close links between market between various entities in this concerns of the company, as are drawn by the accessibility of players, handling of ever ecosystem. data is one of the most valuable the data, the infrastructure cost larger amounts of capital, and and strategic asset to all reductions and the appeal of increasingly sophisticated Cyberattacks targeting businesses. services that are adaptable and financial products, operational connected devices can be highly flexible. risks have arisen significantly. harmful and disrupt critical From affected brand trust to services. cybercrime costs, cyber-attacks More and more SaaS Securing transactions demands disrupt every business, even applications are hosted outside efficient, reliable and flexible It is therefore vital to deploy an legally. For example, fines up to the company’s walls. This security solutions, fully integrated overall device and data security 20 million€ or 4 % of the total migration to Cloud raises the into information systems and solution adapted to the IoT worldwide annual turnover apply question of where data is really payment systems, in compliance environments, communication pursuant to non-compliance to stored and who can access it. with industry standards such as networks and protocols (Low- the GDPR (Article 83). Companies need to be sure that PCI DSS (Payment Card Industry power long-range such asLoRa data privacy is ensured. Data Security Standard). or Sigfox, and Short-range such Ensure privacy and data as Wi-Fi, ZigBee, or Bluetooth security by choosing a solution Identity and access Low Power). compliant with the standards management and especially and regulations related to your encryption are the best ways to business (GDPR compliance, protect data. HIPAA, PCI DSS…). 02 Data Security Choosing the right path through compliance Protect your data with compliant devices Data protection became a strategic Compliant, flexible and innovative, our Designed to ensure integrity and security step in your digital transformation Hardware Security Module range brings of customers’ cryptographic operations, journey but most of all a priority in to companies and critical infrastructures our HSMs guarantee high availability and company security policy. the reliability of an innovative and robust safe restore, an easy installation and an architecture in compliance with strict ergonomic management application. security demands. Virtual HSM: Security pioneer 100% European mutualize your HSM in IoT solutions With its virtual HSMs, Trustway Proteccio Atos supports its customers through their Developed in Europe and complying with the allows your customer to mutualize their HSM digital transformation and offers them upmost demanding norms and regulations, for different use cases. innovative ways to secure their data. Our our HSMs are designed to integrate IoT Security Suite is an end-to-end solution seamlessly with your overall information The Hardware Security Module Trustway which includes Trustway Crypt2pay HSM systems protection policies. Proteccio gives simultaneously access to extensions for smart meters (DLMS/COSEM) eight virtual HSMs. Each virtual HSM is a and connected objects (LoRa) security. Hardware and software are especially cryptographic partition strongly separated designed, implemented and completely from the others by dedicated encryption Atos is a member of the LoRa Alliance, an manufactured in our offices in France. Our keys, users, administrators and auditors. open global standard for secure, carrier- 100% European solutions insure a total grade IoT LPWAN connectivity, and provides capacity to deploy our HSMs and to offer you This strong partitioning permits a physical trust security services to deliver keys and an end-to-end solution including sales, post- HSM to be shared among various certificate for IoT. We contributed to build the sale support, maintenance and training. applications, while still benefitting from a first highly secure LoRa network of Bouygues level of security identical to the deployment Telecom – Objenious project, managing of several pieces of equipment. more than 19 million devices and 4000 LoRa antennas and gateways. HARDWARE-BASED ENCRYPTION With a Hardware Safe & centralized storage Security Module, Why you you keep the need a control of all your Tamperproof Control of sensitive data and Hardware physical access all sensitive data the security level is protection and sensors not dependent on Security any external factor, to the contrary of Module ? software-based. Truly random number Flexible 1001011 encryption. 0010110 generation and strong upgrade and update 0101000 resilience possible Safe processing Independent from all and no performance major operating degradation systems Data Security Choosing the right path through compliance 03 End-to-end security As a trusted partner, Atos designs, develops, operates and maintains cutting-edge digital solutions that combine power, security and systems integration. With its wide-ranging technology expertise, Atos combines its expertise with important market actors, in the cloud sector, in Internet of Things (IoT)… to propose to its customers an end-to-end cybersecurity offer. Data protection Authentication Cloud Data protection solutions allow you to Hardware Security Module enhances The combination of its physical security encrypt and control the access to your data security of your application dedicated to devices and its cryptographic core whatever its place is (On-premise, Virtual and access management, authentication… responding to strict security requirements Cloud). brings to information systems and HSM is the root of trust for all your cloud services one of the most certified The Hardware Security Modules bring application. It brings you the required cryptographic modules in the world. a complete security and protect all your insurance for authentication regardless transactions, identities and applications in a whether it is PKI, signature solution, IAM nor To secure cloud environment, the HSM box. privileged account management. provides: The HSM allows you to manage encryption HSM offers a safe environment to manage • Secure exchange between Private Cloud keys that guarantee data security at every key pair of certification Authority and and local site; level: virtual machine, database, applications, signature solution and master key of IAM and • Data encryption: On-premise solution; files... PAM solution. • Data encryption: in the cloud solution; The HSM guarantee a high security thanks to • On demand crypto services. access control of your data and securing of keys generators. References Cloud solutions associated with data encryption boxes Based on our Trustway Proteccio HSM Bring the highest level of security to protect your data in the Cloud: • Data protection: Associated to Oodrive Saas application, HSM guarantee security of all the data hosted in Oodrive cloud • Standard compliancy: HSM certified Common Criteria EAL4+ and respond to the EU regulations • Virtual vault: strong authentication and management key encryption • Flexibility in the cloud: Clusterized and managed on remote, the HSM provides cryptographic services in the Cloud to enhance security of the data and application 04 Data Security Choosing the right path through compliance Secure payment Trustway IoT security transactions DataProtect The Internet of Things is a key area of the The Trustway Crypt2payHSM is in the The management of encryption digital transformation. As the number of heart of the whole banking transactions keys becomes a real headache, digital connected devices is skyrocketing, lifecycle, from the general payment card (PIN it is expensive