IBM Power Systems Platform IBM System I and I5/OS Data Encryption Options

IBM Power Systems Platform IBM System I and I5/OS Data Encryption Options

IBM Power Systems IBM Power Systems Platform IBM System i and i5/OS Data Encryption Options Sue Baker IBM Advanced Technical Support Rochester, MN © 2008 IBM Corporation Version 2/14/2008 IBM Power Systems Agenda Why is Encryption Hot in the Marketplace Today? Alternatives for Encryption on IBM System i and i5/OS – Encrypt Data in your Database/Application – Encrypt Data using Middleware – Encrypting Data via an Encrypted ASP – V6R1 – Encrypt Data via Tape Appliances – Encrypting Data via Tape Drives with Built-in Encryption – Overview of Encryption Solution on IBM Tape Drives – The Encryption Key Manager (EKM) – BRMS and Tape Encryption – Encryption - How to get Started 2 © 2008 IBM Corporation IBM Power Systems Why is Encryption Hot in the Marketplace Today? 3 © 2008 IBM Corporation IBM Power Systems Tape and Data Encryption Customer Data EXPOSED!! Many government agencies are requiring disclosure of security breaches In the News – 38 states have enacted legislation requiring notification in cases of security breaches TAPES LOST! • Source: www.Privacyrights.org Privacy Commission – Similar federal legislation has been proposed Contacted • Source: http://www.epic.org/privacy/bill_track.html Industry organizations are also increasing In a move that could fuel efforts to change data storage practices, records management scrutiny of security procedures provider ABC Co has admitted losing a customer’s backup tapes and is recommending • Source: Payment Card Industry Security Audit that customers begin encrypting tapes. Procedures Version 1 Although data encryption is not a new issue, it is a growing business security focus. Increased Over 90 million consumers have been awareness of customer privacy, an increase in notified of potential security breaches identity theft crimes, and more technical savvy criminals are all contributing. regarding personal information since 2/2005 New state, federal and industry regulations to • Source: www.Privacyrights.org protect personal data, credit card numbers, etc, are making this an issue of interest to many businesses 4 © 2008 IBM Corporation IBM Power Systems Tape and Data Encryption Customer Data EXPOSED!! Many government agencies are requiring disclosure of security breaches Costs from Security Breach – 38 states have enacted legislation requiring notification in cases of security breaches Direct Costs • Source: www.Privacyrights.org - Fines and penalties – Similar federal legislation has been proposed - Customer notification -letters • Source: http://www.epic.org/privacy/bill_track.html - postage Industry organizations are also increasing - hotline $$ scrutiny of security procedures - credit checks • Source: Payment Card Industry Security Audit - Public Relations costs Procedures Version 1 - Legal Actions Over 90 million consumers have been notified of potential security breaches Indirect Costs regarding personal information since 2/2005 - Loss of reputation • Source: www.Privacyrights.org - Loss of customer goodwill - Government investigations 5 © 2008 IBM Corporation IBM Power Systems Alternatives for Encryption on IBM System i 6 © 2008 IBM Corporation IBM Power Systems Techniques for Encrypting Data on System i Encrypt sensitive data Appl. Encrypt Database directly in SQL Encrypted using IBM Encrypted table columns Fields or 3rd party Copy or via Encrypted middleware application use Data for selected of objects cryptographic APIs Encrypt using 3rd Encrypt Database Database Encrypted party using a tape Encryption ASP/iASP of data at appliance drive with rest in an between built-in tape ASP server and encryption tape drive 7 © 2008 IBM Corporation IBM Power Systems i5/OS V6R1 Enhancements i5/OS V6R1 cryptographic key management enhancements Encrypted BRMS backups of user data to tape or virtual tape Encryption of data residing in an ASP (user and independent) Announce 1/29/08 GA 3/21/08 8 © 2008 IBM Corporation IBM Power Systems Encrypting Data in your Database/Application 9 © 2008 IBM Corporation IBM Power Systems Encrypting Data in your Database/Application Four methods to choose from: • DB2 column encryption (V5R3 onwards) • i5/OS cryptographic API’s (V5R3 onwards) • Java cryptographic extensions (API’s) Let’s look at • 4764 cryptographic co-processor and API’s these in more detail! DB2 Column i5/OS Java Crypto 4764 Crypto Encryption Crypto API’s Extensions Co-Processor (API’s) and API’s 10 © 2008 IBM Corporation IBM Power Systems Encrypting Data in your Database/Application DB2 column encryption • Built-in to i5/OS from V5R3 onwards • Native DB2: use “Before Insert” and “Update” triggers • SQL: use SQL functions and “Instead of” triggers • Details available in the i5/OS Information Center DB2 Column Encryption 11 © 2008 IBM Corporation IBM Power Systems Encrypting Data in your Database/Application i5/OS cryptographic API’s Encryption Services Provided • Built-in to i5/OS from V5R3 onwards • Called by an application program • Use industry standard encryption algorithms • V5R3: Application must handle keys • V5R4: Key Mgmt APIs store master keys below the Machine Interface (MI) – i.e., never in the clear in the application DB2 Column i5/OS Encryption Crypto API’s 12 © 2008 IBM Corporation IBM Power Systems Encrypting Data in your Database/Application – V6R1 i5/OS V6R1 cryptographic key management enhancements – GUI and CL interface to manage master keys • New master key for ASP encryption (256 bit) • New master key for save/restore (256 bit) – GUI and CL interface to manage i5/OS keystore and keys Announce 1/29/08 GA 3/21/08 13 © 2008 IBM Corporation IBM Power Systems Master Key Management – V6R1 14 © 2008 IBM Corporation IBM Power Systems Keystore Management – V6R1 15 © 2008 IBM Corporation IBM Power Systems Keystore Management – V6R1 16 © 2008 IBM Corporation IBM Power Systems Encrypting Data in your Database/Application – V6R1 i5/OS V6R1 cryptographic key management enhancements – Save/restore of software master keys – Improved SSL acceleration using the 4764 Cryptographic coprocessor – New algorithm modes – New hardware based JCE provider Announce 1/29/08 GA 3/21/08 17 © 2008 IBM Corporation IBM Power Systems Encrypting Data in your Database/Application Encryption Java cryptographic extensions (API’s) Services Provided • JCE for short • Part of i5/OS Developer Toolkit for Java (5722-JV1) • Similar services to i5/OS crypto APIs • Adds Digital Signature Algorithm (seldom used) • Application must manage/store encryption keys DB2 Column i5/OS Java Crypto Encryption Crypto API’s Extensions (API’s) 18 © 2008 IBM Corporation IBM Power Systems Encrypting Data in your Database/Application Encryption Services Provided 4764 cryptographic co-processor and API’s • Orderable hardware feature • Application program calls the APIs to access the encryption functions of the co-processor • API’s standard across platforms • Main advantage: key is stored in hardware • FIPS 140 security standard DB2 Column i5/OS Java Crypto 4764 Crypto Encryption Crypto API’s Extensions Co-Processor (API’s) and API’s 19 © 2008 IBM Corporation IBM Power Systems Protecting i5/OS Data with Encryption Whitepaper Great whitepaper that came out last year http://www-03.ibm.com/servers/enable/site/education/wp/efbe/efbe.pdf 20 © 2008 IBM Corporation IBM Power Systems Protecting i5/OS Data with Encryption Redbook New Redbook currently in a draft version http://www.redbooks.ibm.com/redpieces/pdfs/sg247399.pdf 21 © 2008 IBM Corporation IBM Power Systems Encrypting Data using Middleware 22 © 2008 IBM Corporation IBM Power Systems Non-IBM Middleware for Encryption Encrypt then Tape Management Encryption Tools save/transmit Systems File File A A File Tools A’ Tape Mgmt System Benefits: Watch for: Example: • Performance • Typically low cost • Extra disk required Records can grow when • Good for small amount • Key management they are encrypted. of data to encrypt functions Tools/techniques are and/or long backup • Added complexity available to help . window ** Note: These products are supported by the vendor, not by IBM, and are included here only as examples 23 © 2008 IBM Corporation IBM Power Systems Non-IBM Middleware for Encryption Encrypt then Tape Management Encryption Tools save/transmit Systems File File A A File Tools A’ Tape Mgmt System ** Note: These products are supported by the vendor, not by IBM, and are included here only as examples 24 © 2008 IBM Corporation IBM Power Systems Third-party Host Software-based Encryption Multiple vendors offer System i software-based encryption products, and many offer trial downloads of their product so that application functionality can be explored. Examples include: Help/Systems –http://www.helpsystems.com/ops/save.html Linoma Software –http://www.linomasoftware.com/products/transferanywhere Patrick Townsend & Associates, Inc –http://www.patownsend.com/AES.htm PKWARE, Inc –http://www.pkware.com/index.php?option=com_content&task=view&id=37&Itemid=84 NuBridges –http://www.nubridges.com/ ** Note: These products are supported by the vendor, not by IBM, and are included here only as examples 25 © 2008 IBM Corporation IBM Power Systems IBM Middleware for Encryption – V6R1 Encrypted BRMS backups of user data to tape or virtual tape – Encrypted Backup Enablement – i5/OS Option 44 – This is a priced option BRMS enabled encryption will be supported for: – Any tape library – Standalone tape drive – Virtual tape – Media duplication What can be encrypted? – All user data – The operating system cannot be encrypted Announce 1/29/08 – Tape labels will not be encrypted GA 3/21/08

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    54 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us