Just as you use different keys for different columns in your database, you use different ciphers for different types of data. Learning and applying the rules of cryptography is time-consuming and you have more exciting projects to work on.”
Without CDP, DBAs and other system administrators can decrypt sensitive data.
CDP protects structured data with AES and Format-Preserving Encryption (FPE) so organizations can secure and decrypt sensitive fields efficiently and perform data analytics on encrypted data.
Organizations can choose local encryption on the database server for maximum performance or remote encryption within CipherTrust Manager to ensure encryption keys never leave the secure enclave.
CDP supports data masking with FPE and granular access controls so that sensitive data can be revealed only on a need-to-know basis:
Ongoing costs decrease with centralized key and policy management in CipherTrust Manager (FIPS 140-2 up to Level 3) with built-in key rotation and data rekeying.
Data Security Administrators can instantly drill down into encryption parameters for individual columns or perform configuration adjustments.
Diagram 1 – Table "clientinfo10x". Below "Name", is a list of the rows in the table. A scrollbar appears when the number of rows exceeds a single screen.
The 5th row, "ssn", has been encrypted. We could add encryption for "cc" at any time by moving the cursor to the 4th row and clicking into the "Set Value" button, setting encryption parameters, then pressing the "Encrypt" button.
Diagram 1
Diagram 2 – Screen "Set Value". In the top row, "Set Value:" "ssn" shows what the DBA/security officer will see when a row is encrypted. Note that the only field that is modifiable is "Decryption Behavior for Users with Insufficient Permissions" – there is no opportunity to create a backdoor to see the encrypted data.
Diagram 2
Diagram 3 – Screen "FPE Encryption Formats". Shows the five data masking options for CDP.
Diagram 3
With CDP, you can have:
Close vulnerability gaps in < minute, Roadmap is respected (because there are no data protection fire drills taking Devs off revenue-generating projects).
Devs can remain focused on revenue-generating projects because they are not involved in updating data protection.
No downtime or fire drills required to update data protection.
Ultra secure (staying on top of your security posture by closing vulnerability gaps in < minute), Roadmap is respected (because there are no data protection fire drills taking Devs off revenue-generating projects).
Visibility into current security posture (single pane of glass, centrally-managed), No code change to make updates (removes dependency on DevOps for updates).
Reputation is protected, audits are passed, in compliance, does not add to technical debt.
Audits are passed, in compliance, empowered to update data protection whenever needed.
No need to learn crypto or do the data protection updates, does not add to technical debt.