Enhance your data security posture with a no-code approach to application-level encryption
Data
is
the
lifeblood
of
every
organization.
As
your
organization’s
data
footprint
expands
across
the
clouds
and
between
your
own
business
lines
to
drive
value,
it
is
essential
to
secure
data
at
all
stages
of
the
cloud
adoption
and
throughout
the
data
lifecycle.
While
there
are
different
mechanisms
available
to
encrypt
data
throughout
its
lifecycle
(in
transit,
at
rest
and
in
use),
application-level
encryption
(ALE)
provides
an
additional
layer
of
protection
by
encrypting
data
at
its
source.
ALE
can
enhance
your
data
security,
privacy
and
sovereignty
posture.
Why
should
you
consider
application-level
encryption?
Figure
1
illustrates
a
typical
three-tier
application
deployment,
where
the
application
back
end
is
writing
data
to
a
managed
Postgres
instance.
If
you
look
at
the
high-level
data
flow,
data
originates
from
the
end
user
and
is
encrypted
in
transit
to
the
application,
between
application
microservices
(UI
and
back
end),
and
from
the
application
to
the
database.
Finally,
the
database
encrypts
the
data
at
rest
using
either
bring
your
own
key
(
or
keep
your
own
key
(
strategy.
In
this
deployment,
both
runtime
and
database
admins
are
inside
the
trust
boundary.
This
means
you’re
assuming
no
harm
from
these
personas.
However,
as
analysts
and
industry
experts
point
out,
there
is
a
human
element
at
the
root
of
most
cybersecurity
breaches.
These
breaches
happen
through
error,
privilege
misuse
or
stolen
credentials
and
this
risk
can
be
mitigated
by
placing
these
personas
outside
the
trust
boundary.
So,
how
can
we
enhance
the
security
posture
by
efficiently
placing
privileged
users
outside
the
trust
boundary?
The
answer
lies
in
application-level
encryption.
How
does
application-level
encryption
protect
from
data
breaches?
Application-level
encryption
is
an
approach
to
data
security
where
we
encrypt
the
data
within
an
application
before
it
is
stored
or
transmitted
through
different
parts
of
the
system.
This
approach
significantly
reduces
the
various
potential
attack
points
by
shrinking
the
data
security
controls
right
down
to
the
data.
By
introducing
ALE
to
the
application,
as
shown
in
figure
2,
we
help
ensure
that
data
is
encrypted
within
the
application.
It
remains
encrypted
for
its
lifecycle
thereon,
until
it
is
read
back
by
the
same
application
in
question.
This
helps
make
sure
that
privileged
users
on
the
database
front
(such
as
database
administrators
and
operators)
are
outside
the
trust
boundary
and
cannot
access
sensitive
data
in
clear
text.
However,
this
approach
requires
changes
to
the
application
back
end,
which
places
another
set
of
privileged
users
(ALE
service
admin
and
security
focal)
inside
the
trust
boundary.
It
can
be
difficult
to
confirm
how
the
encryption
keys
are
managed
in
the
ALE
service.
So,
how
are
we
going
to
bring
the
value
of
ALE
without
such
compromises?
The
answer
is
through
a
data
security
broker.
Why
should
you
consider
Data
Security
Broker?
IBM
Cloud®
Security
and
Compliance
Center
(SCC)
Data
Security
Broker
(DSB)
provides
an
application-level
encryption
software
with
a
no-code
change
approach
to
seamlessly
mask,
encrypt
and
tokenize
data.
It
enforces
a
role-based
access
control
(RBAC)
with
field
and
column
level
granularity.
DSB
has
two
components:
a
control
plane
component
called
DSB
Manager
and
a
data
plane
component
called
DSB
Shield,
as
shown
in
Figure
3.
DSB
Manager
(the
control
plane)
is
not
in
the
data
path
and
is
now
running
outside
the
trust
boundary.
DSB
Shield
(the
data
plane
component)
seamlessly
retrieves
the
policies
such
as
encryption,
masking,
RBAC
and
uses
the
customer-owned
keys
to
enforce
the
policy
with
no-code
changes
to
the
application!
Data
Security
Broker
offers
these
benefits:
-
Security:
Personally
identifiable
information
(PII)
is
anonymized
before
ingestion
to
the
database
and
is
protected
even
from
database
and
cloud
admins. -
Ease:
The
data
is
protected
where
it
flows,
without
code
changes
to
the
application. -
Efficiency:
DSB
supports
scaling
and
to
the
end
user
of
the
application,
this
results
in
no
perceived
impact
on
application
performance. -
Control:
DSB
offers
customer-controlled
key
management
access
to
data.
Help
to
avoid
the
risk
of
data
breaches
Data
breaches
come
with
the
high
cost
of
time-to-address,
the
risk
of
industry
and
regulatory
compliance
violations
and
associated
penalties,
and
the
risk
of
loss
of
reputation.
Mitigating
these
risks
is
often
time-consuming
and
expensive
due
to
the
application
changes
required
to
secure
sensitive
data,
as
well
as
the
oversight
required
to
meet
compliance
requirements.
Making
sure
your
data
protection
posture
is
strong
helps
avoid
the
risk
of
breaches.
IBM
Cloud
Security
and
Compliance
Center
Data
Security
Broker
provides
the
IBM
Cloud
and
hybrid-multicloud
with
IBM
Cloud
Satellite®
no-code
application-level
encryption
to
protect
your
application
data
and
enhance
your
security
posture
toward
zero
trust
guidelines.
Get
started
with
IBM
Cloud®
Data
Security
Broker
today
Was
this
article
helpful?
YesNo
Comments are closed.