Welcome!

Containers Expo Blog Authors: AppDynamics Blog, Elizabeth White, Liz McMillan, Dana Gardner, Roger Strukhoff

Blog Feed Post

Amazon S3 Server Side Encryption & Software Defined Key Management

encryption key management Cloud Key Management AWS security AWS Encryption  amazon s3 server side encryption Amazon S3 Server Side Encryption & Software Defined Key ManagementStrong data encryption is a critical line of defense against cyber criminals and spies. Amazon has always taken care of the front lines with their strong infrastructure with security mechanisms like multi-factor access control systems in AWS datacenters, availability zones, built-in firewalls, private subnets, etc.

Now, with the addition of Server Side Encryption with Customer-Provided Keys, Amazon protects the data you store with Amazon S3 server side encryption. Even better, Amazon encrypts your data using a key you provide; a key that is never stored by Amazon. Thus, they have successfully protected your data from prying eyes – even their own.

The result is that you no longer need to lose sleep over storing encryption keys with Amazon. You can easily encrypt your data with your own key. Thanks to Amazon, encrypting is easy and secure!

How do you manage your Amazon S3 encryption keys?

Herein lies the real issue now facing each of AWS’s customers. Amazon has provided you with an excellent arsenal: strong infrastructure, easy encryption. But your part of the shared responsibility model is to properly manage your encryption keys. You need:

  • A way to randomly and securely generate Amazon S3 encryption keys
  • A controlled system to store, manage, and retrieve the many keys required for each S3 object
  • A system that ensures that keys are kept within your control; thus complying with regulations like HIPAA and PCI.
  • A software-defined automated solution that eliminates the need for cumbersome, non-scalable, and expensive hardware security modules (HSMs)

AWS Encryption Key Management: What are the options?

You have three options when it comes to managing encryption keys for AWS.

1.       Hardware security modules (HSMs)

HSMs are reasonably secure. To manage keys outside the cloud, an HSM is a great option. Unfortunately, in cloud scenarios, they have major drawbacks. First, being hardware based, they limit the benefits of the cloud, especially auto provisioning, orchestration and geographic dispersion. Also, they are far more expensive than software-defined solutions.

2.       Cloud-based HSMs

Still based on hardware, cloud-based HSMs offer limited scaling and do not support auto-provisioning. Because they are complex systems, operational overhead is high, and involves up-front costs. Also, with cloud-based HSMs, you still deal with the problems of securing a key cache in the cloud and access credentials.

3.       Software-defined key management

To work with your software-based cloud-computing scenario, the best option is a software-defined cloud key management system. Such a system enables you to consume key management as a service, while ensuring data security that is stronger than hardware. It can be automated with a RESTful API. Its benefits are much like those which prompted you to migrate to cloud storage: scalability, flexibility, and agility. Software-defined key management costs a fraction of hardware-based modules and is more effective at securing your cloud data. Furthermore, it is compliant with laws and industry regulations. Two examples for such systems are Porticor Cloud Security, and HP Atalla Cloud Encryption

Key Management for Amazon S3 Server Side Encryption

Amazon, one of the most customer-centric companies in the world, has developed a cloud computing system that is great for customers. They provide you with a safe place to put your data. Now, they even provide you with a way to protect the data you put there. The only thing they can’t do (and rightfully so) is protect that protection.

Managing the encryption keys remains your responsibility because it must be your responsibility to ensure the integrity and ownership of your data. If Amazon could manage the encryption keys for you, they would . . . but by doing so, they would puncture a hole in your security (and defy regulations like HIPAA and PCI).

Encryption key management remains solely your discretion and the only way to do it in a manner that is secure, compliant, and cost-effective is with software-defined key management.

For a detailed technical example and an implementation sample, see this post.

The post Amazon S3 Server Side Encryption & Software Defined Key Management appeared first on Porticor Cloud Security.

Read the original blog entry...

More Stories By Gilad Parann-Nissany

Gilad Parann-Nissany, Founder and CEO at Porticor is a pioneer of Cloud Computing. He has built SaaS Clouds for medium and small enterprises at SAP (CTO Small Business); contributing to several SAP products and reaching more than 8 million users. Recently he has created a consumer Cloud at G.ho.st - a cloud operating system that delighted hundreds of thousands of users while providing browser-based and mobile access to data, people and a variety of cloud-based applications. He is now CEO of Porticor, a leader in Virtual Privacy and Cloud Security.

@ThingsExpo Stories
What does it look like when you have access to cloud infrastructure and platform under the same roof? Let’s talk about the different layers of Technology as a Service: who cares, what runs where, and how does it all fit together. In his session at 18th Cloud Expo, Phil Jackson, Lead Technology Evangelist at SoftLayer, an IBM company, spoke about the picture being painted by IBM Cloud and how the tools being crafted can help fill the gaps in your IT infrastructure.
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise.
19th Cloud Expo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterpri...
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
If you had a chance to enter on the ground level of the largest e-commerce market in the world – would you? China is the world’s most populated country with the second largest economy and the world’s fastest growing market. It is estimated that by 2018 the Chinese market will be reaching over $30 billion in gaming revenue alone. Admittedly for a foreign company, doing business in China can be challenging. Often changing laws, administrative regulations and the often inscrutable Chinese Interne...
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, will discuss recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model f...
Personalization has long been the holy grail of marketing. Simply stated, communicate the most relevant offer to the right person and you will increase sales. To achieve this, you must understand the individual. Consequently, digital marketers developed many ways to gather and leverage customer information to deliver targeted experiences. In his session at @ThingsExpo, Lou Casal, Founder and Principal Consultant at Practicala, discussed how the Internet of Things (IoT) has accelerated our abil...
24Notion is full-service global creative digital marketing, technology and lifestyle agency that combines strategic ideas with customized tactical execution. With a broad understand of the art of traditional marketing, new media, communications and social influence, 24Notion uniquely understands how to connect your brand strategy with the right consumer. 24Notion ranked #12 on Corporate Social Responsibility - Book of List.
Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is expected in the amount of information being processed, managed, analyzed, and acted upon by enterprise IT. This amazing is not part of some distant future - it is happening today. One report shows a 650% increase in enterprise data by 2020. Other estimates are even higher....
Adobe is changing the world though digital experiences. Adobe helps customers develop and deliver high-impact experiences that differentiate brands, build loyalty, and drive revenue across every screen, including smartphones, computers, tablets and TVs. Adobe content solutions are used daily by millions of companies worldwide-from publishers and broadcasters, to enterprises, marketing agencies and household-name brands. Building on its established design leadership, Adobe enables customers not o...
Everyone knows that truly innovative companies learn as they go along, pushing boundaries in response to market changes and demands. What's more of a mystery is how to balance innovation on a fresh platform built from scratch with the legacy tech stack, product suite and customers that continue to serve as the business' foundation. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, will discuss why and how ReadyTalk diverted from healthy revenue an...
Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm ...
The Transparent Cloud-computing Consortium (abbreviation: T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data processing High speed and high quality networks, and dramatic improvements in computer processing capabilities, have greatly changed the nature of applications and made the storing and processing of data on the network commonplace.
Digital transformation is too big and important for our future success to not understand the rules that apply to it. The first three rules for winning in this age of hyper-digital transformation are: Advantages in speed, analytics and operational tempos must be captured by implementing an optimized information logistics system (OILS) Real-time operational tempos (IT, people and business processes) must be achieved Businesses that can "analyze data and act and with speed" will dominate those t...
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra...
As ridesharing competitors and enhanced services increase, notable changes are occurring in the transportation model. Despite the cost-effective means and flexibility of ridesharing, both drivers and users will need to be aware of the connected environment and how it will impact the ridesharing experience. In his session at @ThingsExpo, Timothy Evavold, Executive Director Automotive at Covisint, will discuss key challenges and solutions to powering a ride sharing and/or multimodal model in the a...
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open.
I'm a lonely sensor. I spend all day telling the world how I'm feeling, but none of the other sensors seem to care. I want to be connected. I want to build relationships with other sensors to be more useful for my human. I want my human to understand that when my friends next door are too hot for a while, I'll soon be flaming. And when all my friends go outside without me, I may be left behind. Don't just log my data; use the relationship graph. In his session at @ThingsExpo, Ryan Boyd, Engi...