Welcome!

Cloud Expo Authors: Elizabeth White, Pat Romanski, Trevor Parsons, Lori MacVittie, Cynthia Dunlop

Blog Feed Post

Amazon S3 Server Side Encryption & Software Defined Key Management

encryption key management Cloud Key Management AWS security AWS Encryption  amazon s3 server side encryption Amazon S3 Server Side Encryption & Software Defined Key ManagementStrong data encryption is a critical line of defense against cyber criminals and spies. Amazon has always taken care of the front lines with their strong infrastructure with security mechanisms like multi-factor access control systems in AWS datacenters, availability zones, built-in firewalls, private subnets, etc.

Now, with the addition of Server Side Encryption with Customer-Provided Keys, Amazon protects the data you store with Amazon S3 server side encryption. Even better, Amazon encrypts your data using a key you provide; a key that is never stored by Amazon. Thus, they have successfully protected your data from prying eyes – even their own.

The result is that you no longer need to lose sleep over storing encryption keys with Amazon. You can easily encrypt your data with your own key. Thanks to Amazon, encrypting is easy and secure!

How do you manage your Amazon S3 encryption keys?

Herein lies the real issue now facing each of AWS’s customers. Amazon has provided you with an excellent arsenal: strong infrastructure, easy encryption. But your part of the shared responsibility model is to properly manage your encryption keys. You need:

  • A way to randomly and securely generate Amazon S3 encryption keys
  • A controlled system to store, manage, and retrieve the many keys required for each S3 object
  • A system that ensures that keys are kept within your control; thus complying with regulations like HIPAA and PCI.
  • A software-defined automated solution that eliminates the need for cumbersome, non-scalable, and expensive hardware security modules (HSMs)

AWS Encryption Key Management: What are the options?

You have three options when it comes to managing encryption keys for AWS.

1.       Hardware security modules (HSMs)

HSMs are reasonably secure. To manage keys outside the cloud, an HSM is a great option. Unfortunately, in cloud scenarios, they have major drawbacks. First, being hardware based, they limit the benefits of the cloud, especially auto provisioning, orchestration and geographic dispersion. Also, they are far more expensive than software-defined solutions.

2.       Cloud-based HSMs

Still based on hardware, cloud-based HSMs offer limited scaling and do not support auto-provisioning. Because they are complex systems, operational overhead is high, and involves up-front costs. Also, with cloud-based HSMs, you still deal with the problems of securing a key cache in the cloud and access credentials.

3.       Software-defined key management

To work with your software-based cloud-computing scenario, the best option is a software-defined cloud key management system. Such a system enables you to consume key management as a service, while ensuring data security that is stronger than hardware. It can be automated with a RESTful API. Its benefits are much like those which prompted you to migrate to cloud storage: scalability, flexibility, and agility. Software-defined key management costs a fraction of hardware-based modules and is more effective at securing your cloud data. Furthermore, it is compliant with laws and industry regulations. Two examples for such systems are Porticor Cloud Security, and HP Atalla Cloud Encryption

Key Management for Amazon S3 Server Side Encryption

Amazon, one of the most customer-centric companies in the world, has developed a cloud computing system that is great for customers. They provide you with a safe place to put your data. Now, they even provide you with a way to protect the data you put there. The only thing they can’t do (and rightfully so) is protect that protection.

Managing the encryption keys remains your responsibility because it must be your responsibility to ensure the integrity and ownership of your data. If Amazon could manage the encryption keys for you, they would . . . but by doing so, they would puncture a hole in your security (and defy regulations like HIPAA and PCI).

Encryption key management remains solely your discretion and the only way to do it in a manner that is secure, compliant, and cost-effective is with software-defined key management.

For a detailed technical example and an implementation sample, see this post.

The post Amazon S3 Server Side Encryption & Software Defined Key Management appeared first on Porticor Cloud Security.

Read the original blog entry...

More Stories By Gilad Parann-Nissany

Gilad Parann-Nissany, Founder and CEO at Porticor is a pioneer of Cloud Computing. He has built SaaS Clouds for medium and small enterprises at SAP (CTO Small Business); contributing to several SAP products and reaching more than 8 million users. Recently he has created a consumer Cloud at G.ho.st - a cloud operating system that delighted hundreds of thousands of users while providing browser-based and mobile access to data, people and a variety of cloud-based applications. He is now CEO of Porticor, a leader in Virtual Privacy and Cloud Security.

@CloudExpo Stories
SYS-CON Events announced today that SOA Software, an API management leader, will exhibit at SYS-CON's 15th International Cloud Expo®, which will take place on November 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. SOA Software is a leading provider of API Management and SOA Governance products that equip business to deliver APIs and SOA together to drive their company to meet its business strategy quickly and effectively. SOA Software’s technology helps businesses to accel...
As cloud gives an opportunity to businesses to buy services externally - how is cloud impacting your customers? In his General Session at 15th Cloud Expo, Fabio Gori, Director of Worldwide Cloud Marketing at Cisco, will provide answers to big questions: Do you see hybrid cloud as where the world is going? What benefits does it bring? And how does Cisco connect all of these clouds? He will also tell us everything about Intercloud and Cisco investment on it.
Can we look to the paradigm of cloud computing from a completely different perspective? In his General Session at 15th Cloud Expo, Gundars Kulups, Sales Director at DEAC, will discuss what we can learn from our dining habits when choosing a cloud solution. Gundars Kulups is Sales Director at DEAC, full service data center operator. An IT expert, he specializes in European countries and has worked in the IT industry since 1992. He graduated from Riga Technical University (RTU) in Latvia and com...
SYS-CON Events announced today that TMCnet has been named “Media Sponsor” of SYS-CON's 15th International Cloud Expo®, which will take place on November 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. Technology Marketing Corporation (TMC) is the world's leading business to business and integrated marketing media company, servicing niche markets within the communications and technology industries.
SYS-CON Events announced today that Aria Systems, the recurring revenue expert, has been named "Bronze Sponsor" of SYS-CON's 15th International Cloud Expo®, which will take place on November 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. Aria Systems helps leading businesses connect their customers with the products and services they love. Industry leaders like Pitney Bowes, Experian, AAA NCNU, VMware, HootSuite and many others choose Aria to power their recurring revenue bu...
SYS-CON Events announced today that Parasoft will exhibit at SYS-CON's 15th International Cloud Expo®, which will take place on November 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. For 27 years, Parasoft has researched and developed software solutions that help organizations deliver defect-free software efficiently. By integrating Development Testing, API/cloud/SOA/composite app testing, and service virtualization, we reduce the time, effort, and cost of delivering secur...
The Internet of Things (IoT) promises to evolve the way the world does business; however, understanding how to apply it to your company can be a mystery. Most people struggle with understanding the potential business uses or tend to get caught up in the technology, resulting in solutions that fail to meet even minimum business goals. In his session at Internet of @ThingsExpo, Jesse Shiah, CEO / President / Co-Founder of AgilePoint Inc., will show what is needed to leverage the IoT to transform...
SYS-CON Events announced today that Utimaco will exhibit at SYS-CON's 15th International Cloud Expo®, which will take place on November 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. Utimaco is a leading manufacturer of hardware based security solutions that provide the root of trust to keep cryptographic keys safe, secure critical digital infrastructures and protect high value data assets. Only Utimaco delivers a general-purpose hardware security module (HSM) as a customiz...
One of the biggest challenges when developing connected devices is identifying user value and delivering it through successful user experiences. In his session at Internet of @ThingsExpo, Mike Kuniavsky, Principal Scientist, Innovation Services at PARC, will describe an IoT-specific approach to user experience design that combines approaches from interaction design, industrial design and service design to create experiences that go beyond simple connected gadgets to create lasting, multi-devic...
Until recently, many organizations required specialized departments to perform mapping and geospatial analysis, and they used Esri on-premise solutions for that work. In his session at 15th Cloud Expo, Dave Peters, author of the Esri Press book Building a GIS, System Architecture Design Strategies for Managers, will discuss how Esri has successfully included the cloud as a fully integrated SaaS expansion of the ArcGIS mapping platform. Organizations that have incorporated Esri cloud-based appl...
Once the decision has been made to move part or all of a workload to the cloud, a methodology for selecting that workload needs to be established. How do you move to the cloud? What does the discovery, assessment and planning look like? What workloads make sense? Which cloud model makes sense for each workload? What are the considerations for how to select the right cloud model? And how does that fit in with the overall IT tranformation? In his session at 15th Cloud Expo, John Hatem, head of V...
Dyn solutions are at the core of Internet Performance. Through traffic management, message management and performance assurance, Dyn is connecting people through the Internet and ensuring information gets where it needs to go, faster and more reliably than ever before. Founded in 2001 at WPI, Dyn’s global presence services more than four million enterprise, small business and personal customers.
IBM and Tencent Cloud signed a business cooperation memorandum to collaborate on providing public cloud with Software-as-a-Service solutions for industries. Both parties agreed to focus on emerging small and medium enterprises in the smarter cities and smarter healthcare industries as well as other fields. This will enable these industries to utilize mobile, cloud computing and big data tools to transform internal processes and operations, thus achieving cloud transformation in the era of mobili...
SimpleECM is the only platform to offer a powerful combination of enterprise content management (ECM) services, capture solutions, and third-party business services providing simplified integrations and workflow development for solution providers. SimpleECM is opening the market to businesses of all sizes by reinventing the delivery of ECM services. Our APIs make the development of ECM services simple with the use of familiar technologies for a frictionless integration directly into web applicat...
European data center operator DEAC is the largest in the Baltics. The activities are orientated to provide data center services and IT outsourcing on Eurasia and America scale in order to create the primary or backup or additional data center for customer in the EU, to protect its business and, most importantly, reduce costs up to 40% within 3-5 years. DEAC is an IT outsourcing services and solutions company whose highly experienced and qualified employees offer various groups of services and...
The Internet of Things will greatly expand the opportunities for data collection and new business models driven off of that data. In her session at Internet of @ThingsExpo, Esmeralda Swartz, CMO of MetraTech, will discuss how for this to be effective you not only need to have infrastructure and operational models capable of utilizing this new phenomenon, but increasingly service providers will need to convince a skeptical public to participate. Get ready to show them the money! Speaker Bio: ...
Samsung VP Jacopo Lenzi, who headed the company's recent SmartThings acquisition under the auspices of Samsung's Open Innovaction Center (OIC), answered a few questions we had about the deal. This interview was in conjunction with our interview with SmartThings CEO Alex Hawkinson. IoT Journal: SmartThings was developed in an open, standards-agnostic platform, and will now be part of Samsung's Open Innovation Center. Can you elaborate on your commitment to keep the platform open? Jacopo Lenzi: S...
The major cloud platforms defy a simple, side-by-side analysis. Each of the major IaaS public-cloud platforms offers their own unique strengths and functionality. Options for on-site private cloud are diverse as well, and must be designed and deployed while taking existing legacy architecture and infrastructure into account. Then the reality is that most enterprises are embarking on a hybrid cloud strategy and programs. In this Power Panel at 15th Cloud Expo, moderated by Ashar Baig, Research ...
Things are being built upon cloud foundations to transform organizations. This CEO Power Panel at 15th Cloud Expo, moderated by Roger Strukhoff, Cloud Expo and @ThingsExpo conference chair, will address the big issues involving these technologies and, more important, the results they will achieve. How important are public, private, and hybrid cloud to the enterprise? How does one define Big Data? And how is the IoT tying all this together?
When an enterprise builds a hybrid IaaS cloud connecting its data center to one or more public clouds, security is often a major topic along with the other challenges involved. Security is closely intertwined with the networking choices made for the hybrid cloud. Traditional networking approaches for building a hybrid cloud try to kludge together the enterprise infrastructure with the public cloud. Consequently this approach requires risky, deep "surgery" including changes to firewalls, subnets...