{"id":25513,"date":"2014-08-14T09:40:55","date_gmt":"2014-08-14T13:40:55","guid":{"rendered":"http:\/\/www.opensource.im\/?p=25513"},"modified":"2014-08-14T09:40:55","modified_gmt":"2014-08-14T13:40:55","slug":"is-your-encryption-getting-out-of-control","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/is-your-encryption-getting-out-of-control.php","title":{"rendered":"Is your encryption getting out of control?"},"content":{"rendered":"<p><p>2014 marks the 25th  anniversary of the creation of the World Wide Web. From its  earliest beginnings, users have demanded security for their  sensitive information and web sites have universally responded by  supporting encryption protocols such as SSL\/TLS to encrypt data  as it moved across the wires.  <\/p>\n<p>    Since those early days, encryption has come a long way. Its use    is no longer limited to the companys web site. With data    privacy legislation, data breach disclosure laws, organized    crime and more recently, concerns over state sponsored    cyber-attacks and government surveillance, the use of    encryption has become pervasive, a last line of defence  if    the data is encrypted, who cares if it gets stolen.  <\/p>\n<p>    Respected media outlets have refereed to 2014 as the year of    encryption. That sort of prediction raises concerns even for    people that have been working with encryption technologies for    years; those in the banking sector and governments know what    the implications are, but for the rest of us this is a step    into the unknown.  <\/p>\n<p>    The rise of encryption technology is now proliferating within    many organizations at a prodigious rate. Encryption is deployed    in the cloud and on premise; for protecting data at rest, data    in motion and data in use; in databases, on memory sticks, in    email, in storage networks; the list goes on.  <\/p>\n<p>    The trouble is that in almost all cases these encryption    deployments will rely on point solutions which, although they    might use familiar sounding encryption algorithms (AES, RSA    etc.), are far from compatible, creating security pockets that    are tied to individual applications or elements of IT    infrastructure. Inevitably, at an enterprise-wide level,    organizations will suffer from fragmentation and inconsistency,    or encryption sprawl.  <\/p>\n<p>    Encryption sprawl can be a major headache for any organization.    Sprawl drives up the costs of managing the myriad of encryption    devices, it increases the risk of error, makes compliance and    forensics more painful and limits flexibility  all at a time    that resources are under pressure to do more with less.  <\/p>\n<p>    So just how can an organization prevent encryption sprawl? Here    are three top tips:  <\/p>\n<p>    Understand your environment - discovery, consistency,    certification  <\/p>\n<p>    Even if encryption sprawl in your organization is unavoidable,    at least focus on consistency and quality. Keep a record of    where encryption is being used and define an internal set of    approved algorithms (NIST 800-131 is a good start) and avoid    proprietary algorithms completely. Where possible, select    products that have a formal security certification where the    implementation of product has been independently validated (the    FIPS 140 validation program is the most widely recognized).  <\/p>\n<p>    And finally, make sure that these disparate encryption systems    are kept up to date and patched correctly. The recent    Heartbleed vulnerability illustrates this need very well.    Taking these measures wont do much to address the inefficiency    of sprawl but they will at least help you know where you stand,    avoid basic vulnerabilities and prepare you for the next step.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.net-security.org\/article.php?id=2097\/RK=0\/RS=QzqR2JcnrSbLWMNg4IeeNKqg_A0-\" title=\"Is your encryption getting out of control?\">Is your encryption getting out of control?<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> 2014 marks the 25th anniversary of the creation of the World Wide Web. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-25513","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25513"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=25513"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25513\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=25513"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=25513"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=25513"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}