{"id":25825,"date":"2014-09-05T22:40:58","date_gmt":"2014-09-06T02:40:58","guid":{"rendered":"http:\/\/www.opensource.im\/?p=25825"},"modified":"2014-09-05T22:40:58","modified_gmt":"2014-09-06T02:40:58","slug":"the-intricacies-of-bring-your-own-encryption-byoe","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/the-intricacies-of-bring-your-own-encryption-byoe.php","title":{"rendered":"The intricacies of Bring Your Own Encryption (BYOE)"},"content":{"rendered":"<p><p>      2014 has been the year of Bring Your Own      Encryption    <\/p>\n<p>    This years steady drumbeat of major data breaches, Snowden    disclosures, and other cyber-attacks are causing all sorts of    businesses to look well beyond compliance requirements to what    it will take to protect themselves and their customers from    additional risks.As such, Bring-Your-Own-Encryption    (BYOE) looks like a very strong trend  cloud providers want an    increasing amount of flexibility around implementing encryption    and, at the very least, want the ability to enable their    customers to maintain control of their own encryption keys.  <\/p>\n<p>    The main drivers for BYOE  <\/p>\n<p>    Before we look at the challenges and opportunities that BYOE    affords cloud hosting providers, it is important to understand    the main drivers for the heightened level of security (and    reduced risk) that go with BYOE. These are: compliance with    standards, risk of breaches, protection of intellectual    property (IP), and, lastly, contractual requirements. In the    first instance, any organisation that has compliance    requirements  such as PCI DSS  will need to fully meet those    requirements and ensure a segregation of roles by user type, or    provide for what are called 'compensating controls' if    allowed.Secondly, increasing reports of cyber-attacks,    along with governments around the globe introducing harsher    penalties for loss of personal information add further weight    to the arguments for the encryption of cloud data.  <\/p>\n<p>    > See also: Keys to the castle: encryption in the    cloud  <\/p>\n<p>    Organisations with critical information, the loss of which    could fundamentally damage their business  typically    aerospace, defence, financial or manufacturing  need the    strongest data assurance solutions available. But, these    solutions must not impede their ability to take advantage of    the scalability and flexibility that the cloud model brings.    For cloud providers whose customers are in one of the areas    mentioned above, it is not unusual to be required to encrypt    data to the same standards as that customer applies to their    own data. Indeed, this stipulation is frequently passed through    as a contractual requirement for doing business.  <\/p>\n<p>    How it works  <\/p>\n<p>    To understand how BYOE works, there are two typical    implementation scenarios to consider from an end user    perspective, the first is for the end user to manage their    encryption keys within the cloud environment, and the second is    managing encryption keys away from the cloud providers    premises inthe end users own data centre or other    environment.  <\/p>\n<p>    In both cases, the cloud provider does not usually manage the    keys or set the encryption and access policies, which means    there is less possibility that a compromise of the cloud    providers architecture or physical infrastructure by a third    party could compromise data.That said, a compromise of a    cloud providers account might be leveraged to access the key    and policy management environment, and then used to get access    to data.  <\/p>\n<p>    > See also: Google adds encryption to its cloud storage    service  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Go here to see the original:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.information-age.com\/technology\/security\/123458437\/intricacies-bring-your-own-encryption-byoe\/RK=0\/RS=1fgT5IzD3r7LgLuVsQAFX_WkJ7Q-\" title=\"The intricacies of Bring Your Own Encryption (BYOE)\">The intricacies of Bring Your Own Encryption (BYOE)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> 2014 has been the year of Bring Your Own Encryption This years steady drumbeat of major data breaches, Snowden disclosures, and other cyber-attacks are causing all sorts of businesses to look well beyond compliance requirements to what it will take to protect themselves and their customers from additional risks.As such, Bring-Your-Own-Encryption (BYOE) looks like a very strong trend cloud providers want an increasing amount of flexibility around implementing encryption and, at the very least, want the ability to enable their customers to maintain control of their own encryption keys. The main drivers for BYOE Before we look at the challenges and opportunities that BYOE affords cloud hosting providers, it is important to understand the main drivers for the heightened level of security (and reduced risk) that go with BYOE<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-25825","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25825"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=25825"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25825\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=25825"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=25825"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=25825"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}