Sunday, April 19, 2026
The BLOCKCHAIN Page
No Result
View All Result
  • Home
  • Cryptocurrency
  • Blockchain
  • Bitcoin
  • Market & Analysis
  • Altcoins
  • DeFi
  • Ethereum
  • Dogecoin
  • XRP
  • Regulations
  • NFTs
The BLOCKCHAIN Page
No Result
View All Result
Home Blockchain

Enhance your data security posture with a no-code approach to application-level encryption

by admin
May 24, 2024
in Blockchain
0
Enhance your data security posture with a no-code approach to application-level encryption
0
SHARES
23
VIEWS
Share on FacebookShare on Twitter


Knowledge is the lifeblood of each group. As your group’s information footprint expands throughout the clouds and between your personal enterprise traces to drive worth, it’s important to safe information in any respect phases of the cloud adoption and all through the info lifecycle.

Whereas there are completely different mechanisms obtainable to encrypt information all through its lifecycle (in transit, at rest and in use), application-level encryption (ALE) gives an extra layer of safety by encrypting information at its supply. ALE can improve your information safety, privateness and sovereignty posture.

Why must you think about application-level encryption?

Determine 1 illustrates a typical three-tier application deployment, the place the appliance again finish is writing information to a managed Postgres instance.

Determine 1: Three-tier software and its belief boundary

Should you have a look at the high-level information circulation, information originates from the tip person and is encrypted in transit to the appliance, between software microservices (UI and again finish), and from the appliance to the database. Lastly, the database encrypts the info at relaxation utilizing both convey your personal key ( or hold your personal key ( technique.

On this deployment, each runtime and database admins are contained in the belief boundary. This implies you’re assuming no hurt from these personas. Nonetheless, as analysts and business consultants level out, there’s a human ingredient on the root of most cybersecurity breaches. These breaches occur by way of error, privilege misuse or stolen credentials and this threat may be mitigated by inserting these personas outdoors the belief boundary. So, how can we improve the safety posture by effectively inserting privileged customers outdoors the belief boundary? The reply lies in application-level encryption.

How does application-level encryption defend from information breaches?

Utility-level encryption is an strategy to information safety the place we encrypt the info inside an software earlier than it’s saved or transmitted by way of completely different components of the system. This strategy considerably reduces the assorted potential assault factors by shrinking the info safety controls proper all the way down to the info.

By introducing ALE to the appliance, as proven in determine 2, we assist be certain that information is encrypted inside the software. It stays encrypted for its lifecycle thereon, till it’s learn again by the identical software in query.

Determine 2: Defending delicate information with application-level encryption

This helps be sure that privileged customers on the database entrance (equivalent to database directors and operators) are outdoors the belief boundary and can’t entry delicate information in clear textual content.

Nonetheless, this strategy requires adjustments to the appliance again finish, which locations one other set of privileged customers (ALE service admin and safety focal) contained in the belief boundary. It may be tough to substantiate how the encryption keys are managed within the ALE service.

So, how are we going to convey the worth of ALE with out such compromises? The reply is thru a knowledge safety dealer.

Why must you think about Knowledge Safety Dealer?

IBM Cloud® Safety and Compliance Heart (SCC) Knowledge Safety Dealer (DSB) gives an application-level encryption software program with a no-code change strategy to seamlessly masks, encrypt and tokenize information. It enforces a role-based entry management (RBAC) with subject and column stage granularity. DSB has two elements: a management airplane part known as DSB Supervisor and a knowledge airplane part known as DSB Protect, as proven in Determine 3.

Determine 3: Defending delicate information with Knowledge Safety Dealer

DSB Supervisor (the management airplane) just isn’t within the information path and is now operating outdoors the belief boundary. DSB Protect (the info airplane part) seamlessly retrieves the insurance policies equivalent to encryption, masking, RBAC and makes use of the customer-owned keys to implement the coverage with no-code adjustments to the appliance!

Knowledge Safety Dealer gives these advantages:

  • Safety: Personally identifiable data (PII) is anonymized earlier than ingestion to the database and is protected even from database and cloud admins.
  • Ease: The info is protected the place it flows, with out code adjustments to the appliance.
  • Effectivity: DSB helps scaling and to the tip person of the appliance, this leads to no perceived influence on software efficiency.
  • Management: DSB gives customer-controlled key administration entry to information.

Assist to keep away from the chance of knowledge breaches

Data breaches include the excessive price of time-to-address, the chance of business and regulatory compliance violations and related penalties, and the chance of lack of fame.

Mitigating these dangers is usually time-consuming and costly as a result of software adjustments required to safe delicate information, in addition to the oversight required to fulfill compliance necessities. Ensuring your information safety posture is powerful  helps keep away from the chance of breaches.

IBM Cloud Security and Compliance Center Data Security Broker gives the IBM Cloud and hybrid-multicloud with IBM Cloud Satellite tv for pc® no-code application-level encryption  to guard your software information and improve your safety posture towards zero trust pointers.

Get started with IBM Cloud® Data Security Broker today

Was this text useful?

SureNo

Architect, Cloud Safety Providers



Source link

Tags: applicationlevelapproachDataencryptionEnhancenocodepostureSecurity
admin

admin

Recommended

Evolve Bank suffers data breach, Turbo Toad enthusiast loses $3.6K

Evolve Bank suffers data breach, Turbo Toad enthusiast loses $3.6K

2 years ago
US Banking Giant Accused of Refusing To Reimburse Customers, Denying Millions of Dollars in Fraud Claims ‘Without Any Explanation Whatsoever’

US Banking Giant Accused of Refusing To Reimburse Customers, Denying Millions of Dollars in Fraud Claims ‘Without Any Explanation Whatsoever’

2 years ago

Popular News

  • Protocol-Owned Liquidity: A Sustainable Path for DeFi

    Protocol-Owned Liquidity: A Sustainable Path for DeFi

    0 shares
    Share 0 Tweet 0
  • Cryptocurrency for College: Exploring DeFi Scholarship Models

    0 shares
    Share 0 Tweet 0
  • What are rebase tokens, and how do they work?

    0 shares
    Share 0 Tweet 0
  • What is Velodrome Finance (VELO): why it’s a next-gen AMM

    0 shares
    Share 0 Tweet 0
  • $10 XRP Price Envisioned By Fund Manager As Ripple Mounts Trillion-Dollar Payment Markets ⋆ ZyCrypto

    0 shares
    Share 0 Tweet 0

Latest

I stopped using my iPhone’s hotspot after testing this 5G router – and that won’t change

I stopped using my iPhone’s hotspot after testing this 5G router – and that won’t change

April 19, 2026
After testing this HP laptop, I get why its ‘boring’ design is adored by business users

After testing this HP laptop, I get why its ‘boring’ design is adored by business users

April 19, 2026

Categories

  • Altcoins
  • Bitcoin
  • Blockchain
  • Cryptocurrency
  • DeFi
  • Dogecoin
  • Ethereum
  • Market & Analysis
  • NFTs & Metaverse
  • Regulations
  • XRP

Follow us

Recommended

  • I stopped using my iPhone’s hotspot after testing this 5G router – and that won’t change
  • After testing this HP laptop, I get why its ‘boring’ design is adored by business users
  • The best TV antennas to buy in 2024
  • Your old iPad or Android tablet can be your new smart home panel – here’s how
  • T-Mobile will give you an iPad for $99 when you sign up for a new line – here’s how
  • About us
  • Privacy Policy
  • Terms & Conditions

© 2023 TheBlockchainPage | All Rights Reserved

No Result
View All Result
  • Home
  • Cryptocurrency
  • Blockchain
  • Bitcoin
  • Market & Analysis
  • Altcoins
  • DeFi
  • Ethereum
  • Dogecoin
  • XRP
  • Regulations
  • NFTs

© 2023 TheBlockchainPage | All Rights Reserved