IBM Power Encryption - 2024 - June 4
IBM Power Encryption - 2024 - June 4
Client Presentation
Agenda
Topics/Sections
Data-in-Transit Encryption
Application Encryption
Performance
Data is under threat..
egulatory compliance and associated financial liabilities are
driving the need for enterprise data protection Risk to Economy
2%
of global Third Party Risk Management
turnover
4
The cost of Data Breaches continues Extensive use of AI and automation, and
increasing, having reached an all-time high in an IR strategy reduce significantly the
2023 impact of data breaches
57% 277 1 in 3
Data breaches led Days to identify Number of
to an increase in (204) and contain breaches identified
prices (73) a data breach by an organization’s
own security teams
or tools
“Q-Day”
Extract Private Key BEFORE
availability of “cryptographically relevant”
Quantum Computer from Public key AFTER
➢ Decrypt lost or harvested comms ➢ Create fraudulent firmware updates ➢ Fraudulently change historical digitally
➢ Decrypt current comms, data & backups ➢ Modify vulnerability scanner patterns signed contracts
➢ Undo privacy in blockchains ➢ Issue fraudulent blockchain transactions ➢ Create fraudulent new contracts
➢ Fraudulent access to systems ➢ Modify signed digital evidence
➢ Create fraudulent digital evidence 6
IBM Consulting / © 2023 IBM Corporation
Secure the enterprise from cyberthreats and maintain
regulatory compliance
Protect critical data across Predict, prevent, and respond Business Resiliency
the hybrid cloud to modern threats
key management
across all platforms
is complex
On-premises
Private Cloud
There are challenges with data encryption and key management
*AES-256 in both GCM and XTS modes runs about 2.5 times faster per core
Coverage than comparable Power9 systems according to preliminary measurements
obtained on RHEL Linux 8.4 and the OpenSSL1.1.1g library
IBM Power / January 2024 / Power Security
Data-at-Rest Encryption for Different Stack Layers
What data should be encrypted and where; how are keys managed
Coverage
Threat Model Overview: What Layer of Data Encryption is applicable to my Environment?
https://www.blackhat.com/us-18/briefings/schedule/index.html#the-unbearable-lightness-of-bmcs-10035 Simplified diagram of connectivity between the service processor and CPU (from ASPEED)
P9 P10
AES AES AES AES AES
engine engine engine engine engine
+ + + + +
SHA SHA SHA SHA SHA
engine engine engine engine engine
24
Copy Services Manager
(CSM) Restore Forensic
Recovery
Production Volumes Analysis
volumes
Surgical
Backup Capacity Recovery
Capture Safeguarded backup 0 Recover
Catastrophic
Safeguarded backup 1 Recovery
Production … Production Offline
Software Safeguarded backup n Software Backups
(up 500 per volume)
Stack Stack
IBM DS8000 provides Safeguarded Copy
IBM DS8000 with Safeguarded Copy CSM manages the creation, recovery, IBM Power Systems hardware and
provides immutable, consistent point- and restoration of the copies and software provides a secure, isolated
in-time copies of data. provides automation to manage those environment to perform data validation,
processes. forensic analysis, and create offline
backups.
IBM Storage
Storage for Data Resilience Storage for Data and AI Storage for Hybrid Cloud
Reduce the threat exposure from Accelerate business results and Drive innovation and scale
days to hours and proactively innovation and unlock the latent application modernisation with
safeguard data with a multi- value of unstructured data across the enterprise storage that deploys
faceted and scalable data data ecosystem by eliminating data seamlessly across hybrid
resiliency approach that defends silos, advancing data discovery and infrastructures including cloud native
an organization’s data. classification. architectures on prem.
Protect, detect, recover fast. IBM storage is the on prem solution IBM cloud already deploys Ceph
for watsonx.
IBM Storage Systems IBM FlashSystem IBM Storage Scale System (SSS)
Encryption Solutions
OS Storage I/O Stack Coverage/
Granularity
Applications
30
E.g. Oracle/DB2 database encryption
© IBM Corporation
Encryption granularity
EFS: Encrypted File System (2007)
Application coverage
Write
Read
TLS/Java: Java SDK with ICC crypto lib (going through FIPS
certification)
- OpenSSL based with exploitation of Power in-core crypto facility
IBM® AIX® 7.3 with Each physical volume Power servers and On AIX, clients can Clients can use
Technology Level 1, is encrypted by using AIX create a solid run Oracle workloads, Power10 memory
you can encrypt the a unique key, that is foundation for the middleware, hardware encryption
physical volumes that known as a data modernization of application servers for protecting Oracle
uses the encryption key. The traditional Oracle and countless workloads, and
small computer data encryption key Database workloads, industry applications benefit from 2.5
systems is required for new application on the same times improved
Interconnect® (SCSI) encrypting and developments and platform—all without performance per core
protocol. Data that is decrypting all data workload unwanted downtime. compared to older
written to the physical that is stored in the consolidation. versions of servers
volume is encrypted physical volume.
and data that is read encryption key. The
from the physical user key can be a
volume is decrypted typed passphrase, or
during an I/O it can be stored in a
operation. platform keystore
(PKS) or in a network
key manager. 36
Workload Encryption Considerations: Oracle Transparent Data Encryption
38
Workload Encryption Considerations: DB2
39
How to ensure we bring the proper level of Security for SAP workloads?
Consider the IBM SAP security framework…
The 13 layers of SAP security is a stratified approach that decompose security aspects in different layers,
following a top-down approach that moves from Regulatory and Compliance to the most technical
aspects of security hardening for SAP ensuring full coverage of our client’s needs
13layers of
SAP Application Layer Data Privacy / Protection Discovery
SAP Security 6. Secure Source Code / DevSecOps Infrastructure and SAP DevSecOps
11. Vulnerability &Threat Management Infrastructure and SAP Threat and Vulnerability Management
When is Q-Day? Quantum Computing Status and Roadmap The good news
2022 ✓ 2023 ✓ 2024 2025 2026+
1
Bring dynamic Enhancing
"The National Institute of Standards Improve Scale Increase
Model
Prototype quantum software applications
2
Developers
Governments issue
Quantum software applications
Algorithm ✓
Quantum algorithm &
Quantum Serverless
advisories and
Developers
directives
application modules Intelligent orchestration Circuit Knitting Libraries
43
(*) arxiv.org/pdf/2103.06159.pdf
IBM Consulting / © 2023 IBM Corporation
Strategy development in action
IBM Quantum Safe Transformation Phase-1
Whether you are just starting out on your Quantum Safe journey, wrestling with a
specific cryptography challenge, or looking to scale crypto-agility with innovation, IBM
will propel your time to value.
1 2 3 4
Initiate and discuss your journey Describe Quantum Safe problem Scan application source code for Achieve a unified vision of success
with IBM Quantum Risk Framing definition and framework cryptographic artifacts. and have clear path to realization.
Workshop – Interactive, Garage conditions.
workshop hosted by IBM’s Establish a “Cryptography Bill of Review existing cryptography policies,
cryptography experts. Review your organization’s Material”(CBOM) for scanned processes and procedures
business dependencies, 3rd applications.
IBM’s PoV covering quantum party technologies, critical Review operating model supporting
threats, quantum-safe crypto applications, networks, Create a cryptographic inventory data-at-rest encryption, key
and cryptographic agility. platforms, crypto tools, etc. including a set of existing management, PKI, certificate lifecycle
metadata sources (e.g., management, application encryption,
Understanding of Quantum Identification of the most vulnerability scanner or data
Risks you might be exposed to. important Quantum Safe fields classification systems). Assess long-term IT strategy and how
of action and suitable solution crypto governance is embedded
Discussion aligned to your approaches. Provide dashboard view of
mid/long-term IT strategy captured cryptography. Visualize your organizational
considering Cloud Migration & cryptography maturity
Application Modernization
Fully Homomorphic Encryption: IBM HELayers FHE SDK Stack Architectural View
Power Applicability and Optimizations
Layers Features
A
Linear Algebra, Packing, Functions:
Computation P
TileMatrix / TileTensor / CKKS Bootstrapping
I
48