Encryption Strategy

continue

"44% of organizations rated complexity as the top barrier to good data security. The move from single on-premises environments to multiple SaaS, IaaS, and PaaS environments is driving this complexity."

2019 Thales Data Threat Report – IDC

We’ll evaluate your current encryption strategy and identify the areas of highest risk. This enables you to prioritize your efforts and budget in order to reduce this risk. We will recommend the best encryption technology to help you on your data protection upgrades.

The steps for a high level approach to develop an Encryption strategy are given below:

At Encryption Consulting, we help clients create a comprehensive Encryption Strategy:

Why do you need an Encryption Strategy?

When you are in the process of reviewing your approach to data protection, it is recommended
to avail professional help to develop your encryption strategy. Especially when you have to
consider additional layers that incorporate broad encryption strategies for data at-rest and data-in-transit, right from the point of origin through its movement in and out of the environment.

What can we do?

We can develop a strategy for implementing encryption at rest and in transit, to protect the
sensitive information of your organization. We also review the existing, non-encryption controls
taken along with encryption controls that provide coverage for your organization’s requirement.
Identifying the encryption requirements and determining the scope of the sensitive information
and environment of your organization completes our strategy services.

What can we do - Encryption Strategy
Approach - Encryption Assessment

Main highlights of our encryption-strategy services

We develop a strategy and roadmap for building a robust data encryption program integrated
with your existing cybersecurity program, to address any gaps and achieve desired
capability maturity.

We develop the roadmap and timeline to prioritize encryption solutions by taking into
consideration the use cases, key platforms, key systems, budget constraints, and business and
regulatory drivers.

Enterprise encryption strategy overview

Our encryption strategy focuses on an approach that develops, implements, and expands
encryption-capabilities across your organization. To achieve this, we have designed the
following approach, that covers three steps:

Step 01
Development of Capability-Foundation & Tactical Remediation, to address the immediate requirements of client and regulatory fronts. This step will cover the following:
  • To fulfill immediate client and regulatory requirements, we implement encryption solutions for unique use cases such as database, disk storage, etc.
  • To enable encryption in the organization, we develop necessary governance policies, standards, and program structure.
  • We identify applications and platforms for encryption and the type of solution to be used by the organization by developing a decision tree and defining requirements for data encryption.
  • To support the implementation of encryption solutions across the enterprise, we develop capabilities for encryption key and certificate management.
  • We conduct deep dive analysis of the prioritized applications of the organization.

Enabling Capability by developing encryption capabilities at the enterprise-level. This step will see
the following:

  • To satisfy the organization’s requirements, including file encryption, application
    encryption, and digital rights management, we explore and select the appropriate
    encryption solutions.
  • We implement application encryption for a small number of critical data elements for the
    organization’s highest priority applications, including SSN and account number.
  • For the organization’s highest priority file repository within a business unit or subset of
    that business unit, we implement robust file encryption.
  • We focus on the prioritized applications and implement transport layer encryption like
    TLS for application components as requirements identified.
  • To refine and update the approach and strategy to encryption, we collaborate with other
    programs such as IAM, DCT, Segmentation, and Data Governance, as and when
    additional inputs are received.
Step 02
Step 03
Expand Capability, through a risk-based approach to encryption. This step will see the following:
  • Based on identified threats and risk mitigation, we expand the implementation of
    application encryption to more applications and add data elements to the scope.
  • We expand implementation of file encryption to other business units and onboard other
    file repositories.
  • We enhance existing email encryption capabilities with digital rights management and
    expand the solution to critical applications that handle file documents.
  • We discover SSH and encryption keys across the enterprise and begin efforts for
    remediation.
  • We incorporate encryption requirements, implementation considerations, validation, and
    testing procedures into the ongoing processes of the organization such as SDLC, controls
    testing, and third party assessment.
Certificate Lifecycle

Evaluate current state/strategy

Our evaluation process of the current state of your encryption strategy will involve key activities
like, workshops and stakeholder interviews, analysis of supporting documentation and
materials, and reports on current state observations.

Our deliverables of this process will include observations of initial current state assessment and recommendations.

Determine recommendations

This process will involve key activities like, providing recommendations, and generating
enhancement opportunities across people, processes, and technology areas.

Our deliverables of this process will be a report on assessment results and a summary of
maturity rating and the relative posture of security.

Collaborative Environment
Growing as a Team and as Individuals

Developing initiative plans

We develop initiative plans to address the recommendations made, as well as foundational data protection program components. Our key deliverable will be initiative plans for data protection.

Develop strategic roadmap

For developing the roadmap, our key activities include the development of:
  1. A prioritized two-to-three-year strategic roadmap for implementing data protection initiatives
  2. Executive summary and assist in socialization to board members & executives.
Our key deliverables will be
  1. Strategy document on data protection
  2. Comprehensive roadmap and considerations for implementation
  3. Sessions for knowledge transfer
  4. Executive summary report
Business Drivers of Encryption Adoption

Case Study

See how Encryption Consulting assisted a Healthcare and Life Science Company by reviewing their current practices.

Icon

“Encryption Consulting created a roadmap for our organization after conducting the Assessment of our Encryption Environment which helped us remediate the high-risk area.”

VP Data Protection, Airline Industry

Blog

Common Encryption Challenges

Data protection must now be the number one priority for organizations.

Report

Global Encryption Trends Study

The purpose of this research is to examine how the use of encryption has evolved over the past 15 years and the impact of this technology

Download Report
Know more

Other Encryption Services