![]() The CipherTrust Data Security Platform can enforce very granular, least-privileged-user access management policies, enabling protection of data from misuse by privileged users and APT attacks. In addition, the CipherTrust Manager supports two-factor authentication for administrative access. Strong separation of duties policies can be enforced to ensure one administrator does not have complete control over data security activities, encryption keys, or administration. In this way, IT administrators - including hypervisor, cloud, storage, and server administrators - can perform their system administration tasks, without being able to gain privileged access to the sensitive data residing on the systems they manage. CipherTrust Transparent Encryption encrypts files, while leaving their metadata in the clear. With the CipherTrust Data Security Platform, administrators can create strong separation of duties between privileged administrators and data owners. Protection of sensitive data at rest Separation of privileged access users and sensitive user data Detailed reporting supports compliance programs and facilitates executive communication. A streamlined workflow exposes security blind spots and reduces remediation time. Supporting both agentless and agent-based deployment models, the solution provides built-in templates that enable rapid identification of regulated data, highlight security risks, and help you uncover compliance gaps. Thales’ CipherTrust Data Discovery and Classification efficiently identifies structured as well as unstructured sensitive data on-premises and in the cloud. It is also important to monitor and assess data regularly to ensure new data isn’t overlooked and your organization does not fall out of compliance. PII, financial, IP, HHI, customer-confidential, etc.), so you can apply the most appropriate data protection techniques. The first step in protecting sensitive data is finding the data wherever it is in the organization, classifying it as sensitive, and typing it (e.g. ![]() Sensitive Data Discovery and Classification Certified protection of encryption keys.Encryption of data-at-rest and data-in-motion.Sensitive data discovery and classification.Thales has a comprehensive set of solutions that can help organizations prepare for and comply with DEFCON 658 across all areas where data needs to be protected - at rest, in motion and in use, including: L.12 Define and implement a policy to manage the access rights of user accounts. M.06 Ensure the organisation has identified asset owners and asset owners control access to their assets. L.07 Define and implement a policy to control access to information and information processing facilities. Note that while the controls are defined based on the risks associated with the contract (Low, Medium or High), Thales’s solutions apply across similar controls simultaneously, and are therefore consolidated below. Thales provides data security solutions that help address these controls, as indicated. DEF STAN 05-138, which specifies the measures that defence suppliers are required to achieve at each of the five levels of cyber risk that a contract can be assessed as carrying, includes several controls specific to the protection of sensitive information, as outlined below.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |