{"id":4888,"date":"2016-10-18T09:59:05","date_gmt":"2016-10-18T14:59:05","guid":{"rendered":"https:\/\/www.poweradmin.com\/blog\/?p=4888"},"modified":"2016-10-08T10:22:07","modified_gmt":"2016-10-08T15:22:07","slug":"enterprise-encryption-best-practices","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/enterprise-encryption-best-practices\/","title":{"rendered":"Enterprise Encryption Best Practices"},"content":{"rendered":"<p><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/10\/strong-communication-security.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-4892 size-full\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/10\/strong-communication-security.jpg\" alt=\"PA Server Monitor security\" width=\"388\" height=\"258\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/10\/strong-communication-security.jpg 388w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/10\/strong-communication-security-300x199.jpg 300w\" sizes=\"auto, (max-width: 388px) 100vw, 388px\"><\/a><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Whether it\u2019s to safeguard internal protocols and hierarchies, or to guard against attacks and data breaches in the escalating scale of current cyber-threats, implementing controls on the way information is transmitted and shared is more crucial to the enterprise than ever. Encryption has been and remains an essential aspect of this process. But how best to use encryption, to ensure the continued data integrity and security of your organization?<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">In this article, we\u2019ll be looking at some strategies and best practices to help you get the most out of your encryption policies.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">The Benefits Of Encryption<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">With hackers potentially able to compromise or reconfigure any or all of the routers shepherding data packets across the internet, eavesdropping into sensitive communications remains a popular pastime for them. Organizations relying on LAN or VLAN connections may fall prey to attackers who, with access to readily available tools may gain control of network hosts, and redirect traffic to their own systems.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Against these kinds of spying, encryption provides a robust line of defense.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Secure encrypted transfer protocols like SSH are easily deployed on Unix and Windows routers and systems, eliminating the need for organizations to rely on vulnerable technologies. SSH modules typically offer regular updates and security patches for routers and their operating systems. And open source code may be readily manipulated on Linux-based systems to create SSH proxies for specialist applications and hardware (including mainframes).<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Encryption protocols also provide secure alternatives to clear text transmissions of data. For instance, secure FTP sessions that terminate on an SSH server may be used instead of standard FTP authentications. And SSL or TLS encryption provide protection to POP and IMAP communications.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">An enterprise network is a complex ecosystem with many potential threat avenues to protect. So deploying encryption requires a systematic and rigorous <\/span><span style=\"font-family: verdana, geneva, sans-serif;\">approach.<\/span><\/p>\n<p>\u00a0<\/p>\n<div style=\"float: right; margin: 10px; font-family: verdana, geneva, sans-serif; background: #E4E8FE; border: 1px solid #99AAFF; width: 100%; padding: 10px;\">Check out our infographic about <a href=\"https:\/\/www.poweradmin.com\/blog\/enterprise-encryption-best-practices-info-graphic\/\">Enterprise Security!<\/a><\/div>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Take An Inventory<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Do a comprehensive sweep of all your operations to determine where sensitive information is stored, manipulated, and moved across the network \u2013 both within your data center and throughout your various sites, branch offices, and remote workstations. Identify those areas where valuable data is at rest, and when it\u2019s in transit.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Remember that your \u201cData at Rest\u201d inventory includes any virtual network infrastructure and applications you may have, plus your assets in the cloud. Encryption may be applied to structured and unstructured information in files, folders, applications, web servers, databases and network storage.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">As data leaves the comparative safety of your firewalls, it\u2019s opened up to potential assault by enterprising cyber-criminals. Unencrypted information may be hacked as it streams from place to place, and malicious outsiders may attempt to compromise that data or insert malware enabling them to gain control of your resources.<\/span><\/p>\n<p>\u00a0<\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Determine Your Encryption Levels<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Encryption to the AES-256 level is pretty much an industry standard for the strong protection of data at rest in corporate networks. But different regional jurisdictions may impose limits on allowable encryption strengths, and regulatory compliance regimes may demand a certain minimum standard. The choice you make will be influenced by these factors, and the specific requirements of your organization.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">The working practices and security protocols of your particular enterprise will also determine how encryption keys are protected and handled.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">For instance, a single password may be used in tight networks where an administrator retains possession of this credential, which may be shared with trusted colleagues at his\/her discretion. Dual passwords may be used in larger environments, where a select group of administrators or IT engineers may have guardianship of one password, while the other is entrusted to a second group. Physical keys with RSA encryption files may be used where stronger protection is required \u2013 but this also imposes a requirement for enhanced security around the storage and backup of keys.<a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/10\/enterprise-encryption-best-practices-infographic-box.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4902 alignright\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/10\/enterprise-encryption-best-practices-infographic-box.png\" alt=\"enterprise-encryption-best-practices-infographic-box\" width=\"300\" height=\"201\"><\/a><\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">For web servers and internet communications (data in transit), a secure encryption protocol with strong cipher algorithms is required. The establishment of communications and the exchange of encryption keys between users and web servers are determined by the cryptographic protocol, while the sequence of mathematical procedures used to encrypt and decrypt data is governed by the cipher algorithms.<\/span><\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\"><a title=\"Security in PA Server Monitor\" href=\"https:\/\/www.poweradmin.com\/products\/server-monitoring\/product-information\/product-security\/\">Transport Layer Security (TLS)<\/a> is the enhanced successor to the Secure Sockets Layer (SSL) cryptographic protocol for web communications. But SSL is by no means dead: many legacy web browsers don\u2019t support TLS, so support for SSL version 3 (the last stable release) must be included in public-facing applications and portals.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Various cipher algorithms are supported by both TLS and SSL, and servers should be configured to use an algorithm whose security is endorsed by reputable sources in the cryptographic community.<\/span><\/p>\n<p>\u00a0<\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Centralize Your Encryption Keys<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">The strongest encryption in the world breaks down if intruders gain access to the keys required to decipher it. So it\u2019s essential to manage and secure your enterprise encryption keys. Ideally, they should be stored in a central repository within the organization\u2019s control \u2013 but in a location that\u2019s separate from the data they\u2019re intended to protect.<\/span><\/p>\n<p>\u00a0<\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Set A Policy For Devices<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">With extended campus networks comprising centralized data centers, branch offices, remote sites, and remote workers empowered through BYOD (Bring Your Own Device), it\u2019s essential for organizations to extend the protection of cryptographic technologies to their users with mobile hardware.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Conditions largely apply as for the encryption of web communications (TLS, SSL, etc.). Secure methods of data transmission such as secure FTP are preferred, and the exchange of signed digital certificates may be included for transactions involving web-based applications.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Dedicated encryption apps may be deployed from a preferred list of products stemming from approved vendors. The same applies to any VPN (Virtual Private Network) applications used to ensure confidential browsing.<\/span><\/p>\n<p>\u00a0<\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Don\u2019t Forget The Email<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Even in the face of Instant Messaging, video chat, social networks and other technologies, email remains a potent force, accounting for well over 90% of all file transfer activity world-wide. Yet it\u2019s estimated that more than 60% of workers don\u2019t have access to email encryption \u2013 and those that do often need to rely on solutions that must be manually configured and deployed at each instance.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">For enterprises, policy-based email encryption is the preferred option. This is a data-centric approach, which seeks to protect information by encrypting it through all stages of email communication.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Technologies like <a href=\"https:\/\/www.voltage.com\/wp-content\/uploads\/Voltage_White_Paper_SecureMail_Rethinking-Email-Encryption.pdf\" rel=\"nofollow\" target=\"_blank\">Identity-based Encryption<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> use a combination of policy-based rules and email routes over SMTP to ensure strong encryption while allowing for activities such as filtering, archiving and discovery to meet regulatory compliance demands. There are also various dedicated tools and plug-ins which perform on the fly decryption of email, in compliance with regulatory standards.<\/span><\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Whether it\u2019s to safeguard internal protocols and hierarchies, or to guard against attacks and data breaches in the escalating scale of current cyber-threats, implementing controls on the way information is transmitted and shared is more crucial to the enterprise than ever. Encryption has been and remains an essential aspect of this process. But how best [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":4892,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,13,6],"tags":[],"class_list":["post-4888","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-pc-security","category-tech"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4888","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=4888"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4888\/revisions"}],"predecessor-version":[{"id":4907,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4888\/revisions\/4907"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/4892"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=4888"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=4888"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=4888"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}