Intelligent CIO North America Issue 16 | Page 45

CIO OPINION clean copy is available for quick and easy restore if an attack occurs . Object Lock works the same onpremises , in a private cloud or in the public cloud .
How are we protecting data at-rest ?
Data theft is increasingly common today . Hackers threaten to expose a company ’ s proprietary information unless a ransom is paid . communications , looking for passwords or other information being transmitted in plaintext . CIOs must ensure data is secured in transit and in their storage system .
Leveraging data encryption and secure transport protocols is the best defense against eavesdropping . CIOs should ensure their storage system supports these features :
To protect your data from theft , it ’ s essential that it be encrypted on the storage device . CIOs would be wise to deploy AES-256 encryption – the specification established by the US National Institute of Standards and Technology ( NIST ) – using a system-generated encryption key ( regular SSE ) or a customer-provided and managed encryption key ( SSE-C ).
• Server-Side Encryption ( SSE )
• Amazon Web Services Key Management Service ( AWS KMS )
• OASIS Key Management Interoperability Protocol ( KMIP )
• Transport Layer Security / Secure Socket Layer ( TLS / SSL )
This allows the upload and download requests to be securely submitted using HTTPS , and the system does not store a copy of the encryption key .
How are we protecting in-flight data ?
It ’ s common for data to be breached through ‘ eavesdropping ’, where hackers ‘ listen ’ to data
To protect your data from theft , it ’ s essential that it be encrypted on the storage device .
www . intelligentcio . com INTELLIGENTCIO NORTH AMERICA 45