SYS-CON MEDIA Authors: Pat Romanski, Gary Arora, Zakia Bouachraoui, Yeshim Deniz, Liz McMillan

Blog Feed Post

MySQL encryption in the cloud: How to do it right

MySQL encryptionMySQL encryption is one of the most common use cases we’re seeing in infrastructure clouds. Enterprises or software as a service (SaaS) vendors store sensitive or regulated data in the cloud using MySQL, and the immediate consequence is a requirement for data encryption.

Below, I’ll cover the MySQL encryption options used by our customers, analysis of pros and cons, and references to relevant knowledge base articles.

Information on additional database and encryption options supported by Porticor is available here.

MySQL Encryption: encrypting the entire database

Encryption of an entire MySQL database can be easily achieved by mounting the database store to an encrypted volume using a Porticor encryption agent or the inline Porticor Virtual Appliance.

MySQL Encryption: Entire database encryption benefits

The main benefit of encrypting an entire database is in the simplicity of the solution. There is no need to alter the code or update SQL statements. Simply attach the data store to an encrypted volume and you’re all set.

MySQL Encryption: The downside of entire database encryption

Full disk encryption might not be enough. Regulations like PCI require sensitive data to be specifically encrypted. In that case, we recommend you’d continue reading the additional database or application level encryption options mentioned below.

Entire database encryption conclusion

Mounting your database to an encrypted volume is considered a best practice and we would highly recommend doing so even if additional encryption options are used.

Database level encryption

Database level encryption with MySQL is relatively simple due to the AES_ENCRYPT / AES_DECRYPT built-in functions (important note: most modern databases like Oracle, PostgreSQL and others have similar built in functions). Calling these functions enables the encryption of specific statements according to your compliance requirements.

MySQL database level encryption benefits:

The benefits of database level encryption are many. Customers can make use of the existing MySQL encryption functions (you will not need to install an additional encryption agent), and encrypted data will not be available for the Linux admin or any super user, as it is encrypted before it is written to disk.

An important note regarding key management

It is considered best practice to generate as many encryption keys as practically possible for certain data sets. The Porticor key management API allows for such automatic creation of encryption keys. An example of MySQL integration with Porticor’s key management API is available here.

Application level encryption

Application level encryption is to be considered if the requirement is to encrypt the data before it hits the database server. This option would require some code changes (API integration as described above), but the end result is a highly secure architecture that can scale to automatically encrypt different data sets with different keys.

Many of our customers have integrated Porticor for application level encryption to protect each customer data with a unique encryption key. Further enhancements like key rotation or key revocation are obviously important and can be easily added.

Our RESTful API is described by our customers as a very easy and intuitive integration point.

MySQL Encryption: Summary

MySQL encryption is available in more than one shape and form. Identifying the relevant options is an important first step. Other MySQL encryption best practices include:

  1. Encrypt the entire volume regardless of additional MySQL or application level encryption. The performance hit is negligible and you’ll sleep better at night knowing you have more than one layer of encryption.
  2. Generate as many encryption keys as practically possible.
  3. Keep it simple as possible. Encryption doesn’t have to be complicated. Our RESTful API is an excellent example of simplifying a complicated task.

The post MySQL encryption in the cloud: How to do it right appeared first on Porticor Cloud Security.

Read the original blog entry...

More Stories By Gilad Parann-Nissany

Gilad Parann-Nissany, Founder and CEO at Porticor is a pioneer of Cloud Computing. He has built SaaS Clouds for medium and small enterprises at SAP (CTO Small Business); contributing to several SAP products and reaching more than 8 million users. Recently he has created a consumer Cloud at G.ho.st - a cloud operating system that delighted hundreds of thousands of users while providing browser-based and mobile access to data, people and a variety of cloud-based applications. He is now CEO of Porticor, a leader in Virtual Privacy and Cloud Security.

Latest Stories
While a hybrid cloud can ease that transition, designing and deploy that hybrid cloud still offers challenges for organizations concerned about lack of available cloud skillsets within their organization. Managed service providers offer a unique opportunity to fill those gaps and get organizations of all sizes on a hybrid cloud that meets their comfort level, while delivering enhanced benefits for cost, efficiency, agility, mobility, and elasticity.
Isomorphic Software is the global leader in high-end, web-based business applications. We develop, market, and support the SmartClient & Smart GWT HTML5/Ajax platform, combining the productivity and performance of traditional desktop software with the simplicity and reach of the open web. With staff in 10 timezones, Isomorphic provides a global network of services related to our technology, with offerings ranging from turnkey application development to SLA-backed enterprise support. Leadin...
DevOps has long focused on reinventing the SDLC (e.g. with CI/CD, ARA, pipeline automation etc.), while reinvention of IT Ops has lagged. However, new approaches like Site Reliability Engineering, Observability, Containerization, Operations Analytics, and ML/AI are driving a resurgence of IT Ops. In this session our expert panel will focus on how these new ideas are [putting the Ops back in DevOps orbringing modern IT Ops to DevOps].
Darktrace is the world's leading AI company for cyber security. Created by mathematicians from the University of Cambridge, Darktrace's Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal' for all devices and users, updating its understa...
Enterprises are striving to become digital businesses for differentiated innovation and customer-centricity. Traditionally, they focused on digitizing processes and paper workflow. To be a disruptor and compete against new players, they need to gain insight into business data and innovate at scale. Cloud and cognitive technologies can help them leverage hidden data in SAP/ERP systems to fuel their businesses to accelerate digital transformation success.
Concerns about security, downtime and latency, budgets, and general unfamiliarity with cloud technologies continue to create hesitation for many organizations that truly need to be developing a cloud strategy. Hybrid cloud solutions are helping to elevate those concerns by enabling the combination or orchestration of two or more platforms, including on-premise infrastructure, private clouds and/or third-party, public cloud services. This gives organizations more comfort to begin their digital tr...
Most organizations are awash today in data and IT systems, yet they're still struggling mightily to use these invaluable assets to meet the rising demand for new digital solutions and customer experiences that drive innovation and growth. What's lacking are potent and effective ways to rapidly combine together on-premises IT and the numerous commercial clouds that the average organization has in place today into effective new business solutions.
Keeping an application running at scale can be a daunting task. When do you need to add more capacity? Larger databases? Additional servers? These questions get harder as the complexity of your application grows. Microservice based architectures and cloud-based dynamic infrastructures are technologies that help you keep your application running with high availability, even during times of extreme scaling. But real cloud success, at scale, requires much more than a basic lift-and-shift migrati...
David Friend is the co-founder and CEO of Wasabi, the hot cloud storage company that delivers fast, low-cost, and reliable cloud storage. Prior to Wasabi, David co-founded Carbonite, one of the world's leading cloud backup companies. A successful tech entrepreneur for more than 30 years, David got his start at ARP Instruments, a manufacturer of synthesizers for rock bands, where he worked with leading musicians of the day like Stevie Wonder, Pete Townsend of The Who, and Led Zeppelin. David has ...
Darktrace is the world's leading AI company for cyber security. Created by mathematicians from the University of Cambridge, Darktrace's Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal' for all devices and users, updating its understa...
Dion Hinchcliffe is an internationally recognized digital expert, bestselling book author, frequent keynote speaker, analyst, futurist, and transformation expert based in Washington, DC. He is currently Chief Strategy Officer at the industry-leading digital strategy and online community solutions firm, 7Summits.
Addteq is a leader in providing business solutions to Enterprise clients. Addteq has been in the business for more than 10 years. Through the use of DevOps automation, Addteq strives on creating innovative solutions to solve business processes. Clients depend on Addteq to modernize the software delivery process by providing Atlassian solutions, create custom add-ons, conduct training, offer hosting, perform DevOps services, and provide overall support services.
Contino is a global technical consultancy that helps highly-regulated enterprises transform faster, modernizing their way of working through DevOps and cloud computing. They focus on building capability and assisting our clients to in-source strategic technology capability so they get to market quickly and build their own innovation engine.
When applications are hosted on servers, they produce immense quantities of logging data. Quality engineers should verify that apps are producing log data that is existent, correct, consumable, and complete. Otherwise, apps in production are not easily monitored, have issues that are difficult to detect, and cannot be corrected quickly. Tom Chavez presents the four steps that quality engineers should include in every test plan for apps that produce log output or other machine data. Learn the ste...
Digital Transformation is much more than a buzzword. The radical shift to digital mechanisms for almost every process is evident across all industries and verticals. This is often especially true in financial services, where the legacy environment is many times unable to keep up with the rapidly shifting demands of the consumer. The constant pressure to provide complete, omnichannel delivery of customer-facing solutions to meet both regulatory and customer demands is putting enormous pressure on...