80 likes | 329 Views
Data Encryption in Transit. Why? Ensure the confidentiality of data in transit. Meet compliance and regulatory requirements. IU Policy IT-12 “Encrypt sensitive data being transmitted to-and-from the system where possible to ensure the data is protected in transit.” How?. SSL & TLS.
E N D
Data Encryption in Transit • Why? • Ensure the confidentiality of data in transit. • Meet compliance and regulatory requirements. • IU Policy IT-12 “Encrypt sensitive data being transmitted to-and-from the system where possible to ensure the data is protected in transit.” • How?
SSL & TLS • Frequently associated with HTTP, but can be utilized with many protocols: • SMTP, IMAP, LDAP, RDP, Databases, Instant Messaging • Authentication of the server, and optionally the client. • Certificate (X.509) based asymmetric encryption during negotiation and authentication. • Negotiation of mutually acceptable cipher suite. • Symmetric session key used for data transfer. • IU Certificate Authority
Email • Encrypting the data • PGP or GnuPG, S/MIME. • Client support. • Trusted certificates must exist. • Encrypting the transfer • SSL/TLS over standard protocols IMAP, SMTP, HTTP. • Third Party such as Zix, Ironport, etc.
VPN and Wireless Networks • Provide an encrypted tunnel between client and VPN or Wireless endpoint. • Traffic leaving endpoint is not protected by the encrypted session. • IU’s Juniper SSL VPN • Client Required • IU Secure Wireless Network • WPA2
Interactive Sessions • SSH suite instead of telnet and ftp • Windows Remote Desktop • Native encryption. • TLS with Windows 2003 SP1+. • Group Policy Objects can be used to control usage. • Third Party Applications (PCAnywhere, VNC, etc)
File Transfers • SMB file shares not encrypted by default. • IPSec. • WebDAV with SSL/TLS. • Secure file transfer protocols: sFTP and Scp. • Utilizing a secure third party such as IUVault or Slashtmp with encryption. • Encrypt the data prior to transmission.