IS Layered Data Protection cicayda Data security threats and incidents can be harmful to any organization and data breaches can negatively impact organizations in a variety of ways including increased costs, loss of brand reputation and revenue, and loss of ‘secrets.’ In order to protect private and confidential information, we use encryption to improve our defense-in-depth controls around these data assets and comply with regulations such as Safe harbor, PCI DSS, HITECH Act, and more. For an integrated encryption strategy, we use access controls to ensure data is only decrypted for authorized requests. This includes the ability to protect both structured and unstructured data stores that include database and file server files, documents etc. In designing a data security plan at cicayda, we have a two-pronged strategy: secured data overlaid with layers of peripheral security in the four "touch points" (data access, data in transit, data at rest, and data in use). For each "touch point", there are a variety of technologies to ensure security such as authentication and access control schemes to control access to data, multi-layered security zones and storage security policies which address issues specific to storage data. cicayda’s storage security policy state the format in which different types of data (as shown in figure 1), has to be kept in storage. For example, sensitive data must be encrypted (in transit & at rest). FIGURE 1: Data in Use: Data in Motion: Active data which is under use. Data that is traversing between networks or temporarily residing in the memory of a computer Data at Rest: Inactive data stored physically in databases, data warehouses, spreadsheets, archives, tapes, off-site backups, etc. cicayda.com To work best, information security must be holistic and fit into an organization seamlessly. Information security practice should take into account personnel security, user access control, network security and regulatory aspects. At cicayda, our holistic security framework integrates technology, people and processes. Data protection controls based on the value of data and its importance are introduced in the policy and the design of databases. This takes into consideration the Principle of Least Privilege, Data classification, The Separation of Duties principle, Integrity, Availability, Identification and Defense in depth, and this became part of enterprise security architecture depicted in figure 2. FIGURE 2: cicayda’s Security Architecture Framework defines: Network Security (Authentication, Authorization, IP segmentations, Antivirus, VPN, Firewalls, IPS / IDS, Platform hardening, and Internet Security) LAN / WAN Security, Application Security, Data Security, Enterprise Security Management, Risk Analysis and Risk Acceptance, Incident Handling and Response, Disaster Recovery, Plan PKI - Public Key Infrastructure, Integrated Security Controls and Compliance. Information Security Policies, Standards and Procedures Used for the Implementation of the Framework and Allow Integration of People, Process, and Technology. Encryption Encryption is a critical security feature for thriving networks. This security mechanism uses mathematical schemes and algorithms to scramble data into unreadable text. It can only by decoded or decrypted by the party that possesses the associated key. At cicayda, your data is encrypted while in transit and at rest. While your data is at rest, we use Full-disk encryption (FDE) and thus offer some of the best protection available. This technology enables us to encrypt every piece of data on a disk or hard disk drive in conjunction with software components. This combination is referred to as end-point or end-based full disk encryption. Strong User Authentication Authentication is another part of data security that we encounter with everyday computer usage. That authentication process allows you to log into applications, files, folders, and you (the customer) are in control of your authentication process and whom to grant access to your data. Backup Solutions Data security wouldn't be complete without a solution to backup your critical information. At cicayda, we have an elaborate backup scheme which is replicated and monitored 24/7. cicayda.com