{"id":268,"date":"2020-08-27T07:15:10","date_gmt":"2020-08-27T06:15:10","guid":{"rendered":"https:\/\/www.itminister.co.uk\/blog\/?p=268"},"modified":"2020-08-27T07:15:10","modified_gmt":"2020-08-27T06:15:10","slug":"securing-cryptography-in-the-cloud","status":"publish","type":"post","link":"https:\/\/www.itminister.co.uk\/blog\/securing-cryptography-in-the-cloud\/","title":{"rendered":"Securing Cryptography in the Cloud:"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">1. Evaluate the Security of the Cloud Cryptography Platform<\/h3>\n\n\n\n<p>A migration project must independently evaluate the security of the cryptography implemented by the host as a first step. It\u2019s not acceptable to take the cloud host\u2019s marketing material as a guarantee of security.<\/p>\n\n\n\n<p>Cryptosense software is used by several major financial services organisations to test cloud cryptography platforms. Negative results from our tools have resulted in \u201cno-go\u201d decisions for major projects, pending improvements to the platform by the host.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Test and Secure the Cryptography in the Application<\/h3>\n\n\n\n<p>While the importance of a secure cryptography provider is evident, most <a href=\"https:\/\/cryptosense.com\/analyzer\/vulnerabilities-detected\/\">vulnerabilities in cryptography<\/a> actually result from the application misusing the provider. These bugs in key-management, random number generation, and cryptographic design cannot be mitigated by WAFs or other similar technologies and need be eliminated in a full cryptography audit before the application is migrated.<\/p>\n\n\n\n<p>Cryptosense Analyzer is the first tool capable of a complete cryptography audit on an application. Multiple financial services organisations and software companies depend on it to ensure their code is secure.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Secure the Keys on the Host Platform<\/h3>\n\n\n\n<p>Due to the increased exposure of a cloud application, cryptography must be adapted to store keys securely using the host\u2019s key-management system (KMS) rather than in software. This requires <a href=\"https:\/\/cryptosense.com\/analyzer\/features\/cartography-cryptography-applications\/\">a full cartography of cryptography use in the application<\/a> and the key lifecycle. However, understanding the full use of cryptography of an application is hard: documentation is often incomplete and out-of-date, key personnel involved in legacy applications may have left, and manual code review is extremely costly.<\/p>\n\n\n\n<p>Cryptosense Analyzer produces a complete cartography of cryptography and keys used in an application that allows easy and secure adaptation to the chosen KMS.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Monitor the Platform and the Application<\/h3>\n\n\n\n<p>Moving an application to the cloud means ceding control of platform updates to the host, each of which may cause new stability or security issues. Testing must be repeated regularly and results monitored. Additionally, to reduce time to market and promote innovation, most organisations take advantage of their new cloud platform to speed up their development and deployment cycle towards a Continuous Integration\/Continuous Deployment (CI\/CD) scenario. Changes to the application must also be tested to ensure cryptography security is maintained.<\/p>\n\n\n\n<p>Cryptosense software makes sure that an application stays secure under these conditions by monitoring the host cryptography platform on a regular basis and by <a href=\"https:\/\/cryptosense.com\/analyzer\/use-cases\/preparing-for-pci-dss-audit-without-manual-analysis\/\">integrating the application cryptography audit<\/a> by Cryptosense Analyzer into the CI\/CD toolchain. <a href=\"https:\/\/cryptosense.com\/analyzer\/use-cases\/secure-cryptography-cloud-migration\/\">Souce<\/a><\/p>\n\n\n\n<p>iTM covers all aspects of cybersecurity from Home cyber security managed solutions to automated, manage threat intelligence, forensic investigations and cyber security training. Our objective is to support organisations and consumers at every step of their cyber maturity journey.<a href=\"https:\/\/www.itminister.co.uk\/contact.html\"> Contact Us<\/a> for more information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>1. Evaluate the Security of the Cloud Cryptography Platform A migration project must independently evaluate the security of the cryptography implemented by the host as a first step. It\u2019s not acceptable to take the cloud host\u2019s marketing material as a guarantee of security. Cryptosense software is used by several major financial services organisations to test &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.itminister.co.uk\/blog\/securing-cryptography-in-the-cloud\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Securing Cryptography in the Cloud:&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","beyondwords_generate_audio":"","beyondwords_integration_method":"","beyondwords_project_id":"","beyondwords_content_id":"","beyondwords_preview_token":"","beyondwords_player_content":"","beyondwords_player_style":"","beyondwords_language_code":"","beyondwords_language_id":"","beyondwords_title_voice_id":"","beyondwords_body_voice_id":"","beyondwords_summary_voice_id":"","beyondwords_error_message":"","beyondwords_disabled":"","beyondwords_delete_content":"","beyondwords_podcast_id":"","beyondwords_hash":"","publish_post_to_speechkit":"","speechkit_hash":"","speechkit_generate_audio":"","speechkit_project_id":"","speechkit_podcast_id":"","speechkit_error_message":"","speechkit_disabled":"","speechkit_access_key":"","speechkit_error":"","speechkit_info":"","speechkit_response":"","speechkit_retries":"","speechkit_status":"","speechkit_updated_at":"","_speechkit_link":"","_speechkit_text":""},"categories":[11,13,18,8],"tags":[],"class_list":["post-268","post","type-post","status-publish","format-standard","hentry","category-cloud","category-cryptography","category-cyber-security-best-practice","category-encryption"],"_links":{"self":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/268","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=268"}],"version-history":[{"count":1,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/268\/revisions"}],"predecessor-version":[{"id":269,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/268\/revisions\/269"}],"wp:attachment":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=268"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=268"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=268"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}