Page 29 - Cyber Warnings
P. 29
The NIST standard allows the use of FPE to protect sensitive data-at-rest, data-in-motion, and
data-in-use while preserving data formats, enabling government agencies to use this
breakthrough technology widely used in the private sector.
Format-Preserving Encryption, when properly implemented, enables the protection of all kinds
of high value data, from personally identifiable information (PII) to protected health information
(PHI) or Classified data types.
It also allows safe data sharing, between agencies or with contractors, and deep big data
analytics, leveraging Hadoop and cloud. This technology allows security to be layered into
decades old legacy systems and applications, and address specific privacy requirements in
legislations.
Bottom line: De-identified data should be the natural state of data
Data can be leveraged to usher in an era of better, more efficient government services and
programs at all levels. The challenge is how to protect this data when it is used. The solution
lies in the fact that the natural state of data in systems should be de-identified data.
That would remove all identifiers that could be of value to attackers, while leaving enough data
in the clear for analytics and business processes to continue.
Only a few select people should have the ability to decrypt the sensitive portions of the data,
while a very large number of people should be able to work on projects and leverage the huge
treasure trove of available “de-identified” data for the betterment of government.
About the Author
Marcelo Delima, Global Product Marketing Manager, HPE Security – Data Security
In his capacity as Global Product Marketing Manager at HPE Security – Data Security, Marcelo
focuses the US Federal market sector among other responsibilities. Marcelo has over 16 years
of experience marketing secure technology solutions for highly regulated enterprises and
government agencies.
In his career Marcelo has held marketing leadership and management positions in technology
organizations large and small in Silicon Valley.
29 Cyber Warnings E-Magazine – May 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide