13.07.2015 Views

Email Security Implementation Guidance - Cloud Security Alliance

Email Security Implementation Guidance - Cloud Security Alliance

Email Security Implementation Guidance - Cloud Security Alliance

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CLOUD SECURITY ALLIANCE SecaaS <strong>Implementation</strong> <strong>Guidance</strong>, Category 4: <strong>Email</strong> <strong>Security</strong>storage devices. This makes encryption of the each organization’s data much more critical. The encryption keysfor the stored email should be held only by the customer, or by an escrow agent which is not the cloud storageprovider.Traditionally, when data was stored in encrypted form, common features such as searching and indexing werelimited or impossible. With the traditional method, the need for decryption or transfer of data could increasethe time needed for processing, and add to data transfer costs.Technologies such as tokenization and Format Preserving Encryption (FPE) enable the capability to perform basicserver side operations over encrypted text. These technologies have been brought to the market in recentyears, and are commercially available for adoption. As a best practice, organizations should adopt thosetechnologies that allow sorting and searching, while reducing the amount of data needing to be decrypted. Inrecent years, homomorphic encryption algorithms have been developed which allow for basic operations onencrypted data. Full commercialization of homomorphic encryption remains in the future.<strong>Email</strong>, as with all business documents, have a limited lifetime which should be defined by the organization.After the documents have reached their intended lifetime, they should be destroyed. A cloud service providershould provide guarantees that deleted data is truly overwritten and destroyed. When data is stored inencrypted format, mere destruction of the encryption keys are not enough, as algorithms weaken over time anddata that was once “un-decryptable” may later fall within the reach of more computation power or a discoveredfailure in the algorithm or implementation.© Copyright 2012, <strong>Cloud</strong> <strong>Security</strong> <strong>Alliance</strong>. All rights reserved. 25

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!