In many industries, cloud computing is now vital to remaining competitive. The cloud typically offers superior flexibility, scalability, accessibility, and high availability, enabling businesses to grow more agile and responsive. Regulatory compliance concerns often make banks and other financial service providers slower to adopt the cloud, but even in the financial services industry, the cloud will soon become a necessity.
Banks are already seeing attractive use cases for cloud computing, as Bank Systems & Technology‘s Bryan Yurcan and Jonathan Camhi pointed out late last year. Cloud-based payment processing is one hot topic. Cloud-based document management is another. Analytics for business insight and fraud detection are also growing popular. All of these applications will require a thorough understanding of the regulatory restrictions and how to comply with them, however. Want to make sure your cloud adoption meets regulatory requirements? Cloud data encryption is one key tool.
WHAT TO PROTECT
PCI DSS mandates the protection of customer account data, which you’ll need in order to process payments in the cloud. Per PCI DSS 3.0, that data includes:
Primary Account Number (PAN)
Full track data from cards’ magnetic stripes or chips
PINs or PIN blocks
PCI DSS requires organizations to “use strong cryptography and security protocols” for the transmission of sensitive cardholder information. Some of these fields are more sensitive than others, however. PANs are more sensitive than expiration dates, for example, while verification codes and PINs are so sensitive that PCI DSS outright forbids the storage of them after the transaction is completed. Your cloud data encryption strategy should include the ability to apply varying strengths of encryption at a granular, policy-based level so that you can apply the appropriate amount of protection to each data type.
Here are some best practices that can help you use cloud data encryption to safely make the most of the cloud.
CLOUD DATA ENCRYPTION BEST PRACTICES
Identify every piece of sensitive data you’re sending to your cloud applications and develop policies to apply appropriate levels of encryption to them. You’ll need to work with all lines of business using the cloud to determine their exact uses for it and their cloud encryption needs.
Encrypt or otherwise protect all sensitive data you handle before it leaves your premises. Encrypt and do not store the most sensitive cardholder and authentication data: full track data, card verification codes, and PINs and PIN blocks.
Integrate your cloud encryption solution with DLP tools that can detect and generate alerts on activity around sensitive data to prevent the unauthorized access or sharing of data and documents that contain protected information.
USE CLOUD DATA ENCRYPTION THAT PRESERVES YOUR CLOUD APPLICATION FUNCTIONALITY
To enjoy the benefits of cloud computing, develop a cloud data encryption strategy that secures your data but also preserves the functionality of the cloud applications you’ve chosen. Tools like CipherCloud’s Searchable Strong Encryption can help, as can encryption and tokenization schemes that retain the original format of the data while hiding the actual values.
How does your organization use cloud encryption to remain compliant? Let us know your thoughts in the comments.
Get the free white paper – “Best Practices for Cloud Information Protection in Financial Services” – Learn how 5 banks complied with 10 laws in 20 countries with 1 solution
Watch the on-demand webinar – “Financial Services and the Cloud: Solving the Security Dilemma” – learn best practices for securing sensitive information before it leaves your organization and while it resides in the cloud.