Encryption strategies shaped by multi-cloud use, compliance needs
This year, 43% of respondents report that their organization has an encryption strategy applied consistently across their enterprise. This strategy is leveraged to protect sensitive data against cyber criminals, help organizations address complex compliance requirements, and guard against human error.
Encryption, which is achieved with software or hardware tools such as hardware security modules (HSMs), is often coupled with best practice-based key management. Encryption is also playing an increasingly large role in protecting the enormous adoption of organizations deploying to the cloud.
Some key findings of the report include:
- 84% of respondents either use the cloud for sensitive/non-sensitive applications and data today, or will do so in the next 12-24 months;
- 61% of respondents are using more than one public cloud provider, and 71% plan to in the next two years;
- 39% encrypt in public cloud services (such as Amazon Web Services, Microsoft Azure and Google Cloud), a number that has risen 11% since last year’s report;
- Overall HSM use grew to 41% — the highest level ever. The most common use cases for HSMs are SSL/TLS and application level encryption, with 20% of respondents reporting that they use HSMs with blockchain applications;
- 49% of enterprises are either partially or extensively deploying encryption of IoT data on IoT devices and platforms.
Data discovery rates as the top data encryption planning/execution challenge by 67% of respondents, a number that is 8% higher than 2017. Respondents from the UK, Germany, the US and France have the most challenges, which likely points to activities associated with preparation and compliance of data privacy regulations such as GDPR which comes into effect in May this year.
When considering the majority of organizations polled are using more than one public cloud provider, the report also raises questions about how organizations are enforcing consistent encryption and key management policies across multiple cloud vendors. Securing data in a multi-cloud environment can be especially problematic for organizations seeking compliance, particularly if they are attempting to instantiate a single organizational policy using different native tools from multiple cloud providers. Not surprisingly, policy enforcement is second only to performance as a most valued feature of encryption in this year’s study.
Dr. Larry Ponemon, chairman and founder of The Ponemon Institute, says: “While enterprises are rightfully encrypting cloud-based data, 42% of organizations indicate they will only use keys for cloud-based data-at-rest encryption that they control themselves.”
“Similarly, organizations that use HSMs in conjunction with public cloud-based applications prefer to own and operate those HSMs on-premises. These findings tell us control over the cloud is highly important to companies increasingly under pressure from data security threats and compliance requirements.”
John Grimm, senior director of security strategy at Thales eSecurity, says: “Companies navigating today’s threat landscape are understandably seeking out fast, scalable encryption tools that encompass enterprise and cloud use cases, and enforce policy consistently across both models. Fortunately, enterprises have more data protection choices today than when the race to the cloud began. These options include bring your own key (BYOK) and bring your own encryption (BYOE) solutions, which allow enterprises to apply the same encryption and key management solution across multiple platforms.”
The Global Encryption Trends Study is now in its thirteenth year. The Ponemon Institute surveyed more than 5,000 people across multiple industry sectors in the United States, United Kingdom, Germany, France, Australia, Japan, Brazil, the Russian Federation, Mexico, India, Saudi Arabia, the United Arab Emirates, and Korea.