Conf42 Golang 2025 - Online

- premiere 5PM GMT

Enhancing Data Protection with HSM Encryption: A Case Study of Securing 50 Oracle Databases

Video size:

Abstract

Learn how implementing HSM encryption across 50 Oracle databases enhanced security and compliance. Explore the challenges, automation strategies, and seamless integration that ensured robust data protection and zero downtime. A must-see case study for scaling encryption in complex environments!

Summary

Transcript

This transcript was autogenerated. To make changes, submit a PR.
Hey. Hi. Good evening everyone. This is Krishna again. I'm here to talk about my recent implementation, elevating security standards for my databases. I'm an Oracle database engineer, and I have like almost 13 years of experience and I was, I did lot of encryption process and I recently implemented. These hardware security module delivering military grade encryption and regulatory campaigns with maintaining the system performance. And nowadays we are seeing lot of security breaches and cyber threats are happening. So encryption is more important for each and every company and each databases. So here are the few things which we automated and elevated the process and improvise the databases, with the help of these HSM encryption. And if we go on to my, my project, right? the challenges which I face solutions and the results, right? here, we, I got an opportunity to implement these security standards for almost 50 databases. So we, we started working on this for one database, like how to safeguard the data, like customer information, that, and personal data and social security, healthcare information, which are all, everything is updated. The personal, like home addresses, everything is there on the databases, the cl for the client, for the client details and everything. So we want to safeguard that. We streamline the process and the solution we deployed. We deployed hardware security model with at once encryption algorithm and robust key management infrastructure. here, if we go onto the, like HMS encryption, right? The hardware security module include the stronger security compliance and regulatory, requirements, and, secure key management performance, scalability. Cloud and hybrid security and protection critical application, which includes everything. which results achieving comprehensive data security, procedure and full regularities and comprehensives, while maintaining the optimal system performances. So with that, like we, we improve, we improve system performance a lot and, We improve system performance a lot and the, where they're trying to access the data, it is also streamlined and everything like the, if we jump onto the, the how we, streamline the process which we implement, like the process. To install the process and the, the project and everything, right? we did it like everything's automate. We automated the process, like to involve the less downtime. So here are that hardware security modules, which I want to explain in detail like temporary register hardware. Hardware. it is a pure physical security application with multilayered. defines that activi actively detect and re respond to unauthorized physical and electrical infrastructure attempts like after, after this implementation. What happens, like the unwanted users, which they can able to access the data. for example, if you build any database in the company, right? There are a default user which order, which we, which imp Which can create automatically in the databases, with the sta like with the security standards. So if any of the user, like all user with the employee information and the customer information are the member of the company, if they are a current member, the data will be stored. And if they are all member, we will be. Locking that account, deactivate the account. Like same with the employee information, deactivating that employee information, the old information and storing the information in the IV database like that. we encrypted everything and data masking the personal, like personal credit card information, the payment process, right? we must the data with the help of these encryption. so if we tone the data from prod to a non-pro, so the customer or the user or developer, application developer, they cannot see the data, like data bridges can be halted with that. So we mastered, all the credit card information from the prod to non pros. So the security key, secure key management, so isolated and. we, we, we isolated cryptographic process environment that, safeguard the entire key life cycle. So whenever we implement, the keys, which we stored in the, in the cybersecurity level, we store those keys in, in, in a cryptographic base. So no one cannot. It's more than we, we select more than 50, more than 50 words to get the passwords. So it has to be algorithm, completely cryptographic algorithm, which automatically change, with the help of the, like with the help of cybersecurity keys. And it rotates automatically to avoid the downtime and to get, the ballots safe. and if we jump onto the next point, the regulatory compliance that facilitates, The, data protection standards includes G-D-G-D-P-R. It means, general data protection re, regulations, which contains the data collection and processing and P-C-I-D-S-S, it's a payment card in, industry. The data security standards, we follow the process. And HIPA, it's a, it's healthcare. Healthcare. Health insurance, poverty, health insurance process and everything. The health insurance information, the HS HSA account, the PPO and everything, the process of the employee information, we stored the data to, To mask that in info, to mask and, secure those information also. it's an internal control for the financial report. so it's audit, it mostly use for the audit team, for the audit databases to audit the audit, the databases who all are accessing the data and everything. So we, we follow the SOC standards and security control and for the audit logging. And the performance optimization here. specialized cryptographic process, ac accurate, accurate, crypto accurate encryption, decryption encryption, decryption operations while freeing the databases, services, resources, maintain throughput. even during the initiative security operations, I. And with that, like we, we, the performance of the databases have been improved a lot after implementing this encryption. So the connections, the sessions which are coming to the databases has been decreased, due to un unwanted reports, unwanted reports, pulling that, pulling and connecting to the databases without doing anything, they're just connecting the databases and running something. So we, we disconnected all those connections with the help of this encryption. With the help of encryption. If we go on to the next slide, we have a few more topics like how we, how the technical implementation, how we prepare, configuration, encrypt, validate, maintain the here, the preparation, the database around will come, the preparation that all the databases are not on the past level. So initially we applied patches to, latest elevated patches to, for the security standard. We have applied all the patches for all the databases. and we implemented those are also like, we, what we did for initially, we took one or two databases. We implemented manually for the first, and then we started doing all the scripting process here. the configuration, we did, we engineered robust HMS, Oracle td. TTDE integration channel with multi-layer authentication protocols, encryption, deployed strategic encryption, access table spaces and sensitive data columns, and minimal performance impact. Validate, executed regular, executed rigorous encryption. Ation testing with third party security experts to verify the protection. Third party expert. we have some expert to test that, encryption process, like how they're able to access the data, the maintenance established automated key rotation. Ation schedules and comprehensive audit ready main management protocols. The rotation of the keys are very important. We need to update the passwords, update the current password, current password every 90 days. So we automated those, password rotations, so it was very helpful for us to do the process and. And here are the five phases which we implemented with most of, we went from some minimal downtime to zero downtime to implement this process here, we got, we have to bonds, bond the database multiple times, but this minimal downtime, what we did for, we have most of the databases are like databases. So we did it in a no way. Single node. Single node. All the users, application users can access the data even though we are implementing this, this encryption process. And here are the TDE transparent data encryption integration challenges, which we faced. Legacy capability. The multiple database, instances require critical version upgrades, patch app patch applications before h HSM integration would be implemented successfully. So most of the databases are different version. In Oracle, we have 11, 11 I to 19 C, so we have upgraded all the databases to latest version 19 C. And also we are thinking about to implement the newer version of 23 a IE. we are working on that. In future I'll be talking about those things also. So network configuration network, establishing the security encryption communication channel between the Oracle databases and HSM encryption, HSM application. demands complex r routing rules and certificate based authentication and performance tuning Intel encryption process triggered the significant io io latency across a high transaction system, necessary the customer buffer and configuring in the table space optimization and, TDE encryption and, And the key management engineering robust fault tolerance process for the master key backup, restore, and disaster recovery Required multi mul, meticulous plans and multi-layered safeguards. we are taking backups of the databases every day, so if there is any need, like the restoration points, we are creating restoration point. like every 15 minutes we are creating restoration points. Depends upon the customer interest and also we are taking the archive of backups so they can pinpoint restore, they can do it anyway. With the help of this, with the help of this HSM encryption, we did it a lot of changes automated, so it'll be very helpful to restore the databases where we want to go, like for the testing databases. They want to restore, like after they are, they were, they're testing multiple things. They want to restore 10 minutes before we can do easily, and there is no issue with the keys. And we really like, that HMH some encryption help us a lot. while we are doing the restoration promotion process, it'll help us to restore the database very easily and fast and with. Encryption with that encryption there. There is no loss of data while we are doing this, like testing process for the testing databases. And automate, automation. The, we did a lot of automation during this key, key process, like here, custom scripts here, we use, we, we use Python and ba dash scripting here. What we did like initially, we did it manual, manually, this encryption process. Initially we need to install some software like a Luna client for my client. client usually use, they use Luna client to store the keys. So from the a Luna client, they need to install the loan client from the server. To the HSM encryption valid cybersecurity team. They use this luna kind to, to talk from, Luna client. it's a heartbeat. it usually, the encryption key issues isnt this heartbeat from database to encryption it. It is like it is signal. it is. It is a heartbeat. it's like a, it's a human heartbeat. similar to the HSM encryption. It's a heartbeat and connection between the database and the, database. And the Valids. So if Luna can help us to read the data and Store, protect the data. So we did it. Everything is like automated, like after the new, after the Luna client installation. We, we need to, we need, we, during the manual process, we need to get the security team, HSM Team, CyberArk team, network team. And me the database. So we all need to work together to, to, for the step-by-step process. We streamline the process with the help of self scripting. So what we did with the one one execution of the script while monitoring, we are in front of the comer while monitoring it'll. It'll throughput, whatever the person need to enter the passwords and, give access to the, access to the particular application team or, the CyberArk team. It'll prompt the CyberArk password there. if it's password like HSM encryption password, like keyword password, where it'll come and request for the teams. They need to just come and enter the password with the. Cryptographic algorithm, password, all they need to do one click saying that I'm granting the password. So only that guy can control. They need to log in from their machine and they need to just give that like just one click. So we automated everything. We no need to be like sitting in front of the computer with everyone available and the three, three to four hours process, we streamline the process. So the monitoring system. Here, the realtime monitoring system, while the database is up and running like we are, we did it like encryption process where there's no impact for the application user. While we are imp while we are implementing this process, I. So we streamline the process validation tools after we implementation violation, the developer comprehensive testing framework that automatically verify encryption integration, security complaints, implementing potential human over sites, documentation, regulatory. We documented everything. Built intelligent document system that automatically product, Produce audit Ready Co auditory complaints report tailored to each databases safe encryption parameters, and configurations. Yeah, here are the key managed key management workflow. What we did and had this workflow, it is if we go over through these generation distribution, usage, rotation backups, generating generation means HSM generation, Cryptographic key keys, which we are, we, when we do step by step process, it'll generate the keys in the ballot. We need to store those creed, tamper, restaurant hardware using NISD certified, entropy source and true random number generation, the distribution. Encryption. We securely put, propagated to Oracle wallets through auto automated channels while rolled database access control and multifactor authentication. The usage, the TD is also similar, CT, D and HS encryption, both the same. The TDE leverages the key keys of seamless encryption, decryption opt, operational while maintaining the optimal data performing and data leverages rotation automated. we have automated this key rotation, automated periodically rotation, information hygienic and my. Mitigates the risk of the long term keys case and protection compromise and the backups. here are the backups. we do take the backups like we automated the key backups, which we physically store, the store, those keys, we are printing those keys in the valid room. we have, like in, for my client, we, so they have some secure, valid room. They usually store those keys. Keys like it. Like a bank wallet, bank vault, they usually store those phy, store those keys physically every quarter. Every quarter they store those keys. They update the keys in the room so no one can able to access those keys. We, and comprehen, the backups, which we are used like comprehensive keys, escrow system with, Geographically displays, encrypt offline backups, business continuity in the disaster recovery process. Yeah. Here are the performance impact. Here are the performance impact, which we, After implementing the, yeah, after implementing the HSM encryption, we do see a lot of implementing the database performances, like the Select operations. Select operations. we do get almost like the 50%, like 20% increase in the efficiency and the. like the response time and output of the select queries has been increased with the help of H-M-S-H-H-S-M based encryption, like writing, writing operation, insert update. we have seen almost 40% implement for these inset and update operations and that. All the data we just entering the table spaces are like, everything is encrypted a ES 2 56. we have altered the, all the databases with the, all the table spaces with, a ES 2 56 encryption after we implemented the databases. So all the ta, all the table spaces are like encrypted, so the insect operations will run very fast. Because minimal number of connections are coming, so it'll accept the all. Insert update. Insert update, select queries like the streamline, the select queries, and we streamline the process. there's no. like buffer gates and the ram speed has been increased. the performance of the ram and everything. The server level has been increased after implementing this, h some encryption. The delete operation has been increased up to 30%, which we, which were really re really while resort. Full table scan while the performance, if we see the execution plan before and after these HMS encryption. The execution plan of the queries has been imp increased, the performance has been increased a lot. like I times buffer gates, and, before we usually see a lot of the s sequels are in like. Sequences are running around. for example, if it is running for th 300, 3, 300, 300 buffer gates, it is going down to 200 and few. I and CP is going like the po the performance of that CCPU and I has been increased by 30%. here, comprehensive performance testing involve minimal overhead from HSMN based TD implementation, operation experience, and average latency. Increase to 25 to 40% with select queries, list effect, and. Least affected and update. Update operation shows the highest impact. So the deployments has been completed so far. So application can do the testing very fast after the completion of their updates and delete operation despite, despite the downtime has been ridiculous for the weekend maintenance. So they can like, The performance, the performance varies. the availability of the database, availability of the application has been increased. So encryption is more important for all the databases? Yeah. Compliance and benefits. So if I already talked about these things, the, regulatory standards and. Corporate security audit implements. See, the PCI, the P-P-P-P-C-I is about these, the SE to secure cardholder data with strong cryptography. G-D-P-R-G-D-P-R is general data protection Regulation. Implement the state of the art, the data protection measure. HIA. HI Security rules. This is PHI, the personal health insurance. Confidential confidentiality through encryption. SOX control the maintain in integrity of the financial report system. Report security mitigating the data, breach financials and regulations impact establish robust inter intellectual. Property protection layer. Build latency client to client trust through demonstrate the security gain security advantage through security excellence, the audit improvements, the streamlined over oversight with centralized the key management. Enable regular security events monitoring analysis, accelerate the complaints, verified with clear audit, trail, demonstrate the security governance and stakeholders. Here we, and if we go into the cross team co collaboration, right? We have collaborated with the database team and the database team and I have collaborated with security team, application team, infrastructure team and compliance team. So we lead the TD arch architecture design, implementing security database level configuration changes and. Conducted extensive performance optimization to minimal encryption overhead. The security team established a robust encryption standards developer, comprehensive key management policies, and perform regulars penetrate the testing to validate the security implementation. The, if we go to the application team. Executed through complete compatibility testing across all environments, application, identify and resolve the encryption. Regulated keys and implemented necessary code modification to security integration. So here are the most important thing. We stored all of the data, right? Most of the data is, we are upgrading from old version to latest version. So application team, we work with application team to up upgrade their application also to access the current version of the data, which we are implementing. HSM hardware procurement and deployment configure the secure network architecture and establish a high availability infrastructure to ensure uninterrupted HMS services. So infrastructure team, they had, they work in the middle saying that we collaborated everything. They helped us to build this HMS encryption, streamline process with the less downtime compliance team. Mely documented. They help us to, like we, we are, we give all the steps to documented the process. Implementation, again is re regulatory. The framework, the provides complaints, guidance, throughput throughout the project lifecycle and prepared detailed, elevated packages of upcoming audits. If we go to the matrix, the implementation of these, we, I've implemented around more than 50 plus databases and, comprehensive encryption deployed across all the production development and testing environment and up time and up time. Maintain encrypted operation continues sim seamlessly with. With, negligible service integration during these implementation. So we, the most important thing we worked on it is very less downtime, which we achieved with these streamlining automation of these processes. And we safeguarded almost three terabyte for each database is slow. If we combine everything light like. almost 150 to 200 terabyte databases, which we, data, which we, which we secured with this, implementation of HSM and the 30% audit time. Reduce the streamline. These campaigns will verification through automate the key management and secured audit trials. So we, with this implementation, we disconnect the most of the unwanted, unused, Read only Econs. We eliminated all those econs with this encryption. So the audit team, we have radio audit team validation. So they were very hap happy about this implementation. Key takeaways and next steps, which we are. Elevating for these security standards enhances security. Deploy multi-grade HSM encryption across 50 databases. Established a robust shield of mission critical customer data assets. Scalable approach. Leverage customer automation frameworks to streamline encryption deployment, reducing implementation time by 60% with assuring security control. Complaints achievement sub process through regulatory required in including PCI and GDPR with maintain sub query performance on critical system, the future expansion in initiating the phase encryption with and. Quarterly cryptographic three rotation with nine with zero downtime architecture. And thank you so much for giving me this opportunity to talk on my hardware security module, which I recently implemented for my client. And I'm very happy to present myself as a senior Oracle database administrator from LGM Entry. Thank you for giving me this chance.
...

Krishna Anumula

Specialist- System Management @ LTIMindtree

Krishna Anumula's LinkedIn account



Join the community!

Learn for free, join the best tech learning community for a price of a pumpkin latte.

Annual
Monthly
Newsletter
$ 0 /mo

Event notifications, weekly newsletter

Delayed access to all content

Immediate access to Keynotes & Panels

Community
$ 8.34 /mo

Immediate access to all content

Courses, quizes & certificates

Community chats

Join the community (7 day free trial)