Creating Policies
A policy is a collection of rules that govern data access and encryption. Think of a policy as an if-then statement. Policy rules are processed sequentially. If the criteria of rule one are not met, the policy enforcement engine moves on to the second rule and so on.
Policies specify:
Actors: Users, groups, and processes that are permitted/denied access to protected data.
Actions: What actions authorized actors are allowed to perform. For example create/delete, read/write, decrypt, modify permissions, and so on.
Files acted upon: Policy rules may apply to entire directories and mount points, or only to files named in a specific way (for example,.docx files may be encrypted and restricted to read-only access by designated users, while other files may be stored clear and read and written by anyone).
Additionally, each CTE policy specifies one or more encryption keys used to encrypt blocks of file data when applications write them, and decrypt them when they are read.
CTE encryption is transparent to applications. This means that the CTE Agent encrypts blocks of data as they are written, and decrypts data when they are read by authorized users and applications. This architecture separates administration of files from access to the data in them. Backup programs, for example, may be authorized to read files, but not view the data in them. Therefore, data can be backed up and taken offsite while remaining encrypted so that security is not breached.
NOTE: CTE UserSpace supports standard policies only.
The following diagram shows policies and how they relate to the GuardPoints, clients, and the CipherTrust Manager.
Before you can create a policy, policy elements should exist on the CipherTrust Manager. This section assumes that you have already created policy elements, as described in Creating Policy Elements.
When creating a policy, you can specify security rules, key rules, and data transformation rules that apply to the policy. At least one key or security rule must be added to a policy. Use the Create Policy wizard to create a policy.
Step 1: Specify General Information
To specify general information about policy:
Open the Transparent Encryption application.
Click Policies. The Policies page shows the list of available policies.
Click Create Policy.
Specify a unique Name for the policy. For example, basic-access-policy or ldt-policy.
The name must start with a character. The maximum length can be 64 characters.
The name can contain alphanumeric characters, underscores (
_
), and dashes (-
).The name cannot contain the following special characters:
? : ; | ! @ # $ % ^ & * < = > + ( ) { } ~ , \ / [ ] ' "
Select Standard from the Policy Type drop-down list.
NOTE: CTE UserSpace supports standard policies only.In Standard policies, access to data is blocked during initial encryption or rekeying of data. This is the default policy type. Refer to Creating Standard GuardPoints for details.
Provide a basic Description for the policy.
(Optional) Turn on the Learn Mode toggle. A warning message is displayed indicating that the policy is in Learn Mode.
Refer to Learn Mode for details. By default, the toggle is turned off.
Note
Learn Mode is not applicable to In-place Data Transformation policies.
(Optional) Turn on the Restrict Update toggle. This option is used to restrict or allow any changes to the policy. By default, the toggle is turned off. This setting can be changed any time after the policy is created. Refer to Controlling Updates to Policies.
(Optional) Turn on the Data Transformation toggle. This option is used to create a data transformation policy. By default, the toggle is turned off.
Note
For a data transformation policy, the Create Policy wizard shows five steps including the Data Transformation step, as shown below.
Click Next. The Security Rules screen is displayed.
For a standard dataxform policy, a security rule with the Action key_op
, the Effect permit,applykey
, and Browsing set to Yes is added automatically. Edit or delete the rule, as appropriate. Click the overflow icon () for options.
Step 2: Add Security Rules
Click Add Security Rule. The Create Security Rule dialog box is displayed. This dialog box contains the following fields:
Field Description Resource Set Resource set for the rule. User Set User set for the rule. Process Set Process set for the rule. Action Actions for the rule. Refer to Actions for the complete list of supported actions. Effect Effect permission and options for the rule. This is a mandatory field. Allow Browsing Whether browsing of directories under the GuardPoint down to the resources in the rule is allowed. Note
CTE UserSpace does not support security rules with process sets or user sets for Block Devices. Refer to Sample Policy for Block Devices.
(Optional) Select a Resource Set.
Click Select next to the Resource Set field. The list of available resource sets is displayed.
Optionally, you can add a new resource set by clicking Create Resource Set. Walk through the Create Resource Set wizard, as described in Creating Resource Sets. The newly created resource set appears in the resource sets list.
Select a resource set.
(Optional) Select Exclude Rule to exclude the resource set from the policy. The security rule does not apply to this resource set.
Click Select. The selected resource set appears in the Resource Set field.
(Optional) Select a User Set.
Click Select next to the User Set field. The list of available user sets is displayed.
Optionally, you can add a new user set by clicking Create User Set. Walk through the Create User Set wizard, as described in Creating User Sets. The newly created user set appears in the user sets list.
Select a user set.
Click Select. The selected user set appears in the User Set field.
(Optional) Select a Process Set.
Click Select next to the Process Set field. The list of available process sets is displayed.
Optionally, you can add a new process set by clicking Create Process Set. Walk through the Create Process Set wizard, as described in Creating Process Sets. The newly created process set appears in the process sets list.
Select a process set.
(Optional) Select Exclude Rule to exclude the process set from the policy. The security rule does not apply to this process set.
Click Select. The selected process set appears in the Process Set field.
(Optional) Select an Action. Specify the type of file and directory action allowed on a GuardPoint. To specify all actions, leave the Action field blank.
Click Select next to the Action field. By default, the Select Action(s) dialog box displays basic actions.
To view advanced actions, expand Advanced Options by clicking +. The Select Action(s) dialog box provides the names and brief description of actions. Refer to Actions for the complete list of supported actions.
Select the desired actions.
<!---
Tip
For a data transformation policy, the action
key_op
is selected automatically. If you selectkey_op
, then you must add a data transformation rule.For an IDT policy, the allowed actions are
read
,write
, andall_ops
.
--->
Note
For a data transformation policy, the action
key_op
is selected automatically. If you selectkey_op
, then you must add a data transformation rule.Click Select. The selected actions appear in the Action field.
Select an Effect. Effect is the action that occurs when the attempted access matches all the criteria in the rule. This is a mandatory field. The default action is Deny.
Click Select next to the Effect field. The Select Effect dialog box displays the available Effect Permissions and Effect Options.
From the Effect Permissions list, select a permission. An effect must have a permission. The available options are:
Deny: Denies the access attempts to a resource. For example, you can specify an effect that denies any attempts to access a resource.
Permit: Allows the access attempt to a resource. For example, you can specify an effect that allows writing to a resource.
From the Effect Options list, select appropriate options. The available options are:
ApplyKey: Applies an encryption key to data in a GuardPoint. When applied, data copied to the GuardPoint is encrypted with the key specified on the Create Key Rule screen and data that is accessed in the GuardPoint is decrypted using the same key. It allows the access attempt to the resource. For example, you can specify an effect that allows writing to a directory.
Note
If you select ApplyKey, you must also specify the key rules to apply for encrypting and decrypting the resources. Refer to Step 3: Add Key Rules for details.
Audit: Creates a message log entry for each qualifying event. It records what, when, and who is accessing the information.
Click Select. The selected effects appear in the Effect field.
(Optional) Specify whether to Allow Browsing the directories under the GuardPoint down to the resources in the rule.
By default, the Allow Browsing toggle is on. Users that match the criteria set by the security rule can access the directories between the GuardPoint and the resource. If you define a resource, then that resource should exist in the GuardPoint. The files in these directories can be listed like any file in a browser, but they cannot be modified, copied, or deleted.
To prevent users from browsing the directories under the GuardPoint, turn off the Allow Browsing toggle.
Click Add. The newly created security rule appears in the list of security rules.
Similarly, you can add multiple security rules to the policy by clicking Create Security Rule. To delete a security rule, click Delete next to the rule.
Note
A security rule with the
ApplyKey
Effect must be supported by at least one key rule. Refer to Step 3: Add Key Rules.Click Next. The Key Rules screen is displayed.
Step 3: Add Key Rules
If you added a security rule with the Effect ApplyKey
on the Security Rules screen, then you must add at least one key rule.
To add a key rule:
Click Create Key Rule. The Create Key Rule dialog box is displayed.
(Optional) Select a Resource Set.
Click Select next to the Resource Set field. The list of available resource sets is displayed.
Optionally, you can add a new resource set by clicking Create Resource Set. The newly created resource set will appear in the resource sets list.
Select a resource set.
Click Select. The selected resource set appears in the Resource Set field.
Select a Key Name. This is a mandatory field. For Data Transformation policies, the field name is Current Key Name instead of Key Name.
Click Select next to the field. The Select Key dialog box shows the list of available keys. Optionally, you can create a new CBC/CBC-CS1 key on this dialog box.
To create a CBC or CBC CS1 key
Click Create a New Key. The Key created will be AES 256 section is displayed on the dialog box below.
Specify an optional Name for the key.
Select Encryption Mode. The default mode is CBC.
Note
CTE UserSpace supports CBC and CBC-CS1 keys, for Standard policies.
Click Create. The newly created key will appear in the keys list.
Alternatively, encryption keys for CTE can be created on the Keys page of the CipherTrust Manager GUI. Refer to Creating a New Key for details.
Select the desired key.
Note
CTE UserSpace supports CBC and CBC-CS1 keys, for Standard policies.
Click Select. The selected key appears in the Key Name / Current Key Name field.
Click Add. The newly created key rule appears in the list of key rules.
Similarly, you can add multiple key rules to the policy by clicking Create Key Rule. To delete a key rule, click Delete next to the rule.
Click Next.
For Standard policies, the following screen is displayed:
Data Transformation: If you selected the Data Transformation check box on the General Info screen of the Create Policy wizard. Add data transformation rules, as described in Step 4: Add Data Transformation Rules.
Confirmation: If you cleared the Data Transformation check box. Verify policy details, as described in Step 5: Confirm Details.
Step 4: Add Data Transformation Rules
This step is applicable to Standard policies if you selected the Data Transformation check box on the General Info screen of the Create Policy wizard.
Click Create Data Transformation Rule. The Create Data Transformation Rule dialog box is displayed.
(Optional) Select a Resource Set.
Click Select next to the Resource Set field. The list of available resource sets is displayed.
Optionally, you can add a new resource set by clicking Create Resource Set. The newly created resource set will appear in the resource sets list.
Select a resource set.
Click Select. The selected resource set appears in the Resource Set field.
Select the Transformation Key Name. This is a mandatory field.
Click Select next to the Transformation Key Name field. The Select Key dialog box shows the list of available keys. Optionally, you can create a new CBC or CBC-CS1 key on this dialog box.
To create a CBC or CBC CS1 key
Click Create a New Key. The Key created will be AES 256 section is displayed on the page below.
Specify an optional Name for the key.
Select Encryption Mode. The default mode is CBC.
Note
CTE UserSpace supports CBC and CBC-CS1 keys, for Standard policies.
Click Create. The newly created key will appear in the keys list.
Alternatively, encryption keys for CTE can be created on the Keys page of the CipherTrust Manager GUI. Refer to Creating a New Key for details.
Select the desired key.
Click Select. The selected key appears in the Transformation Key field.
Click Add. The newly created data transformation rule appears in the list of rules.
Similarly, you can add multiple rules to the policy by clicking Create Data Transformation Rule. To delete a rule, click Delete next to the rule.
Click Next. The Confirmation screen is displayed.
Step 5: Confirm Details
Verify the policy details. The Confirmation screen displays general information about the policy and details of the security and key rules added to the policy.
If the details are incorrect or you want to modify them, click Back and update the details.
Click Save.
The newly created policy appears in the policies list on the Policies page. Similarly, add as many policies as required. A sample list of policies is shown below:
Creating a New Key
When creating a key rule for a policy, you can either select an existing key or create a new key. The list of available keys is displayed on the Select Key dialog box. The new keys that you create on this dialog box appear under the keys list.
Alternatively, encryption keys for CTE can be created on the Keys page of the CipherTrust Manager GUI, as described below.
Note
The CTE keys must be:
AES-128, AES-256, ARIA-128, or ARIA-256
Shared with the CTE Clients group
Set as exportable
Only the clients that support the CBC CS1 encryption mode can have GuardPoints that use a policy with a CBC CS1 key.
To create a new key:
In the top left corner, click the App Switcher icon. The Products page is displayed.
In the left pane, click Keys. The Keys page is displayed.
Click Add Key.
Specify the Key Name.
Select the Algorithm from the drop-down list. The default algorithm is
AES
. CTE supportsAES
andARIA
algorithms.Select the key Size from the drop-down list. The default size is
256
.(Optional) Under Key Properties, select XTS/CBC CS1 if you want to create a key for enhanced encryption mode.
Click Add Key to create the key. The edit view of the key is displayed.
For an enhanced encryption key, a set of two keys is created with names
<key-name>
and<key-name>_xts
.In the mini detail view, turn on the Exportable toggle. This makes sure the key is displayed in the keys list when you add the key rule to the policy.
Specify whether the key can be deleted. To make the key deletable, turn on the Deletable toggle. By default, the Deletable toggle is turned off, that is, the key cannot be deleted.
Expand the KEY ACCESS section:
On the General tab:
Make sure that the Show All Groups toggle is enabled. It displays the list of available groups.
In the Search groups box, type CTE Clients to filter the groups. The CTE Clients group is displayed.
Select the All check box. All the available permissions are selected.
Click Update.
Navigate to the KEY LABELS section. You need to scroll down the page.
Click the CTE tab.
Specify the CTE key properties (metadata):
Note
You must be a member of both the CTE Admins and Key Admins groups to update the CTE key properties.
Refer to create users and assign groups to them.
CTE Versioned: Clear the CTE Versioned check box. This makes sure that the key is displayed in the keys list when you add the key rule to the policy.
Persistent on Client: Specify whether the key is stored in persistent memory on the client.
When the check box is selected, the key is downloaded and stored (in an encrypted form) in persistent memory on the client. This can be used in the event that a connection to the CipherTrust Manager is unreliable.
When the check box is left clear, the key is only stored on disk inside the CipherTrust Manager. When required, the key is downloaded to the CTE client but only cached in memory. Every time the key is needed, the client retrieves it from the CipherTrust Manager.
Encryption Mode: Encryption mode of the key. The options are:
CBC CS1
XTS
CBC
Note
For ARIA-128 and ARIA-256 keys, select
CBC
as the encryption mode. These keys don't support theCBC CS1
encryption mode.If you selected the XTS/CBC CS1 check box when creating the key, you must select
CBC CS1
as the encryption mode. Encryption using theCBC CS1
keys is known as enhanced encryption. Refer to the CTE UserSpace Agent Advanced Configuration Guide for details.
If you left the XTS/CBC CS1 check box clear when creating the key,
CBC
is the available encryption mode.
Properties of a sample CTE key are shown below:
Note
To set Group Permissions for accessing this key, specify the settings on the General tab under the KEY ACCESS section.
Click Update.
The key is updated for use with CTE.
Note
Only CTE Administrators (users of the CTE Admins group) can delete the CTE keys.
An in-use CTE key cannot be deleted. Before you delete a CTE key, make sure that no key rule is using the key.