Creating Policies for Standard Encryption with CipherTrust Manager
When you use standard encryption, you need to create two policies:
-
The initial encryption policy specifies the current encryption key (if any) and the encryption key you want CTE to use when it encrypts the data. This policy also denies access to any other process trying to access the GuardPoint.
You apply the initial encryption policy when you first create the GuardPoint, and you leave it in place until all of the data has been encrypted. After that, you remove this policy from the GuardPoint.
-
The production policy specifies the same encryption key as the initial encryption policy along with any security rules you want to use to protect your data. After the initial encryption has completed, you apply the production policy to the GuardPoint and allow users and applications to access the now-protected data.
Creating the Initial Encryption Policy
-
Log into CipherTrust Manager and launch the CTE application.
-
In the left-hand menu bar, click Policies.
-
Click Create Policy.
-
For Name, make sure you use a name that clearly designates this as an initial-encryption policy and not a production policy. You will need to be able to find this policy name from the list of all available policies when you create the GuardPoint.
-
For Policy Type, select Standard.
-
Enable the Data Transformation check box.
-
Click Next to go to the Security Rules page. CipherTrust Manager should have automatically added a security rule for Action:
key_op
, Effect:permit,applykey
. If this security rule is not there, click Back and make sure you have enabled the Data Transformation check box. -
Click Create Security Rule and do the following:
-
In the Action field, select
all_ops
. -
In the Effect field, select
deny
. -
Click Add to return to the Security Rules page.
You should now have two security rules, as shown:
-
-
Click Next to go to the Key Rules page.
-
Click Create Key Rule.
-
In Current Key Name, click Select to specify the current encryption key used for the data. If the data is unencrypted, specify
clear_key
as the encryption key. When you are done, click Add. For example:Tip
You can also create a new key at this point if desired. For details on creating an encryption key, see your CipherTrust Manager documentation.
-
Click Next to go to the Data Transformation page.
-
Click Create Data Transformation Rule.
-
In the Transformation Key Name field select the encryption key you want to use to encrypt the data. This key must match the one specified in the production policy you intend to apply to the GuardPoint after the data has been encrypted. For example, if you want to encrypt the data with the key CS1_AES256, you would specify the following transformation rule:
-
Click Next to go to the Confirmation page.
-
Verify your selections and click Save to save the policy.
Creating the Production Policy
-
Launch the CTE application.
-
In the left-hand menu bar, click Policies.
-
Click Create Policy.
-
For Name, make sure you use a name that clearly designates this as a production policy and not an initial encryption policy. You will need to be able to find this policy name from the list of all available policies when you create the GuardPoint.
-
For Policy Type, select Standard.
-
Click Next to go to the Security Rules page. Enter the security rules you want to use based on your production environent requirements. You can add as many security rules as you need to define who should have access to the protected data.
-
When you are done, click Next to go to the Key Rules page.
-
Click Create Key Rule.
-
In Key Name field, click Select to specify the encryption key used to transform the data in the initial encryption policy. When you are done, click Add. For example:
-
Click Next to go to the Data Transformation page.
-
Click Create Data Transformation Rule.
-
In the Transformation Key Name field select the encryption key you want to use to encrypt the data. This key must match the one specified in the production policy you intend to apply to the GuardPoint after the data has been encrypted. For example, if you want to encrypt the data with the key CS1_AES256, you would specify the following transformation rule:
-
Click Next to go to the Confirmation page.
-
Verify your selections and click Save to save the policy.