Don't Fall for the Encryption Fallacy

Yet another intrusion with data theft, yet another chorus of yells for "encryption.” I refer to the eBay intrusion from last week with the subsequent hysteria over their not encrypting certain personal information at rest. "It is inexcusable for a company the size of eBay with the amount of data it holds to not encrypt all personal information held,” said Trend Micro’s Rik Ferguson.

It has become quite fashionable these days to say, "If only the information had been encrypted.”

The problem is not that simple, either from a privacy or security perspective. From a privacy perspective, the motivation is “don’t let someone who doesn’t need to see the information see it.” From a security perspective, the motivation is “don’t allow someone to violate privacy and then misuse the obtained information.” They’re very closely related, and wherever we talk about security or privacy, we really mean both.

Encryption at rest solves a small set of problems really well:

  • Unauthorized physical access, loss or theft of portable devices, including laptops, USB drives and other mobile media. This is a superb use case for encryption, because the risk/reward ratio is so skewed toward reward. That's one reason the Massachusetts privacy law MA 201 CMR 17 specifically requires "encryption of all personal information stored on laptops or other portable devices.”
  • Backup media and other information that is constantly in transit. This is another excellent use case. Data is on backups. Backups move around on trucks. Backups fall off the back of trucks. The impact is catastrophic. Encryption completely makes sense.

(Picture from

It's when you start trying to apply the same principles to data on servers without thinking correctly about it that you start getting into trouble. Let's talk about what encryption at rest does not do:

  • It doesn't help you when logical access to the system is gained through other means. For instance, a guessed or cracked password; through an application level attack, such as SQL injection; a user level attack, such as phishing. Remember that encryption must still make data available to the user on demand, so if an attacker has the ability to become the user, you're toast. How do you prevent that? Perhaps with stronger authentication, e.g., two-factor authentication. This now becomes a harder problem than just "let's encrypt everything,” doesn't it?
  • It doesn't help you when a user goes "bad.” There's no way to generally predict this or, for the most part, respond to it. You could do strict segregation of duties and two-person controls, if you can afford it (the government can, but how many businesses can?), but encryption doesn't really help you protect against this attack either.
  • Encryption at rest is fine and dandy, but what about the transmission of data on your network? Is it encrypted? Is it stored on a file share, perhaps? On an e-mail server? Are you prepared to perform all of the process flow analysis to ensure that every data avenue is protected? If an attacker were on your network and couldn't get to the encrypted database, could they simply sniff network traffic instead? This is where concepts such as Privacy by Design come into play—you anticipate threats to privacy and counter them early in an application’s lifecycle. It’s a lot harder to do this for a legacy application.
  • Encryption can eventually be brute-forced. Of course, this is also a good thing—it means that it buys you some time to put in countermeasures, change passwords, warn banks and consumers, etc. But most people think that encryption "solves" the security problem entirely. Not by a long shot.

Keep the right perspective as you think about encryption at rest:

Data Privacy:

  • Data minimization—have you followed the principle of data minimization and only retained the data that you need for business purposes and disposed of it after its useful life has expired?
  • User access control—do you have a solid user access control program in place so that only people who need certain data access have it?

Data Security:

  • Vulnerability management—are you actively scanning your systems like an attacker would to ensure that you are as protected as possible?
  • Data protection—are you implementing controls such as data leakage protection and host intrusion detection/prevention to try and stop attacks from happening?

Data Privacy and Security:

  • Segregation and segmentation of services—are your sensitive services walled off physically or logically from less sensitive ones so that you can apply the rigorous security controls selectively?
  • Monitoring—do you have the right instrumentation being generated and monitored so that when someone breaks through your controls—and they will be broken, make no mistake about that—you are able to quickly detect it and apply countermeasures?
  • Screening, training and awareness—do you have the right hiring policies in place? Are you ensuring that employees are trained appropriately about the dangers of phishing and social engineering?

The point I'm trying to make is that without a solid security and privacy program in place to start with, encryption at rest is like applying duct tape to a broken bone. Encryption has its uses, and it can be effective as a security and privacy control, a safe harbor control and as a compliance measure. But if you're not careful about realizing its limitations and communicating them to your executives, you're the one that will be in hot water when an incident occurs.

photo credit: Yuri Yu. Samoilov via photopin cc

Written By

Aurobindo Sundaram, CIPP/US


If you want to comment on this post, you need to login.
  • Chris Bowen, CIPP/IT, CIPP/US Jun 12, 2014

    I agree completely Aurobindo. You summarized this very well.

  • John Kropf Jun 12, 2014

    Robin, Excellent article--insightful and realistic advice. Well done.

  • Kathleen Aguilar, CIPP/US Jun 13, 2014

    Excellent and very useful article.

  • Robert Ng Jun 13, 2014

    I totally agree with you. The biggest challenge is to convince the management that all this is necessary. It would normally takes an incident to wake them up.

  • Juan Carlos Carrillo Jun 13, 2014

    Auro: This is one of the best security/privacy documents I have seen in my life. Congrats


Board of Directors

See the esteemed group of leaders shaping the future of the IAPP.

Contact Us

Need someone to talk to? We’re here for you.

IAPP Staff

Looking for someone specific? Visit the staff directory.

Learn more about the IAPP»

Daily Dashboard

The day’s top stories from around the world

Privacy Perspectives

Where the real conversations in privacy happen

The Privacy Advisor

Original reporting and feature articles on the latest privacy developments

Privacy Tracker

Alerts and legal analysis of legislative trends

Privacy Tech

Exploring the technology of privacy

Canada Dashboard Digest

A roundup of the top Canadian privacy news

Europe Data Protection Digest

A roundup of the top European data protection news

Asia-Pacific Dashboard Digest

A roundup of the top privacy news from the Asia-Pacific region

IAPP Westin Research Center

Original works. Groundbreaking research. Emerging scholars.

Advertise in IAPP Publications

Find out how to get your message in front the people you want to reach. Download a media kit now.

Get more News »

Find a KnowledgeNet Chapter Near You

Network and talk privacy at IAPP KnowledgeNet meetings, taking place worldwide.

Women Leading Privacy

Events, volunteer opportunities and more designed to help you give and get career support and expand your network.

IAPP Job Board

Looking for a new challenge, or need to hire your next privacy pro? The IAPP Job Board is the answer.

Join the Privacy List

Have ideas? Need advice? Subscribe to the Privacy List. It’s crowdsourcing, with an exceptional crowd.

Find more ways to Connect »

Find a Privacy Training Class

Two-day privacy training classes are held around the world. See the complete schedule now.

Online Privacy Training

Build your knowledge. The privacy know-how you need is just a click away.

The Training Post—Can’t-Miss Training Updates

Subscribe now to get the latest alerts on training opportunities around the world.

New Web Conferences Added!

See our list of upcoming web conferences. Just log on, listen in and learn!

Train Your Staff

Get your team up to speed on privacy by bringing IAPP training to your organization.

Learn more »

CIPP Certification

The global standard for the go-to person for privacy laws, regulations and frameworks

CIPM Certification

The first and only privacy certification for professionals who manage day-to-day operations

CIPT Certification

The industry benchmark for IT professionals worldwide to validate their knowledge of privacy requirements

Certify Your Staff

Find out how you can bring the world’s only globally recognized privacy certification to a group in your organization.

Learn more about IAPP certification »

Get Close-up

Looking for tools and info on a hot topic? Our close-up pages organize it for you in one easy-to-find place.

Where's Your DPA?

Our interactive DPA locator helps you find data protection authorities and summary of law by country.

IAPP Westin Research Center

See the latest original research from the IAPP Westin fellows.

Looking for Certification Study Resources?

Find out what you need to prepare for your exams

More Resources »

GDPR Comprehensive: Registration Open

New! Intensive two-day GDPR training led by the sharpest minds in the field. It's a can't-miss event.

The Congress Is Cancelled

The IAPP Europe Data Protection Congress 2015 is cancelled. Click through to learn more.

Sponsor an Event

Increase visibility for your organization—check out sponsorship opportunities today.

Exhibit at an Event

Put your brand in front of the largest gatherings of privacy pros in the world. Learn more.

More Conferences »

Become a Member

Start taking advantage of the many IAPP member benefits today

Corporate Members

See our list of high-profile corporate members—and find out why you should become one, too

Renew Your Membership

Don’t miss out for a minute—continue accessing your benefits

Join the IAPP»