Print this Page
Excessive Encryption
27. Information Security Manager
26 Replicated Encrypted Data
Information Security Manager
Close this Page

27.26 Replicated Encrypted Data:
1. Excessive encryption using a large number of different encryption methods has proved to be an effective technical way to ensure that stored data cannot be stolen, because all stored data is meaningless and worthless.   The second part of the technical solution is to replicted that encrypted data to a large number of secure data centers to ensure that business data can never be lost or corrupted.
2. The ASP as the Dat Processor has a legal duty of care to enssure that a reportable data can never happen - Replicated Encrypted Data (RED) ensures that a data breach cannot happen.   If a state sponsored agent or criminal gained access to any data center they could take a copy of all stored data, but that stored data is excessively encrypted to the point where it is meaningless and worthless.   When a disaster happens to destroy a data center, no data can be lost as a reportable data breach because any stored data that has been lost exists in a large number of other physical data centers.
3. The DPO advokes Replicated Encrypted Data (RED) as a technical method to mitigate the security journey.

2. Replication:
1. Encrypted data is migrated from data center to date center in real time so a number of data centers may be called upon to become the operational data center at a moments notice.   It is possible that with certain types of disasters, the data that a person was entering at the time of the data center failure may not have been processed and may need to be reentered so the replacement data center can process the data.   The scope of data not processed will only ever be the last field value entered and the person will know that the "saved" message was not shown.
2. Active and passive replication is deployed to a large number of secure data centers.   Certain communications are synchronous and others are asynchronous based on the specific requirements of the application and its data.   No single architecture is applicable for all applications, but most will enjoy sub-second synchronous replication.   With meter reading applications, replication may be delayed for up to one hour because the loss of a single transaction will have low impact as the next meter reading transaction is self-correcting.
3. Data replication can be achieved with just 2 secure data centers, but to be certain that no stored data cen be lost, it is cost justified to expand to at least ten secure data centers.   Having achieved data replication with ten secure data centers, the next step is to grow to more than one hundred secure data centers to absolutly eliminate the possibility of any loss of data or accidental data corruption or fraudulent data changes.   Both active and passive replication is needed to ensure that a corrupt data transaction is not propogated to all secure data centers before the corruption is identified and blocked.   Some types of business data will be replicated in real-time, some daily, some weekly, some monthly and some annually.   Annual archives of historic data are frozen and cannot be changed, so once they are replicated to a swarm of remote data centers, they never need to be replicated to those data centers again.

3, Mission:
1. The mission is to eliminate obsolete backup-restart-recovery procedures that always left a lot of data to be reentered after an old backup has been restored.   Every backup restore procedure creates a loss of data - typically a full days worth of transations to be manually renetered.   It is a reportable data breach when data is lost and so most backup plans may be planning to have a reportable data breach with applicable fines by the Information Commissioners Office.
2. Business continuity is about never having any downtime, even when a data center fails, switching to an alternative data center is automatic and seamless.   Internet traffic is directed to more than one data center, but only the operational data center processed the transaction.   When the currently operational data center does not respond, then an alternative data center becomes the operational data center to continue to provide the application service.
3. It is a mission to eliminate every single point of failure so application services never stop and cannot be stopped.   This mission is confined to ASP as the Data Processor who provides Bespoke Application Services to the public Internet for and on behalf of the Customer and Data Controller.   The mission cannot influence the public Internet and Customer infrastructure that is beyond the control of the ASP.

Document Control:
1. Document Title: Replicated Encrypted Data.
2. Reference: 162726.
3. Keywords: ITIL, Replicated Encrypted Data.
4. Description: Information security can be technically achieved with the Replicated Encrypted Data.
5. Privacy: Public education service as a benefit to humanity.
6. Issued: 11 Dec 2016.
7. Edition: 1.2.