• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • PTSS First to Achieve NIST Compliance for DB2/400 Encryption

    May 4, 2010 Alex Woodie

    Patrick Townsend Security Solutions demonstrated why it calls itself “the encryption company” last week when it because the first and only vendor to receive certification from the National Institute of Standards and Technology for a DB2/400 encryption solution. The NIST certification, combined with its support and deep technical understanding of the new automated encryption facilities that IBM introduced with i/OS 7.1 gives the company a solid leadership position in the i/OS security business.

    John Earl, who became CEO of PTSS last year after leaving PowerTech, says achieving NIST compliance for Alliance AES Encryption for System i on i5/OS V5R4, i/OS 6.1, and i/OS 7.1 is important for two main reasons.

    First, it confirms PTSS’ standards-based approach to developing encryption and proves that its work has been thoroughly vetted by an independent third party. The second reason is that the standards groups, including the Payment Cardholder Industry (PCI) standards body, are leaning toward certification of encryption products as part of their compliance mandates.

    “We will go to COMMON with the certificates in hand, so we’ll be the only company with NIST certified encryption on all supported versions of IBM i,” Earl said in an interview with IT Jungle last week. “That’s pretty significant because even the encryption algorithms provided by IBM are not NIST certified.”

    And neither are any of the i/OS encryption algorithms provided by other third-party vendors, Earl says. “We’ve seen encryption algorithms out there that are, frankly, baffling, and don’t make a lot of sense. They certainly haven’t been peer reviewed, and they aren’t certified, although sometimes you see the claims for that,” he says.

    “Getting encryption right is not a simple thing, and it’s not something you do over the weekend. We’re going to really stress that and we’re really proud of the fact that we’re the only company that has NIST certification for database encryption on IBM i,” he says.

    Earl says it’s likely a matter of time before the PCI standards body requires that companies use an encryption tool that holds a certification from NIST. “While the PCI Security Standards Council does not yet require strict adherence to the NIST standard, it is clear they are driving in this direction,” Earl writes on the PTSS Blog.

    PTSS is one of only two i/OS security software vendors that have committed to supporting the new DB2/400 field procedure that IBM introduced in i/OS 7.1 to make it easier for System i shops to implement automated encryption without modifying application source code. The other vendor is Linoma Software.

    As PTSS founder and renowned encryption expert Patrick Townsend explains it, the problem didn’t have to do with enabling automated encryption in i/OS–it was the automated decryption that was the problem.

    In previous releases of the operating system, most vendors like PTSS used SQL views and triggers to automated encryption and decryption. In fact, it was possible to almost completely automate the encryption of field values using this method. However, when a user went to read a record that had been encrypted, a built-in limitation in DB2/400–one that doesn’t exist on most other platforms–prevented DB2/400 from showing decrypted values.

    “When you insert or update a record [SQL views and triggers are] nice, because you can grab that data before it’s written, encrypt it, and write it into the file. Now you have protection. That works really well.

    “But on a read operation, the trigger fires, you get the data, and you can decrypt it. But guess what? The buffer is not updatable,” Townsend explains. “Your trigger gets fired, your program gets called, the data gets decrypted–it just never gets passed upstream. In IBM terms, it’s not updateable.”

    This limitation has been eliminated with the addition of the new field procedure in i/OS 7.1, and PTSS is champing on the bit to start using it to help its customers clamp down on their data.

    While the new “field proc” exit point will (mostly) eliminate the need to make source code changes to implement automated encryption and decryption, the new technology also introduces a whole new set of security challenges.

    “With great power comes great responsibility/risk. A field exit point is another potential point for security failure,” Townsend says. “A proper implementation has to enforce policy around who can encrypt data, and which applications can encrypt data.”

    If a System i shop failed to implement the proper security controls around the field procedure exit point, they could risk exposing all of their encrypted data, Townsend and Earl say. A savvy user with a power tool such as ProData‘s extremely popular Database Utility (DBU) could essentially lay in wait for a user with the proper security credentials to access a file. And then every file is all of a sudden decrypted and viewable to the rouge user.

    “There are substantial risks around deploying field proc exit points in the wrong way,” Townsend says. “I think customers need to be aware of those risks and be fully cognizant of the issues around it. I believe an exit point solution has to enforce a rule. If you’re not explicitly authorized to see data, it should be denied to you. If an application is not explicitly authorized, it should be denied access to data.”

    RELATED STORIES

    Pat Townsend Updates MFT Offering for i/OS

    PowerTech to Resell Pat Townsend’s Encryption Offering

    Pat Townsend to Supply Encryption Technology to Quantum

    Pat Townsend Secure with New President

    Pat Townsend Unveils Encryption Key Appliance

    Pat Townsend to Resell Valid’s i5/OS Biometric Authentication



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Rocket Software

    Unlock the full potential of your data with Rocket Software. Our scalable solutions deliver AI-driven insights, seamless integration, and advanced compliance tools to transform your business. Discover how you can simplify data management, boost efficiency, and drive informed decisions.

    Learn more today.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    Botz & Associates, Inc.:  Set up a FREE one hour security Q&A session with Patrick Botz
    BOSaNOVA:  Limited time e-Twinax Controller REBATE for new Power System customers
    Computer Keyes:  KeyesOverlay rapidly converts standard *SCS printer files into PDF documents

    IT Jungle Store Top Book Picks

    Easy Steps to Internet Programming for AS/400, iSeries, and System i: List Price, $49.95
    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The System i RPG & RPG IV Tutorial and Lab Exercises: List Price, $59.95
    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    Chip Wars: List Price, $29.95

    SMB Customers, BI Projects Lift SAP’s First Quarter In Orlando, Optimism Returns

    Leave a Reply Cancel reply

Volume 10, Number 17 -- May 4, 2010
THIS ISSUE SPONSORED BY:

Help/Systems
PowerTech
Patrick Townsend Security Solutions
BOSaNOVA
VAULT400

Table of Contents

  • IBM Unveils i/OS CMS Upgrades and Migration Promotions
  • PTSS First to Achieve NIST Compliance for DB2/400 Encryption
  • m-Power Gets Better Record Filtering, Other Goodies
  • Bsafe Launches Compliance Software for PCI
  • Aldon Goes 64-Bit with Service Desk Software
  • New State Privacy Laws Clamp Down on Data
  • Unitrends to Add Deduplication to D2D Backup Appliances
  • Datawatch Updates Data Integration Tool for Monarch BI Suite
  • ACOM Adds New Workflow Features to EZCM
  • Zend Studio Gets New Code Tracing Capabilities

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24
  • Big Blue Raises IBM i License Transfer Fees, Other Prices
  • Keep The IBM i Youth Movement Going With More Training, Better Tools
  • Remain Begins Migrating DevOps Tools To VS Code
  • IBM Readies LTO-10 Tape Drives And Libraries
  • IBM i PTF Guide, Volume 27, Number 23

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle