Transformed & Split Data
SplitlockTM is a complete replacement for traditional encryption. Encryption attempts to protect original data in its entirety.
SplitlockTM uses cryptographic hash technology ("Splitcryption") to first transform the original data and then split the transformed data so that it becomes unrecognizable on multiple databases. Without access to a cryptographic hash key or series of keys, any data obtained from the SplitlockTM system is rendered useless.
Source of Access
Stealing access to the SplitlockTM system is more like stealing one key of a two-key safe. The other key, in the two-key safe scenario, is typically secured by a third party. The rules surrounding the basis for authentication of SplitlockTM clients are determined by the client.
As a base level restriction, Splitlock'sTM systems implement Source Address Access Restriction. This restricts the computers from which access to the system can be gained. Beyond that, some clients will make the decision that their systems should be able to have automatic, unfettered access. But many will elect to have access mediated through more sophisticated authentication mechanisms, such as one-time key tokens, biometric authentication mechanisms, or other approaches. SplitlockTM encourages clients to utilize such systems, and puts no limits on their use.
Scope of Access
SplitlockTM implements rules and systems to determine when and on what basis SplitlockTM will give access to a record, once the steps outlined above have been carried out, i.e. once the user has been authenticated. These rules and systems are specified by the client.
All clients have access to the following mechanisms:
This slows the rate of transactions, to eliminate the possibility of fast, bulk removal of records;
- Transaction Velocity Monitoring and Reporting
This ensures that changes in patterns of data access are restricted and reported;
Time-based Availability Restriction
This restricts access to records within certain time periods. If there is no need access to records out of office hours, SplitlockTM can be configured to automatically deny such access.
Revocation of Access
When any security system is compromised, there should be a revocation system in place. When your car keys are stolen, you change the locks on your car. When your computer account is compromised, you change the password. The question of revocation is important, and the most important aspect of a good revocation system is speed. The longer it takes to revoke access, the larger the window of opportunity for the thief.
SplitlockTM uses a sophisticated technique that allows an entire database of records for a given client to be re-keyed effectively instantaneously. The time taken for re-keying is independent of the size of the database: a database of a million records is re-keyed as quickly as a database of one record.
Logging & Reporting
Sensitive data is often maintained internally within organizations, but access to it is very rarely subject to extensive logging and reporting. However, that's not the key problem. Organizations can implement access logging and reporting systems. The real issue is that someone who is either privileged enough or determined and skilful enough to gain illegitimate access to the data itself can usually gain access to the logs. Once that happens, removing all traces of access is the next step, and the logs become useless.
Splitlock'sTM logging is, of course, separate from the organization's own IT systems and represents a much more difficult access problem for the would-be data thief. This means two things: First, it means that someone who attempts data theft is more likely to be caught. Comprehensive logging is the most important tool in IT Security forensics. Second, it means that the sophisticated potential thief is much more likely to pick another target.