
Secure Architecture
After evaluating all available solutions on the market, Worthworm and Kanda teams have chosen StrongAuth to guide RC3 implementation and provide KeyAppliance for tokenization and key-management.
KeyAppliance is an integrated solution for compliance to PCI-DSS, 201 CMR 17.00, HIPAA/HITECH, FISMA, the EU Directive and similar data-security regulations for the protection of sensitive data.
Adhering to RC3 allowed to efficiently distribute sensitive data across regulated zones, public clouds and servers. KeyAppliance was used to encrypt, tokenize and provide key-management in regulated zones within secure network perimeter. These zones are compliant with data security standards.
Class 1:data is processed and stored in regulated zones, within a secure network perimeter. They are compliant with applicable data-security regulations. Class 1 data is encrypted and tokenized. Class 2 data also undergoes encryption and tokenization. However, it is processed in secure, but not regulated zones.
StrongAuth KeyAppliance is used for encryption, decryption, search and deletion of the data stored in the system. Additional key-management automation capability allowed Worthworm to drastically reduce the number of requests to the web-service while in use.
Data tokens generated by KeyAppliance can be safely stored in the public cloud. The token has no cryptographic relation to the encrypted data other than being a unique identifier. In the case of a breach, attackers will be unable to decode or connect this data to user information.
The data is encrypted before it is stored in the database and decryption process happens when the data needs to be sent to the user through Worthworm interface. This way Kanda Team ensured that no sensitive data is ever passed to or maintained on the user side.
KeyAppliance is also used for user authorization process. The user is authorized based on comparison of login credentials with the existing tokens in the system. The system searches for the similar token and, if found, grants access to the user. This method provides additional data security without system flexibility loss or any other additional restrictions on the user side. The password can be recovered any time via e-mail without decreasing security of the system and transparency to the end user.
Kanda has integrated KeyAppliance into Worthworm infrastructure using Spring Web Services that ensured additional flexibility.
We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.