Overview
Syllabus
Intro
what are we trying to do?
example
requirements
Uber Service Graph
field-level encryption
impacts of encrypting data
approaches
volume/disk encryption
database (TDE)
database (column-level)
application ("server-side")
application ("client-side")
envelope encryption
config driven
tech specs
dataflow
where (and how) to encrypt?
crypto interfaces (crypter)
crypto interfaces (hasher)
crypto interfaces (options)
crypto interfaces (crypter, hasher)
ciphertext schema
language-specific devices
developer evangelism
supporting legacy flows
signer interface
search over encrypted data
Taught by
OWASP Foundation