Articles on: AnalyzeCU

AnalyzeCU: Explanation of Encryption in Data Preparer

Explanation of Encryption in Data Preparer




What Encryption Are We Using?


In Data Preparer, we use a method called symmetric encryption. Specifically, we use an algorithm known as RijndaelManaged, which is a part of the Advanced Encryption Standard (AES). This method is widely used across many industries for securing data.

How Does It Work?
Key:
- This is a password that only you and the system know lives locally on your desktop. It's used to lock (encrypt) and unlock (decrypt) your data.

Encrypting Your Data:
- When you input your plain text (like a message or password), the system converts it into a format called bytes.
- The key is then processed to ensure it is strong and secure.
- An encryption object (RijndaelManaged) uses the key to transform your plain text into something called ciphertext. This ciphertext looks like a random string of characters, and it can't be understood without the key.

Output:
- The encrypted data is then converted into a format that can be easily stored or sent, such as Base64. This makes it look like a long, jumbled string of characters.

How Safe Is It?
- Strong Security: The Rijndael (AES) encryption method is very secure. It is widely trusted and used by governments and industries worldwide.
- Key Strength: The key length we use (256 bits) is very strong. A longer key means stronger encryption.

Why Is This Important for You?
- Protection Against Unauthorized Access: Encryption ensures that even if someone intercepts your data, they can't understand it without the key.
- Data Integrity: It helps in maintaining the privacy and integrity of your sensitive information.
- Compliance: Using strong encryption helps in meeting industry standards and regulations for data protection.

By using Data Preparer, you can be confident that your data is being protected with industry-leading encryption methods.

Additional Encryption Practices


At-Rest Encryption:
- Before storage in the cloud, CUCollaborate automatically encrypts data, ensuring it is secure when not actively being accessed or used.

Encryption in Transit:
- Our PowerShell automation leverages the HTTPS protocol, a secure version of HTTP, to protect data during its transfer from the customer to CUCollaborate storage, ensuring the integrity and confidentiality of your data.

Data Isolation:
- To maintain data privacy and prevent unauthorized access, each customer is allocated a separate, isolated storage container. This measure ensures that data from different customers do not intermingle.

Compliance:
- Adhering to high standards of security and operational integrity, CUCollaborate is SOC 2 Type 2 compliant. This certification underscores our commitment to maintaining strict security controls and processes.

Updated on: 13/06/2024

Was this article helpful?

Share your feedback

Cancel

Thank you!