Articles on: AnalyzeCU

AnalyzeCU: Explanation of Encryption in Data Preparer

Explanation of Encryption in Data Preparer



What Encryption Are We Using?

In Data Preparer, we use a method called symmetric encryption. Specifically, we use an algorithm known as RijndaelManaged, which is a part of the Advanced Encryption Standard (AES). This method is widely used across many industries for securing data.


**How Does It Work? **

  1. Key:
  • This is a password that only you and the system know lives locally on your desktop. It's used to lock (encrypt) and unlock (decrypt) your data.


  1. Encrypting Your Data:
  • When you input your plain text (like a message or password), the system converts it into a format called bytes.
  • The key is then processed to ensure it is strong and secure.
  • An encryption object (RijndaelManaged) uses the key to transform your plain text into something called ciphertext. This ciphertext looks like a random string of characters, and it can't be understood without the key.


  1. Output:
  • The encrypted data is then converted into a format that can be easily stored or sent, such as Base64. This makes it look like a long, jumbled string of characters.


**How Safe Is It? **

  • Strong Security: The Rijndael (AES) encryption method is very secure. It is widely trusted and used by governments and industries worldwide.
  • Key Strength: The key length we use (256 bits) is very strong. A longer key means stronger encryption.


**Why Is This Important for You? **

  • Protection Against Unauthorized Access: Encryption ensures that even if someone intercepts your data, they can't understand it without the key.
  • Data Integrity: It helps in maintaining the privacy and integrity of your sensitive information.
  • Compliance: Using strong encryption helps in meeting industry standards and regulations for data protection.


By using Data Preparer, you can be confident that your data is being protected with industry-leading encryption methods.


Additional Encryption Practices

  1. At-Rest Encryption:
  • Before storage in the cloud, CUCollaborate automatically encrypts data, ensuring it is secure when not actively being accessed or used.


  1. Encryption in Transit:
  • Our PowerShell automation leverages the HTTPS protocol, a secure version of HTTP, to protect data during its transfer from the customer to CUCollaborate storage, ensuring the integrity and confidentiality of your data.


  1. Data Isolation:
  • To maintain data privacy and prevent unauthorized access, each customer is allocated a separate, isolated storage container. This measure ensures that data from different customers do not intermingle.


  1. Compliance:
  • Adhering to high standards of security and operational integrity, CUCollaborate is SOC 2 Type 2 compliant. This certification underscores our commitment to maintaining strict security controls and processes.

Updated on: 13/06/2024

Was this article helpful?

Share your feedback

Cancel

Thank you!