Slide 1

Slide 1 text

1 A kulcs kérdés – Kulcskérdés Entrust KeyControl 2025. november 13. Hajabács Balázs System Engineer

Slide 2

Slide 2 text

4 Source: GitGuardian – sprawl report 2025 - https://www.gitguardian.com/state-of-secrets-sprawl-report-2025 24 Million 70% More shocking numbers of leaked secrets remain valid two years later passwords, API keys, and credentials were found in public GitHub repositories in 2024

Slide 3

Slide 3 text

5 High-Impact Cloud Key & Token Incidents Year Company Exposed Secret Cause Impact 2022 Toyota API keys & source code (T-Connect) Public GitHub repo left open by subcontractor ~296,000 customers affected in Japan; location, email, VIN leaked; 5- year undetected exposure 2022 Uber Hardcoded AWS & Duo credentials Contractor's PowerShell script in private repo leaked via MFA bypass Attackers accessed internal dashboards, GDrive, Slack, Bitbucket; lateral movement across systems 2023 Microsoft SAS (Shared Access Signature) token - Azure Key mistakenly included in Microsoft-hosted GitHub repo Nation-state attackers forged tokens for email, Teams & SharePoint; undetected for over 2 years 2025 Salesforce OAuth token via Drift chatbot Token reused across tenants; attacker exploited token in Salesloft/Drift system Data exfiltration across dozens of orgs; support cases, customer records, embedded passwords

Slide 4

Slide 4 text

6 Encryption and Keys Executed by Applications, encryption is a method protecting sensitive data by converting it into ciphertext, using an algorithm and a random key. Applications SECRET !d=&2b Algorithm AES Key (Usually stored in files) Possessing the Key means having the ability to retrieve the data from ciphertext.

Slide 5

Slide 5 text

7 Encryption in Enterprise Products Enterprise Products know you care about the data stored / processed inside. Therefore, they have usually been equipped with the ability to generate key and encrypt data. Data not being used (Usually stored in files) Data being processed Enterprise Product Applications SECRET !d=&2b Algorithm AES Key (Usually stored in files)

Slide 6

Slide 6 text

8 Concerns Over the Encryption and Key Rights to use the Key is usually tied to authentication / authorization policies of the products (Having certain accounts compromised could have the data decrypted as well) Keys are stored with encrypted data in the same product 1 2 Enterprise Product Data not being used (Stored in files) Data being processed Applications !d=&2b Algorithm AES Key (Stored in files) SECRET 1 2 2

Slide 7

Slide 7 text

9 What Do You Need to Protect the Keys? Any key encrypting data (Data Encryption Key) should be encrypted by another key (Key Encryption Key) 1 KEK Storage should be robust 3 KEK should not be stored with encrypted data 2 Therefore, most products having native encryption allows third-party key management, i.e. a Key Management Server (KMS) Enterprise Product Data not being used (Stored in files) Data being processed Applications !d=&2b Algorithm AES Key (Encrypted by another key in KMS) SECRET 1 ENTRUST Cryptographic Security Platform (CSP) Key Management Server 3 2

Slide 8

Slide 8 text

10

Slide 9

Slide 9 text

11 DECENTRALIZED VAULTS

Slide 10

Slide 10 text

12

Slide 11

Slide 11 text

13

Slide 12

Slide 12 text

14

Slide 13

Slide 13 text

15

Slide 14

Slide 14 text

16

Slide 15

Slide 15 text

17

Slide 16

Slide 16 text

18

Slide 17

Slide 17 text

19

Slide 18

Slide 18 text

20

Slide 19

Slide 19 text

21 Summarize

Slide 20

Slide 20 text

22

Slide 21

Slide 21 text

23 Delivers complete key lifecycle – from inception to retirement • Key generation • Key rotation (manual and scheduled) • Management of unlimited keys/key sets • Ability to import existing keys • Ability to suspend not just revoke keys Key Lifecycle Management Destroy Register Suspend Generate / Distribute Use Distribute / Install Revoke Rotate Key Storage

Slide 22

Slide 22 text

24 Entrust’s Vision on Key Management Redefining Key and Secrets Lifecycle Management Key Management & Protection KMIP Server Lifecycle/rollover scheduling Access Controls Controls over geo-location of vaults Decentralized risk management Centralized/ Global Visibility Centralized Compliance Management Compliance Visibility Key/usage documentation Most KMS in the market Entrust’s definition of Key Management Traditional Lifecycle Management Compliance Management Dashboard Decentralized Vault-Based Architecture Comprehensive Central Policy

Slide 23

Slide 23 text

25 Comprehensive dashboard provides: • Visibility over globally distributed key vaults • Details of keys stored at each location • Degree to which stored keys comply to policy • Extent to which your keys are properly documented Centralized Policy and Compliance Management

Slide 24

Slide 24 text

26 Calculate Risk Score for Cryptographic Objects

Slide 25

Slide 25 text

27

Slide 26

Slide 26 text

28 Köszönöm a figyelmet! [email protected] 2025. november 13. Hajabács Balázs System Engineer