global encryption trends study · breaches in financial services. employee/hr data and intellectual...

44
2019 GLOBAL ENCRYPTION TRENDS STUDY

Upload: others

Post on 25-Mar-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

2019GLOBAL ENCRYPTION TRENDS STUDY

Page 2: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

PART 1. EXECUTIVE SUMMARY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 PART 2. KEY FINDINGS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

Strategy and adoption of encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

Trends in encryption adoption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

Threats, main drivers and priorities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

Deployment choices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

Encryption features considered most important . . . . . . . . . . . . . . . . . . . 14

Attitudes about key management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

Importance of hardware security modules (HSMs) . . . . . . . . . . . . . . . . . 18

Cloud encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

APPENDIX 1. METHODS & LIMITATIONS . . . . . . . . . . . . . . . . . . . . . . 24 APPENDIX 2. CONSOLIDATED FINDINGS . . . . . . . . . . . . . . . . . . . . . 29

Sponsored by nCipher SecurityIndependently conducted by Ponemon Institute LLC

Page 3: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

EXECUTIVE SUMMARY01

Page 4: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

4PONEMON INSTITUTE © RESEARCH REPORT

We surveyed 5,856 individuals across multiple industry sectors in 14 countries/regions: Australia, Brazil, France, Germany, India, Japan, Mexico, the Middle East (which is a combination of respondents located in Saudi Arabia and the United Arab Emirates)2, the Russian Federation, South Korea, the United Kingdom, the United States and, two new regions in Asia for the first time, Southeast Asia (Indonesia, Malaysia, Philippines, Thailand and Vietnam) and Hong Kong and Taiwan.

The purpose of this research is to examine how the use of encryption has evolved over the past 14 years and the impact of this technology on the security posture of organizations.

The first encryption trends study was conducted in 2005 for a US sample of respondents.3 Since then we have expanded the scope of the research to include respondents in all regions of the world.

As shown in Figure 1, since 2015 the deployment of an overall encryption strategy has steadily increased. This year, 45 percent of respondents say their organizations have an overall encryption plan that is applied consistently across the entire enterprise and 42 percent say they have a limited encryption plan or strategy that is applied to certain applications and data types. The following pages contain the 2019 findings.

PONEMON INSTITUTE IS PLEASED TO PRESENT THE FINDINGS OF THE 2019 GLOBAL ENCRYPTION TRENDS STUDY 1, SPONSORED BY NCIPHER SECURITY.

1 This year’s data collection was completed in December 2018 . Throughout the report we present trend data based on the fiscal year (FY) the survey commenced rather than the year the report is finalized . Hence, our most current findings are presented as FY18 . The same dating convention is used in prior years .2 Country-level results are abbreviated as follows: Australia (AU), Brazil (BZ), France (FR), Germany (DE), Hong Kong and Taiwan (HKT), India (IN), Japan (JP), Korea (KO), Mexico (MX), Middle East (ME), Russia (RF), Southeast Asia (SA), United Kingdom (UK), and United States (US) . 3 The trend analysis shown in this study was performed on a combined country samples spanning 14 years (since 2005) .

Figure 1. Does your company have an encryption strategy?Country samples are consolidated

An overall encryption plan or strategy that is applied consistenly across the

entire enterprise

A limited encryption plan or strategy that is applied to certain applications and data types

No encryption plan or strategy

37%41%

43%

45%

25%

44%

44%

42%

15%14%

13%

13%

FY15 FY16 FY17 FY18

Page 5: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

5 PONEMON INSTITUTE © RESEARCH REPORT

STRATEGY AND ADOPTION OF ENCRYPTION

Enterprise-wide encryption strategies increase. Since first conducting this study 14 years ago, there has been a steady increase in organizations with an encryption strategy applied consistently across the entire enterprise. In turn, there has been a steady decline in organizations not having an encryption plan or strategy. The results have essentially reversed over the years of the study. Certain countries have more mature encryption strategies. The prevalence of an enterprise encryption strategy varies among the countries represented in this research. The highest prevalence of an enterprise encryption strategy is reported in Germany followed by the United States, Australia and the United Kingdom. Respondents in the Russian Federation and Brazil report the lowest adoption of an enterprise encryption strategy. The global average of adoption is 45 percent.

The IT operations function is the most influential in framing the organization’s encryption strategy over the past 14 years. However, in some countries lines of business are more influential. These are the United States and Brazil. IT security and IT operations have a similar level of influence in Australia, India, Mexico and the Russian Federation.

TRENDS IN ADOPTION OF ENCRYPTION

The use of encryption increases in all industries. Results suggest a steady increase in all industry sectors. The most significant increases in extensive encryption usage occur in manufacturing, hospitality and consumer products.

The extensive use of encryption technologies increases. Since we began tracking the enterprise-wide use of encryption in 2005, there has been a steady increase in the encryption solutions extensively used by organizations.

THREATS, MAIN DRIVERS AND PRIORITIES

Employee mistakes continue to be the most significant threats to sensitive data. The most significant threats to the exposure of sensitive or confidential data are employee mistakes. In contrast, the least significant threats to the exposure of sensitive or confidential data include government eavesdropping and lawful data requests. Concerns over inadvertent exposure (employee mistakes and system malfunction) significantly outweigh concerns over actual attacks by temporary or contract workers and malicious insiders. It is interesting to note that the employee mistake threat exceeds the combined threat by both hackers and insiders. The main driver for encryption is protection of sensitive information. Organizations are using encryption to protect the enterprise’s intellectual property and the personal information of customers (both 54 percent of respondents).

A barrier to a successful encryption strategy is the ability to discover where sensitive data resides in the organization. Sixty-nine percent of respondents say discovering where sensitive data resides in the organization is the number one challenge. In addition, 42 percent of all respondents cite initially deploying encryption technology as a significant challenge. Thirty-two percent cite classifying which data to encrypt as difficult.

Since first conducting this study 14 years ago, there has been a steady increase in organizations with an encryption strategy applied consistently across the entire enterprise.

““

Page 6: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

6PONEMON INSTITUTE © RESEARCH REPORT

DEPLOYMENT CHOICES

No single encryption technology dominates in organizations. Organizations have very diverse needs. Internet communications, databases and laptop hard drives are the most likely to be encrypted and correspond to mature use cases. For the second year, the study tracked the deployment of encryption of IoT devices and platforms. As shown, 52 percent of respondents say encryption of IoT devices and 50 percent of respondents say encryption on IoT platforms have been at least partially deployed.

ENCRYPTION FEATURES CONSIDERED MOST IMPORTANT

Certain encryption features are considered more critical than others. According to consolidated findings, enforcement of policy, system performance and latency and support for both cloud and on-premise deployment are the three most important features. Support for both cloud and on-premise deployment has risen in importance as organizations have increasingly embraced cloud computing and look for consistency across computing styles. In fact, the top findings in this area all correspond to features considered important for cloud solutions. System performance and latency and system scalability remain at high levels but declined in importance in this year’s survey.

Which data types are most often encrypted? Payment-related data and financial records are most likely to be encrypted as a result of high-profile data breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data type to be encrypted is health-related information and non-financial information, which is a surprising result given the sensitivity of health information and the recent high-profile healthcare data breaches. Financial records had the largest increase on this list over last year.

ATTITUDES ABOUT KEY MANAGEMENT

How painful is key management? Sixty-one percent of respondents rate key management as very painful, which suggests respondents view managing keys as a very challenging activity. The highest percentage pain threshold of 70 percent occurs in the UK. At 38 percent, the lowest pain level occurs in France.

Companies continue to use a variety of key management systems. Companies continue to use a variety of key management systems. The most commonly deployed systems include: (1) formal key management policy (KMP), (2) formal key management infrastructure (KMI) and (3) manual process.

IMPORTANCE OF HARDWARE SECURITY MODULES (HSMS)

Germany, United States and India organizations are more likely to deploy HSMs. Germany, United States and India are more likely to deploy HSMs than other countries. The overall average deployment rate for HSMs is 47 percent.

How HSMs in conjunction with public cloud-based applications are primarily deployed today and in the next 12 months. Almost half (48 percent of respondents) own and operate HSMs on-premise for cloud-based applications, and 37 percent of respondents rent/use HSMs from a public cloud provider for the same purpose. In the next 12 months, both figures will increase, by 5 and 7 percent respectively. Interestingly, the use of HSMs with Cloud Access Security Brokers is expected to double in the next 12 months. The overall average importance rating for HSMs, as part of an encryption and key management strategy in the current year is 60 percent. The pattern of responses suggests Japan, Germany and Australia are most likely to assign importance to HSMs as part of their organization’s encryption or key management activities.

Page 7: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

7 PONEMON INSTITUTE © RESEARCH REPORT

What best describes an organization’s use of HSMs? Sixty percent of respondents say their organization has a centralized team that provides cryptography as a service (including HSMs) to multiple applications/teams within their organization (i.e., private cloud model). Forty percent say each individual application owner/team is responsible for their own cryptographic services (including HSMs), indicative of the more traditional siloed application-specific data center deployment approach.

What are the primary purposes or uses for HSMs? The top uses are application-level encryption, TLS/SSL, and database encryption. There is projected to be a significant (10%) increase in the use of database encryption 12 months from now. It is also significant to note that HSM use for application-level encryption will soon be deployed in 50 percent of the organizations represented in this study.

CLOUD ENCRYPTION

60 percent of respondents say their organizations transfer sensitive or confidential data to the cloud whether or not it is encrypted or made unreadable via some other mechanism such as tokenization or data masking.

Another 22 percent of respondents expect to do so in the next one to two years. These findings indicate the benefits of cloud computing outweigh the risks associated with transferring sensitive or confidential data to the cloud.

How do organizations protect data at rest in the cloud? Forty-four percent of respondents say encryption is performed on-premise prior to sending data to the cloud using keys their organization generates and manages. However, 35 percent of respondents perform encryption in the cloud, with cloud provider generated/managed keys. Twenty-one percent of respondents are using some form of Bring Your Own Key (BYOK) approach.

What are the top three encryption features specifically for the cloud? The top three features are support for the KMIP standard for key management (73 percent of respondents), SIEM integration, visualization and analysis of logs (60 percent of respondents) and granular access controls (58 percent of respondents).

Payment-related data and financial records are most likely to be encrypted as a result of high-profile data breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted.

Page 8: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

KEYFINDINGS02

Page 9: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

9 PONEMON INSTITUTE © RESEARCH REPORT

We have organized the report according to the following themes:

■ Strategy and adoption of encryption■ Trends in adoption of encryption■ Threats, main drivers and priorities■ Deployment choices■ Encryption features considered most important ■ Attitudes about key management■ Importance of hardware security modules (HSMs)4

STRATEGY AND ADOPTION OF ENCRYPTION

Enterprise-wide encryption strategies increase. Since first conducting this study 14 years ago, there has been a steady increase in organizations with an encryption strategy applied consistently across the entire enterprise. In turn, there has been a steady decline in organizations not having an encryption plan or strategy. The results have essentially reversed over the years of the study. Figure 2 shows these changes over time.

IN THIS SECTION, WE PROVIDE A DEEPER ANALYSIS OF THE KEY FINDINGS. THE COMPLETE AUDITED FINDINGS ARE PRESENTED IN THE APPENDIX OF THE REPORT.

4 HSMs are devices specifically built to create a tamper-resistant environment in which to perform cryptographic processes (e .g ., encryption or digital signing) and to manage the keys associated with those processes . These devices are used to protect critical data processing activities and can be used to strongly enforce security policies and access controls . HSMs are typically validated to formal security standards such as FIPS 140-2 .

Figure 2. Trends in encryption strategy

Company has an encryption strategy applied consistently across the entire enterprise

Company does not have an encryption strategy

15%

45%38%

13%

0%

5%

10%

15%

20%

25%

30%

35%

40%

45%

50%

FY05 FY06 FY07 FY08 FY09 FY10 FY11 FY12 FY13 FY14 FY15 FY16 FY17 FY18

Page 10: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

10PONEMON INSTITUTE © RESEARCH REPORT

Figure 3. Di�erences in enterprise encryption strategies by country

67%65%

51% 50%46% 45%

39% 37% 36% 36%33%

29%26%

DE US AU UK FR JP IN HKT KO ME MX SA RF BZ

We have an overall encryption plan or strategy that is applied consistently across the entire enterprise

Average

40%

Certain countries have more mature encryption strategies. According to Figure 3, the prevalence of an enterprise encryption strategy varies among the countries represented in this research. The highest prevalence of an enterprise encryption strategy is reported in Germany followed by the United States, Australia and the United Kingdom. Respondents in the Russian Federation and Brazil report the lowest adoption of an enterprise encryption strategy. The global average of adoption is 45 percent. Figure 4 shows that the IT operations function is the most influential in framing the organization’s encryption strategy over the past 14 years.

However, in some countries lines of business are more influential. These are the United States and Brazil. IT security and IT operations have a similar level of influence in Australia, India, Mexico and the Russian Federation.

A possible reason why the lines of business are more influential than IT security is because of the growing adoption of Internet of Things (IoT) devices in the workplace, proliferation of employee-owned devices or BYOD and the general consumerization of IT. A consequence is that lines of business are required to be more accountable for the security of these technologies.

Figure 4. Influence of IT operations, lines of business and securityCountry samples are consolidated

IT operations SecurityLines of business or general management

US UK DE FR AU JP BZ RF IN MX ME KO HKT SA

25%

49%

30%

18%

22%

13%

0%

10%

20%

30%

40%

50%

60%

Page 11: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

11 PONEMON INSTITUTE © RESEARCH REPORT

TRENDS IN ADOPTION OF ENCRYPTION

The use of encryption increases in all industries. Figure 5 shows the current year and the seven-year average in the use of encryption solutions for 10 industry sectors. Results suggest a steady increase in all industry sectors. The most significant increases in extensive encryption usage occur in manufacturing, hospitality and consumer products.

THREATS, MAIN DRIVERS AND PRIORITIES

Employee mistakes continue to be the most significant threats to sensitive data.

Figure 6 shows that the most significant threats to the exposure of sensitive or confidential data are employee mistakes. In contrast, the least significant threats to the exposure of sensitive or confidential data include government eavesdropping and lawful data requests. Concerns over inadvertent exposure (employee mistakes and system malfunction) significantly outweigh concerns over actual attacks by temporary or contract workers and malicious insiders. It is interesting to note that the employee mistake threat exceeds the combined threat by both hackers and insiders.

Figure 5. The extensive use of encryption by industry: Current year versus 7-year averageCountry samples are consolidated. Average of 15 encryption categories

Consumer products

Retail

Hospitality

Public sector

Manufacturing

Transportation

Services

Health & pharma

Financial services

Tech & software

7-year consolidation FY2018

39%

40%

42%

42%

47%

47%

48%

49%

50%

52%

28%

32%

31%

32%

27%

40%

45%

43%

50%

43%

Figure 6. The most salient threats to sensitive or confidential dataCountry samples are consolidated. More than one choice permitted

Lawful data request (e.g., by police)

Other

Government eavesdropping

Third party service providers

Malicious insiders

Temporary or contract workers

Hackers

System or process malfunction

Employee mistakes

2%

11%

12%

19%

21%

22%

30%

30%

54%

Page 12: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

12PONEMON INSTITUTE © RESEARCH REPORT

The main driver for encryption is protection of information against identified threats.Eight drivers for deploying encryption are presented in Figure 7. Organizations use an average of 8 different products to perform encryption.

Organizations are using encryption to protect the enterprise’s intellectual property and the personal information of customers (both 54 percent of respondents).

This marks the second year that compliance with regulations has not been the top driver for encryption indicating that encryption is less of a “checkbox” exercise and is now used to safeguard targeted critical information.

A barrier to a successful encryption strategy is the ability to discover where sensitive data resides in the organization. Figure 8 provides a list of six aspects that present challenges to an organization’s effective execution of its data encryption strategy in descending order of importance. Sixty-nine percent of respondents say discovering where sensitive data resides in the organization is the number one challenge. In addition, 42 percent of all respondents cite initially deploying encryption technology as a significant challenge. Thirty-two percent cite classifying which data to encrypt as difficult.

To protect enterprise intellectual property

To protect customer personal information

To protect information against specific, identified threats

To comply with external privacy or datasecurity regulations and requirement

To reduce the scope of compliance audits

To limit liability from breaches or inadvertent disclosure

To comply with internal policies

To avoid public disclosure after a data breach occurs

Figure 7. The main drivers for using encryption technology solutionsCountry samples are consolidated. Three responses permitted

14%

21%

29%

31%

46%

51%

54%

54%

Other

Training users to use encryption appropriately

Determining which encryption technologies are most eective

Ongoing management of encryption and keys

Classifying which data to encrypt

Initially deploying the encryption technology

Discovering where sensitive data resides in the organization

Figure 8. Biggest challenges in planning and executing a data encryption strategyCountry samples are consolidated. More than one choice permitted

1%

13%

16%

28%

32%

42%

69%

Page 13: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

13 PONEMON INSTITUTE © RESEARCH REPORT

DEPLOYMENT CHOICES

No single encryption technology dominates in organizations.We asked respondents to indicate if specific encryption technologies are widely or only partially deployed within their organizations. “Extensive deployment” means that the encryption technology is deployed enterprise-wide. “Partial deployment” means the encryption technology is confined or limited to a specific purpose (i.e., point solution).

As shown in Figure 9, no single technology dominates because organizations have very diverse needs. Internet communications, databases and laptop hard drives are the most likely to be deployed and correspond to mature use cases.

For the second year, the study tracked the deployment of encryption of IoT devices and platforms. As shown, 52 percent of respondents say encryption of IoT devices and 50 percent of respondents say encryption on IoT platforms have been at least partially deployed.

Extensively deployed encryption applications Partially deployed encryption applications

Figure 9. Consolidated view on the use of 15 encryption technologies Country samples are consolidated

Internet communications (e.g., TLS/SSL)

Databases

Backup and archives

Internal networks (e.g., VPN/LPN)

Laptop hard drives

Cloud gateway

Email

Data center storage

File systems

Public cloud services

Private cloud infrastructure

Docker containers

Big data repositories

Internet of things (IoT) devices

Internet of things (IoT) platforms 25%28%30%

26%35%

40%38%40%40%

44%55%

47%50%

58%62% 26%

25%24%

24%32%

31%29%32%

34%34%

32%25%

34%32%

28%

0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%

No single technology dominates because organizations have very diverse needs. Internet communications, databases and laptop hard drives are the most likely to be deployed and correspond to mature use cases.

Page 14: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

14PONEMON INSTITUTE © RESEARCH REPORT

ENCRYPTION FEATURES CONSIDERED MOST IMPORTANT

Certain encryption features are considered more critical than others.Figure 10 lists 12 encryption technology features. Each percentage defines the very important response (on a four-point scale). Respondents were asked to rate encryption technology features considered most important to their organization’s security posture.

According to consolidated findings, enforcement of policy, system performance and latency and support for both cloud and on-premise deployment are the three most important features. The performance finding is not surprising given that encryption in networking is a prominent use case, as well as the often-emphasized requirement for transparency of encryption solutions.

Support for both cloud and on-premise deployment has risen in importance as organizations have increasingly embraced cloud computing and look for consistency across computing styles.

In fact, the top findings in this area all correspond to features considered important for cloud solutions. System performance and latency and system scalability remain at high levels but declined in importance in this year’s survey.

Enforcement of policy

System performance and latency

Support for cloud and on-premise deployment

Management of keys

Integration with other security tools(e.g., SIEM and ID management)

System scalability

Support for emerging algorithms (e.g., ECC)

Formal product security certifications (e.g., FIPS 140)

Separation of duties and role-based controls

Support for multiple applications or environments

Tamper resistance by dedicated hardware (e.g., HSM)

Support for regional segregation (e.g., data residency)

Figure 10. Most important features of encryption technology solutionsCountry samples are consolidated. Very important and Important responses combined

50%

51%

54%

56%

57%

59%

63%

66%

68%

70%

73%

44%43%

50%

52%

54%

56%

59%

68%

64%

68%

71%

78%

72%

FY17 FY18

Support for both cloud and on-premise deployment has risen in importance as organizations have increasingly embraced cloud computing and look for consistency across computing styles.

““

Page 15: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

15 PONEMON INSTITUTE © RESEARCH REPORT

Payment related data

Financial records

Employee/HR data

Intellectual property

Customer information

Non-financial business information

Healthcare information

Figure 11. Data types routinely encryptedCountry samples are consolidated. More than one choice permitted

FY17 FY18

24%

25%

44%

51%

51%

54%

55%

26%

26%

43%

52%

53%

50%

54%

Figure 12. Rating on the overall impact, risk and cost associated with managing keysCountry samples are consolidated

8%

13%

19%23%

36%

9%12%

22%24%

33%

8%12%

20%

25%

36%

1 or 2 3 or 4 5 or 6 7 or 8 9 or 10

FY16 FY17 FY18

Which data types are most often encrypted?Figure 11 provides a list of seven data types that are routinely encrypted by respondents’ organizations. As can be seen, payment-related data and financial records are most likely to be encrypted as a result of high-profile data breaches in financial services.

The least likely data type to be encrypted is health-related information and non-financial information, which is a surprising result given the sensitivity of health information and the recent high-profile healthcare data breaches. Financial records had the largest increase on this list over last year.

ATTITUDES ABOUT KEY MANAGEMENT

How painful is key management? Using a 10-point scale, respondents were asked to rate the overall “pain” associated with managing keys within their organization, where 1 = minimal impact to 10 = severe impact. Figure 12 clearly shows that 61 percent of respondents in this year’s survey chose ratings at or above 7; thus, suggesting a fairly high pain threshold.

Page 16: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

16PONEMON INSTITUTE © RESEARCH REPORT

Figure 13 shows the 7+ ratings on a 10-point scale for each country. As can be seen, the average percentage in all country samples is 61 percent, which suggests respondents view managing keys as a very challenging activity. The highest percentage pain threshold of 70 percent occurs in the UK. At 38 percent, the lowest pain level occurs in France

Why is key management painful? Figure 14 shows the reasons why the management of keys is so difficult. The top three reasons are: (1) no clear ownership of the key management function, (2) lack of skilled personnel and (3) isolated or fragmented key management systems.

Figure 13. Percentage “pain threshold” by countryPercentage 7 to 10 rating on a 10-point scale

UK MX RF DE IN ME JP US CH AU BZ SA KO FR

7 to 10 (high) rating Average

70% 69% 68% 66% 66%64% 62% 60%

59%

52%

45%

38%

55%58%

No clear ownership

Lack of skilled personnel

Systems are isolated and fragmented

Key management tools are inadequate

Insu�cient resources (time/money)

No clear understanding of requirements

Technology and standards are immature

Manual processes are prone to errors and unreliable

Figure 14. What makes the management of keys so painful?Country samples are consolidated. More than one choice permitted

9%

12%

25%

33%

45%

50%

62%

64%

Page 17: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

17 PONEMON INSTITUTE © RESEARCH REPORT

Which keys are most difficult to manage? For the second year in a row, keys for external cloud or hosted services rank as the most difficult keys to manage. As shown in Figure 15, they are followed by SSH keys, signing keys, and keys for TLS/SSL. The least difficult include: (1) encryption keys for archived data, (2) encryption keys for backups and storage, and (3) embedded device keys.

As shown in Figure 16, respondents’ companies continue to use a variety of key management systems. The most commonly deployed systems include: (1) formal key management policy (KMP) and (3) formal key management infrastructure (KMI) and manual process.

Keys for external cloud or hosted servicesincluding Bring Your Own Key (BYOK) keys

SSH keys

Signing keys (e.g., code signing, digital signatures)

Keys associated with TLS/SSL

End user encryption keys (e.g., email, full disk encryption)

Payments-related keys (e.g., ATM, POS, etc.)

Encryption keys for archived data

Encryption keys for backups and storage

Keys to embed into devices (e.g., at the time of manufacturein device production environments, or for IoT devices you use)

Figure 15. Types of keys most di�cult to manageCountry samples are consolidated. Very painful and painful responses combined

27%

30%

34%

35%

41%

42%

51%

57%

60%

Formal key management policy (KMP)

Formal key management infrastructure (KMI)

Manual process (e.g., spreadsheet, paper-based)

Central key management system/server

Removable media (e.g., thumb drive, CDROM)

Software-based key stores and wallets

Hardware security modules

Smart cards

Figure 16. What key management systems does your organization presently use?Country samples are consolidated. More than one choice permitted

24%

24%

30%

31%

34%

41%

44%

56%

Page 18: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

18PONEMON INSTITUTE © RESEARCH REPORT

IMPORTANCE OF HARDWARE SECURITY MODULES (HSMs)5

Germany, United States and India organizations are more likely to deploy HSMs. Figure 17 summarizes the percentage of respondents that deploy HSMs. Germany, United States and India are more likely to deploy HSMs than other countries. The overall average deployment rate for HSMs is 47 percent.

Deployment of HSMs increases steadily. Figure 18 shows a seven-year trend for HSMs. As can be seen, the rate of global HSM deployment has steadily increased.

5 HSMs are devices specifically built to create a tamper-resistant environment in which to perform cryptographic processes (e .g . encryption or digital signing) and to manage the keys associated with those processes . These devices are used to protect critical data processing activities and can be used to strongly enforce security policies and access controls . HSMs are typically validated to formal security standards such as FIPS 140-2 .

Figure 17. Deployment of HSMs

DE US IN JP KO UK ME AU FR HKT SA BZ RF MX

62%60%

54%51% 51% 50% 50%

43%41%

39%36%

35% 33% 32%

Does your organization use HSMs? Average

Figure 18. HSM deployment rate over seven years Country samples are consolidated

FY12 FY13 FY14 FY15 FY16 FY17 FY18

26%29%

33% 34%

38%41%

47%

Page 19: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

19 PONEMON INSTITUTE © RESEARCH REPORT

How HSMs in conjunction with public cloud-based applications are primarily deployed today and in the next 12 months. As shown in Figure 19, almost half (48 percent of respondents) own and operate HSMs on-premise for cloud-based applications, and 37 percent of respondents rent/use HSMs from a public cloud provider for the same purpose. In the next 12 months, both figures will increase, by 5 and 7 percent respectively. Interestingly, the use of HSMs with Cloud Access Security Brokers is expected to double in the next 12 months.

Figure 20 summarizes the percentage of respondents in 14 countries that rate HSMs as either very important or important to their organization’s encryption or key management program or activities. The overall average importance rating in the current year is 60 percent. The pattern of responses suggests Japan, Germany and Australia are most likely to assign importance to HSMs as part of their organization’s encryption or key management activities.

Own and operate HSMs on-premise at your organization, accessed real-time

by cloud-hosted applications

Rent/use HSMs from public cloud provider, hosted in the cloud

Own and operate HSMs for the purpose of generating and managing BYOK (Bring Your Own Key) keys to

send to the cloud for use by the cloud provider

Own and operate HSMs that integrate with a Cloud Access Security Broker to manage keys and

cryptographic operations (e.g., encrypting data on the way to the cloud, managing keys for cloud applications)

Not using HSMs with public cloud applications

Figure 19. Use of HSMs in conjunction with public cloud-based applications today and in the next 12 months

What models do you use today? What models do you plan to use in the next 12 months?

1%

24%

24%

44%

53%

1%

12%

17%

37%

48%

Figure 20. Perceived importance of HSMs as part of encryption or key managementVery important & important responses combined

JP DE AU US KO HKT UK FR IN BZ ME RF SA MX

70%

76% 75% 75%70%

63%

54% 54% 52% 52%

41% 40% 39%

How important are HSMs to yourencryption or key management strategy?

Average

56%

Page 20: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

20PONEMON INSTITUTE © RESEARCH REPORT

Figure 21 shows a seven-year trend in the importance of HSMs for encryption or key management, which has steadily increased over time.

What best describes an organization’s use of HSMs? As shown in Figure 22, 60 percent of respondents say their organization has a centralized team that provides cryptography as a service (including HSMs) to multiple applications/teams within their organization (i.e., private cloud model). Forty percent say each individual application owner/team is responsible for their own cryptographic services (including HSMs), indicative of the more traditional siloed application-specific data center deployment approach.

Figure 21. Perceived importance of HSMs as part of encryption or key management over seven yearsCountry samples are consolidated

FY12 FY13 FY14 FY15 FY16 FY17 FY18

33%

39%

48% 49%

55% 57%60%

We have a centralized team that provides cryptography as a service (including HSMs) to multiple applications/teams

within our organization (i.e., private cloud model)

Each individual application owner/team is responsible for their own cryptographic services (including HSMs) (i.e., traditional

siloed, application-specific data center deployment)

Figure 22. Which statement best describes how your organization uses HSMs?

40%

60%

60 percent of respondents say their organization has a centralized team that provides cryptography as a service (including HSMs) to multiple applications/teams within their organization

““

Page 21: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

21 PONEMON INSTITUTE © RESEARCH REPORT

What are the primary purposes or uses for HSMs? Figure 23 summarizes the primary purpose or use cases for deploying HSMs. As can be seen, the top choices are application-level encryption, TLS/SSL, and database encryption. This chart shows a significant increase in the use of database encryption projected for 12 months from now.

It is significant to note that HSM use for application-level encryption will soon be deployed in 50 percent of the organizations represented in this study.

Figure 23. How HSMs are deployed or planned to be deployed in the next 12 monthsCountry samples are consolidated. More than one choice permitted

HSMs used today HSMs to be deployed in the next 12 months

2%

13%

22%

23%

22%

24%

28%

24%

25%

26%

28%

30%

27%

33%

27%

33%

46%

47%

50%

3%

8%

19%

20%

20%

22%

24%

24%

24%

25%

26%

27%

28%

29%

30%

32%

36%

45%

48%Application level encryption

TLS/SSL

Database encryption

Public cloud encryption including forBring Your Own Key (BYOK)

Payment credential provisioning (e.g., mobile, IoT)

PKI or credential management

With Privileged Access Management (PAM) solutions to protect administrative access

Payment transaction processing including P2PEWith Cloud Access Security Brokers

(CASBs) for encryption key managementPayment service provider interface (e.g.,

TSP, real-time payments, Open API)

Big data encryption

Private cloud encryption

Payment credential issusing (e.g., mobile, EMV)

Internet of Things (IoT) root of trust

Code signing

Document signing (e.g. electronic invoicing)

Blockchain applications (e.g., cryptocurrency, financial transfer)

Not planning to use

Other

HSM use for application-level encryption will soon be deployed in 50 percent of the organizations represented in this study.

““

Page 22: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

22PONEMON INSTITUTE © RESEARCH REPORT

CLOUD ENCRYPTION

According to Figure 24, 60 percent of respondents say their organizations transfer sensitive or confidential data to the cloud whether or not it is encrypted or made unreadable via some other mechanism such as tokenization or data masking. Another 22 percent of respondents expect to do so in the next one to two years.

These findings indicate the benefits of cloud computing outweigh the risks associated with transferring sensitive or confidential data to the cloud.

According to Figure 25, with respect to the transfer of sensitive or confidential data to the cloud, the United States, Germany, Korea and India are more frequently transferring sensitive data to the cloud.

Figure 24. Do you currently transfer sensitive or confidential data to the cloud?Country samples are consolidated

Yes, we are presentlydoing so

No, but we are likely to do soin the next 12 to 24 months

No

60%

22%

17%

Figure 25. Organizations that transfer sensitive or confidential data to the cloud by country

US DE IN KO UK RF JP AB HKT BZ AU MX SA FR

71%68% 67% 67%

65% 64%

54%49%

46% 46%

Yes, we are presently doing so Average

56% 56%59% 58%

Page 23: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

23 PONEMON INSTITUTE © RESEARCH REPORT

How do organizations protect data at rest in the cloud? As shown in Figure 26, 44 percent of respondents say encryption is performed on-premise prior to sending data to the cloud using keys their organization generates and manages. However, 35 percent of respondents perform encryption in the cloud, with cloud provider generated/managed keys. Twenty-one percent of respondents are using some form of Bring Your Own Key (BYOK) approach.

What are the top three encryption features specifically for the cloud? The top three features are support for the KMIP standard for key management (73 percent of respondents), SIEM integration, visualization and analysis of logs (60 percent of respondents) and granular access controls (58 percent of respondents).

Figure 26. How does your organization protect data at rest in the cloud?Country samples are consolidated. More than one choice permitted

6%

12%

13%

21%

35%

44%Encryption performed on-premise prior to sending data to the cloud using keys my organization generates and manages

Encryption performed in the cloud using keys generated/managed by the cloud provider

Encryption performed in the cloud using keys my organization generates and manages on-premise

Tokenization performed by the cloud provider

Tokenization performed on-premise prior to sending data to the cloud

None of the above

Figure 27. How important are the following features associated with cloud encryption to your organization?Very important and Important responses combined

35%

41%

47%

47%

49%

56%

58%

60%

73%Support for the KMIP standard for key management

SIEM integration, visualization and analysis of logs

Granular access controls

Audit logs identifying key usage

Privileged user access control

Ability to encrypt and rekey data while in use without downtime

Bring Your Own Key (BYOK) management support

Audit logs identifying data access attempts

Support for FIPS 140-2 compliant key management

Page 24: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

24PONEMON INSTITUTE © RESEARCH REPORT

APPENDIX 1METHODS & LIMITATIONS

Page 25: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

25 PONEMON INSTITUTE © RESEARCH REPORT

Table 1 reports the sample response for 14 separate country samples. Data collection was completed in December 2018. Our consolidated sampling frame of practitioners in all countries consisted of 150,066 individuals who have bona fide credentials in IT or security fields. From this sampling frame, we captured 6,502 returns of which 646 were rejected for reliability issues. Our final consolidated 2018 sample was 5,856, thus resulting in an overall 3.9% response rate.

The first encryption trends study was conducted in the United States in 2005. Since then we have expanded the scope of the research to include 14 separate country samples. Trend analysis was performed on combined country samples. As noted previously, we added Southeast Asia and also Hong Kong & Taiwan to this year’s study.

Table 1. Survey response in 14 countries

Sampling frameSurvey response Final sample Response rate

AU

BZ

DE

FR

HKT

IN

JP

KO

ME

MX

RF

SA

UK

US

7,077

12,550

11,938

10,356

8,360

15,053

11,030

10,349

9,842

10,961

5,959

7,693

10,984

17,914

150,066

327

517

531

332

317

587

502

325

340

499

226

268

402

683

5,856

4.6%

4.1%

4.4%

3.2%

3.8%

3.9%

4.6%

3.1%

3.5%

4.6%

3.8%

3.5%

3.7%

3.8%

3.9%

Australia

Brazil

Germany

France

Hong Kong & Taiwan

India

Japan

Korea

Middle East

Mexico

Russian Federation

Southeast Asia

United Kingdom

United States

Consolidated

Legend

The purpose of this research is to examine how the use of encryption has evolved over the past 14 years and the impact of this technology on the security posture of organizations.

Page 26: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

26PONEMON INSTITUTE © RESEARCH REPORT

Table 2 summarizes our survey samples for 14 countries over the history of the study.

Figure 28 reports the respondent’s organizational level within participating organizations. By design, 56 percent of respondents are at or above the supervisory levels.

Respondents have on average 10 years of security experience with approximately 7 years of experience in their current position.

Table 2. Sample history over 13 years

Legend FY18 FY17 FY16 FY15 FY14 FY13 FY12 FY11 FY10 FY09 FY08 FY07

AU

BZ

DE

FR

HKT

IN

JP

KO

ME

MX

RF

SA

UK

US

Total

327

517

531

332

317

587

502

325

340

499

226

268

402

683

5,856

315

507

543

370

582

468

317

308

468

196

468

710

5,252

331

463

531

345

548

450

316

451

206

460

701

4,802

334

460

563

344

578

487

368

429

201

487

758

5,009

359

472

564

375

532

476

445

193

509

789

4,714

414

530

602

478

521

201

637

892

4,275

938

637

499

584

466

550

531

4,205

471

525

526

511

544

651

912

4,140

477

465

419

622

964

2,947

482

490

414

615

997

2,998

405

453

638

975

2,471

449

541

768

1,758

FY06

489

918

1,407

Figure 28. Distribution of respondents according to position levelCountry samples are consolidated

42%

33%

3%2% 3%

17% Senior Executive

Vice President

Director

Manager/Supervisor

Associate/Sta�/Technician

Other

Page 27: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

27 PONEMON INSTITUTE © RESEARCH REPORT

Figure 29 identifies the organizational location of respondents in our study. Over half of respondents (55 percent) are located within IT operations, followed by security at 19 percent of respondents and 12 percent of respondents are located within the lines of business.

Figure 30 reports the industry classification of respondents’ organizations. Fifteen percent of respondents are located in the financial services industry, which includes banking, investment management,

insurance, brokerage, payments and credit cards. Eleven percent of respondents are located in manufacturing and industrial organizations and 11 percent of respondents are in service organizations. Another nine percent are located in the public sector, including central and local government.

Figure 29. Distribution of respondents according to organizational locationCountry samples are consolidated

19%

4%

55%

12%

7%

4%

IT operations

Security

Lines of business (LOB)

Compliance

Finance

Other

Figure 30. Distribution of respondents according to primary industry classificationCountry samples are consolidated

15%

11%

11%

9%8%8%

7%

7%

4%

4%

3%3%

3%4%2%

Financial services

Manufacturing & industrial

Services

Public sector

Technology & software

Health & pharmaceutical

Retailing

Energy & utilities

Consumer products

Education & research

Hospitality

Transportation

Communications

Entertainment & media

Other

Page 28: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

28PONEMON INSTITUTE © RESEARCH REPORT

According to Figure 31 the majority of respondents (60 percent) are located in larger-sized organizations with a global headcount of more than 1,000 employees.

LIMITATIONS

There are inherent limitations to survey research that need to be carefully considered before drawing inferences from the presented findings. The following items are specific limitations that are germane to most survey-based research studies.

■ Non-response bias: The current findings are based on a sample of survey returns. We sent surveys to a representative sample of IT and IT security practitioners in 14 countries, resulting in a large number of usable returned responses. Despite non-response tests, it is always possible that individuals who did not participate are substantially different in terms of underlying beliefs from those who completed the survey.

■ Sampling-frame bias: The accuracy of survey results is dependent upon the degree to which our sampling frames are representative of individuals who are IT or IT security practitioners within the sample of 14 countries selected.

■ Self-reported results: The quality of survey research is based on the integrity of confidential responses received from respondents. While certain checks and balances were incorporated into our survey evaluation process including sanity checks, there is always the possibility that some respondents did not provide truthful responses.

Figure 31. Distribution of respondents according to organizational headcountCountry samples are consolidated

26%

19%

15%6%3%

32%

Less than 500

500 to 1,000

1,001 to 5,000

5,001 to 25,000

25,001 to 75,000

More than 75,000

Page 29: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

APPENDIX 2CONSOLIDATED FINDINGS

Page 30: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

30PONEMON INSTITUTE © RESEARCH REPORT

The following tables provide the consolidated results for 14 country samples.

PART 1. ENCRYPTION POSTURE

Survey response FY2018

150,066

6,502

646

5,856

3.9%

Sampling frame

Total returns

Rejected or screened surveys

Final sample

Response rate

Q1. Please select one statement that best describes your organization’s approach to encryption implementation across the enterprise.

45%

42%

13%

100%

We have an overall encryption plan or strategy that is applied consistently across the entire enterprise

We have a limited encryption plan or strategy that is applied tocertain applications and data types

We don’t have an encryption plan or strategy

Total

FY2018

Q2a-1 Backup and archives

50%

32%

18%

100%

Extensively deployed

Partially deployed

Not deployed

Total

FY2018 Q2b-1. Big data repositories

30%

24%

47%

100%

Extensively deployed

Partially deployed

Not deployed

Total

FY2018

Q2. Following are areas where encryption technologies can be deployed. Please check those areaswhere encryption is extensively deployed, partially deployed or not as yet deployed by your organization.

Q2c-1 Cloud gateway

44%

31%

25%

100%

Extensively deployed

Partially deployed

Not deployed

Total

FY2018 Q2d-1. Data center storage

40%

34%

26%

100%

Extensively deployed

Partially deployed

Not deployed

Total

FY2018

Page 31: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

31 PONEMON INSTITUTE © RESEARCH REPORT

Q2e-1. Databases

58%

28%

15%

100%

Extensively deployed

Partially deployed

Not deployed

Total

FY2018 Q2f-1. Docker containers

26%

32%

42%

100%

Extensively deployed

Partially deployed

Not deployed

Total

FY2018

Q2g-1. Email

40%

34%

27%

100%

Extensively deployed

Partially deployed

Not deployed

Total

FY2018 Q2h-1. Public cloud services

40%

29%

31%

100%

Extensively deployed

Partially deployed

Not deployed

Total

FY2018

Q2i-1. File systems

38%

32%

29%

100%

Extensively deployed

Partially deployed

Not deployed

Total

FY2018 Q2j-1. Internet communications(e.g., SSL)

62%

26%

12%

100%

Extensively deployed

Partially deployed

Not deployed

Total

FY2018

Q2k-1. Internal networks(e.g., VPN/LPN)

47%

34%

19%

100%

Extensively deployed

Partially deployed

Not deployed

Total

FY2018 Q2l-1. Laptop hard drives

55%

25%

21%

100%

Extensively deployed

Partially deployed

Not deployed

Total

FY2018

Q2m-1 Private cloud infrastructure

35%

31%

35%

100%

Extensively deployed

Partially deployed

Not deployed

Total

FY2018 Q2n-1 Internet of things(IoT) devices

28%

24%

48%

100%

Extensively deployed

Partially deployed

Not deployed

Total

FY2018

Q2o-1 Internet of things(IoT) platforms

25%

25%

49%

100%

Extensively deployed

Partially deployed

Not deployed

Total

FY2018

Page 32: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

32PONEMON INSTITUTE © RESEARCH REPORT

Q3. How many di�erent products does your organization use that perform encryption?

14%

23%

31%

20%

12%

100%

1 to 3

4 to 6

7 to 9

10 to 12

13 or more

Total

FY2018

Q4. Who is most influential in directing your organization’sencryption strategy? Please select one best choice.

33%

17%

2%

25%

22%

100%

IT operations

Security

Compliance

Lines of business (LOB) or general management

No single function has responsibility

Total

FY2018

Q5. What are the reasons why your organization encrypts sensitive and confidential data? Please select the top three reasons.

54%

54%

29%

14%

51%

21%

46%

31%

2%

300%

To protect enterprise intellectual property

To protect customer personal information

To limit liability from breaches or inadvertent disclosure

To avoid public disclosure after a data breach occurs

To protect information against specific, identified threats

To comply with internal policies

To comply with external privacy or data security regulations and requirement

To reduce the scope of compliance audits

Unsure

Total

FY2018

Q6. What are the biggest challenges in planning and executing a data encryption strategy? Please select the top two reasons.

69%

32%

16%

42%

28%

13%

1%

200%

Discovering where sensitive data resides in the organization

Classifying which data to encrypt

Determining which encryption technologies are most e�ective

Initially deploying the encryption technology

Ongoing management of encryption and keys

Training users to use encryption appropriately

Other

Total

FY2018

Page 33: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

33 PONEMON INSTITUTE © RESEARCH REPORT

Q7. How important are the following features associated with encryption solutions that may be used by your organization? Very important and important response combined.

73%

66%

51%

54%

59%

50%

63%

43%

70%

57%

68%

56%

Enforcement of policy

Management of keys

Support for multiple applications or environments

Separation of duties and role-based controls

System scalability

Tamper resistance by dedicated hardware (e.g., HSM)

Integration with other security tools (e.g., SIEM and ID management)

Support for regional segregation (e.g., data residency)

System performance and latency

Support for emerging algorithms (e.g., ECC)

Support for cloud and on-premise deployment

Formal product security certifications (e.g., FIPS 140)

FY2018

Q8. What types of data does your organization encrypt? Please select all that apply.

44%

25%

51%

54%

51%

55%

24%

Customer information

Non-financial business information

Intellectual property

Financial records

Employee/HR data

Payment related data

Healthcare information

FY2018

Q9. What are the main threats that might result in the exposure of sensitive or confidential data? Please select the top two choices.

30%

21%

30%

54%

22%

19%

11%

12%

2%

200%

Hackers

Malicious insiders

System or process malfunction

Employee mistakes

Temporary or contract workers

Third party service providers

Lawful data request (e.g., by police)

Government eavesdropping

Other

Total

FY2018

Page 34: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

34PONEMON INSTITUTE © RESEARCH REPORT

Q10. Please rate the overall “pain” associated with managing keys or certificates within your organization, where 1 = minimal impact to 10 = severe impact?

8%

12%

20%

25%

36%

100%

1 or 2

3 or 4

5 or 6

7 or 8

9 or 10

Total

FY2018

Q11. What makes the management of keys so painful?Please select the top three reasons.

64%

33%

62%

25%

45%

50%

12%

9%

1%

300%

No clear ownership

Insu�cient resources (time/money)

Lack of skilled personnel

No clear understanding of requirements

Key management tools are inadequate

Systems are isolated and fragmented

Technology and standards are immature

Manual processes are prone to errors and unreliable

Other

Total

FY2018

Q12. Following are a wide variety of keys that may be managed by your organization. Please rate the overall “pain” associated with managing each type of key. Very painful and painful response combined.

30%

34%

42%

57%

41%

51%

35%

25%

60%

Encryption keys for backups and storage

Encryption keys for archived data

Keys associated with SSL/TLS

SSH keys

End user encryption keys (e.g., email, full disk encryption)

Signing keys (e.g., code signing, digital signatures)

Payments-related keys (e.g., ATM, POS, etc.)

Keys to embed into devices (e.g., at the time of manufacture indevice production environments, or for IoT devices you use)

Keys for external cloud or hosted services including Bring Your Own Key (BYOK) keys

FY2018

PART 2. KEY MANAGEMENT

Page 35: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

35 PONEMON INSTITUTE © RESEARCH REPORT

Q13a. What key management systems does yourorganization presently use?

56%

44%

41%

34%

24%

31%

30%

24%

283%

Formal key management policy (KMP)

Formal key management infrastructure (KMI)

Manual process (e.g., spreadsheet, paper-based)

Central key management system/server

Hardware security modules

Removable media (e.g., thumb drive, CDROM)

Software-based key stores and wallets

Smart cards

Total

FY2018

Q13b. What key management systems does your organization presently not used or not aware of use?

27%

29%

34%

45%

51%

50%

45%

58%

339%

Formal key management policy (KMP)

Formal key management infrastructure (KMI)

Manual process (e.g., spreadsheet, paper-based)

Central key management system/server

Hardware security modules

Removable media (e.g., thumb drive, CDROM)

Software-based key stores and wallets

Smart cards

Total

FY2018

Q14. What best describes your level of knowledge about HSMs?

36%

28%

19%

17%

100%

Very knowledgeable

Knowledgeable

Somewhat knowledgeable

No knowledge (skip to Q18)

Total

FY2018

Q15a. Does your organization use HSMs?

47%

53%

100%

Yes

No (skip to Q18)

Total

FY2018

PART 3. HARDWARE SECURITY MODULES

Page 36: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

36PONEMON INSTITUTE © RESEARCH REPORT

Q15b. For what purpose does your organization presently deploy or plan to use HSMs? Please select all that apply.

Q15b-1. HSMs used today

48%

36%

24%

32%

24%

45%

29%

22%

20%

20%

27%

24%

30%

25%

26%

28%

19%

8%

3%

487%

Application level encryption

Database encryption

Big data encryption

Public cloud encryption including for Bring Your Own Key (BYOK)

Private cloud encryption

SSL/TLS

PKI or credential management

Internet of Things (IoT) root of trust

Document signing (e.g. electronic invoicing)

Code signing

Payment transaction processing including P2PE

Payment credential issuing (e.g., mobile, EMV)

Payment credential provisioning (e.g., mobile, IoT)

Payment service provider interface (e.g., TSP, real-time payments,Open API)

With Cloud Access Security Brokers (CASBs) for encryptionkey management

With Privileged Access Management (PAM) solutions toprotect administrative access

Blockchain applications (e.g., cryptocurrency, financial transfer)

Not planning to use

Other

Total

FY2018

Page 37: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

37 PONEMON INSTITUTE © RESEARCH REPORT

Q15b-2. HSMs planned to be deployed in the next 12 months

50%

46%

25%

33%

24%

47%

33%

24%

23%

22%

30%

28%

27%

26%

28%

27%

22%

13%

2%

529%

Application level encryption

Database encryption

Big data encryption

Public cloud encryption including for Bring Your Own Key (BYOK)

Private cloud encryption

SSL/TLS

PKI or credential management

Internet of Things (IoT) root of trust

Document signing (e.g. electronic invoicing)

Code signing

Payment transaction processing including P2PE

Payment credential issuing (e.g., mobile, EMV)

Payment credential provisioning (e.g., mobile, IoT)

Payment service provider interface (e.g., TSP, real-time payments, Open API)

With Cloud Access Security Brokers (CASBs) for encryption key management

With Privileged Access Management (PAM) solutions to protectadministrative access

Blockchain applications (e.g., cryptocurrency, financial transfer)

Not planning to use

Other

Total

FY2018

Q15c-1. If you use HSMs in conjunction with public cloud based applications, what models do you use today? Please select all that apply.

36%

47%

17%

12%

1%

113%

Rent/use HSMs from public cloud provider, hosted in the cloud

Own and operate HSMs on-premise at your organization,accessed real-time by cloud-hosted applications

Own and operate HSMs for the purpose of generating and managing BYOK (Bring Your Own Key) keys to send to the cloud for use by the cloud provider

Own and operate HSMs that integrate with a Cloud Access Security Broker to manage keys and cryptographic operations (e.g., encrypting data on the way to the cloud, managing keys for cloud applications)

Not using HSMs with public cloud applications

Total

FY2018

Page 38: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

38PONEMON INSTITUTE © RESEARCH REPORT

Q15c-2. If you use HSMs in conjunction with public cloud based applications, what models do you plan to use in the next 12 months.Please select all that apply.

44%

53%

24%

24%

1%

145%

Rent/use HSMs from public cloud provider, hosted in the cloud

Own and operate HSMs on-premise at your organization, accessed real-time by cloud-hosted applications

Own and operate HSMs for the purpose of generating and managing BYOK (Bring Your Own Key) keys to send to the cloud for use by the cloud provider

Own and operate HSMs that integrate with a Cloud Access Security Broker to manage keys and cryptographic operations (e.g., encrypting data on the way to the cloud, managing keys for cloud applications)

Not using HSMs with public cloud applications

Total

FY2018

Q16. In your opinion, how important are HSMs to your encryption or key management strategy? Very important and important response combined

60%

69%

Q16a. Importance today

Q16b. Importance in the next 12 months

FY2018

Q17. Which statement best describes how your organization uses HSMs?

60%

40%

100%

We have a centralized team that provides cryptography as a service (including HSMs) to multiple applications/teams within our organization (i.e. private cloud model).

Each individual application owner/team is responsible for their own cryptographic services (including HSMs) (i.e. traditional siloed, application-specific data center deployment).

Total

FY2018

Q37. Does your organization currently use cloud computing services for any class of data or application – both sensitive and non-sensitive?

67%

16%

16%

100%

Yes, we are presently doing so

No, but we are likely to do so in the next 12 to 24 months

No (Go to Part 7 if you do not use cloud services for any class of data or application)

Total

FY2018

PART 6: CLOUD ENCRYPTION: WHEN RESPONDING TO THE FOLLOWING QUESTIONS, PLEASE ASSUME THEY REFER ONLY TO PUBLIC CLOUD SERVICES

Page 39: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

39 PONEMON INSTITUTE © RESEARCH REPORT

Q39. In your opinion, who is most responsible for protecting sensitive or confidential data transferred to the cloud?

44%

23%

33%

100%

The cloud provider

The cloud user

Shared responsibility

Total

FY2018

Q40. How does your organization protect data at rest in the cloud?

35%

21%

44%

13%

12%

6%

130%

Encryption performed in the cloud using keys generated/managed by the cloud provider

Encryption performed in the cloud using keys my organization generates and manages on-premise

Encryption performed on-premise prior to sending data to the cloud using keys my organization generates and manages

Tokenization performed by the cloud provider

Tokenization performed on-premise prior to sending data to the cloud

None of the above

Total

FY2018

Q41. For encryption of data at rest in the cloud, my organization’s strategy is to…

41%

18%

19%

22%

100%

Only use keys controlled by my organization

Only use keys controlled by the cloud provider

Use a combination of keys controlled by my organization and by the cloud provider, with a preference for keys controlled by my organization

Use a combination of keys controlled by my organization and by the cloud provider, with a preference for keys controlled by the cloud provider

Total

FY2018

Q38. Do you currently transfer sensitive or confidential data to the cloud (whether or not it is encrypted or made unreadable via some other mechanism)?

60%

22%

17%

100%

Yes, we are presently doing so

No, but we are likely to do so in the next 12 to 24 months

No (Go to Part 7 if you do not use or plan to use any cloud servicesfor sensitive or confidential data)

Total

FY2018

Page 40: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

40PONEMON INSTITUTE © RESEARCH REPORT

Q43-1. How many public cloud providers does your organization in use today?

36%

26%

16%

21%

100%

1

2

3

4 or more

Total

FY2018

Q43-2. How many public cloud providers does your organization plan to use in the next 12 to 24 months?

26%

21%

18%

34%

100%

1

2

3

4 or more

Total

FY2018

D1. What organizational level best describes your current position?

3%

3%

17%

33%

42%

2%

100%

Senior Executive

Vice President

Director

Manager/Supervisor

Associate/Sta�/Technician

Other

Total

FY2018

Q42. How important are the following features associated with cloud encryption to your organization?Very important and Important response provided.

47%

49%

58%

56%

41%

60%

35%

73%

47%

Bring Your Own Key (BYOK) management support

Privileged user access control

Granular access controls

Audit logs identifying key usage

Audit logs identifying data access attempts

SIEM integration, visualization and analysis of logs

Support for FIPS 140-2 compliant key management

Support for the KMIP standard for key management

Ability to encrypt and rekey data while in use without downtime

FY2018

PART 7: ROLE AND ORGANIZATIONAL CHARACTERISTICS

Page 41: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

41 PONEMON INSTITUTE © RESEARCH REPORT

D4. What industry best describes your organization’s industry focus?

1%

3%

4%

0%

3%

7%

2%

15%

8%

3%

11%

1%

9%

7%

11%

8%

4%

2%

100%

Agriculture & food services

Communications

Consumer products

Defense & aerospace

Education & research

Energy & utilities

Entertainment & media

Financial services

Health & pharmaceutical

Hospitality

Manufacturing & industrial

Pharmaceuticals

Public sector

Retailing

Services

Technology & software

Transportation

Other

Total

FY2018

D5. What is the worldwide headcount of your organization?

15%

26%

32%

19%

6%

3%

100%

Less than 500

500 to 1,000

1,001 to 5,000

5,001 to 25,000

25,001 to 75,000

More than 75,000

Total

FY2018

D2. Select the functional area that best describes your organizational location.

55%

19%

7%

4%

12%

4%

100%

IT operations

Security

Compliance

Finance

Lines of business (LOB)

Other

Total

FY2018

Page 42: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

ABOUT PONEMON INSTITUTE

The Ponemon Institute© is dedicated to advancing responsible information and privacy management practices in business and government. To achieve this objective, the Institute conducts independent research, educates leaders from the private and public sectors and verifies the privacy and data protection practices of organizations in a variety of industries.

ABOUT NCIPHER SECURITY

Today’s fast moving digital environment enhances customer satisfaction, gives competitive advantage and improves operational efficiency. It also multiplies the security risks. nCipher Security, a leader in the general purpose hardware security module (HSM) market, empowers world-leading organizations by delivering trust, integrity and control to their business critical information and applications.

Our cryptographic solutions secure emerging technologies – cloud, IoT, blockchain, digital payments – and help meet new compliance mandates, using the same proven technology that global organizations depend on today to protect against threats to their sensitive data, network communications and enterprise infrastructure. We deliver trust for your business critical applications, ensuring the integrity of your data and putting you in complete control – today, tomorrow, at all times. www.ncipher.com

Page 43: GLOBAL ENCRYPTION TRENDS STUDY · breaches in financial services. Employee/HR data and intellectual property remain high on the list of data being encrypted. The least likely data

43 PONEMON INSTITUTE © RESEARCH REPORT

Today’s fast moving digital environment enhances customer satisfaction, gives competitive advantage and improves operational efficiency. It also multiplies the security risks.