DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

The software you build is only as secure as the code that powers it. Learn how malicious code creeps into your software supply chain.

Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS vendors.

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workloads.

Related

  • Achieving Security and Trust in a Data Fabric: The Role of Zero Trust Architecture
  • Implementing OneLake With Medallion Architecture in Microsoft Fabric
  • From Ransomware to Ransom Nations: Everything You Need to Know About State-Sponsored Cyberattacks
  • Comparing Cloud Hosting vs. Self Hosting

Trending

  • The Human Side of Logs: What Unstructured Data Is Trying to Tell You
  • Secure by Design: Modernizing Authentication With Centralized Access and Adaptive Signals
  • Kullback–Leibler Divergence: Theory, Applications, and Implications
  • 5 Subtle Indicators Your Development Environment Is Under Siege
  1. DZone
  2. Software Design and Architecture
  3. Security
  4. How Data Encryption Can Simplify Infrastructure Architecture

How Data Encryption Can Simplify Infrastructure Architecture

Learn how to leverage data encryption capabilities to improve security standards, simplify infrastructure architecture, and enhance developer velocity.

By 
Lulu Cheng user avatar
Lulu Cheng
·
Aug. 20, 24 · Analysis
Likes (2)
Comment
Save
Tweet
Share
4.1K Views

Join the DZone community and get the full member experience.

Join For Free

Product and infrastructure engineering teams are not always aligned with the interests of security engineering teams. While product and infrastructure focus on driving business value and delivering practical solutions, security focuses on detection, prevention, and remediation, which can seem less immediately valuable. Like an insurance policy, it's not entirely obvious why it's worth the money or effort when there hasn't been an incident yet. 

Instead of the traditional cycle of identifying vulnerabilities, applying remediation, and following up through case management, I've found it much more effective to advocate for security solutions that also deliver business value. For example, using OAuth and IAM-based access instead of static keys and encryption instead of more granular access control can significantly simplify infrastructure, reduce complexity, and lessen the operational burden, making them very appealing to both product and platform engineering teams.

An Example: Replace Static Keys With IAM-Based OAuth

Traditionally, access between systems is implemented via static key-secret pairs. While common, this method often leads to reliability issues due to the complexity of managing key generation, rotation, and application lifecycle. Platform teams must also invest significant effort in monitoring and detecting anomalies to prevent unexpected key-secret compromises, such as accidental exposure via Slack or GitHub. Even when developers report and remediate leaks, the rotation process can be laborious. Worse, developers may consider it a low-risk leak, and the leak can go unreported.

According to ISO/IEC 27001:2022, A.9.1:

Organizations must implement policies and procedures to control access to information, ensuring it is only accessible to those with a legitimate need.

Platform teams have two choices: 

  1. Add more complex access controls and approval processes.
  2. Replace static key-secret pairs with IAM-based OAuth.

The first option can be tempting, as it involves simply adding a vendor like ServiceNow without much additional work. However, the second option, while requiring more implementation changes, is more secure and reduces the operational burden on application teams to update secrets, restart pods, and ensure secrets are picked up. In fact, several companies focusing on non-human identity authentication, such as P0 and Clutch, have recently emerged, highlighting the growing trend towards more secure and efficient authentication methods.

This example demonstrates how a different approach to security implementation can improve security standards, simplify infrastructure architecture, and enhance overall developer velocity.

The Case for Data Encryption

Data encryption is another example where, although security teams cannot simply "add a vendor," it significantly reduces complexity and implementation efforts across all platforms from both security and architecture design standpoints.

The typical data flow involves:

  • Source application publishes data
  • Data is sent to a transport layer (e.g., Kafka, Kinesis)
  • Data is stored in a database (MySQL, Postgres), data warehouse (Redshift, Snowflake), or data lake (S3, Databricks)

Data encryption data flow

Different solutions have different interpretations and implementations of "access control," leading platform teams to implement their own versions. This often results in fragmented implementations across the company. For security engineers, the more fragmented the implementations are, the more difficult it is to implement standardized governance, control, and monitoring, ultimately making the system less secure.

Infrastructure/Vendor Auth and Permission Comparison 

Platform IAM-Based AUth Row/Column Permissions
Databricks Supports IAM-based permissions Supports row and column-level security
Snowflake Does not natively support IAM-based permissions

Supports row and column-level security

MySQL Does not support IAM-based permissions Supports row and column-level security through grants and policies
PostgreSQL Does not support IAM-based permissions Supports row and column-level security

Conclusion

With data encryption, access is configured once with a crypto key and can then be assigned to individual workloads at different stages of the data flow. This significantly reduces the complexities involved in implementing and aligning permission policies across different platforms. Encryption ensures that data is consistently protected across all platforms, simplifying governance and control while enhancing overall security.

Architecture Infrastructure Data (computing) security

Published at DZone with permission of Lulu Cheng. See the original article here.

Opinions expressed by DZone contributors are their own.

Related

  • Achieving Security and Trust in a Data Fabric: The Role of Zero Trust Architecture
  • Implementing OneLake With Medallion Architecture in Microsoft Fabric
  • From Ransomware to Ransom Nations: Everything You Need to Know About State-Sponsored Cyberattacks
  • Comparing Cloud Hosting vs. Self Hosting

Partner Resources

×

Comments
Oops! Something Went Wrong

The likes didn't load as expected. Please refresh the page and try again.

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends:

Likes
There are no likes...yet! 👀
Be the first to like this post!
It looks like you're not logged in.
Sign in to see who liked this post!