x

Encrypting sensitive information in real-time with Cribl

January 15, 2019

If your machine data does not contain sensitive information, you don’t really need to read this – you got it all figured out. Just stop here and go back to surfing the interwebs or…maybe you want to check again?! 🙂

If you’re still reading, you know that while your machine data is vital for your operations/security analytics, depending on the source, you may have sensitive information coming in. This could be names, locations, addresses, IDs etc., and if you don’t guard it properly, your organization may be exposed to major risk. Most customers that we talk to do one or both of the following to minimize that risk:

  • Omit the use of potentially sensitive sources: They intentionally do not send data that is known to contain sensitive information to their analytics systems (e.g. Splunk, Elasticsearch etc.). I.e. they’re willing tradeoff better and more complete analysis for security. This is suboptimal as they’re not getting all the insights possible from that data.
  • Duplicate and Redact:  They send a redacted copy and a clear-text copy to their analytics system and control access to each via strict ACL/RBAC mechanisms. In some cases copies would go to entirely different systems. I.e. they’re willing to tradeoff space/complexity for security.

In the latest version of Cribl LogStream 1.3 we added support for another fundamental option in dealing with sensitive data: real-time information encryption. If your machine data analytics system is Splunk, you can now do field-level encryption in real-time and decrypt on retrieval using Roles and Capabilities.

Let’s take a look and see how you can do it.

cribl-encryption-marchitecture

Encrypting in Cribl and Decrypting in Splunk

In Cribl, fields or patterns within events can be encrypted with C.Crypto.encrypt()using a Mask function. Patterns are defined via regular expressions and one or more of them can be encrypted simultaneously. Encryption Keys can be configured through the UI or CLI. They can be organized into Key Classes which can be used to implement multiple levels of access control. Users or groups/roles with access to data with encrypted fields/patterns can be associated with Key Classes for even more granular, field-level compartmentalized access.

Assuming you have data flowing through Cribl to Splunk, let’s walk through it:

1. Define one or more Keys and Key Classes on Cribl.

On the Cribl instance that is doing the information encryption, go to Settings > Encryption Keys and generate a handful of keys. Add as many keys across as many Key Classes as necessary. Chose an appropriate expiration time.

encryption-keys

2. Sync auth folder with decryption side (Splunk)

On your Search Head (SH) install Cribl using the Splunk app package and convert it to searchhead mode:

$SPLUNK_HOME/bin/splunk cmd node --harmony
$CRIBL_HOME/bin/cribl.bundle.js mode-searchhead

In order for the SH to decrypt encrypted patterns you must make the encrypting keys available. Using a secure mechanism (e.g., Deployment Server, Config Management) sync $CRIBL_HOME/local/cribl/auth/(cribl.secret|keys.json) from the encrypting Cribl instance to the Search Head.

Encrypting Cribl Instance: $CRIBL_HOME/local/cribl/auth
-to-
Search Head: $SPLUNK_HOME/etc/apps/cribl/local/cribl/auth

Next, assign permissions to the decrypt command per your requirements. This could be one or several Roles.

Finally, assign finer grained capabilities to your Roles per your requirements. Capability names should follow the format cribl_keyclass_N where N is the Cribl Key Class number. For example, a role with capability cribl_keyclass_1 has access to all key ids associated with key class 1. You can use more capabilities as long as they follow this naming convention. The Cribl app ships with 5 Key Class Capabilities out of the box.

encryption-capabilties.png

3. Apply the Mask function with C.Crypto.encrypt() to fields of interest

Assume we have sample events (unencrypted) as below. Notice values of fieldA and fieldB.

unencrypted-data.png

In Cribl, create a simple Pipeline with a Mask function that targets the fields in question. In this case, we’ll encrypt:

fieldA values using Key Class 1
fieldB values using Key Class 2

encrypting-data.png

Notice in the Replace Expression, the C.Crypto.encrypt()first parameter is the payload to be encrypted and the second is Key Class.

On  the Search Head, notice how the values of fieldA and fieldB look after encryption has been applied.

encrypted-data.png

4. Decrypt on Search Head using RBAC on decrypt command.


Logged in user has been assigned capability cribl_keyclass_2 but not cribl_keyclass_1. Hence fieldB can be decrypted but NOT fieldA.

decrypted-data.png

That’s it!

With Cribl real-time field-level information encryption you can:

  • Safely bring in all your data and encrypt sensitive parts as necessary.
  • Decrypt based on Role and Capabilities assignment
  • No longer need to duplicate data

If this is of interest to you, please check us out at Cribl.io and get started with your deployment. If you’d like more details on installation or configuration, see our documentation or join us in Slack #cribl, tweet at us @cribl_io, or contact us via hello@cribl.io. We’d love to help you!

Enjoy it!  — The Cribl Team

Get Cribl LogStream Now!

.
Blog
Feature Image

Mastering Tail Sampling for OpenTelemetry: Cost-Effective Strategies with Cribl

Read More
.
Blog
Feature Image

The Stream Life Podcast 110: Microsoft Azure + Cribl – Better together

Read More
.
Blog
Feature Image

Rethinking Security: Why Organizations are Flocking to Microsoft Sentinel

Read More
pattern

Try Your Own Cribl Sandbox

Experience a full version of Cribl Stream and Cribl Edge in the cloud with pre-made sources and destinations.

box

So you're rockin' Internet Explorer!

Classic choice. Sadly, our website is designed for all modern supported browsers like Edge, Chrome, Firefox, and Safari

Got one of those handy?