Crypto Framework
The Crypto Framework is a proprietary framework developed by SmartCrypto,
providing enterprises with a strategy for implementing a zero-trust architecture
Layer 1 - Root of Trust
Arguably the most important layer that is responsible for anchoring your digital identity as an enterprise.
While this layer is typically keys in hardware it can also be found in Cloud.
This layer is responsible for ensuring Digital Soverignity both for data and identity.
The typical solutions found here are HSMs and HSEs.
Layer 2 - Public Key Infrastructure
Enterprise PKI should be regarded as a critical asset – worthy of focused attention and appropriate resource allocation.
It should serve as a business enabler, with automation marking the final step in your digital transformation journey.
Unfortunately, this critical layer is often misunderstood, misconfigured, and significantly underutilized.
Layer 3 - Key Management System
Beyond centralizing enterprise keys, this layer plays a vital role in crypto agility by managing the full lifecycle of all active cryptographic keys.
This layer is responsible for managing Tokenization, which requires a Vault and Secrets management solution.
When implemented correctly, the Crypto Framework delivers measurable value and strengthens security. However, poor implementation can lead to inefficiencies and increased security-related costs.
Layer 4 - Access Control
The Crypto Framework provides two main supporting solutions in the drive to a simplified identity and access management, by trusting no one.
While most enterprises have one or more IAM as well as CIAM solutions, we promote Multi Factor Authentication (MFA) through Certificate Based Authentication (CBA) making better use of your PKI as well as introducing FIDO2 for customers.
Second, we support a simplified view of an identity and access management platform by trusting no one and treating all identites the same, using a data user and non-data user approach.
Layer 5 - Data Protection
Data protection is at the heart of compliance and ensuring privacy. Options abound for field, database, file, folder and disk protection.
The key differentiator of product capabilities lies in its ecosystem and integration. This makes forward-thinking design and future scalability essential factors in decision-making.
Layer 6 - Signing
The signing layer, which ensures non-repudiation, is one of the most underutilized components in the enterprise stack – largely due to a widespread misunderstanding of the role of enterprise PKI and its trust-enabling function at Layer 2.
With a secure PKI providing business enablement including signing certificates, the sky is the limit including non-repudiation of transactions, documents and code.
Layer 7 - Data Governance
While data governance makes use of other areas within the Crypto Framework, ensuring the right Identity can not only access the right information (access control) as well as prevent others, including administrators, from seeing the information (Privacy), ensuring data integrity (non-repudiation), layer 7 focuses on the governance of data use.
This includes data access management (DAM) of structured data as well as file activity monitoring (FAM) and Data risk intelligence (DRI).
Layer 8 - Crypto Bill of Material
The Crypto Framework being cryptographic is all about generating, managing and storing keys and certificates, while the broader topic being a bill of materials, takes into account, applications, libraries and protocols that use keys and certificates.
Layer 9 - Crypto Center of Excellence
The Crypto Center of Excellence serves as the authoritative body for the proper implementation and management of cryptographic keys and certificates, guiding the enterprise on all aspects of cryptography.
Its role is increasingly vital as organizations rely more heavily on cryptographic solutions to ensure long-term sustainability in a world marked by growing distrust and rising threats such as ransomware, cyberattacks, and emerging Quantum risks.
Our Services
SmartCrypto supports the Crypto Framework with the following services.
Auditing
We can provide auditing against the Crypto Framework which includes regulations, industry regulations and best practices.
Training
Crypto Framework training is available to all levels of the organization – from C-Suite executives to engineering teams. Customized, company specific sessions can be delivered either on-site or off-site, depending on your needs.
Implementation
The Crypto Framework includes comprehensive resources such as operational procedures, runbooks, and detailed architectural diagrams.
Enablement
A key advantage of the Crypto Framework is its focus on maximizing return on investment from your technology, while simultaneously enhancing enterprise security.
Frequently Asked Questions
A few questions and answers to better understand the framework.
Is it a product
The Crypto Framework consists of a number of solutions working together focusing on implementation and configuration. The products themselves can consist of software or hardware, on-prem or in the cloud, all dependent on customer requirements.
How long does it take to implement a Crypto Framework
Technically, this takes around 6 months to implement a full Crypto Framework stack. Rollout, however, is stretched out by the customer environment, change management, management buy-in and other economic factors.
What is the best approach to take
Start now!!! The Crypto Framework allows for a step-in and step-up program at any one of the layers. Most enterprises start at layer 2 or 3, taking anything from 3 to 9 months.
Where do I start
Ideally, start bottom up as the higher layers make use of the lower layers, but as long as you drive improvement and trust, you can start anywhere. Some start with an audit, others focus on a layer, while others have a compliance need.
How much does it cost
Not as much as you think 😉 but while most are concerned with the initial cost, the focus should be on value which is easily returned in security spend consolidation and increased security posture for future threats such as Quantum.
Can I get it somewhere else
Unfortunately, not. This is a proprietary Crypto Framework developed by SmartCrypto over many years of industry experience in solving customer problems with Cryptographic solutions. Due to the world becoming less trusting, customers are turning to cryptography, with its ultimate security architecture that verifies everything.
Let's Work Together!
Unlock your Cryptographic potential.
SmartCrypto Pty LTD
578 Grand Cypress Avenue, Pearl Valley Estate, Paarl, 7646, Western Cape, South Africa