Crypto Framework

The Crypto Framework is a proprietary framework developed by SmartCrypto,

providing enterprises with a strategy for implementing a zero-trust architecture

Foundational

The Crypto Framework is a foundational framework focused on the correct implementation

and management of keys and certificates.

Consolidation

Focused on implementation from the ground up, the framework helps to identify savings in security spending through consolidation.

Futuristic

Correct foundational management of keys and certificates will ensure that future risks are already

built-in such as hacking, ransomware and Quantum.

ROI

Who wouldn’t want to get more out of their technology while improving security?

The Crypto Framework does both, and we’ll show you how.

Layer 1 - Root of Trust

Arguably the most important layer that is responsible for anchoring your digital identity as an enterprise.

While this layer is typically keys in hardware it can also be found in Cloud.

This layer is responsible for ensuring Digital Soverignity both for data and identity.

The typical solutions found here are HSMs and HSEs.

Layer 2 - Public Key Infrastructure

Enterprise PKI should be regarded as a critical asset – worthy of focused attention and appropriate resource allocation.

It should serve as a business enabler, with automation marking the final step in your digital transformation journey.

Unfortunately, this critical layer is often misunderstood, misconfigured, and significantly underutilized.

Layer 3 - Key Management System

Beyond centralizing enterprise keys, this layer plays a vital role in crypto agility by managing the full lifecycle of all active cryptographic keys.

This layer is responsible for managing Tokenization, which requires a Vault and Secrets management solution.

When implemented correctly, the Crypto Framework delivers measurable value and strengthens security. However, poor implementation can lead to inefficiencies and increased security-related costs.

Layer 4 - Access Control

The Crypto Framework provides two main supporting solutions in the drive to a simplified identity and access management, by trusting no one.

While most enterprises have one or more IAM as well as CIAM solutions, we promote Multi Factor Authentication (MFA) through Certificate Based Authentication (CBA) making better use of your PKI as well as introducing FIDO2 for customers.

Second, we support a simplified view of an identity and access management platform by trusting no one and treating all identites the same, using a data user and non-data user approach.

Layer 5 - Data Protection

Data protection is at the heart of compliance and ensuring privacy. Options abound for field, database, file, folder and disk protection.

The key differentiator of product capabilities lies in its ecosystem and integration. This makes forward-thinking design and future scalability essential factors in decision-making.

Layer 6 - Signing

The signing layer, which ensures non-repudiation, is one of the most underutilized components in the enterprise stack – largely due to a widespread misunderstanding of the role of enterprise PKI and its trust-enabling function at Layer 2.

With a secure PKI providing business enablement including signing certificates, the sky is the limit including non-repudiation of transactions, documents and code.

Layer 7 - Data Governance

While data governance makes use of other areas within the Crypto Framework, ensuring the right Identity can not only access the right information (access control) as well as prevent others, including administrators, from seeing the information (Privacy), ensuring data integrity (non-repudiation), layer 7 focuses on the governance of data use.

This includes data access management (DAM) of structured data as well as file activity monitoring (FAM) and Data risk intelligence (DRI).

Layer 8 - Crypto Bill of Material

The Crypto Framework being cryptographic is all about generating, managing and storing keys and certificates, while the broader topic being a bill of materials, takes into account, applications, libraries and protocols that use keys and certificates.

Layer 9 - Crypto Center of Excellence

The Crypto Center of Excellence serves as the authoritative body for the proper implementation and management of cryptographic keys and certificates, guiding the enterprise on all aspects of cryptography.

Its role is increasingly vital as organizations rely more heavily on cryptographic solutions to ensure long-term sustainability in a world marked by growing distrust and rising threats such as ransomware, cyberattacks, and emerging Quantum risks.

Our Services

SmartCrypto supports the Crypto Framework with the following services.

Auditing

We can provide auditing against the Crypto Framework which includes regulations, industry regulations and best practices.

Training

Crypto Framework training is available to all levels of the organization – from C-Suite executives to engineering teams. Customized, company specific sessions can be delivered either on-site or off-site, depending on your needs.

Implementation

The Crypto Framework includes comprehensive resources such as operational procedures, runbooks, and detailed architectural diagrams.

Enablement

A key advantage of the Crypto Framework is its focus on maximizing return on investment from your technology, while simultaneously enhancing enterprise security.

Frequently Asked Questions

A few questions and answers to better understand the framework.

Is it a product

The Crypto Framework consists of a number of solutions working together focusing on implementation and configuration. The products themselves can consist of software or hardware, on-prem or in the cloud, all dependent on customer requirements.

How long does it take to implement a Crypto Framework

Technically, this takes around 6 months to implement a full Crypto Framework stack. Rollout, however, is stretched out by the customer environment, change management, management buy-in and other economic factors.

What is the best approach to take

Start now!!! The Crypto Framework allows for a step-in and step-up program at any one of the layers. Most enterprises start at layer 2 or 3, taking anything from 3 to 9 months.

Where do I start

Ideally, start bottom up as the higher layers make use of the lower layers, but as long as you drive improvement and trust, you can start anywhere. Some start with an audit, others focus on a layer, while others have a compliance need.

How much does it cost

Not as much as you think 😉 but while most are concerned with the initial cost, the focus should be on value which is easily returned in security spend consolidation and increased security posture for future threats such as Quantum.

Can I get it somewhere else

Unfortunately, not. This is a proprietary Crypto Framework developed by SmartCrypto over many years of industry experience in solving customer problems with Cryptographic solutions. Due to the world becoming less trusting, customers are turning to cryptography, with its ultimate security architecture that verifies everything.

Let's Work Together!

Unlock your Cryptographic potential.

SmartCrypto Pty LTD

578 Grand Cypress Avenue, Pearl Valley Estate, Paarl, 7646, Western Cape, South Africa