[wp-trac] [WordPress Trac] #43175: Discussion - Pseudonymisation
WordPress Trac
noreply at wordpress.org
Tue Apr 24 16:51:54 UTC 2018
#43175: Discussion - Pseudonymisation
-------------------------+------------------------------
Reporter: xkon | Owner: (none)
Type: enhancement | Status: new
Priority: normal | Milestone: Awaiting Review
Component: General | Version:
Severity: normal | Resolution:
Keywords: gdpr | Focuses:
-------------------------+------------------------------
Comment (by iandunn):
Replying to [comment:8 David 279]:
> they host their application on one server that was internet accessible,
the encrypted user data was stored on a second server only accessible from
the first and the encryption key for the user data was stored on a third
server
Firewalling the database server behind a DMZ is a good practice, and seems
fairly common, but I'm curious to hear about the third server that stores
the encryption key.
I'm assuming that the web server makes some kind of request to the key
server, and uses some credentials for authentication/authorization. It
seems like if the web server was compromised, then the attacker would gain
access to those credentials, and therefore have access to the encryption
key as well. If that's true, then it doesn't seem like the 3rd server
offers any meaningful protection.
Is there something I'm missing?
--
Ticket URL: <https://core.trac.wordpress.org/ticket/43175#comment:10>
WordPress Trac <https://core.trac.wordpress.org/>
WordPress publishing platform
More information about the wp-trac
mailing list