[wp-trac] [WordPress Trac] #43175: Discussion - Pseudonymisation

WordPress Trac noreply at wordpress.org
Tue Apr 24 16:51:54 UTC 2018


#43175: Discussion - Pseudonymisation
-------------------------+------------------------------
 Reporter:  xkon         |       Owner:  (none)
     Type:  enhancement  |      Status:  new
 Priority:  normal       |   Milestone:  Awaiting Review
Component:  General      |     Version:
 Severity:  normal       |  Resolution:
 Keywords:  gdpr         |     Focuses:
-------------------------+------------------------------

Comment (by iandunn):

 Replying to [comment:8 David 279]:
 > they host their application on one server that was internet accessible,
 the encrypted user data was stored on a second server only accessible from
 the first and the encryption key for the user data was stored on a third
 server

 Firewalling the database server behind a DMZ is a good practice, and seems
 fairly common, but I'm curious to hear about the third server that stores
 the encryption key.

 I'm assuming that the web server makes some kind of request to the key
 server, and uses some credentials for authentication/authorization. It
 seems like if the web server was compromised, then the attacker would gain
 access to those credentials, and therefore have access to the encryption
 key as well. If that's true, then it doesn't seem like the 3rd server
 offers any meaningful protection.

 Is there something I'm missing?

-- 
Ticket URL: <https://core.trac.wordpress.org/ticket/43175#comment:10>
WordPress Trac <https://core.trac.wordpress.org/>
WordPress publishing platform


More information about the wp-trac mailing list