Encryption is one of the big promises of modern IT. It is intended to protect data, reduce risks, and support compliance. But in the enterprise environment in particular, it is clear that security does not only arise from the use of a cryptographic process. It is created through architecture.
A good example of this is the Data Encryption Standard (DES). For decades, it was considered a reliable standard for encrypting digital information. Today, it is clear that what was once considered safe is now outdated. And that is precisely where its real relevance lies. This is because the Data Encryption Standard exemplifies why companies must never look at security mechanisms in isolation — especially when it comes to SAP archiving, long-term storage requirements and compliance.
The Data Encryption Standard was developed in the 1970s and established itself early on as one of the most important standards for encrypting electronic data. Its significance was enormous: It brought structure, standardization and technical reliability to a time when digital information security was by no means a matter of course.
The only problem is: standards age. And DES is one of the most well-known examples of this.
With its comparatively low key length, the algorithm is no longer considered sufficiently secure. This is not a historical footnote, but a fundamental insight: IT security is never static. Procedures that appear viable today may be inadequate tomorrow.
For companies that not only need to process data at short notice but also need to store it for years or decades, this is exactly what is crucial. This is because, in many cases, the lifespan of information is significantly longer than the lifespan of individual security mechanisms.
At first glance, the term Data Encryption Standard looks like a classic IT security topic. At second glance, it is highly relevant for archiving.
Because archives have a special feature: They not only have to store information, but also keep it readable, provable, protected and compliant with regulations over long periods of time. While operational systems are constantly being modernized, replaced or consolidated, archived documents are often retained for many years — for example for commercial, tax or industry-specific reasons.
This creates an area of tension:
This is precisely why encryption in archiving should never be understood as a selective function. It is part of an overall strategy for information security, compliance and sustainability.
This is particularly evident in SAP-centered architectures. There, it is not just about storing data, but also about storing business-critical documents and information in such a way that they remain available in processes and meet regulatory requirements.
In the context of archiving, this means that companies must do more than simply store data. You must ensure that archived content
That is where the historical look at the Data Encryption Standard becomes interesting. Because it shows how risky it is to link security to a specific technology alone. If you link archiving too closely to individual processes, products or legacy systems, you do not create sustainable compliance — but new dependencies.
Archival landscapes have grown historically in many companies. Different storage locations, older interfaces, proprietary repositories, and complex migration paths make it difficult to implement security and compliance requirements properly.
The real risk therefore often does not lie in the fact that an individual algorithm such as DES is outdated. The real risk is that the overall architecture is not prepared to respond to new requirements.
This is particularly problematic in regulated environments. Because there, companies must be able to react to changes, for example when:
A rigid archive architecture makes such changes expensive, slow, and risky. A flexible architecture, on the other hand, allows security mechanisms to be further developed without jeopardizing the traceability or integrity of archived content.
For modern SAP archiving, this provides a clear picture: Security should not only be understood as an individual technical measure. It must be considered architecturally.
This includes the question of how documents and data are archived, how closely the solution is integrated with SAP and how easily it can be adapted to new requirements. On the KGS website, this SAP-related approach is described via certified interfaces such as ArchiveLink®, ILM and CMIS as well as audit-proof document and data archiving.
In practice, this means:
An archive should not only store data, but should also be structured in such a way that companies can respond to new security requirements in the future — without compliance risks, without unnecessary data copies and without additional complexity.
This is exactly where classic filing is separated from intelligent archiving.
The Data Encryption Standard is no longer a recommended security mechanism today. But as a model of thought, it is highly topical.
He reminds us that when archiving, companies must not only secure the present tense. They must create systems that are still sustainable tomorrow — when standards change, platforms migrate, or new regulatory expectations arise.
For SAP-related companies, this means:
It is not the isolated view of a single encryption method that is decisive, but the question of whether the entire archive architecture is sustainable in the long term.
A modern solution must therefore:
The Data Encryption Standard is a relic from an earlier phase of IT security. But his story is highly topical. It shows how quickly technical security can become obsolete — and how important it is therefore not to think about archiving in the short term, but structurally.
Especially in the area of SAP archiving and compliance, it is not enough to securely store data once. Companies need architectures that combine security, traceability, and sustainability.
Or in other words:
It is not the old standard that is still relevant today — but the recognition that long-term compliance only works with an intelligent, flexible and SAP-native archiving strategy.
Further information


More Info

