Decrypting Encryption at the Hardware and Storage Level

Posted on July 31, 2014 by April Sage

After deep dives into the world of encryption as it relates to privacy, security and compliance and how it functions at thesoftware level, Online Tech’s “Tuesday at 2” webinar series concluded its three-part encryption presentation with a look at encryption at the hardware and storage levels.

Steve Aiello led the conversation and handled aspects of encryption for Microsoft-driven hardware and guest co-host Mark Stanislav took over for the Linux-focused stretch of the presentation. Both explored the variety of places encryption can be employed to mitigate risk of data loss or breach, and some of the considerations for choosing the most appropriate method to employ.

To wrap up the presentation, Aiello covered encryption options for storage media.

What follows is a brief recap of their presentation. Click to watch the webinar and view the slides and transcript of the full 57-minute presentation below.

Watch webinar: Encryption at the Hardware Level

While handling a look at both its Encrypting File Systems (EFS) and BitLocker disk encryption offerings, Aiello noted that “Microsoft has generally done a very good job at implementing cryptography in their ecosystem.”

EFS uses AES, a very strong encryption algorithm, to encrypt data at rest on a hard disk. Aiello covered its pros, cons and other highlights; described how it functions and how to enable it.

“The really nice thing about EFS is that it’s completely built into the Windows NT file system,” Aiello said. “There’s no extra you have to add, there’s no performance hit, and it’s a very safe option – as long as you can keep the username and password to that laptop or device private.”

Aiello also covered BitLocker, which he called “Microsoft’s answer to full-disk encryption.” It allows for a customizable level of protection depending on the combination of features used: The Trusted Platform Module (TPM) allows the system to verify the integrity of data, a PIN offers authentication and a USB Key offers two-factor authentication.

“One of the really great things you can do with a full-disk encryption solution is … do a secure wipe,” Aiello said. That ensures you properly “sanitize” drives that may have once held sensitive healthcare of financial data, for instance, on them.

EncryptionScenario

Stanislav took over the Linux disk encryption portion of the event, covering Linux Unified Key Setup (LUKS) and the free, open-source TrueCrypt. He cautioned that while there are parallels to Windows in terms of what the Linux options can do, because Active Directory is the standard in how to manage systems within the scope of a deployment, Linux is not as direct in trying to manage encrypted systems as it would under Windows.

That said, he noted that LUKS – despite its name – is usable with Windows using FreeOTFE software. Most commonly used for enterprise deployment, LUKS is flexible to utilize and allows you to select algorithms, key size and mode of operation for encryption.

Perhaps more familiar to the general public is TrueCrypt, which offers a graphical user interface or command line functionality. As a stand-alone software application, it is stronger and more feature-rich out of the box than other options.

Another highlight of TrueCrypt, said Stanislav, is that it offers the ability to completely hide volumes of data on hardware. “Even if somebody stole a laptop, they wouldn’t know there’s a volume of encrypted data on the device,” he said.

The storage portion of the presentation covered self-encrypting drives (SEDs) and appliances for array-based encryption.

Self-encrypting drives are hard drives that have encryption hardware built in that is completely transparent to the user and comes with software to generate a unique encryption key. Relatively new to the market, these drives come in a limited number of types and sizes.

Aiello also covered numerous encryption appliances that can be built into the storage array that leaves data encrypted on the disk. These options have little performance impact, no drive choice limitations and zero key management issues, but can be expensive.

This entry was posted in Cybersecurity

Follow Us

Want to stay informed on all things Online Tech?

Sign up to receive compliant and secure hosting resources now!

View our Privacy Policy.

About Online Tech

Online Tech is the leader in secure, compliant hosting services including private cloud hosting, managed cloud hosting, hybrid cloud hosting, managed dedicated servers, disaster recovery, offsite backup services, and Michigan colocation.

Online Tech’s Midwest data centers assure mission critical applications are always available, comply with government & industry regulations, and continue operating after a disaster.

Backed by independent HIPAA, PCI, SAS 70, SSAE 16, SOC 2, and SOC 3 audits, Online Tech delivers the security, privacy, and availability expected from world class data center operators.

For more information, call (734) 213-2020 or email contactus@onlinetech.com.