Encrypted SSDs: Self-Encryption Versus Software Solutions



Similar documents
Solid State Drives (SSD) with Self Encryption: Solidly Secure Michael Willett Storage Security Strategist Independent Consultant

Solid-State Drives with Self-Encryption: Solidly Secure

Data Security Using TCG Self-Encrypting Drive Technology

Implementing Stored-Data Encryption (with a bias for self-encrypting drives) Presenter: Michael Willett SAMSUNG Author: Michael Willett, Samsung

Frequently Asked Questions: EMC Isilon Data at Rest Encryption Solution

Keep Your Data Secure: Fighting Back With Flash

Overview of Data Security Methods: Passwords, Encryption, and Erase

Making Data at Rest Encryption Easy

Self-Encrypting Hard Disk Drives in the Data Center

Perceptions about Self-Encrypting Drives: A Study of IT Practitioners

Samsung SED Security in Collaboration with Wave Systems

XTREMIO DATA AT REST ENCRYPTION

SSDs tend to be more rugged than hard drives with respect to shock and vibration because SSDs have no moving parts.

ACER ProShield. Table of Contents

Gain Complete Data Protection with SanDisk Self-Encrypting SSDs and Wave Systems

Seagate Secure Technology

256-bit AES HARDWARE ENCRYPTED SOLID STATE DRIVES

256-bit AES HARDWARE ENCRYPTED PRODUCT RANGE

256-bit AES HARDWARE ENCRYPTED PRODUCT RANGE

Intel RAID Controller Premium Feature Key Training

Scaling from Datacenter to Client

SATA II 3Gb/s SSD. SSD630 Benefits. Enhanced Performance. Applications

Technical Note. Installing Micron SEDs in Windows 8 and 10. Introduction. TN-FD-28: Installing Micron SEDs in Windows 8 and 10.

Advances in Storage Security Standards Jason Cox Intel Corporation

256-bit AES HARDWARE ENCRYPTED SOLID STATE DRIVES

YubiKey Integration for Full Disk Encryption

SSDs tend to be more rugged than hard drives with respect to shock and vibration because SSDs have no moving parts.

SSDs tend to be more rugged than hard drives with respect to shock and vibration because SSDs have no moving parts.

Increasing Storage Performance

ABC of Storage Security. M. Granata NetApp System Engineer

Full Drive Encryption with Samsung Solid State Drives

1. System Requirements

Clodoaldo Barrera Chief Technical Strategist IBM System Storage. Making a successful transition to Software Defined Storage

Self-Encrypting Drives

High-Performance SSD-Based RAID Storage. Madhukar Gunjan Chakhaiyar Product Test Architect

Full Drive Encryption Security Problem Definition - Encryption Engine

QuickSpecs. HP Solid State Drives (SSDs) for Workstations. Overview

How SSDs Fit in Different Data Center Applications

Trusted Computing Basics: Self-Encrypting Drives

AES 256-BIT HARDWARE ENCRYPTED USB FLASH DRIVES & SSD

Navigating Endpoint Encryption Technologies

Origin Storage Limited. Company Profile

BitLocker Drive Encryption Hardware Enhanced Data Protection. Shon Eizenhoefer, Program Manager Microsoft Corporation

Opal SSDs Integrated with TPMs

Cloud Compu)ng in Educa)on and Research

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015

Unlock the value of data with smarter storage solutions.

All-Flash Storage Solution for SAP HANA:

SecureD Technical Overview

SOLID STATE DRIVES AND PARALLEL STORAGE

WHITEPAPER It s Time to Move Your Critical Data to SSDs

SSDs tend to be more rugged than hard drives with respect to shock and vibration because SSDs have no moving parts.

Understanding Flash SSD Performance

Advantages of Intel SSDs for Data Centres

Seagate Instant Secure Erase Deployment Options

ntier Verde Simply Affordable File Storage

Data Breaches and the Encryption Safe Harbor. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems

Nasir Memon Polytechnic Institute of NYU

EMC VNX2: Data at Rest Encryption

Samsung Portable SSD. Branded Product Marketing Team, Memory Business

Data Management in the Cloud: Limitations and Opportunities. Annies Ductan

Factory-Installed, Standards-Based Hardware Security. Steven K. Sprague President & CEO, Wave Systems Corp.

Commercially Proven Trusted Computing Solutions RSA 2010

S E A h a w k C r y p t o M i l l CryptoMill Technologies Ltd.

Industrial Flash Storage Trends in Software and Security

Full Disk Encryption Drives & Management Software. The Ultimate Security Solution For Data At Rest

Response Time: The time required for the UUT to complete an I/O request.

Moving Media Storage Technologies

Dell Compellent 6.5 SED Reference Architecture and Best Practices

Flash Memory Technology in Enterprise Storage

SSD Server Hard Drives for IBM

Data Security using Encryption in SwiftStack

Strategies for Firmware Support of Self-Encrypting Drives

Accelerating Server Storage Performance on Lenovo ThinkServer

Solutions for Encrypting Data on Tape: Considerations and Best Practices

How To Manage A Mobile Device Management At Harvard

HP 80 GB, 128 GB, and 160 GB Solid State Drives for HP Business Desktop PCs Overview. HP 128 GB Solid State Drive (SSD)

lightning wire labs Hardware Appliances

MaxDeploy Ready. Hyper- Converged Virtualization Solution. With SanDisk Fusion iomemory products

How To Understand Cloud Storage In A Flash Memory Flash Memory Hard Disk Drive (Hard Disk) And Flash Memory (Flash Memory) (Flash) (Hard Drive) (Non-Flash) Hard Disk Drives (Harddrive) (Sustained)

WHITE PAPER: THE SSD ADVANTAGE

Cautions When Using BitLocker Drive Encryption on PRIMERGY

Aegis Padlock for business

IOmark- VDI. HP HP ConvergedSystem 242- HC StoreVirtual Test Report: VDI- HC b Test Report Date: 27, April

Transcription:

Encrypted SSDs: Self-Encryption Versus Software Solutions Michael Willett Storage Security Strategist and VP Marketing Bright Plaza Flash Memory Summit 2015 Santa Clara, CA 1

The Problem 2005-2013: over 864,108,052 records containing sensi5ve personal informa5on have been involved in security breaches In 2013, U.S. businesses paid an average cost of $5.4 million per data breach; that s $188 per record $5.4 Million Per Incident h>p://www.privacyrights.org/ar/chrondatabreaches.htm http://www.symantec.com/about/news/resources/press_kits/detail.jsp?pkid=ponemon-2013 2

The Problem 2005-2013: over 864,108,052 records containing sensi5ve personal informa5on have been involved in security breaches Legal Financial In 2013, U.S. businesses paid an average cost of $5.4 million per data breach; that s $188 per record $5.4 Million Per Incident Reputa5on h>p://www.privacyrights.org/ar/chrondatabreaches.htm http://www.symantec.com/about/news/resources/press_kits/detail.jsp?pkid=ponemon-2013 3 3

Breach No5fica5on Legisla5on Example: California any agency that owns or licenses computerized data that includes personal information shall disclose any breach of the security of the system following discovery or notification of the breach in the security of the data to any resident of California whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person Encryp5on safe harbor 4

Trusted Storage Standardiza5on Self-Encrypting Drives (SED) 5

What is a Self- Encryp5ng Drive (SED)? Trusted Compu5ng Group SED Management Interface I n t e r f a c e AES Hardware Circuitry - Encrypt Everything Wri>en - Decrypt Everything Read 6

Crypto Erase Description Cryptographic erase changes the drive encryption key Data encrypted with previous key, unintelligible when DEcrypted with new key Benefits The quick brown fox jumps over the lazy dog User Data Encryp5on Process DEK Change DEK Command % $#@βδελιϕρυιλ. σκδ% $#@ι&&6544τψ8 99#@&$ Data on Drive Instantaneous rapid erase for secure disposal or repurposing Decryp5on (Afer Erase) Revision 1 of U.S. NIST SP800-88: Guidelines for Media Sanitization under way to support Crypto Erase h0p://csrc.nist.gov/publica>ons/dra?s/800-88- rev1/sp800_88_r1_dra?.pdf J N ² µ [ L ± X e % í ' 4 ] Z Ï ø! % í ' 4 ] Z Ï ø Data Afer Erase New DEK % $#@βδελιϕρυιλ. σκδ% $#@ι&&6544τψ8 Data on Drive 99#@&$ 7

No Performance Degradation Encryp5on engine speed Matches Port s max speed The encryp5on engine is in the drive electronics Scales Linearly, Automa>cally Storage System Storage System All data will be encrypted, with no performance degrada>on 37 8

Hardware- Based Self- Encryp5on versus Sofware Encryp5on - Transparency: SEDs come from factory with encryp>on key already generated - Ease of management: No encryp>ng key to manage - Life- cycle costs: The cost of an SED is pro- rated into the ini>al drive cost; so?ware has con>nuing life cycle costs - Disposal or re- purposing cost: With an SED, erase on- board encryp>on key - Re- encryp5on: With SED, there is no need to ever re- encrypt the data - Performance: No degrada>on in SED performance - Standardiza5on: Whole drive industry is building to the TCG/SED Specs - No interference with upstream processes 9 New hardware acquisi5on (part of normal replacement cycle)

Addressing the Hurdles Simplifies key management to prevent data loss Simplifies Planning and Management Solves Performance Reduces Cost ü Encryption key does not leave the drive; it does not need to be escrowed, tracked, or managed ü Standards-based for optimal manageability and interoperability ü Transparent to application developers and database administrators. No change to OS, applications, databases ü Data classification not needed to maintain performance ü No performance degradation ü Automatically scales linearly ü Can change keys without re-encrypting data ü Standards enables competition and drive cost down ü Compression and de-duplication maintained ü Simplifies decommissioning and preserves hardware value for returns, repurposing 10

Solid- State Drive + Self- Encryp5ng Drive SSD SED Reduced TCO Increased produc5vity Be>er Performance More shock resistance Be>er reliability Less power use Approaching price parity re: HDD Simplified Management Robust Security Compliance Safe Harbor Cut Disposal Costs Scalable Interoperable Integrated Transparent

HDD versus SSD Cost Comparison $$$/GB $$$/IOPS Hard Drive (HDD) 1x 15,000RPM 300GB SAS Solid State (SSD) 300GB In/Out Operations per Second (IOPS Higher is Better) 200~450 IOPS 10,000~25,000 IOPS Sequential Read/Write Speeds (MB/s Higher is Better) Read: 240MB/s Write: 210MB/s Read: 510MB/s Write: 310MB/s http://www.tomshardware.com/news/ssd-hddsolid-state-drive-hard-disk-drive-prices, 14336.html Random Read/Write Speeds (MB/s Higher is Better) Sound Read: 2MB/s Write: 5MB/s Low Hum, clicky sounds during Read and Write Read: 60MB/s 210MB/s Sound of Silence Write: heat-assisted magnetic recording (HAMR) could push the (difference) even further. http://www.diffen.com/difference/ HDD_vs_SSD Whereas hard drives are around $0.08 per gigabyte for 3.5", or $0.20 for 2.5", a typical flash SSD is about $0.80 per GB. This is down from about $2 per GB in early 2012. Heat Output Moderate Very Low Power Consumption (Idle/ Load) 14~17 Watts 0.5~5 Watts Sensitivity to Shock/ Vibration Yes w/ Data Loss None Sensitivity to Magnets Yes w/ Data Loss None Fragmentation Yes, degraded performance None Estimated Lifespan 1.5 Million Hours 2.0 Million Hours 12 http://nutypesystems.com/rd-lab/ssd-vs-hdd-high-level/

The Future: Self-Encryption Everywhere Notebook USB Encryption everywhere! Data center/branch office to the USB drive Key Management Service Desktop USB Standards-based Multiple vendors; interoperability Standard Key Mgmt Protocol Data Center Application Servers Branch Office Unified key management Authentication key management handles all forms of storage Simplified key management Encryption keys never leave the drive. No need to track or manage. Transparent Transparent to OS, applications, application developers, databases, database administrators Automatic performance scaling Granular data classification not needed OASIS KMIP Tape Trusted Computing Group T10/T13 Security Protocol Network Storage System, NAS, DAS Authentication Key Flow Storage System Local Key Mgmt Data Flow Authentication Key (lock key or password) Data Encryption Key (encrypted) 13

Drive Trust Alliance Marke5ng and Open Source Development for Self- Encryp5ng Drives (SED) Jointly with (Tom) Coughlin Associates Mission: promote (TCG/OPAL) SED adop>on in the marketplace Sponsors benefit from cost efficiencies in: marke>ng, on- going educa>on, open source so?ware for managing SEDs Leadership team: Bob Thibadeau, Sco0 Marks, Michael Wille0 - Client open- source sofware: ini>alize and provision a TCG/OPAL Self- Encryp>ng Drive (SED) unlock one or more TCG ranges on that drive for reading and/or wri>ng - Network agent applica5on for remote management of these func>ons using: OASIS KMIP protocols or OMA protocols (in the case of mobile OS) - Roadmap: pre- OS boot (PBA) so?ware and allow TCG OPAL ranges re: non- PBA use cases - Services can be either: broadly applicable to Sponsors or customized - Services include: broad range of technical marke>ng support and collabora>on - Contact: (Gene Farrelly, COO, Bright Plaza, Inc., 919-389- 3948, Gene.Farrelly@ka.je) for details on sponsoring the Drive Trust Alliance

15 Thank You!