Solid State Drives (SSD) with Self Encryption: Solidly Secure Michael Willett Storage Security Strategist Independent Consultant



Similar documents
Encrypted SSDs: Self-Encryption Versus Software Solutions

Solid-State Drives with Self-Encryption: Solidly Secure

Data Security Using TCG Self-Encrypting Drive Technology

Implementing Stored-Data Encryption (with a bias for self-encrypting drives) Presenter: Michael Willett SAMSUNG Author: Michael Willett, Samsung

Perceptions about Self-Encrypting Drives: A Study of IT Practitioners

Frequently Asked Questions: EMC Isilon Data at Rest Encryption Solution

Samsung SED Security in Collaboration with Wave Systems

Overview of Data Security Methods: Passwords, Encryption, and Erase

Making Data at Rest Encryption Easy

Keep Your Data Secure: Fighting Back With Flash

Self-Encrypting Hard Disk Drives in the Data Center

Seagate Secure Technology

Full Drive Encryption with Samsung Solid State Drives

ACER ProShield. Table of Contents

XTREMIO DATA AT REST ENCRYPTION

SecureD Technical Overview

Clodoaldo Barrera Chief Technical Strategist IBM System Storage. Making a successful transition to Software Defined Storage

Intel RAID Controller Premium Feature Key Training

256-bit AES HARDWARE ENCRYPTED SOLID STATE DRIVES

256-bit AES HARDWARE ENCRYPTED PRODUCT RANGE

256-bit AES HARDWARE ENCRYPTED PRODUCT RANGE

Full Drive Encryption Security Problem Definition - Encryption Engine

Gain Complete Data Protection with SanDisk Self-Encrypting SSDs and Wave Systems

S E A h a w k C r y p t o M i l l CryptoMill Technologies Ltd.

How SSDs Fit in Different Data Center Applications

Unlock the value of data with smarter storage solutions.

Key Management Interoperability Protocol (KMIP)

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives

Enterprise Data Protection

1. System Requirements

Navigating Endpoint Encryption Technologies

ABC of Storage Security. M. Granata NetApp System Engineer

SSDs tend to be more rugged than hard drives with respect to shock and vibration because SSDs have no moving parts.

Trusted Computing Basics: Self-Encrypting Drives

Advances in Storage Security Standards Jason Cox Intel Corporation

Self-Encrypting Drives

Scaling from Datacenter to Client

Security Overview for Windows Vista. Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation

256-bit AES HARDWARE ENCRYPTED SOLID STATE DRIVES

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud

Aegis Padlock for business

Advantages of Intel SSDs for Data Centres

Full Disk Encryption Drives & Management Software. The Ultimate Security Solution For Data At Rest

Technical Note. Installing Micron SEDs in Windows 8 and 10. Introduction. TN-FD-28: Installing Micron SEDs in Windows 8 and 10.

EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

Factory-Installed, Standards-Based Hardware Security. Steven K. Sprague President & CEO, Wave Systems Corp.

All-Flash Storage Solution for SAP HANA:

Solutions for Encrypting Data on Tape: Considerations and Best Practices

SOLUTION BRIEF. Resolving the VDI Storage Challenge

SATA II 3Gb/s SSD. SSD630 Benefits. Enhanced Performance. Applications

Industrial Flash Storage Trends in Software and Security

YubiKey Integration for Full Disk Encryption

HP 80 GB, 128 GB, and 160 GB Solid State Drives for HP Business Desktop PCs Overview. HP 128 GB Solid State Drive (SSD)

Whitepaper. What You Need to Know About Infrastructure as a Service (IaaS) Encryption

The TCO of Software vs. Hardware-based Full Disk Encryption Summary

EMC VMAX3 DATA AT REST ENCRYPTION

SSD Server Hard Drives for IBM

BitLocker Drive Encryption Hardware Enhanced Data Protection. Shon Eizenhoefer, Program Manager Microsoft Corporation

Understanding Flash SSD Performance

Five Truths. About Enterprise Data Protection THE BEST WAY TO SECURE YOUR DATA AND YOUR BUSINESS DEFENDING THE DATA CMYK

Odyssey Access Client FIPS Edition

Origin Storage Limited. Company Profile

Commercially Proven Trusted Computing Solutions RSA 2010

Samsung Portable SSD. Branded Product Marketing Team, Memory Business

Protecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer

SOLID STATE DRIVES AND PARALLEL STORAGE

A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions

2014 Teradici Corporation.

Data-at-Rest Encryption Addresses SAN Security Requirements

Comprehensive Endpoint Security

EMC Symmetrix Data at Rest Encryption

SSDs tend to be more rugged than hard drives with respect to shock and vibration because SSDs have no moving parts.

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015

Best Practices for Optimizing SQL Server Database Performance with the LSI WarpDrive Acceleration Card

Challenges and Solutions for Effective SSD Data Erasure

AES 256-BIT HARDWARE ENCRYPTED USB FLASH DRIVES & SSD

QUICK REFERENCE GUIDE: KEY FEATURES AND BENEFITS

Data Breaches and the Encryption Safe Harbor. Eric A. Hibbard, CISSP, CISA Hitachi Data Systems

Storage Architecture in XProtect Corporate

Transcription:

Solid State Drives (SSD) with Self Encryption: Solidly Secure Michael Willett Storage Security Strategist Independent Consultant Flash Memory Summit 2014 Santa Clara, CA 1

The Problem 2005-2013: over 864,108,052 records containing sensitive personal information have been involved in security breaches In 2013, U.S. businesses paid an average cost of $5.4 million per data breach; that s $188 per record $5.4 Million Per Incident tp://www.privacyrights.org/ar/chrondatabreaches.htm http://www.symantec.com/about/news/resources/press_kits/detail.jsp?pkid=ponemon-2013 2

The Problem 2005-2013: over 864,108,052 records containing sensitive personal information have been involved in security breaches Legal Financial In 2013, U.S. businesses paid an average cost of $5.4 million per data breach; that s $188 per record $5.4 Million Per Incident Reputation tp://www.privacyrights.org/ar/chrondatabreaches.htm http://www.symantec.com/about/news/resources/press_kits/detail.jsp?pkid=ponemon-2013 3 3

Breach Notification Legislation Example: California any agency that owns or licenses computerized data that includes personal information shall disclose any breach of the security of the system following discovery or notification of the breach in the security of the data to any resident of California whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person Encryption safe harbor 4

Trusted Storage Standardization Self-Encrypting Drives (SED) 5

What is a Self-Encrypting Drive (SED)? Trusted Computing Group SED Management Interface I n t e r f a c e AES Hardware Circuitry - Encrypt Everything Written - Decrypt Everything Read 6

Crypto Erase Description Encryption Process Cryptographic erase changes the drive encryption key Data encrypted with previous key, unintelligible when DEcrypted with new key The quick brown fox jumps over the lazy dog User Data DEK %$#@βδελιϕρυι λ.σκδ%$#@ι&&6 544τψ899#@&$ Data on Drive Benefits Change DEK Command Instantaneous rapid erase for secure disposal or repurposing Decryption (After Erase) Revision 1 of U.S. NIST SP800-88: Guidelines for Media Sanitization under way to support Crypto Erase http://csrc.nist.gov/publications/drafts/800-88-rev1/sp800_88_r1_draft.pdf ±! Data After Erase New DEK %$#@βδελιϕρυι λ.σκδ%$#@ι&&6 544τψ899#@&$ Data on Drive 7

No Performance Degradation Encryption engine speed Matches Port s max speed The encryption engine is in the drive electronics Scales Linearly, Automatically Storage System Storage System All data will be encrypted, with no performance degradation 37

Hardware-Based Self-Encryption versus Software Encryption -Transparency: SEDs come from factory with encryption key already generated - Ease of management: No encrypting key to manage - Life-cycle costs: The cost of an SED is pro-rated into the initial drive cost; software has continuing life cycle costs - Disposal or re-purposing cost: With an SED, erase on-board encryption key - Re-encryption: With SED, there is no need to ever re-encrypt the data - Performance: No degradation in SED performance - Standardization: Whole drive industry is building to the TCG/SED Specs - No interference with upstream processes New hardware acquisition (part of normal replacement cycle) 9

MB/Sec Performance Comparisons: HDD and SSD, software versus SED HDD: no encryption HDD: S/W encryption HDD: SED SSD: no encryption SSD: S/W encryption SSD: SED Startup 7.90 6.97 7.99 82.50 47.90 95.33 App Loading 7.03 5.77 5.71 48.33 30.77 60.37 Modest size file test Large Scale Data Read Large Scale Data Write 10 6.13 5.00 5.28 41.13 26.77 50.40 84.67 52.88 82.75 178.00 70.23 169.33 79.60 49.50 50.31 170.80 63.60 164.50 http://www.trustedstrategies.com/

Addressing the Hurdles Simplifies key management to prevent data loss Encryption key does not leave the drive; it does not need to be escrowed, tracked, or managed Simplifies Planning and Management Solves Performance Reduces Cost Standards-based for optimal manageability and interoperability Transparent to application developers and database administrators. No change to OS, applications, databases Data classification not needed to maintain performance No performance degradation Automatically scales linearly Can change keys without re-encrypting data Standards enables competition and drive cost down Compression and de-duplication maintained Simplifies decommissioning and preserves hardware value for returns, repurposing 11

Solid-State Drive + Self-Encrypting Drive SSD SED Reduced TCO Increased productivity Better Performance More shock resistance Better reliability Less power use Approaching price parity re: HDD Simplified Management Robust Security Compliance Safe Harbor Cut Disposal Costs Scalable Interoperable Integrated Transparent

HDD versus SSD Cost Comparison $$$/GB $$$/IOPS Hard Drive (HDD) 1x 15,000RPM 300GB SAS Solid State (SSD) 300GB In/Out Operations per Second (IOPS Higher is Better) 200~450 IOPS 10,000~25,000 IOPS Sequential Read/Write Speeds (MB/s Higher is Better) Read: 240MB/s Write: 210MB/s Read: 510MB/s Write: 310MB/s Random Read/Write Speeds (MB/s Higher is Better) Read: 2MB/s Write: 5MB/s Read: 60MB/s 210MB/s Write: http://www.tomshardware.com/news/ssd-hddsolid-state-drive-hard-disk-driveprices,14336.html Sound Low Hum, clicky sounds during Read and Write Sound of Silence heat-assisted magnetic recording (HAMR) could push the (difference) even further. http://www.diffen.com/difference/h DD_vs_SSD Whereas hard drives are around $0.08 per gigabyte for 3.5", or $0.20 for 2.5", a typical flash SSD is about $0.80 per GB. This is down from about $2 per GB in early 2012. Heat Output Moderate Very Low Power Consumption (Idle/Load) 14~17 Watts 0.5~5 Watts Sensitivity to Yes w/ Data Loss None Shock/Vibration Sensitivity to Magnets Yes w/ Data Loss None Fragmentation Yes, degraded performance None Estimated Lifespan 1.5 Million Hours 2.0 Million Hours 13 http://nutypesystems.com/rd-lab/ssd-vs-hdd-high-level/

Saint Barnabas Health Care System: SED Case Study Organization New Jersey s largest integrated healthcare system 25 functional facilities total Provides treatment for >2M patients/year 18,200 employees, 4,600 doctors Environment 2380 laptops Adopted SED as standard for desktops this year (2011), used by healthcare professionals and executives distributed across 25 functional facilities Protecting PII/PHI/diagnostic information HP shop using Wave-managed Hitachi SEDs 14

Business Case Identify the data protection risks/requirements Regulatory requirement for data protection Safe harbor exemption Intellectual property/ Proprietary information protection Build a business case Market place analysis Embed into the asset lifecycle program to manage expense Key Findings: 24 hours faster deployment on average per user over previous software-based encryption Negligible boot time versus up to 30 minutes to boot a PC with software encryption 15

The Future: Self-Encryption Everywhere Encryption everywhere! Data center/branch office to the USB drive Key Management Service Notebook Desktop USB USB Standards-based Multiple vendors; interoperability Standard Key Mgmt Protocol Data Center Application Servers Branch Office Unified key management Authentication key management handles all forms of storage Simplified key management Encryption keys never leave the drive. No need to track or manage. Transparent Transparent to OS, applications, application developers, databases, database administrators Automatic performance scaling Granular data classification not needed OASIS KMIP Tape Trusted Computing Group T10/T13 Security Protocol Network Storage System, NAS, DAS Authentication Key Flow Storage System Local Key Mgmt Data Flow Authentication Key (lock key or password) Data Encryption Key (encrypted) 16

17 Thank You!