BitLocker Drive Encryption Hardware Enhanced Data Protection. Shon Eizenhoefer, Program Manager Microsoft Corporation



Similar documents
Introduction to BitLocker FVE

Penetration Testing Windows Vista TM BitLocker TM

Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory

Disk Encryption. Aaron Howard IT Security Office

Do "standard tools" meet your needs when it comes to providing security for mobile PCs and data media?

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015

Encrypting stored data. Tuomas Aura T Information security technology

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

Security Overview for Windows Vista. Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation

Windows BitLocker TM Drive Encryption Design Guide

TPM Key Backup and Recovery. For Trusted Platforms

Opal SSDs Integrated with TPMs

Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken

How to Encrypt your Windows 7 SDS Machine with Bitlocker

EMBASSY Remote Administration Server (ERAS) BitLocker Deployment Guide

Using BitLocker As Part Of A Customer Data Protection Program: Part 1

DriveLock and Windows 8

Managing BitLocker Encryption

DriveLock and Windows 7

Factory-Installed, Standards-Based Hardware Security. Steven K. Sprague President & CEO, Wave Systems Corp.

Windows Server 2008 R2 Boot Manager Security Policy For FIPS Validation

Encrypting with BitLocker for disk volumes under Windows 7

Trusted Platforms for Homeland Security

Windows BitLocker Drive Encryption Step-by-Step Guide

TPM. (Trusted Platform Module) Installation Guide V for Windows Vista

Enhancing Organizational Security Through the Use of Virtual Smart Cards

How Endpoint Encryption Works

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Microsoft Windows Server 2008: Data Protection

Mobile Device Security and Encryption Standard and Guidelines

BitLocker Encryption for non-tpm laptops

Windows 7 BitLocker Drive Encryption Security Policy For FIPS Validation

How to enable Disk Encryption on a laptop

TPM. (Trusted Platform Module) Installation Guide V2.1

Secure Storage. Lost Laptops

Session ID: Session Classification:

How Drive Encryption Works

Guidelines on use of encryption to protect person identifiable and sensitive information

Embedded Trusted Computing on ARM-based systems

Self-Encrypting Drives

UEFI Implications for Windows Server

Protecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer

Cautions When Using BitLocker Drive Encryption on PRIMERGY

Innovative Secure Boot System (SBS) with a smartcard.

Using the TPM: Data Protection and Storage

PGP Whole Disk Encryption Training

Disk encryption... (not only) in Linux. Milan Brož

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

Installing and Upgrading to Windows 7

In order to enable BitLocker, your hard drive must be partitioned in a particular manner.

Security and Compliance. Robert Nottoli Principal Technology Specialist Microsoft Corporation

Windows 7, Enterprise Desktop Support Technician

Hiva-network.com. Microsoft_70-680_v _Kat. Exam A

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

Windows 7, Enterprise Desktop Support Technician

Windows 7. Qing Liu Michael Stevens

Management of Hardware Passwords in Think PCs.

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

ACER ProShield. Table of Contents

Administering and Maintaining Windows 7 Course 50292C; 5 Days, Instructor-led

Secure Data Management in Trusted Computing

White Paper: Whole Disk Encryption

70-685: Enterprise Desktop Support Technician

Table of Contents. TPM Configuration Procedure Configuring the System BIOS... 2

"Charting the Course to Your Success!" MOC D Windows 7 Enterprise Desktop Support Technician Course Summary

Course Outline. ttttttt

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010

MS-50292: Administering and Maintaining Windows 7. Course Objectives. Required Exam(s) Price. Duration. Methods of Delivery.

Pointsec Enterprise Encryption and Access Control for Laptops and Workstations

Patterns for Secure Boot and Secure Storage in Computer Systems

Windows BitLocker and Paragon s Backup Solutions

Trusted Platform Module (TPM) Quick Reference Guide

Dell Client BIOS: Signed Firmware Update

User Manual. Copyright Rogev LTD

Making Data at Rest Encryption Easy

Data At Rest Protection

Encrypted File Systems. Don Porter CSE 506

UNCLASSIFIED Version 1.0 May 2012

MS 50292: Administering and Maintaining Windows 7

Excerpt of Cyber Security Policy/Standard S Information Security Standards

Commercially Proven Trusted Computing Solutions RSA 2010

Intel Desktop Board D975XBX2

Configuring and Administering Windows 7

BitLocker Network Unlock & BitLocker support for Encrypted Drives

IT Networking and Security

Course 50322B: Configuring and Administering Windows 7

Trustworthy Computing

Solid-State Drives with Self-Encryption: Solidly Secure

Kaspersky Lab s Full Disk Encryption Technology

Firmware security features in HP Compaq business notebooks

A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions

Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed.

Full Drive Encryption Security Problem Definition - Encryption Engine

An Improved Trusted Full Disk Encryption Model

ICT Professional Optional Programmes

End User Devices Security Guidance: Apple OS X 10.10

Protecting Data with Short- Lived Encryption Keys and Hardware Root of Trust. Dan Griffin DefCon 2013

Transcription:

BitLocker Drive Encryption Hardware Enhanced Data Protection Shon Eizenhoefer, Program Manager Microsoft Corporation

Agenda Security Background BitLocker Drive Encryption TPM Overview Building a BitLocker Capable System Additional Resources

BitLocker Drive Encryption BitLocker Drive Encryption gives you improved data protection on your Windows Vista and Windows Server codenamed Longhorn systems Notebooks Often stolen, easily lost in transit Desktops Often stolen, difficult to safely decommission Servers High value targets, often kept in insecure locations All three can contain very sensitive IP and customer data Designed to provide a transparent user experience that requires little to no interaction on a protected system Prevents thieves from using another OS or software hacking tool to break OS file and system protections Prevents offline viewing of user data and OS files Provides enhanced data protection and boot validation through use of a Trusted Platform Module (TPM) v1.2

BitLocker And TPM Features BitLocker Drive Encryption Encrypts entire volume Uses Trusted Platform Module (TPM) v1.2 to validate pre-os components Customizable protection and authentication methods Pre-OS Protection USB startup key, PIN, and TPM-backed authentication Single Microsoft TPM Driver Improved stability and security TPM Base Services (TBS) Enables third party applications Active Directory Backup Automated key backup to AD server Group Policy support Scriptable Interfaces TPM management BitLocker management Command-line tool

TPM Services Architecture (Simplified) Feature Map Windows Vista Enterprise Ultimate BitLocker TPM Admin Tools TPM WMI Provider Third Party Applications TSS* Windows Vista All SKUs TPM Base Services TPM Driver *TCG Software Stack Trusted Platform Module (TPM)

What Is A Trusted Platform Module (TPM)? Smartcard-like module on the motherboard Protects secrets Performs cryptographic functions RSA, SHA-1, RNG Meets encryption export requirements Can create, store and manage keys Provides a unique Endorsement Key (EK) Provides a unique Storage Root Key (SRK) Performs digital signature operations Holds Platform Measurements (hashes) Anchors chain of trust for keys and credentials Protects itself against attacks TPM 1.2 spec: www.trustedcomputinggroup.org

Why Use A TPM? Trusted Platforms use Roots-of-Trust A TPM is an implementation of a Root-of-Trust A hardware Root-of-Trust has distinct advantages Software can be hacked by Software Difficult to root trust in software that has to validate itself Hardware can be made to be robust against attacks Certified to be tamper resistant Hardware and software combined can protect root secrets better than software alone A TPM can ensure that keys and secrets are only available for use when the environment is appropriate Many specific hardware and software configurations

BitLocker Drive Encryption Architecture Static Root of Trust Measurement of boot components PreOS Static OS All Boot Blobs unlocked Volume Blob of Target OS unlocked TPM Init BIOS MBR BootSector BootBlock BootManager OS Loader Start OS

Disk Layout And Key Storage OS Volume Contains Encrypted OS Encrypted Page File Encrypted Temp Files Encrypted Data Encrypted Hibernation File Where s the Encryption Key? 1. SRK (Storage Root Key) contained in TPM 2. SRK encrypts FVEK (Full Volume Encryption Key) protected by TPM/PIN/USB Storage Device 3. FVEK stored (encrypted by SRK) on hard drive in the OS Volume 3 OS Volume System 2 FVEK 1 SRK System Volume Contains: MBR, Boot manager, Boot Utilities (Unencrypted, small)

Information Protection Threats Internal threats are just as prevalent as external threats Accidental Intentional Targeted Loss due to carelessness System disposal or repurposing without data wipe System physically lost in transit Data intentionally compromised Insider access to unauthorized data Offline attack on lost/stolen laptop Thief steals asset based on value of data Theft of branch office server (high value and volume of data) Theft of executive or government laptop Direct attacks with specialized hardware

Spectrum of Protection BitLocker offers a spectrum of protection, allowing an organization to customize according to its own needs TPM + USB What it is + what you have Protects Against: HW attacks Vulnerable To: Stolen USB key User Must: Protect USB key USB Only What you have Protects Against: HW attacks Vulnerable To: Stolen USB key No boot validation User Must: Protect USB key TPM + PIN What it is + what you know Protects Against: Many HW attacks Vulnerable To: Hardware attacks User Must: Enter PIN to boot TPM Only What it is Protects Against: Most SW attacks Vulnerable To: Hardware attacks User Must: N/A No user impact o esae lo pe D f

BitLocker Recovery Scenarios Lost/Forgotten Authentication Methods Lost USB key, user forgets PIN Upgrade to Core Files Unanticipated change to pre-os files (BIOS upgrade, etc ) Broken Hardware Hard drive moved to a new system Deliberate Attack Modified or missing pre-os files (Hacked BIOS, MBR, etc )

BitLocker Recovery Methods Recommended method for domain-joined machines Automate key backups through BitLocker Setup Configure group policy to store keys in Active Directory Provides centralized storage and management of keys Recommended methods for non domain-joined machines Back up to a USB flash device Back up to a web-based key storage service Windows Ultimate Extras Provides a free key storage service for home users or unmanaged environments Potential OEM or 3rd-party service for key storage Back up to a file Print or record to physical media

Platform Threats And Mitigations BIOS Modification THREAT Lost Core Root of Trust for Measurement MITIGATION Secure CRTM Update MITIGATION Provide extra protection with PIN or USB Physical Memory THREAT Key exposure in physical memory MITIGATION Memory Overwrite on Reset MITIGATION Provide extra protection with PIN or USB Dictionary Attack Against PIN THREAT Key exposure MITIGATION Anti-hammering countermeasures End Users THREAT Unsafe practices (PIN nearby, USB in laptop case) MITIGATION User education, corporate security policy

Building BitLocker Systems Windows Vista Logo Program Performance, quality, and feature metrics that help consumers understand and seek out the best computing experience that Windows Vista has to offer http://www.microsoft.com/whdc/winlogo/hwrequirements.mspx whdc/winlogo/hwrequirements.mspx Trusted Platform Module SYSFUND-0030 TPM Main Specification, Version 1.2 (or later) Memory Mapped I/O, Locality 0 https://www.trustedcomputinggroup.org www.trustedcomputinggroup.org/specs/tpm TPM PC Client Interface Specification, Version 1.2 (or later) https://www.trustedcomputinggroup.org/specs/pcclient BIOS SYSFUND-0031 TCG BIOS Specification Physical Presence Interface Specification Memory Overwrite on Reset Specification Immutable CRTM or Secure Update https://www.trustedcomputinggroup.org/specs/pcclient

Building BitLocker Systems Hard Disk SYSFUND-0032 BitLocker requires at least two partitions System partition ( Active, NTFS, minimum 1.5GB) OS must be installed on separate partition OS and other partition(s) can be of any size e-mail bdeinfo @ microsoft.com for more information USB SYSFUND-0069-0070 System boot from USB 1.x and 2.x USB USB read/write in pre-os environment FAT16, FAT32, or NTFS file system e-mail bdeinfo @ microsoft.com for BitLocker and TPM Admin BIOS and Platform Requirements

Enterprise Customer Needs Remote Deployment Considerations Think through large-scale deployment of BitLocker Provide solutions for remote initialization of TPMs Provide a secure BIOS update mechanism Support Encrypted Volumes in Recovery Environment Include WinRE scripting components Ship Systems with an Endorsement Key (EK) EK generation in the field is time consuming Industry security best practice TCG Guidelines

Call To Action Build BitLocker -ready Systems TPM v1.2 Consider the deployment experience, make it easy BIOS Don t ship systems without secure CRTM/BIOS update! Hard Disk Ship your platforms with two or more partitions USB Verify read/write/boot from USB in pre-os environment Consider Enterprise Customer Needs Provide ability to initialize TPM remotely Ship with Endorsement Key (EK) Test Your Platforms! Test with latest Windows Vista releases WDK test suite http://www.microsoft.com/ whdc/driver/wdk/aboutwdk.mspx Work with us to get your reference platforms tested! e-mail bdeinfo @ microsoft.com for more information

Additional Resources Web Resources Specs and Whitepapers http://www.microsoft.com/whdc/system/platform/hwsecurity/default.mspx Windows Logo Program Testing http://www.microsoft.com/whdc/getstart/testing.mspx whdc/getstart/testing.mspx TCG http://www.trustedcomputinggroup.org Related Sessions Enterprise and Server Use of Microsoft BitLocker Drive Encryption (CPA027) Windows Vista and Windows Server Longhorn Security Platform Enhancements (CPA127) BitLocker Questions or Ideas Bdeinfo @ microsoft.com BitLocker Blog http://blogs.msdn.com/si_team/default.aspx