Disk Encryption. Aaron Howard IT Security Office



Similar documents
Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015

Using BitLocker As Part Of A Customer Data Protection Program: Part 1

DriveLock and Windows 7

DriveLock and Windows 8

How to Encrypt your Windows 7 SDS Machine with Bitlocker

BitLocker/Active Directory Encryption Procedure Department: Information Security Office Version: 1.0 Last Revised: 09/26/2011

Hiva-network.com. Microsoft_70-680_v _Kat. Exam A

ZENworks 11 Support Pack 4 Full Disk Encryption Agent Reference. May 2016

Introduction to BitLocker FVE

EMBASSY Remote Administration Server (ERAS) BitLocker Deployment Guide

BitLocker Encryption for non-tpm laptops

Encrypting with BitLocker for disk volumes under Windows 7

Mobile Device Security and Encryption Standard and Guidelines

In order to enable BitLocker, your hard drive must be partitioned in a particular manner.

Technical Note. Installing Micron SEDs in Windows 8 and 10. Introduction. TN-FD-28: Installing Micron SEDs in Windows 8 and 10.

Encrypting the Private Files on Your Computer Presentation by Eric Moore, CUGG June 12, 2010

ACER ProShield. Table of Contents

MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features

BitLocker Drive Encryption Hardware Enhanced Data Protection. Shon Eizenhoefer, Program Manager Microsoft Corporation

Full Disk Encryption Agent Reference

Managing Applications, Services, Folders, and Libraries

Encrypting stored data. Tuomas Aura T Information security technology

Windows BitLocker TM Drive Encryption Design Guide

SecureDoc Disk Encryption Cryptographic Engine

HP ProtectTools Embedded Security Guide

SecureDoc for Mac v6.1. User Manual

Deploying EFS: Part 2

Cautions When Using BitLocker Drive Encryption on PRIMERGY

Do "standard tools" meet your needs when it comes to providing security for mobile PCs and data media?

EMBASSY Remote Administration Server (ERAS) Administrator Manual

Windows BitLocker Drive Encryption Step-by-Step Guide

How to enable Disk Encryption on a laptop

Table of Contents. TPM Configuration Procedure Configuring the System BIOS... 2

TPM. (Trusted Platform Module) Installation Guide V for Windows Vista

Check Point FDE integration with Digipass Key devices

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

SafeGuard Easy startup guide. Product version: 7

PGP Whole Disk Encryption Training

Guidelines on use of encryption to protect person identifiable and sensitive information

Navigating Endpoint Encryption Technologies

ICT Professional Optional Programmes

Get Success in Passing Your Certification Exam at first attempt!

Full Disk Encryption Pre-Boot Authentication Reference

Industrial Flash Storage Trends in Software and Security

Q&A. DEMO Version

How Drive Encryption Works

A Guide to Managing Microsoft BitLocker in the Enterprise

Full Disk Encryption Policy Reference

HP ProtectTools User Guide

Full Disk Encryption Drives & Management Software. The Ultimate Security Solution For Data At Rest

Upgrading Client Security and Policy Manager in 4 easy steps

Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory

WARNING!!: Before installing Truecrypt encryption software on your

Comodo Disk Encryption

Drive encryption with Microsoft BitLocker

Crystal Practice Management Encrypting the Database

Security Overview for Windows Vista. Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation

Managing BitLocker Encryption

Deploying EFS: Part 1

Windows 7. Qing Liu Michael Stevens

Windows BitLocker and Paragon s Backup Solutions

Dell ControlPoint Security Manager


Chapter 1 Scenario 1: Acme Corporation

Microsoft Windows 7. Administration. Instant Reference. William Panek WILEY. Wiley Publishing, Inc.

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

Strategies for Firmware Support of Self-Encrypting Drives

Secure Storage. Lost Laptops

Sophos Disk Encryption License migration guide. Product version: 5.61 Document date: June 2012

Disk encryption... (not only) in Linux. Milan Brož

Acronis True Image 2015 REVIEWERS GUIDE

Microsoft Windows 8 Beta Exam by Ding Dong

Innovative Secure Boot System (SBS) with a smartcard.

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

Smart TPM. User's Manual. Rev MD-STPM-1001R

Getting Started with Symantec Endpoint Protection

How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The

Protecting Your Business from Costly Data Theft: Why Hardware-Based Encryption Is the Answer

White Paper: Whole Disk Encryption

Yale Software Library

Management of Hardware Passwords in Think PCs.

ScoMIS Encryption Service

Samsung Drive Manager FAQ

TPM. (Trusted Platform Module) Installation Guide V2.1

Designing and Deploying Connected Device Solutions for Small and Medium Business

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

Kaspersky Lab s Full Disk Encryption Technology

Advanced Diploma In Hardware, Networking & Server Configuration

HP ProtectTools Security Manager Guide

Course 20688A: Managing and Maintaining Windows 8

Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive

Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon

YubiKey Integration for Full Disk Encryption

Transcription:

Disk Encryption Aaron Howard IT Security Office

Types of Disk Encryption? Folder Encryption Volume or Full Disk Encryption OS / Boot Volume Data Volume Managed or Unmanaged Key Backup and Data Assurance

How Does Disk Encryption Help? Useful when Physical Security Fails Stolen Laptop Protects Data from Public Disclosure Not a replacement for permissions Does Encryption Protect from Malware?

Recomendation for Laptops Mobile Device Physical Security Secured when not in use Implement Screen Saver Passwords Mobile Devices should not contain Level 3 Highly Sensitive Data e.g. CC #s, SSNs, Medical Records Data Classification Guide

Level 3 Highly Sensitive Data Stored on Laptops Must be Encrypted

Encryption Challenges Business Continuity Encryption Key Management Passwords Backups & Restores Additional Complexity False sense of security

Strategy for Deployment Identify Sensitive Data Cornell Spider Is sensitive data required? Can data be moved to a server? Only encrypt when sensitive data is required

What s Being Done? Upgrading Existing AD Integrated PKI Offline Root CA Adding support for EFS Planning EFS Pilot Develop Support Documentation FDE Product Evaluation

Which Technology to Use? Migrate Laptops to Vista Use Bitlocker for long term solution When EFS Infrastructure is ready Enable EFS on Legacy hardware Use AD & PKI for Key Management PGP interim solution

Encrypting File System Included in Windows 2000+ NTFS + Encryption Module Transparent Encryption Uses Public Keys - PKI Managed with AD & Group Policy

EFS Data Recovery Multiple ways to Recover Data Key Recovery Agents Key Backup / Escrow Data Recovery Agent Allowed to Decrypt Only

Key Recovery 2003 Enterprise CA Creates backup key automatically Key Recovery Separation of Duties CA Admin extracts encrypted key Key Recovery Agent(s) decrypts key Key Escrow

EFS Best Practices Use EFS with domain accounts Assign Data Recovery Agent Backup EFS Keys Encrypt folders instead of files Disable swap file and hibernation

EFS Warnings XP Local account password reset Causes loss of encryption keys Change password back Use Data Recovery Agent to recover XP does not have a Default DRA

EFS Vulnerabilities Windows 2000 Local Admin default DRA Local Admin can access EFS data Original Clear text files are not wiped Create files in encrypted folder Use secure erase or cipher to wipe Won t encrypt swap or hibernation file

What EFS Doesn t Do Doesn t encrypt across network FTP, CIFS, SMB ( Network Shares ) WEBDAV is encrypted EFS is enabled on specific folders Accidents happen Sensitive data could be made public

Manual Key Backup Backup keys before encrypting Certificate Manager MMC Right click key -- Export Cipher.exe Keep backup keys offline Store keys in secure location

EFS Setup Disable EFS when not in Use Curious users may enable EFS Data could be lost Configure EFS individually Configure Data Recovery Agent Backup encryption keys Encrypt data and temporary folders

Which Folders to Encrypt? My Documents and all subfolders All Folders with Sensitive Data Temporary folders Found in Environment Variables Use set command

EFS Data is Protected by a Password EFS is as weak as your password Use at least 15 character complex pw Require authentication after hibernation or screen saver Enable Syskey for Windows 2000 or when using local accounts

Encrypting for multiple Users XP & 2003 only EFS files can be shared Add additional users to specific files Managed via file properties Cumbersome to manage Can t add groups or share folders Try sharing encrypted ZIP files

FDE Full Disk Encryption

Full Disk Encryption All data is encrypted Including Swap & Hibernation files Better protection for stolen laptops Separate pre-boot authentication Disk unlocked at boot Still requires password after screensaver, sleep and hibernation

FDE Product Evaluation Ongoing PGP Enterprise Pointsec Winmagic SecureDoc Guardian Edge Compusec Bitlocker and others

OS Specific Encryption Most are windows only Bitlocker Vista Only Linux Open Source or Pointsec OS X FileVault or PGP Data Volumes or virtual disks

Hardware Disk Encryption Seagate and others have disks with encryption built-in Is it enterprise ready? Management tools are in development Can we make key backups? How will encryption keys be protected?

MS Bitlocker FDE Built into Vista Enterprise Managed via group policy Scriptable with WMI AD key backup Great pre-boot authentication Supported by MS

Bitlocker Pre-Boot Authentication Trusted Platform Module TPM Based Modes TPM only TPM + PIN TPM + USB Key USB Key Only Mode

USB Key Only

Bitlocker Disk Configuration Two NTFS drive partitions one for bitlocker one for the operating system volume Bitlocker partition must be at least 1.5 GB

Bitlocker Hardware Requirements TPM chip, version 1.2 Or USB key attached to user Trusted Computing Group (TCG) compliant BIOS Minimum requirements for Vista

How To Configure Bitlocker Bitlocker installation guide on Technet Partition drives before installing Vista Initialize TPM TPM MMC Enable Bitlocker Control Panel Create recovery password

Bitlocker AD Integration Backup recovery key in AD Disable encryption until key is stored Initialize TPM Backup TPM password or key in AD Select encryption strength AES 128 512 bit keys

Recovery Password 48 digit random number Saved to USB Key Saved to Network File Share Sent to Printer

Disaster Recovery TPM is not required for recovery Encrypted disk can be recovered on alternate system Boot normally Type in recovery password What happens if the drive fails? What about corrupt sectors?

Bitlocker Security Is Bitlocker Secure? Not yet FIPS 140-2 compliant Use BIOS password with TPM Does not support single sign-on TPM plus fingerprint reader

Performance FDE can slow disk usage 2x Most FDE is reasonable to use Copying large files will show latency Faster CPU will help

Vista Security Guide Best practices for implementing Bitlocker and EFS Great advice on preventing malware Templates and tools for Vista security http://www.microsoft.com/technet/win dowsvista/security/guide.mspx